Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation

被引:0
作者
Zhang, Shengjun [1 ]
Jin, Liang [1 ]
Zhu, Shilei [2 ]
Huang, Kaizhi [1 ]
Zhong, Zhou [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou, Henan, Peoples R China
[2] 66393 Troops Postdoctoral Sci Res Workstn, Baoding, Peoples R China
来源
2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL) | 2018年
基金
中国国家自然科学基金;
关键词
Secret key generation; physical layer security; information reconciliation; secure polar code; AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
Focusing on the problem of information leakage in information reconciliation (IR), this paper proposes an IR method based on systematic secure polar code (SSPC), which can ensure the security of transmitted check bits. First, the upper and lower bounds of decoded bit error ratio are derived through Gaussian approximation. Then, the generic algorithm is utilized to design suitable SSPC for IR based on the initial quantified bit error ratios, key strength and IR outage probability (IROP). At last, the completely IR procedures are simulated to evaluate the performances of proposed IR method. Simulation results show that the proposed method not only satisfies the requirements of key strength and IROP threshold, but also achieves higher IR efficiency, compared with traditional low density parity check (LDPC) code based IR method.
引用
收藏
页数:6
相关论文
共 16 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2017, R11708890 3GPP TSG R
[3]   Systematic Polar Coding [J].
Arikan, Erdal .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (08) :860-862
[4]   Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels [J].
Arikan, Erdal .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (07) :3051-3073
[5]   Polar Coding for Secret-Key Generation [J].
Chou, Remi A. ;
Bloch, Matthieu R. ;
Abbe, Emmanuel .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) :6213-6237
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]   Does Gaussian Approximation Work Well for the Long-Length Polar Code Construction? [J].
Dai, Jincheng ;
Niu, Kai ;
Si, Zhongwei ;
Dong, Chao ;
Lin, Jiaru .
IEEE ACCESS, 2017, 5 :7950-7963
[8]  
Etesami J., 2012, 2012 1st IEEE International Conference on Communications in China (ICCC 2012), P208, DOI 10.1109/ICCChina.2012.6356879
[9]   A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding [J].
Kim, Young-Sik ;
Kim, Jong-Hwan ;
Kim, Sang-Hyo .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (06) :937-940
[10]   Polar Coding for Secure Transmission and Key Agreement [J].
Koyluoglu, O. Ozan ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) :1472-1483