Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative approach based on polar codes that jointly deals with reliability and secrecy. Specifically, we propose secret-key capacityachieving polar coding schemes for the following models: (i) the degraded binary memoryless source (DBMS) model with rateunlimited public communication, (ii) the DBMS model with oneway rate-limited public communication, (iii) the 1-to-m broadcast model and (iv) the Markov tree model with uniform marginals. For models (i) and (ii) our coding schemes remain valid for nondegraded sources, although they may not achieve the secret-key capacity. For models (i), (ii) and (iii), our schemes rely on preshared secret seed of negligible rate; however, we provide special cases of these models for which no seed is required. Finally, we show an application of our results to secrecy and privacy for biometric systems. We thus provide the first examples of lowcomplexity secret-key capacity-achieving schemes that are able to handle vector quantization for model (ii), or multiterminal communication for models (iii) and (iv).
@article{Chou2013b,
author = {Chou, R\'emi A. and Bloch, Matthieu R and Abbe, Emmanuel},
journal = {IEEE Transactions on Information Theory},
title = {Polar Coding for Secret-Key Generation},
year = {2015},
issn = {0018-9448},
month = nov,
number = {11},
pages = {6213-6237},
volume = {61},
creationdate = {2013-10-09T00:00:00},
doi = {10.1109/TIT.2015.2471179},
eprint = {1305.4746},
file = {:2015-Chou-IEEETransIT-Polar Coding for Secret-Key Generation.pdf:PDF},
groups = {Secret key agreement, Polar codes},
keywords = {Biological system modeling;Decoding;Encoding;Markov processes;Privacy;Protocols;Reliability},
owner = {mattbloch}
}