Skip to main content

Polar Coding for Secret-Key Generation

Author(s): Chou, RA; Bloch, MR; Abbe, Emmanuel

To refer to this page use:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChou, RA-
dc.contributor.authorBloch, MR-
dc.contributor.authorAbbe, Emmanuel-
dc.identifier.citationChou, RA, Bloch, MR, Abbe, E. (2015). Polar Coding for Secret-Key Generation. IEEE Transactions on Information Theory, 61 (6213 - 6237. doi:10.1109/TIT.2015.2471179en_US
dc.description.abstractPractical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative approach based on polar codes that jointly deals with reliability and secrecy. Specifically, we propose secret-key capacity-achieving polar coding schemes for the following models: (i) the degraded binary memoryless source (DBMS) model with rate-unlimited public communication, (ii) the DBMS model with one-way rate-limited public communication, (iii) the 1-to-m broadcast model and (iv) the Markov tree model with uniform marginals. For models (i) and (ii) our coding schemes remain valid for non-degraded sources, although they may not achieve the secret-key capacity. For models (i), (ii) and (iii), our schemes rely on pre-shared secret seed of negligible rate; however, we provide special cases of these models for which no seed is required. Finally, we show an application of our results to secrecy and privacy for biometric systems. We thus provide the first examples of low-complexity secret-key capacity-achieving schemes that are able to handle vector quantization for model (ii), or multiterminal communication for models (iii) and (iv).en_US
dc.format.extent6213 - 6237en_US
dc.relation.ispartofIEEE Transactions on Information Theoryen_US
dc.rightsAuthor's manuscripten_US
dc.titlePolar Coding for Secret-Key Generationen_US
dc.typeJournal Articleen_US

Files in This Item:
File Description SizeFormat 
Polar Coding for Secret-Key Generation.pdf907.24 kBAdobe PDFView/Download

Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.