Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation

Focusing on the problem of information leakage in information reconciliation (IR), this paper proposes an IR method based on systematic secure polar code (SSPC), which can ensure the security of transmitted check bits. First, the upper and lower bounds of decoded bit error ratio are derived through Gaussian approximation. Then, the generic algorithm is utilized to design suitable SSPC for IR based on the initial quantified bit error ratios, key strength and IR outage probability (IROP). At last, the completely IR procedures are simulated to evaluate the performances of proposed IR method. Simulation results show that the proposed method not only satisfies the requirements of key strength and IROP threshold, but also achieves higher IR efficiency, compared with traditional low density parity check (LDPC) code based IR method.

[1]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[2]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[3]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[4]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[5]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.

[6]  Yi Hong,et al.  Efficient Algorithms for Systematic Polar Encoding , 2016, IEEE Communications Letters.

[7]  Erdal Arikan,et al.  Systematic Polar Coding , 2011, IEEE Communications Letters.

[8]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[9]  Young-Sik Kim,et al.  A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding , 2014, IEEE Communications Letters.

[10]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[11]  Zhongwei Si,et al.  Does Gaussian Approximation Work Well for the Long-Length Polar Code Construction? , 2015, IEEE Access.

[12]  Mohamed-Slim Alouini,et al.  Secret Key Agreement: Fundamental Limits and Practical Challenges , 2017, IEEE Wireless Communications.

[13]  Onur Ozan Koyluoglu,et al.  Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[14]  Werner Henkel,et al.  LDPC code construction for wireless physical-layer key reconciliation , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).