• DocumentCode
    659102
  • Title

    Polar coding for secret-key generation

  • Author

    Chou, Remi A. ; Bloch, Matthieu R. ; Abbe, Emmanuel

  • Author_Institution
    Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
  • fYear
    2013
  • fDate
    9-13 Sept. 2013
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative scheme based on polar coding that jointly deals with reliability and secrecy. We study a binary degraded symmetric discrete memoryless source model with uniform marginals, and assume one-way rate-limited public communication between two legitimate users. Specifically, we propose secret-key capacity-achieving polar coding schemes, in which users rely on pre-shared secret seed of negligible rate. For the model studied, we thus provide the first example of low-complexity secret-key capacity-achieving scheme that handles vector quantization, for rate-limited public communication. Furthermore, we provide examples for which no seed is required.
  • Keywords
    data privacy; encoding; reliability; vector quantisation; binary degraded symmetric discrete memoryless source model; low-complexity secret-key capacity-achieving scheme; one-way rate-limited public communication; privacy amplification; rate-limited public communication; reconciliation amplification; reliability; secret-key capacity-achieving polar coding scheme; secret-key generation; sequential strategy; vector quantization; Decoding; Encoding; Iron; Privacy; Reliability; Tin; Zinc;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop (ITW), 2013 IEEE
  • Conference_Location
    Sevilla
  • Print_ISBN
    978-1-4799-1321-3
  • Type

    conf

  • DOI
    10.1109/ITW.2013.6691225
  • Filename
    6691225