A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding

In this letter, a new secure information transmission scheme based on polar codes with a pre-shared secret key is proposed. In polar codes, after the channel polarization is induced, good split channels are used to transmit the user message and bad channels are utilized to support the reconstruction of the message by sharing fixed information. If the fixed information in bad channels is secret, an adversary gets difficulty in reconstructing the user message in good channels without knowledge of the fixed information. From this observation, we construct a secure information transmission scheme. By appending pre-/post-processing that imposes a dependency between the transmitted message sub-blocks, the adversary's difficulty can be changed to an intractability, since only partial information can be decodable by attackers. A new class of secret key scheme is developed in such a way.

[1]  Young-Sik Kim Refined Secure Network Coding Scheme with no Restriction on Coding Vectors , 2012, IEEE Communications Letters.

[2]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[3]  Shlomo Shamai,et al.  Secrecy-Achieving Polar-Coding for Binary-Input Memoryless Symmetric Wire-Tap Channels , 2010, ArXiv.

[4]  Mikael Skoglund,et al.  Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.

[5]  R. Urbanke,et al.  Polar codes are optimal for lossy source coding , 2009 .

[6]  Toshiyuki Tanaka,et al.  Performance of polar codes with the construction using density evolution , 2009, IEEE Communications Letters.

[7]  Rüdiger L. Urbanke,et al.  Polar Codes for Channel and Source Coding , 2009, ArXiv.

[8]  Emre Telatar,et al.  On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.

[9]  Erdal Arikan,et al.  Systematic Polar Coding , 2011, IEEE Communications Letters.

[10]  Rüdiger L. Urbanke,et al.  Polar Codes for Channel and Source Coding , 2009, ArXiv.

[11]  Ronald L. Rivest,et al.  All-or-Nothing Encryption and the Package Transform , 1997, FSE.

[12]  Onur Ozan Koyluoglu,et al.  Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[13]  Alexander Vardy,et al.  Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.