Polar coding for secure transmission and key agreement

O. Ozan Koyluoglu, Hesham El Gamal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations

Abstract

Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input degraded wiretap channels while enjoying their low encoding-decoding complexity. In the special case of symmetric main and eavesdropper channels, this coding technique achieves the secrecy capacity. Next, fading erasure wiretap channels are considered and a secret key agreement scheme is proposed, which requires only the statistical knowledge of the eavesdropper channel state information (CSI). The enabling factor is the creation of advantage over Eve, by blindly using the proposed scheme over each fading block, which is then exploited with privacy amplification techniques to generate secret keys.

Original languageEnglish (US)
Title of host publication2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
Pages2698-2703
Number of pages6
DOIs
StatePublished - 2010
Externally publishedYes
Event2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010 - Istanbul, Turkey
Duration: Sep 26 2010Sep 30 2010

Publication series

NameIEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC

Other

Other2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
Country/TerritoryTurkey
CityIstanbul
Period9/26/109/30/10

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Polar coding for secure transmission and key agreement'. Together they form a unique fingerprint.

Cite this