Polar Coding for Secret-Key Generation

被引:71
|
作者
Chou, Remi A. [1 ,2 ]
Bloch, Matthieu R. [1 ,2 ]
Abbe, Emmanuel [3 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Georgia Tech CNRS UMI, F-2958 Metz, France
[3] Princeton Univ, Sch Engn & Appl Sci, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Secret-key generation; polar codes; information-theoretic security; COMMON RANDOMNESS; CODES; AUTHENTICATION; POLARIZATION; CAPACITIES; BIOMETRICS; AGREEMENT; WIRETAP;
D O I
10.1109/TIT.2015.2471179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative approach based on polar codes that jointly deals with reliability and secrecy. Specifically, we propose secret-key capacity-achieving polar coding schemes for the following models: (i) the degraded binary memoryless source (DBMS) model with rate-unlimited public communication, (ii) the DBMS model with one-way rate-limited public communication, (iii) the 1-to-m broadcast model and (iv) the Markov tree model with uniform marginals. For models (i) and (ii) our coding schemes remain valid for non-degraded sources, although they may not achieve the secret-key capacity. For models (i), (ii) and (iii), our schemes rely on pre-shared secret seed of negligible rate; however, we provide special cases of these models for which no seed is required. Finally, we show an application of our results to secrecy and privacy for biometric systems. We thus provide the first examples of low-complexity secret-key capacity-achieving schemes that are able to handle vector quantization for model (ii), or multiterminal communication for models (iii) and (iv).
引用
收藏
页码:6213 / 6237
页数:25
相关论文
共 50 条
  • [1] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    [J]. 2013 IEEE INFORMATION THEORY WORKSHOP (ITW), 2013,
  • [2] Authentication Based on Secret-Key Generation
    Willems, Frans M. J.
    Ignatenko, Tanya
    [J]. 2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [3] Coding theorems for secret-key authentication systems
    Koga, H
    Yamamoto, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (08) : 1691 - 1703
  • [4] Coding theorems for secret-key authentication systems
    Koga, H
    Yamamoto, H
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 150 - 151
  • [5] SECRET-KEY SYSTEMS
    BRASSARD, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 8 - 19
  • [6] Secret-key generation with correlated sources and noisy channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 1005 - +
  • [7] Secret-Key Generation Using Correlated Sources and Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 652 - 670
  • [8] Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel
    Chou, Remi A.
    Bloch, Matthieu R.
    [J]. 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 277 - 280
  • [9] Limiting rate of secret-key generation in quantum cryptography in spacetime
    Molotkov, SN
    [J]. JETP LETTERS, 2002, 75 (10) : 521 - 526
  • [10] Limiting rate of secret-key generation in quantum cryptography in spacetime
    S. N. Molotkov
    [J]. Journal of Experimental and Theoretical Physics Letters, 2002, 75 : 521 - 526