Polar coding for secret-key generation

Rémi A. Chou, Matthieu R. Bloch, Emmanuel Abbe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative scheme based on polar coding that jointly deals with reliability and secrecy. We study a binary degraded symmetric discrete memoryless source model with uniform marginals, and assume one-way rate-limited public communication between two legitimate users. Specifically, we propose secret-key capacity-achieving polar coding schemes, in which users rely on pre-shared secret seed of negligible rate. For the model studied, we thus provide the first example of low-complexity secret-key capacity-achieving scheme that handles vector quantization, for rate-limited public communication. Furthermore, we provide examples for which no seed is required.

Original languageEnglish (US)
Title of host publication2013 IEEE Information Theory Workshop, ITW 2013
DOIs
StatePublished - 2013
Event2013 IEEE Information Theory Workshop, ITW 2013 - Seville, Spain
Duration: Sep 9 2013Sep 13 2013

Publication series

Name2013 IEEE Information Theory Workshop, ITW 2013

Other

Other2013 IEEE Information Theory Workshop, ITW 2013
Country/TerritorySpain
CitySeville
Period9/9/139/13/13

All Science Journal Classification (ASJC) codes

  • Information Systems

Fingerprint

Dive into the research topics of 'Polar coding for secret-key generation'. Together they form a unique fingerprint.

Cite this