-
arXiv:2002.11687 [pdf, ps, other]
Secure and Reliable Key Agreement with Physical Unclonable Functions
Abstract: Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the dec… ▽ More
Submitted 27 February, 2020; v1 submitted 26 February, 2020; originally announced February 2020.
Comments: An extra term in the last page due to the mismatch between the Arxiv compiler and MDPI template is eliminated. No other changes
Journal ref: MDPI Entropy Journal 20 (2018) 340:1-340:19
-
arXiv:1910.13240 [pdf, ps, other]
Sign-Bit Sha** Using Polar Codes
Abstract: A new polar coding scheme for higher order modulation is presented. The proposed scheme is based on multi-level coding (MLC) with natural labeling, where the bit-level corresponding to the sign-bit is generated in dependence on the previous bit-levels, such that the modulated symbols are distributed according to a target non-uniform distribution resulting in a sha** gain. This is realized by rep… ▽ More
Submitted 29 October, 2019; originally announced October 2019.
-
arXiv:1812.07864 [pdf, ps, other]
Probabilistically Shaped Multi-Level Coding with Polar Codes for Fading Channels
Abstract: A probabilistic sha** method for multi-level coding (MLC) is presented, where the transmitted symbols are forced to have a shaped non-uniform distribution. It is shown that sha** only a single bit-level suffices to compensate for most of the sha** loss on the fading channels. A polar code based implementation of the proposed scheme is presented, where sha** is performed by using a precoder… ▽ More
Submitted 19 December, 2018; originally announced December 2018.
-
arXiv:1808.09360 [pdf, ps, other]
Polar Codes with Integrated Probabilistic Sha** for 5G New Radio
Abstract: A modification to 5G New Radio (NR) polar code is proposed, which improves the error correction performance with higher order modulation through probabilistic sha**. The presented scheme mainly re-uses existing hardware at the transmitter, and modifications at the receiver are small. Simulation results show that the presented approach can improve the performance by up to 1dB for 256-QAM on AWGN… ▽ More
Submitted 28 August, 2018; originally announced August 2018.
Comments: This work is accepted for publication at IEEE 88th Vehicular Technology Conference (VTC 2018-Fall). Copyright IEEE 2018
-
arXiv:1709.00275 [pdf, ps, other]
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Abstract: The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during… ▽ More
Submitted 3 April, 2019; v1 submitted 1 September, 2017; originally announced September 2017.
Comments: To appear in IEEE Transactions on Information Forensics and Security
-
arXiv:1707.09753 [pdf, ps, other]
Polar Code Construction for List Decoding
Abstract: A heuristic construction of polar codes for successive cancellation list (SCL) decoding with a given list size is proposed to balance the trade-off between performance measured in frame error rate (FER) and decoding complexity. Furthermore, a construction based on dynamically frozen bits with constraints among the "low weight bits" (LWB) is presented. Simulation results show that the LWB-polar cod… ▽ More
Submitted 2 August, 2018; v1 submitted 31 July, 2017; originally announced July 2017.
Comments: 6 pages
-
Rate-Distortion Properties of Single-Layer Quantize-and-Forward for Two-Way Relaying
Abstract: The Quantize & Forward (QF) scheme for two-way relaying is studied with a focus on its rate-distortion properties. A sum rate maximization problem is formulated and the associated quantizer optimization problem is investigated. An algorithm to approximately solve the problem is proposed. Under certain cases scalar quantizers maximize the sum rate.
Submitted 3 February, 2014; originally announced February 2014.
Comments: Extended version of submission to ISIT 2014
-
arXiv:1301.6397 [pdf, ps, other]
Scalar Quantize-and-Forward for Symmetric Half-duplex Two-Way Relay Channels
Abstract: Scalar Quantize & Forward (QF) schemes are studied for the Two-Way Relay Channel. Different QF approaches are compared in terms of rates as well as relay and decoder complexity. A coding scheme not requiring Slepian-Wolf coding at the relay is proposed and properties of the corresponding sum-rate optimization problem are presented. A numerical scheme similar to the Blahut-Arimoto algorithm is deri… ▽ More
Submitted 27 January, 2013; originally announced January 2013.
Comments: Extended version of ISIT submission