Abstract
The polarization phenomenon for a single source is extended to a framework with multiple correlated sources. It is shown in addition to extracting the randomness of the source, the polar transforms take the original arbitrary dependencies to extremal dependencies. Polar coding schemes for the Slepian-Wolf (SW) coding problem and for secret key generations are then proposed based on this phenomenon. In particular, secret keys achieving the secrecy capacity and compression schemes achieving the SW capacity region are obtained with a complexity of O(n log (n)).
Original language | English (US) |
---|---|
Article number | 7055362 |
Pages (from-to) | 2388-2398 |
Number of pages | 11 |
Journal | IEEE Transactions on Information Theory |
Volume | 61 |
Issue number | 5 |
DOIs | |
State | Published - May 1 2015 |
All Science Journal Classification (ASJC) codes
- Information Systems
- Computer Science Applications
- Library and Information Sciences
Keywords
- Polar codes
- polarization
- randomness extraction