@inproceedings{bff1afabe8a047fface39317f77f72d9,
title = "Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage",
abstract = "The key agreement problem with biometric or physical identifiers and two terminals for key enrollment and reconstruction is considered. A nested convolutional code construction that performs lossy compression with side information is proposed. Nested convolutional codes are an alternative to nested polar codes and nested random linear codes that achieve all points of the key-leakage-storage regions of the generated-secret and chosen-secret models for long block lengths. Our design uses a convolutional code for vector quantization during enrollment and a subcode of it for error correction during reconstruction. Physical identifiers with small bit error probability are considered to illustrate the gains of the proposed construction. One variant of nested convolutional codes improves on all previous constructions in terms of the key vs. storage rate ratio but it has high complexity. Another variant of nested convolutional codes with lower complexity performs similarly to previously designed nested polar codes. The results suggest that the choice of convolutional or polar codes for key agreement with identifiers depends on the complexity constraints.",
keywords = "convolutional codes, information privacy, nested codes, physical unclonable functions, tailbiting",
author = "Thomas Jerkovits and Onur G{\"u}nl{\"u} and Vladimir Sidorenko and Gerhard Kramer",
note = "Publisher Copyright: {\textcopyright} 2020 ACM.; 8th ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2020 ; Conference date: 22-06-2020 Through 24-06-2020",
year = "2020",
month = jun,
day = "22",
doi = "10.1145/3369412.3395063",
language = "English",
series = "IH and MMSec 2020 - Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security",
publisher = "Association for Computing Machinery, Inc",
pages = "79--89",
booktitle = "IH and MMSec 2020 - Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security",
}