An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Polar coding for secret-key generation

RA Chou, MR Bloch, E Abbe - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Practical implementations of secret-key generation are often based on sequential strategies,
which handle reliability and secrecy in two successive steps, called reconciliation and …

Secure integrated sensing and communication

O Günlü, MR Bloch, RF Schaefer… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
This work considers the problem of mitigating information leakage between communication
and sensing in systems jointly performing both operations. Specifically, a discrete …

Information reconciliation schemes in physical-layer security: A survey

C Huth, R Guillaume, T Strohm, P Duplys, IA Samuel… - Computer Networks, 2016 - Elsevier
Abstract Information reconciliation is an essential part of physical-layer based key
agreement. It enables the equalization of similar, but disagreeing channel observations of …

Communication for generating correlation: A unifying survey

M Sudan, H Tyagi, S Watanabe - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The task of manipulating correlated random variables in a distributed setting has received
attention in the fields of both Information Theory and Computer Science. Often shared …

Code constructions for physical unclonable functions and biometric secrecy systems

O Günlü, O İşcan, V Sidorenko… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The two-terminal key agreement problem with biometric or physical identifiers is considered.
Two linear code constructions based on Wyner-Ziv coding are developed. The first …

Privacy, secrecy, and storage with multiple noisy measurements of identifiers

O Günlü, G Kramer - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The key-leakage-storage region is derived for a generalization of a classic two-terminal key
agreement model. The additions to the model are that the encoder observes a hidden, or …

Key agreement with physical unclonable functions and biometric identifiers

O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …

Secure joint communication and sensing

O Günlü, M Bloch, RF Schaefer… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
This work considers mitigation of information leakage between communication and sensing
operations in joint communication and sensing systems. Specifically, a discrete memoryless …

Secret-key agreement by asynchronous EEG over authenticated public channels

M Galis, M Milosavljević, A Jevremović, Z Banjac… - Entropy, 2021 - mdpi.com
In this paper, we propose a new system for a sequential secret key agreement based on 6
performance metrics derived from asynchronously recorded EEG signals using an EMOTIV …