TY - GEN
T1 - Polar coding for secure transmission and key agreement
AU - Koyluoglu, O. Ozan
AU - El Gamal, Hesham
PY - 2010
Y1 - 2010
N2 - Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input degraded wiretap channels while enjoying their low encoding-decoding complexity. In the special case of symmetric main and eavesdropper channels, this coding technique achieves the secrecy capacity. Next, fading erasure wiretap channels are considered and a secret key agreement scheme is proposed, which requires only the statistical knowledge of the eavesdropper channel state information (CSI). The enabling factor is the creation of advantage over Eve, by blindly using the proposed scheme over each fading block, which is then exploited with privacy amplification techniques to generate secret keys.
AB - Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input degraded wiretap channels while enjoying their low encoding-decoding complexity. In the special case of symmetric main and eavesdropper channels, this coding technique achieves the secrecy capacity. Next, fading erasure wiretap channels are considered and a secret key agreement scheme is proposed, which requires only the statistical knowledge of the eavesdropper channel state information (CSI). The enabling factor is the creation of advantage over Eve, by blindly using the proposed scheme over each fading block, which is then exploited with privacy amplification techniques to generate secret keys.
UR - http://www.scopus.com/inward/record.url?scp=78751480777&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78751480777&partnerID=8YFLogxK
U2 - 10.1109/PIMRC.2010.5671797
DO - 10.1109/PIMRC.2010.5671797
M3 - Conference contribution
AN - SCOPUS:78751480777
SN - 9781424480166
T3 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
SP - 2698
EP - 2703
BT - 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
T2 - 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
Y2 - 26 September 2010 through 30 September 2010
ER -