Polar Coding for Secret-Key Generation

被引:71
|
作者
Chou, Remi A. [1 ,2 ]
Bloch, Matthieu R. [1 ,2 ]
Abbe, Emmanuel [3 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Georgia Tech CNRS UMI, F-2958 Metz, France
[3] Princeton Univ, Sch Engn & Appl Sci, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Secret-key generation; polar codes; information-theoretic security; COMMON RANDOMNESS; CODES; AUTHENTICATION; POLARIZATION; CAPACITIES; BIOMETRICS; AGREEMENT; WIRETAP;
D O I
10.1109/TIT.2015.2471179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative approach based on polar codes that jointly deals with reliability and secrecy. Specifically, we propose secret-key capacity-achieving polar coding schemes for the following models: (i) the degraded binary memoryless source (DBMS) model with rate-unlimited public communication, (ii) the DBMS model with one-way rate-limited public communication, (iii) the 1-to-m broadcast model and (iv) the Markov tree model with uniform marginals. For models (i) and (ii) our coding schemes remain valid for non-degraded sources, although they may not achieve the secret-key capacity. For models (i), (ii) and (iii), our schemes rely on pre-shared secret seed of negligible rate; however, we provide special cases of these models for which no seed is required. Finally, we show an application of our results to secrecy and privacy for biometric systems. We thus provide the first examples of low-complexity secret-key capacity-achieving schemes that are able to handle vector quantization for model (ii), or multiterminal communication for models (iii) and (iv).
引用
收藏
页码:6213 / 6237
页数:25
相关论文
共 50 条
  • [31] Obfustopia Built on Secret-Key Functional Encryption
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Tanaka, Keisuke
    [J]. JOURNAL OF CRYPTOLOGY, 2022, 35 (03)
  • [32] Secret-Key Generation Using Compound Sources and One-Way Public Communication
    Tavangaran, Nima
    Boche, Holger
    Schaefer, Rafael F.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 227 - 241
  • [33] Secret-key expansion from covert communication
    Arrazola, Juan Miguel
    Amiri, Ryan
    [J]. PHYSICAL REVIEW A, 2018, 97 (02)
  • [34] Secure Secret-Key Management of Kerberos Service
    Cao, Lai-Cheng
    [J]. EMERGING RESEARCH IN ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, 2011, 237 : 76 - 83
  • [35] Secret-Key Distribution Based on Bounded Observability
    Muramatsu, Jun
    Yoshimura, Kazuyuki
    Davis, Peter
    Uchida, Atsushi
    Harayama, Takahisa
    [J]. PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1762 - 1780
  • [36] A novel algorithm towards designing the protocol for generation of secret-key with authentication in collaboration (PGSAC)
    Mukherjee, Shyamasree
    Choudhury, Sankhayan
    Chaki, Nabendu
    Mukhopadhyay, Debajyoti
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY CONVERGENCE, PROCEEDINGS, 2007, : 353 - +
  • [37] Enhanced secret-key generation from atmospheric optical channels with the use of random modulation
    Chen, Chunyi
    LI, Qiong
    [J]. OPTICS EXPRESS, 2022, 30 (25) : 45862 - 45882
  • [38] Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio
    Jost, Daniel
    Maurer, Ueli
    Ribeiro, Joao L.
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 345 - 369
  • [39] A secret-key exponential key agreement protocol with smart cards
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 430 - +
  • [40] Secret-Key Generation: Full-Duplex Versus Half-Duplex Probing
    Vogt, Hendrik
    Awan, Zohaib Hassan
    Sezgin, Aydin
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (01) : 639 - 652