# Rémi Chou

Assistant Professor in the Department of Electrical Engineering And Computer Science at Wichita State University.

### Scholarly works

###### Submitted
1. R. Chou, M. Bloch, and A. Yener, “Universal Covertness for Discrete Memoryless Sources.” submitted to IEEE Transactions on Information Theory, Jul. 2018.

Consider a sequence Xn of length n emitted by a Discrete Memoryless Source (DMS) with unknown distribution pX. The objective is to construct a lossless source code that maps Xn to a sequence Yˆm of length m that is indistinguishable, in terms of Kullback-Leibler divergence, from a sequence emitted by another DMS with known distribution pY. The main result is the existence of a coding scheme that performs this task with an optimal ratio m/n equal to H(X)/H(Y), the ratio of the Shannon entropies of the two distributions, as n goes to infinity. The coding scheme overcomes the challenges created by the lack of knowledge about pX by relying on a sufficiently fine estimation of H(X), followed by an appropriately designed type-based source coding that jointly performs source resolvability and universal lossless source coding. The result recovers and extends previous results that either assume pX or pY uniform, or pX known. The price paid for these generalizations is the use of common randomness with vanishing rate, whose length roughly scales as the square root of n. By allowing common randomness strictly larger than the square root of n but still negligible compared to n, a constructive low-complexity encoding and decoding counterpart to the main result is also provided for binary sources by means of polar codes.

@misc{Chou2018,
author = {Chou, R\'emi and Bloch, Matthieu and Yener, Aylin},
howpublished = {submitted to \emph{IEEE Transactions on Information Theory}},
month = jul,
title = {Universal Covertness for Discrete Memoryless Sources},
year = {2018},
eprint = {1808.05612}
}


2. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “The Effect of Eavesdropper’s Statistics in Experimental Wireless Secret-Key Generation.” submitted to IEEE Transactions on Information Forensics and Security, Jun. 2014.

@misc{Pierrot2013c,
author = {Pierrot, Alexandre J. and Chou, Remi A. and Bloch, Matthieu R.},
title = {The Effect of Eavesdropper's Statistics in Experimental Wireless Secret-Key Generation},
howpublished = {submitted to \emph{IEEE Transactions on Information Forensics and Security}},
month = jun,
year = {2014},
eprint = {1312.3304},
groups = {Experimental systems},
owner = {mattbloch},
timestamp = {2013.12.11}
}


###### Articles
1. R. A. Chou, M. R. Bloch, and J. Kliewer, “Empirical and Strong Coordination via Soft Covering with Polar Codes,” IEEE Transactions on Information Theory, vol. 64, no. 7, pp. 5087–5100, Jul. 2018.

We design polar codes for empirical coordination and strong coordination in two-node networks. Our constructions hinge on the fact that polar codes enable explicit low-complexity schemes for soft covering. We leverage this property to propose explicit and low-complexity coding schemes that achieve the capacity regions of both empirical coordination and strong coordination for sequences of actions taking value in an alphabet of prime cardinality. Our results improve previously known polar coding schemes, which (i) were restricted to uniform distributions and to actions obtained via binary symmetric channels for strong coordination, (ii) required a non-negligible amount of common randomness for empirical coordination, and (iii) assumed that the simulation of discrete memoryless channels could be perfectly implemented. As a by-product of our results, we obtain a polar coding scheme that achieves channel resolvability for an arbitrary discrete memoryless channel whose input alphabet has prime cardinality.

@article{Chou2016a,
author = {Chou, Remi A. and Bloch, Matthieu R. and Kliewer, Joerg},
title = {Empirical and Strong Coordination via Soft Covering with Polar Codes},
journal = {IEEE Transactions on Information Theory},
year = {2018},
volume = {64},
number = {7},
pages = {5087-5100},
month = jul,
issn = {0018-9448},
doi = {10.1109/TIT.2018.2817519},
eprint = {1608.08474},
groups = {Coordination of networks, Polar codes},
howpublished = {accepted to \emph{IEEE Transactions on Information Theory}}
}


2. R. A. Chou, B. N. Vellambi, M. R. Bloch, and J. Kliewer, “Coding Schemes for Achieving Strong Secrecy at Negligible Cost,” IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1858–1873, Mar. 2017.

We study the problem of achieving strong secrecy over wiretap channels at negligible cost, in the sense of maintaining the overall communication rate of the same channel without secrecy constraints. Specifically, we propose and analyze two source-channel coding architectures, in which secrecy is achieved by multiplexing public and confidential messages. In both cases, our main contribution is to show that secrecy can be achieved without compromising communication rate and by requiring only randomness of asymptotically vanishing rate. Our first source-channel coding architecture relies on a modified wiretap channel code, in which randomization is performed using the output of a source code. In contrast, our second architecture relies on a standard wiretap code combined with a modified source code termed uniform compression code, in which a small shared secret seed is used to enhance the uniformity of the source code output. We carry out a detailed analysis of uniform compression codes and characterize the optimal size of the shared seed.

@article{Chou2014b,
author = {Chou, R. A. and Vellambi, B. N. and Bloch, M. R. and Kliewer, J.},
title = {Coding Schemes for Achieving Strong Secrecy at Negligible Cost},
journal = {IEEE Transactions on Information Theory},
year = {2017},
volume = {63},
number = {3},
pages = {1858-1873},
month = mar,
issn = {0018-9448},
doi = {10.1109/TIT.2016.2645225},
eprint = {1508.07920},
groups = {Wiretap channels},
keywords = {channel coding;cryptography;message authentication;multiplexing;source coding;telecommunication security;asymptotically vanishing rate randomness;confidential messages;modified source code;modified wiretap channel code;multiplexing;optimal size characterization;public messages;shared secret seed;source code output uniformity enhancement;source-channel coding architectures;strong secrecy problem;uniform compression code;Channel models;Decoding;Encoding;Multiplexing;Physical layer;Security;Virtual private networks;Wiretap channel;multiplexing;physical-layer security;source coding},
owner = {mattbloch},
timestamp = {2014.06.15}
}


3. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2410–2429, May 2016.

We develop a low-complexity polar coding scheme for the discrete memoryless broadcast channel with confidential messages under strong secrecy and randomness constraints. Our scheme extends previous work by using an optimal rate of uniform randomness in the stochastic encoder, and avoiding assumptions regarding the symmetry or degraded nature of the channels. The price paid for these extensions is that the encoder and the decoders are required to share a secret seed of negligible size and to increase the block length through chaining. We also highlight a close conceptual connection between the proposed polar coding scheme and a random binning proof of the secrecy capacity region.

@article{Chou2014d,
author = {Chou, Remi A. and Bloch, Matthieu R},
title = {Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy},
journal = {IEEE Transactions on Information Theory},
year = {2016},
volume = {62},
number = {5},
pages = {2410-2429},
month = may,
issn = {0018-9448},
doi = {10.1109/TIT.2016.2539145},
eprint = {1411.0281},
groups = {Polar codes, Wiretap codes},
keywords = {Channel models;Decoding;Degradation;Encoding;Random variables;Security;Stochastic processes;Polar codes;physical-layer security;random binning;strong secrecy;wiretap channel},
owner = {mattbloch},
timestamp = {2014.10.31}
}


4. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” IEEE Transactions on Information Theory, vol. 61, no. 11, pp. 6213–6237, Nov. 2015.

Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative approach based on polar codes that jointly deals with reliability and secrecy. Specifically, we propose secret-key capacityachieving polar coding schemes for the following models: (i) the degraded binary memoryless source (DBMS) model with rateunlimited public communication, (ii) the DBMS model with oneway rate-limited public communication, (iii) the 1-to-m broadcast model and (iv) the Markov tree model with uniform marginals. For models (i) and (ii) our coding schemes remain valid for nondegraded sources, although they may not achieve the secret-key capacity. For models (i), (ii) and (iii), our schemes rely on preshared secret seed of negligible rate; however, we provide special cases of these models for which no seed is required. Finally, we show an application of our results to secrecy and privacy for biometric systems. We thus provide the first examples of lowcomplexity secret-key capacity-achieving schemes that are able to handle vector quantization for model (ii), or multiterminal communication for models (iii) and (iv).

@article{Chou2013b,
author = {Chou, Remi A. and Bloch, Matthieu R and Abbe, Emmanuel},
title = {Polar Coding for Secret-Key Generation},
journal = {IEEE Transactions on Information Theory},
year = {2015},
volume = {61},
number = {11},
pages = {6213-6237},
month = nov,
issn = {0018-9448},
doi = {10.1109/TIT.2015.2471179},
eprint = {1305.4746},
groups = {Secret key agreement, Polar codes},
keywords = {Biological system modeling;Decoding;Encoding;Markov processes;Privacy;Protocols;Reliability},
owner = {mattbloch},
timestamp = {2013.10.09}
}


5. R. A. Chou and M. R. Bloch, “Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation,” IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4941–4957, Aug. 2014.

For a discrete or a continuous source model, we study the problem of secret-key generation with one round of rate-limited public communication between two legitimate users. Although we do not provide new bounds on the wiretap secret-key (WSK) capacity for the discrete source model, we use an alternative achievability scheme that may be useful for practical applications. As a side result, we conveniently extend known bounds to the case of a continuous source model. Specifically, we consider a sequential key-generation strategy, that implements a rate-limited reconciliation step to handle reliability, followed by a privacy amplification step performed with extractors to handle secrecy. We prove that such a sequential strategy achieves the best known bounds for the rate-limited WSK capacity (under the assumption of degraded sources in the case of two-way communication). However, we show that, unlike the case of rate-unlimited public communication, achieving the reconciliation capacity in a sequential strategy does not necessarily lead to achieving the best known bounds for the WSK capacity. Consequently, reliability and secrecy can be treated successively but not independently, thereby exhibiting a limitation of sequential strategies for rate-limited public communication. Nevertheless, we provide scenarios for which reliability and secrecy can be treated successively and independently, such as the two-way rate-limited SK capacity, the one-way rate-limited WSK capacity for degraded binary symmetric sources, and the one-way rate-limited WSK capacity for Gaussian degraded sources.

@article{Chou2012a,
author = {Chou, Remi A. and Bloch, Matthieu R},
title = {Separation of Reliability and Secrecy in Rate-Limited Secret Key-Distillation},
journal = {IEEE Transactions on Information Theory},
year = {2014},
volume = {60},
number = {8},
pages = {4941--4957},
month = aug,
citeseerurl = {1210.4482},
doi = {10.1109/TIT.2014.2323246},
eprint = {1210.4482},
groups = {Secret key agreement},
owner = {mattbloch},
timestamp = {2012.09.24}
}


###### Conference proceedings
1. R. A. Chou, M. R. Bloch, and A. Yener, “Universal covertness for Discrete Memoryless Sources,” in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, Aug. 2016, pp. 516–523.

Consider a sequence S of length n emitted by a Discrete Memoryless Source (DMS) with unknown distribution p. We wish to construct a lossless source code that maps S to a sequence S’ of minimal length m such that S’ approximates in terms of Kullback-Leibler divergence a sequence emitted by another DMS with known distribution q. Our main result is the existence of a coding scheme that performs such a task with an asymptotically optimal compression rate, i.e., such that the limit of m/n is H(p)/H(q) as n goes to infinity. Our coding scheme overcomes the challenges created by the lack of knowledge about p by relying on a sufficiently fine estimation of H(p), followed by an appropriately designed type-based compression that jointly performs source resolvability and universal lossless source coding. Our result recovers several previous results that either assume p uniform, or q uniform, or p known. The price paid for these generalizations is the use of common randomness with vanishing rate. We further determine that the length of the latter roughly scales as the square root of n, by an analysis of second order asymptotics and error exponents.

@inproceedings{Chou2016,
author = {Chou, Remi A. and Bloch, Matthieu R. and Yener, Aylin},
title = {Universal covertness for Discrete Memoryless Sources},
booktitle = {54th Annual Allerton Conference on Communication, Control, and Computing (Allerton)},
year = {2016},
pages = {516-523},
month = aug,
doi = {10.1109/ALLERTON.2016.7852275},
groups = {Steganography and covert communications},
keywords = {source coding;DMS;discrete memoryless source;error exponent analysis;second order asymptotic analysis;source resolvability;universal covertness;universal lossless source coding;Decoding;Entropy;Estimation;Random variables;Reliability;Source coding},
owner = {mattbloch},
timestamp = {2016.01.26}
}


2. R. A. Chou and M. R. Bloch, “Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes,” in Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2015, pp. 1380–1385.

We show how to replace some of the randomized decisions in the encoding and decoding of polar codes by deterministic decisions. Specifically, we prove that random decisions on low-entropy bits may be replaced by an argmax decision without any loss of performance. We illustrate the usefulness of this result in the case of polar coding for the Wyner-Ziv problem and for channel coding.

@inproceedings{Chou2015a,
author = {Chou, R. A. and Bloch, M. R.},
title = {Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes},
booktitle = {Proc. of 53rd Annual Allerton Conference on Communication, Control, and Computing},
year = {2015},
pages = {1380-1385},
month = sep,
doi = {10.1109/ALLERTON.2015.7447169},
groups = {Polar codes},
keywords = {channel coding;Wyner-Ziv problem;argmax decision;channel coding;deterministic decisions;low-entropy bits;polar codes;Channel coding;Computers;Couplings;Decoding;Distortion;Source coding},
owner = {mattbloch},
timestamp = {2015.07.07}
}


3. R. A. Chou, M. R. Bloch, and J. Kliewer, “Polar Coding for Empirical and Strong Coordination via Distribution Approximation,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 1512–1516.

We design low-complexity polar codes for empirical and strong coordination in two-node network. Our constructions hinge on the observation that polar codes may be used to approximate distribution; which we leverage to prove that nested polar codes achieve the capacity region of empirical coordination and strong coordination.

@inproceedings{Chou2015,
author = {Chou, R\'emi A. and Bloch, Matthieu R and Kliewer, Joerg},
title = {Polar Coding for Empirical and Strong Coordination via Distribution Approximation},
booktitle = {Proc. of IEEE International Symposium on Information Theory},
year = {2015},
pages = {1512--1516},
month = jun,
doi = {10.1109/ISIT.2015.7282708},
groups = {Polar codes, Coordination of networks},
howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}},
keywords = {Approximation methods;Convergence;Decoding;Encoding;Joints;Probability distribution;Random variables},
owner = {mattbloch},
timestamp = {2015.01.27}
}


4. B. N. Vellambi, M. R. Bloch, R. A. Chou, and J. Kliewer, “Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?,” in Proc. of IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015, pp. 2171–2175.

It is known that a sub-linear rate of source-independent random seed (common randomness) can enable the construction of lossless compression codes whose output is nearly uniform under the variational distance (Chou-Bloch-ISIT’13). This work uses finite-blocklength techniques to present an alternate proof that for near-uniform lossless compression, the seed length has to grow strictly larger than n, where n represents the blocklength of the lossless compression code. In the lossy setting, we show the surprising result that a seed is not required to make the encoder output nearly uniform.

@inproceedings{Vellambi2015,
author = {Vellambi, Badri N. and Bloch, Matthieu R and Chou, R\'emi A and Kliewer, Joerg},
title = {Lossless and Lossy Source Compression with Near-Uniform Outputs: Is Common Randomness Always Required?},
booktitle = {Proc. of IEEE International Symposium on Information Theory},
year = {2015},
pages = {2171--2175},
month = jun,
doi = {10.1109/ISIT.2015.7282840},
groups = {Randomness processing},
howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}},
keywords = {Decoding;Distortion;Encoding;Manganese;Random variables;Tin;Finite-blocklength techniques;Lossless coding;Rate-distortion;Source coding},
owner = {mattbloch},
timestamp = {2015.01.27}
}


5. R. A. Chou and M. R. Bloch, “Polar Coding for the Broadcast Channel with Confidential Messages,” in Proc. of IEEE Information Theory Workshop, Jerusalem, Israel, Apr. 2015, pp. 1–5.

We develop a low-complexity and secrecy capacity achieving polar coding scheme for the discrete memoryless wiretap channel. Our scheme extends previous work by using a nearly optimal amount of uniform randomness in the stochastic encoder, and avoiding assumptions regarding the symmetry or degraded nature of the channels. The price paid for these extensions is that the encoder and decoder are required to share a secret seed of negligible size. We also highlight a close conceptual connection between the proposed polar coding scheme and a random binning proof of the secrecy capacity.

@inproceedings{Chou2014e,
author = {Chou, R\'emi A. and Bloch, Matthieu R},
title = {Polar Coding for the Broadcast Channel with Confidential Messages},
booktitle = {Proc. of IEEE Information Theory Workshop},
year = {2015},
pages = {1-5},
month = apr,
doi = {10.1109/ITW.2015.7133142},
groups = {Wiretap codes, Polar codes},
howpublished = {accepted to \emph{IEEE Information Theory Workshop}},
keywords = {broadcast channels;channel capacity;channel coding;decoding;broadcast channel;channel symmetry;confidential messages;decoder;discrete memoryless wiretap channel;polar coding scheme;secrecy capacity;stochastic encoder;Channel coding;Decoding;Entropy;Joints;Parity check codes;Stochastic processes},
owner = {mattbloch},
timestamp = {2014.11.13}
}


6. R. A. Chou, M. R. Bloch, and J. Kliewer, “Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel,” in Proc. of IEEE Information Theory Workshop, Hobart, Tasmania, Nov. 2014, pp. 466–470.

@inproceedings{Chou2014,
author = {Chou, R\'emi A. and Bloch, Matthieu R and Kliewer, J\"org},
title = {Low-Complexity Channel Resolvability Codes for the Symmetric Multiple-Access Channel},
booktitle = {Proc. of IEEE Information Theory Workshop},
year = {2014},
pages = {466--470},
month = nov,
doi = {10.1109/ITW.2014.6970875},
groups = {Randomness processing},
howpublished = {accepted to \emph{IEEE Information Theory Workhop}},
owner = {mattbloch},
timestamp = {2014.01.24}
}


7. R. A. Chou and M. R. Bloch, “Uniform Distributed Source Coding for the Multiple Access Wiretap Channel,” in Proc. of IEEE Conference on Communications and Network Security, San Francisco, CA, Oct. 2014, pp. 127–132.

@inproceedings{Chou2014c,
author = {Chou, Remi A. and Bloch, Matthieu R},
title = {Uniform Distributed Source Coding for the Multiple Access Wiretap Channel},
booktitle = {Proc. of IEEE Conference on Communications and Network Security},
year = {2014},
pages = {127--132},
month = oct,
doi = {10.1109/CNS.2014.6997477},
groups = {Wiretap channels},
howpublished = {accepted at \emph{IEEE Conference on Communications and Network Security: Wokshop on Physical-layer Methods for Wireless Security} (invited)},
owner = {mattbloch},
timestamp = {2014.07.07}
}


8. R. A. Chou and M. R. Bloch, “Secret-Key Generation with Arbitrarily Varying Eavesdropper’s Channel,” in Proc. of Global Conference on Signal and Information Processing, Austin, TX, Sep. 2013, pp. 277–280.

@inproceedings{Chou2013c,
author = {Chou, R\'emi A. and Bloch, Matthieu R},
title = {Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel},
booktitle = {Proc. of Global Conference on Signal and Information Processing},
year = {2013},
pages = {277--280},
month = sep,
doi = {10.1109/GlobalSIP.2013.6736869},
groups = {Secret key agreement},
owner = {mattbloch},
timestamp = {2013.10.21}
}


9. R. A. Chou and M. R. Bloch, “Data compression with nearly uniform ouput,” in Proc. of IEEE International Symposium on Information Theory, Istanbul, Turkey, Jul. 2013, pp. 1979–1983.

For any lossless fixed-length compression scheme operating at the optimal coding rate, it is known that the encoder output is not uniform in variational distance, which yet might be desirable in some security schemes. In the case of independent and identically distributed (i.i.d.) sources, uniformity in divergence might be achieved if a uniformly distributed sequence, called seed, of length dn negligible compared to the message length n, is shared between the encoder and the decoder. We show that the optimal scaling of dn that jointly ensures an optimal coding rate and a uniform encoder output in divergence, is roughly on the order of sqrt(n). We also develop a near optimal achievability scheme using invertible extractors.

@inproceedings{Chou2013,
author = {Chou, Remi A. and Bloch, Matthieu R.},
title = {Data compression with nearly uniform ouput},
booktitle = {Proc. of IEEE International Symposium on Information Theory},
year = {2013},
pages = {1979-1983},
month = jul,
doi = {10.1109/ISIT.2013.6620572},
file = {:Users/mattbloch/Documents/Publications/2013-Chou-ISIT.pdf:PDF},
groups = {Randomness processing},
issn = {2157-8095}
}


10. R. A. Chou, M. R. Bloch, and E. Abbe, “Polar Coding for Secret-Key Generation,” in Proc. of IEEE Information Theory Workshop, Sevilla, Spain, Apr. 2013, pp. 1–5.

Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative scheme based on polar coding that jointly deals with reliability and secrecy. We study a binary degraded symmetric discrete memoryless source model with uniform marginals, and assume one-way rate-limited public communication between two legitimate users. Specifically, we propose secret-key capacity-achieving polar coding schemes, in which users rely on pre-shared secret seed of negligible rate. For the model studied, we thus provide the first example of low-complexity secret-key capacity-achieving scheme that handles vector quantization, for rate-limited public communication. Furthermore, we provide examples for which no seed is required.

@inproceedings{Chou2013a,
author = {Chou, R\'emi A. and Bloch, Matthieu R. and Abbe, Emmanuel},
title = {Polar Coding for Secret-Key Generation},
booktitle = {Proc. of IEEE Information Theory Workshop},
year = {2013},
pages = {1-5},
month = apr,
doi = {10.1109/ITW.2013.6691225},
eprint = {1305.4746},
groups = {Secret key agreement, Polar codes},
howpublished = {accepted to \emph{IEEE Information Theory Workshop}},
owner = {mattbloch},
timestamp = {2013.03.07}
}


11. A. J. Pierrot, R. A. Chou, and M. R. Bloch, “Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments,” in Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications, Apr. 2013.

This paper proposes a proof-of-principle design of a secret key generation system along with the desirable secrecy analysis to guarantee information-theoretic security. We conduct physical experiments on programmable radios in an indoor environment to analyze the statistical characteristics of the induced source that we employ to generate secret keys. We also provide a generic security analysis of the system, and we give an estimate of the achievable secret key rates for a target information leakage in the finite block-length regime.

@inproceedings{Pierrot2013a,
author = {Pierrot, Alexandre J. and Chou, R\'emi A. and Bloch, Matthieu R.},
title = {Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments},
booktitle = {Proc. of Signal IEEE 4th Workshop on Signal Processing Advances in Wireless Communications},
year = {2013},
month = apr,
doi = {10.1109/SPAWC.2013.6612134},
file = {:../Publications/2013-Pierrot-SPAWC.pdf:PDF},
groups = {Experimental systems},
howpublished = {accepted to \emph{IEEE Workshop on Signal Processing Advances in Wireless Communications}},
owner = {mattbloch},
timestamp = {2013.02.13}
}


12. R. A. Chou and M. R. Bloch, “One-way rate-limited sequential key-distillation,” in Proc. IEEE International Symp.Information Theory, Cambridge, MA, Jul. 2012, pp. 1777–1781.

We study the problem of key-distillation for a source model, with a one-way and rate-limited public communication between two legitimate users. Although, the secret-key capacity is already known, we provide an alternative achievability scheme, that directly translates into practical designs. We consider a sequential key-distillation strategy, which consists of a reconciliation phase followed by a privacy amplification phase performed with extractors. We determine the reconciliation capacity and show that, for a degraded source, such a sequential strategy leads to an optimal key-distillation strategy that achieves the secret-key capacity. We illustrate our results in the case of a binary source model.

@inproceedings{Chou2012,
author = {Chou, Remi A. and Bloch, Matthieu R.},
title = {One-way rate-limited sequential key-distillation},
booktitle = {Proc. IEEE International Symp.Information Theory},
year = {2012},
pages = {1777--1781},