DocumentCode
659102
Title
Polar coding for secret-key generation
Author
Chou, Remi A. ; Bloch, Matthieu R. ; Abbe, Emmanuel
Author_Institution
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
fYear
2013
fDate
9-13 Sept. 2013
Firstpage
1
Lastpage
5
Abstract
Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative scheme based on polar coding that jointly deals with reliability and secrecy. We study a binary degraded symmetric discrete memoryless source model with uniform marginals, and assume one-way rate-limited public communication between two legitimate users. Specifically, we propose secret-key capacity-achieving polar coding schemes, in which users rely on pre-shared secret seed of negligible rate. For the model studied, we thus provide the first example of low-complexity secret-key capacity-achieving scheme that handles vector quantization, for rate-limited public communication. Furthermore, we provide examples for which no seed is required.
Keywords
data privacy; encoding; reliability; vector quantisation; binary degraded symmetric discrete memoryless source model; low-complexity secret-key capacity-achieving scheme; one-way rate-limited public communication; privacy amplification; rate-limited public communication; reconciliation amplification; reliability; secret-key capacity-achieving polar coding scheme; secret-key generation; sequential strategy; vector quantization; Decoding; Encoding; Iron; Privacy; Reliability; Tin; Zinc;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Workshop (ITW), 2013 IEEE
Conference_Location
Sevilla
Print_ISBN
978-1-4799-1321-3
Type
conf
DOI
10.1109/ITW.2013.6691225
Filename
6691225
Link To Document