WO2017177610A1 - Coding method and device - Google Patents
Coding method and device Download PDFInfo
- Publication number
- WO2017177610A1 WO2017177610A1 PCT/CN2016/098729 CN2016098729W WO2017177610A1 WO 2017177610 A1 WO2017177610 A1 WO 2017177610A1 CN 2016098729 W CN2016098729 W CN 2016098729W WO 2017177610 A1 WO2017177610 A1 WO 2017177610A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- matrix
- check matrix
- channel
- fading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/11—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Definitions
- Embodiments of the present invention relate to, but are not limited to, the field of communications, and in particular, to an encoding method and apparatus.
- the study of physical layer security in wireless communication systems stems from related techniques for eavesdropping channels.
- eavesdropping channels a channel model in which a peer-to-peer communication system is eavesdropped by an eavesdropper is studied.
- the related technique for eavesdropping channel uses conditional entropy to define the eavesdropper's doubts about confidential messages, and gives the maximum value of information transmission efficiency when the eavesdropper has the highest degree of confusion, that is, the security capacity.
- a random binning coding technique is proposed. This technology has become one of the most common coding techniques in considering a secure channel model.
- Random boxing means that the sent message is in one-to-one correspondence with a codebook (a collection of codewords).
- a codebook a collection of codewords.
- the sender sends a specific message, it first finds the codebook corresponding to the message, and then randomly selects a codeword in the codebook to send out, and the codeword serves as the output of the encoder.
- the eavesdropping channel model is proposed, constructing the actual codeword that can approach the safe capacity becomes a new research direction in the field of coding.
- the eavesdropping channel is Gaussian noise and the main channel is noiseless
- the coset coding scheme is adopted and the subcode is any good coded dual code that can reach the eavesdropping channel capacity, and the information theory meaning can be achieved. On the security.
- the research on eavesdropping channels is mainly directed to the case of discrete memoryless and Gaussian noise. It must be pointed out here that the above two noise scenarios are quite different from the actual wireless channel.
- the actual wireless channel is a time-varying fading channel, usually using a Rayleigh fading channel to simulate the actual wireless channel.
- the safety capacity of the time-varying fading eavesdropping channel model is further studied.
- the random packing coding technique is also used.
- the related art also uses the Turbo code, the Polar code, the BCH code, the Reed-Solomon code and the concatenated code. Technical solution, but there are problems with security.
- an encoding method comprising: encoding a to-be-transmitted message on a primary channel according to a parity check matrix H * , wherein a coefficient fading matrix diag (h) through a Rayleigh fading primary channel b ) and the check matrix H when there is no fading determines the H * , the message to be transmitted includes: a real message s k and a random message d lk .
- the method further includes: sending the encoded message to be sent.
- the check matrix H * is a check matrix of a low-density parity check code LDPC code having a codeword length of n+k bits and a message length of 1 bit, where k ⁇ l ⁇ n+k,
- the real message s k includes k bits
- the random message d lk includes lk bits
- the codeword length encoded by the check matrix H * is n+k bits
- n, k, l are positive integers.
- n, k, l satisfy the following equation:
- diag(h e ) is a coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the primary channel
- SNR 1 and SNR 2 are respectively a signal to noise ratio of the primary channel and the eavesdropping channel, and a value of SNR 2 Less than the value of SNR 1 .
- the method further includes:
- the method further comprises: the actual transmission efficiency of the codeword r n+k is smaller than the channel capacity of the primary channel.
- an encoding apparatus including:
- An encoding module arranged to encode the parity check matrix H * based on the transmitted message to be the main channel, wherein the coefficient Rayleigh fading primary channel fading matrix diag (h b) and the check matrix H at the time of no fading determining H * , the to-be-sent message includes: a real message s k and a random message d lk .
- the method further includes: a sending module, configured to send the encoded message to be sent.
- the check matrix H * obtained by the encoding module is a check matrix of a low density parity check code LDPC code with a codeword length of n+k bits and a message length of 1 bit;
- the real message s k includes k bits
- the random message d lk includes lk bits
- the to-be-sent message is encoded by the check matrix H *
- the codeword length is n+k bits, and n, k, and l are positive integers.
- n, k, l satisfy the following equation:
- diag(h e ) is a coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the primary channel
- SNR 1 and SNR 2 are respectively a signal to noise ratio of the primary channel and the eavesdropping channel, and a value of SNR 2 Less than the value of SNR 1 .
- the embodiment of the present invention further provides a computer readable storage medium storing computer executable instructions for performing the encoding method of any of the above.
- the technical solution for encoding the real message and the random message in the message to be sent according to the check matrix H * is adopted in the embodiment of the present invention, and the problem that the coding technology cannot satisfy the information security in the related art is solved, thereby improving the security of the primary channel.
- Sex, eavesdropping channel can't decipher the effect of the message actually sent.
- FIG. 1 is a flow chart of an encoding method in accordance with an embodiment of the present invention.
- FIG. 2 is a block diagram showing the structure of an encoding apparatus according to an embodiment of the present invention.
- FIG. 3 is a channel model applied in accordance with a preferred embodiment of the present invention.
- FIG. 4 is a diagram showing a relationship between a ratio of a signal to noise ratio of a primary channel and an eavesdropping channel and an error rate of an eavesdropper according to a preferred embodiment of the present invention
- FIG. 5 is a schematic diagram showing another relationship between the ratio of the signal to noise ratio of the primary channel and the eavesdropping channel and the error rate of the eavesdropper according to a preferred embodiment of the present invention
- FIG. 6 is a diagram showing still another relationship between the ratio of the signal to noise ratio of the primary channel and the eavesdropping channel and the error rate of the eavesdropper according to a preferred embodiment of the present invention.
- FIG. 1 is a flowchart of an encoding method according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
- Step S102 based on the parity check matrix H * message to be transmitted on the primary channel encoding, wherein the matrix diag (h b) and the check matrix H is determined when there is no fading coefficients H * by the primary channel fading Rayleigh fading,
- the message to be sent includes: a real message s k and a random message d lk .
- the embodiment of the present invention further includes: Step S104, sending the coded to-be-sent message.
- the technical solution for encoding the real message and the random message in the message to be sent according to the check matrix H * is solved, and the problem that the coding technology cannot satisfy the information security in the related art is solved, thereby improving the security of the main channel.
- the eavesdropping channel cannot decipher the effect of the message actually sent.
- H * diag (h b ) H
- the check matrix H * is a check matrix of a low-density parity check code (LDPC) having a codeword length of n+k bits and a message length of 1 bit, where k ⁇ l ⁇ n+k,s k includes k bits, d lk includes lk bits, and the length of the codeword encoded by the check matrix H * to be transmitted is n+k bits; wherein n, k, l are positive integers.
- LDPC low-density parity check code
- n, k, l satisfy the following equation: Where diag(h e ) is the coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the main channel, and SNR 1 and SNR 2 are the signal-to-noise ratios of the main channel and the eavesdropping channel, respectively, and the value of SNR 2 is smaller than the value of SNR 1 .
- any small (nearly 0) decoding error probability index can be achieved.
- the eavesdropper consumes all of its decoding capabilities on the translated random message bit k, the eavesdropper cannot decode the transmitted real message bit k at all.
- the simulation results show that when the signal-to-noise ratio of the eavesdropping channel is relatively large, the error rate of the eavesdropper translating the real message bit k is close to 0.5, that is, the secure coding and coding method designed by the embodiment of the present invention approaches absolute security (ie, information-based security). ).
- the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
- the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
- an encoding device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and will not be described again.
- the term “module” may implement a combination of software and/or hardware of a predetermined function.
- the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 2 is a structural block diagram of an encoding apparatus according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes:
- Encoding module 20 arranged to encode the parity check matrix H * based on the transmitted message to be the main channel, wherein the coefficient primary channel fading Rayleigh fading matrix diag (h b) and the check matrix H determined when there is no fading H * , the message to be sent includes: a real message s k and a random message d lk .
- the embodiment of the present invention further includes: a sending module 22, configured to send the encoded message to be sent.
- the technical solution of encoding the real message and the random message in the message to be sent according to the check matrix H * is solved, and the problem that the coding technology cannot satisfy the information security in the related art is solved, thereby achieving the improvement of the main Channel security, the eavesdropping channel can't decipher the effect of the real sent message.
- the matrix H * encodes the message to be sent with a length of n+k bits, and n, k, and l are positive integers.
- n, k, l satisfy the following equation:
- diag(h e ) is the coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the main channel
- SNR 1 and SNR 2 are the signal-to-noise ratios of the main channel and the eavesdropping channel, respectively, and the value of SNR 2 is smaller than the value of SNR 1 .
- each of the above modules may be implemented by software or hardware.
- the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
- v b and v e represent the noise of the legitimate user and the eavesdropper channel, respectively, and they all have a mean of 0, and the variances are respectively Gaussian noise
- diag(h b ) diag(h e ) is a matrix of channel fading coefficients, and is a diagonal matrix as follows,
- h b,i ,h e,i (1 ⁇ i ⁇ n) are complex Gaussian random variables, and their variances are respectively It is not difficult to know from the above definition that
- the obtained new generation matrix can be used as a generation matrix of the Rayleigh fading eavesdropping channel security coding scheme.
- the secure coding and decoding scheme of the Rayleigh fading eavesdropping channel can be designed.
- the related art on the eavesdropping channel indicates that if the eavesdropper knows the specific message sent, if the eavesdropper can obtain the code corresponding to the specific message.
- the random codeword sent is correctly found ("translated") in the word box, the ability of the eavesdropper to decode is consumed.
- the codeword box corresponding to the specific message is also regarded as a new codeword, we hope that the transmission efficiency corresponding to the new codeword is equal to the channel capacity of the eavesdropping channel, because this represents the entire eavesdropper.
- the decoding power is consumed by translating the new codeword so that he has no additional ability to translate which message was sent.
- the designed secure coding scheme needs to have the following three characteristics: (a) the code Dividable The channel capacity C (SNR 2 ) of the eavesdropping channel; (c) given the transmitted message bit k, a random selection of one codeword from its corresponding subcode is sent.
- the scheme of the secure coding and coding scheme can be implemented by the following steps:
- the 1-bit message contains a k-bit real transmission message and a 1-k-bit random message. Obviously, l satisfies the following constraint k ⁇ l ⁇ n + k.
- the encoding method described in the proof of the secure coding theorem of the eavesdropping channel model that is, when the transmitted k-bit message is determined, randomly selects a codeword from its corresponding codeword box.
- the check matrix designed above is H
- the LDPC code of length n+k bits is divided into 2 k subcodes according to the k-bit real message, and each subcode has a length of n bits.
- This type of subcode is also a linear block code, and the message bits of the subcode are lk-bit random messages.
- the coding mode of “selecting one codeword transmission from the subcodes randomly” is implemented in the following manner: (a) randomly generating a random message of lk bits by a random number generator; (b) randomly selecting the lk bits; The message generates a one-to-one codeword through the generation matrix of the linear block code, and then the codeword is transmitted.
- the actual transmission efficiency of the above subcode is
- the parity transmission matrix is H
- the codeword length is n+k bits
- the actual transmission efficiency of the LDPC code with a message length of 1 bit is
- the check matrix is H
- the codeword length is n+k bits
- the LDPC code with a message length of 1 bit is designed as follows: (a) the check matrix H is reduced to [A
- the B matrix is a matrix with a row number of n+kl and a column number of l.
- c n+kl represents a parity bit of n+k1 bits after encoding.
- Equation (4) gives the formula for calculating the check digit of the codeword when the real message s k and the randomly generated message d lk are known. After knowing the parity bit, the codeword r n+k obtained by checking the matrix H can be expressed as shown in equation (5):
- the actual transmission efficiency of the codeword r n+k It is smaller than the channel capacity of the primary channel, so the legitimate user can simultaneously decode the real message s k and the randomly generated message d lk with a decoding error probability close to zero.
- the eavesdropper first of all, I hope that he will consume all of his decoding ability on the correctly translated subcode r n , here, as in formula (6),
- r n is to delete the real message s k sent in r n+k , that is, r n is a subcode of r n+k .
- the message is d lk
- the eavesdropper can correctly translate d lk
- all its decoding capabilities are consumed on the translated d lk . Since the actual transmission efficiency of the codeword r n+k is greater than the channel capacity of the eavesdropping channel, it can be known from Shannon's theorem that the error probability of the eavesdropper translating r n+k cannot be close to zero.
- Both the legitimate user and the eavesdropper decoder adopt the classical BP decoding algorithm, and the decoding algorithm is divided into the following steps: (1) firstly priori probability of the information bit of the Rayleigh fading channel; (2) by the information node The information probability is obtained according to the belief propagation algorithm, and the posterior probability of each check node is obtained; (3) the posterior probability of the information node is derived from the posterior probability of the check node; (4) the posterior probability of the information node is compared with the judgment The condition is a hard decision. If it is satisfied, the decoding ends. If it is not satisfied, the above steps (2) to (4) are repeated, and the iteration is repeated until the condition is satisfied, and the decoding result is obtained. If the number of iterations reaches a preset maximum The number of times (for example, 100), if the condition is still not met, the decoding failure is declared;
- FIG. 3 is a channel model applied according to a preferred embodiment of the present invention.
- the above-designed secure coding and coding scheme is simulated in a Rayleigh fading environment.
- the signal-to-noise ratio of the primary channel is equal to 14.
- the probability of decoding error of legitimate users is greatly increased in the case of Rayleigh fading (the probability of decoding error of legitimate users in the case of Gaussian noise is 4 ⁇ 10 -9)
- the probability of decoding error of a legitimate user in the case of Rayleigh fading is 0.0075).
- the relationship between the decoding error probability of the eavesdropper and the signal-to-noise ratio of the eavesdropping channel in Rayleigh fading and Gaussian cases is shown in Fig. 4. It should be noted that the abscissa of FIG. 4 adopts a standardized unit, that is, takes 10 times the base 10 logarithmic function of the ratio of the signal to noise ratio of the primary channel and the eavesdropping channel. It can be seen from Fig. 4 that the anti-eavesdropping ability of the same coding scheme in the Rayleigh fading environment is significantly stronger than the anti-eavesdropping capability under Gaussian noise.
- the regular LDPC code makes the eavesdropper's decoding error probability closer to 0.5 than in the Gaussian environment, which makes the system more secure;
- the regular LDPC code increases the probability of decoding errors of legitimate users, which makes the decoding difficulty of legitimate users increase.
- the efficiency of the codeword must be sacrificed, that is, the difficulty of decoding by legitimate users is reduced by reducing l/(n+k).
- Embodiments of the present invention also provide a storage medium.
- the foregoing storage medium may be configured to store program code for performing the following steps:
- the sending message includes: a real message s k and a random message d lk ;
- the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
- ROM Read-Only Memory
- RAM Random Access Memory
- a mobile hard disk e.g., a hard disk
- magnetic memory e.g., a hard disk
- modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
- Encoding method and apparatus provided by the embodiments of the present invention, the method comprising: sending a message * check matrix H based on the main channel to be encoded, wherein the fading matrix diag (h b) by a factor of primary channel Rayleigh fading And the check matrix H when there is no fading determines the H * , the to-be-sent message includes: a real message s k and a random message d lk ; and sends the encoded message to be sent.
- the above technical solution solves the problem that the coding technology in the related art cannot satisfy the information security, thereby achieving the effect of improving the security of the primary channel, and the eavesdropping channel cannot decipher the message actually transmitted.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Theoretical Computer Science (AREA)
- Error Detection And Correction (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本发明实施例涉及但不限于通信领域,具体而言,涉及一种编码方法及装置。Embodiments of the present invention relate to, but are not limited to, the field of communications, and in particular, to an encoding method and apparatus.
无线通信系统物理层安全的研究起源于关于窃听信道的相关技术。在关于窃听信道的相关技术中,研究了点对点通信系统被一个窃听者窃听的信道模型。关于窃听信道的相关技术采用条件熵来定义窃听者对机密消息的疑惑度,并给出了当窃听者的疑惑度最大时信息传输效率的最大值,即安全容量。在安全容量的存在性证明中,提出了随机装箱(random binning)的编码技术。在考虑安全的信道模型中,该技术已经成为一种最常见的编码技术。随机装箱是指发送的消息和一个码本(一堆码字组成的集合)一一对应。当发送方发送一个具体的消息时,首先找出和此消息相对应的码本,然后随机地于此码本中选取一个码字发送出去,该码字就作为编码器的输出。在窃听信道模型提出之后,构造实际的能逼近安全容量的码字就成为了编码领域一个新的研究方向。在上述相关技术中,当窃听信道是高斯噪声,主信道无噪声的情况下,采用陪集编码方案且子码是任意一种可达窃听信道容量的好码的对偶码时,可以达到信息论意义上的安全。关于窃听信道的相关技术对窃听信道的研究主要针对离散无记忆和高斯噪声的情况,这里必须指出上述两种噪声情况和实际无线信道有着较大的区别。实际的无线信道是时变衰落的信道,通常用瑞利衰落信道来模拟实际的无线信道。基于关于窃听信道的相关技术的研究,进一步研究了时变衰落窃听信道模型的安全容量。在时变衰落窃听信道模型的安全容量的存在性证明中,同样使用了随机装箱的编码技术,相关技术中虽然也存在采用Turbo码、Polar码、BCH码、Reed-Solomon码和级联码的技术方案,但是安全性都存在问题。The study of physical layer security in wireless communication systems stems from related techniques for eavesdropping channels. In the related art on eavesdropping channels, a channel model in which a peer-to-peer communication system is eavesdropped by an eavesdropper is studied. The related technique for eavesdropping channel uses conditional entropy to define the eavesdropper's doubts about confidential messages, and gives the maximum value of information transmission efficiency when the eavesdropper has the highest degree of confusion, that is, the security capacity. In the proof of the existence of safety capacity, a random binning coding technique is proposed. This technology has become one of the most common coding techniques in considering a secure channel model. Random boxing means that the sent message is in one-to-one correspondence with a codebook (a collection of codewords). When the sender sends a specific message, it first finds the codebook corresponding to the message, and then randomly selects a codeword in the codebook to send out, and the codeword serves as the output of the encoder. After the eavesdropping channel model is proposed, constructing the actual codeword that can approach the safe capacity becomes a new research direction in the field of coding. In the above related art, when the eavesdropping channel is Gaussian noise and the main channel is noiseless, the coset coding scheme is adopted and the subcode is any good coded dual code that can reach the eavesdropping channel capacity, and the information theory meaning can be achieved. On the security. Related technologies for eavesdropping channels The research on eavesdropping channels is mainly directed to the case of discrete memoryless and Gaussian noise. It must be pointed out here that the above two noise scenarios are quite different from the actual wireless channel. The actual wireless channel is a time-varying fading channel, usually using a Rayleigh fading channel to simulate the actual wireless channel. Based on the research on related technologies of eavesdropping channel, the safety capacity of the time-varying fading eavesdropping channel model is further studied. In the proof of the existence of the safety capacity of the time-varying fading eavesdropping channel model, the random packing coding technique is also used. Although the related art also uses the Turbo code, the Polar code, the BCH code, the Reed-Solomon code and the concatenated code. Technical solution, but there are problems with security.
针对相关技术中,编码技术不能满足信息安全的问题,尚未提出有效的解决方案。In view of the related art, the coding technology cannot satisfy the problem of information security, and an effective solution has not been proposed yet.
发明内容 Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
根据本发明实施例的一个方面,提供了一种编码方法,包括:依据校验矩阵H*对主信道上的待发送消息进行编码,其中,通过瑞利衰落主信道的系数衰落矩阵diag(hb)和无衰落时的校验矩阵H确定所述H*,所述待发送消息包括:真实消息sk和随机消息dl-k。According to an aspect of the embodiments of the present invention, there is provided an encoding method, comprising: encoding a to-be-transmitted message on a primary channel according to a parity check matrix H * , wherein a coefficient fading matrix diag (h) through a Rayleigh fading primary channel b ) and the check matrix H when there is no fading determines the H * , the message to be transmitted includes: a real message s k and a random message d lk .
可选地,还包括:发送所述编码后的待发送消息。Optionally, the method further includes: sending the encoded message to be sent.
优选地,所述依据衰落系数矩阵diag(hb)和预设校验矩阵H生成校验矩阵H*,包括:通过以下公式得到所述校验矩阵H*:H*=diag(hb)H。Preferably, according to the fading coefficient matrix diag (h b) generating a parity check matrix H and the preset check matrix H *, comprising: a check matrix H obtained by the following formula *: H * = diag (h b) H.
优选地,所述校验矩阵H*为码字长度为n+k比特,消息长度为l比特的低密度奇偶校验码LDPC码的校验矩阵,其中,k<l<n+k,所述真实消息sk包括k个比特,所述随机消息dl-k包括l-k个比特,通过所述校验矩阵H*对所述待发送消息进行编码后的码字长度为n+k比特,n,k,l均为正整数。Preferably, the check matrix H * is a check matrix of a low-density parity check code LDPC code having a codeword length of n+k bits and a message length of 1 bit, where k<l<n+k, The real message s k includes k bits, the random message d lk includes lk bits, and the codeword length encoded by the check matrix H * is n+k bits, n, k, l are positive integers.
优选地,所述n,k,l满足以下等式:Preferably, the n, k, l satisfy the following equation:
其中,diag(he)为所述主信道对应的瑞利衰落窃听信道的系数衰落矩阵,SNR1,SNR2分别为所述主信道和所述窃听信道的信噪比,且SNR2的值小于SNR1的值。 Where diag(h e ) is a coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the primary channel, and SNR 1 and SNR 2 are respectively a signal to noise ratio of the primary channel and the eavesdropping channel, and a value of SNR 2 Less than the value of SNR 1 .
优选地,所述方法还包括:Preferably, the method further includes:
所述真实消息sk和所述随机消息dl-k通过所述校验矩阵H*编码后得到的码字rn+k为:rn+k=((sk,dl-k)·BT·(A-1)T,sk,dl-k);其中,通过高斯消元法将所述校验矩阵H矩阵化为AB型矩阵,A为单位矩阵,单位矩阵A的行数和列数均为n+k-l的矩阵,B为一个行数为n+k-l,列数为l的矩阵,H=diag-1(hb)H*,BT表示矩阵B的转置,(A-1)T表示矩阵A的逆矩阵的转置。The code word r n+k obtained by encoding the real message s k and the random message d lk by the check matrix H * is: r n+k =(( s k , d lk )·B T · (A -1 ) T , s k , d lk ); wherein the check matrix H is matrixed into an AB matrix by a Gaussian elimination method, A is an identity matrix, and the number of rows and the number of columns of the unit matrix A are both For a matrix of n+kl, B is a matrix with a row number n+kl and a column number l, H=diag -1 (h b )H * , B T represents the transpose of matrix B, (A -1 ) T represents the transpose of the inverse matrix of matrix A.
优选地,所述方法还包括:所述码字rn+k的实际传输效率小于主信道的信道容量。Preferably, the method further comprises: the actual transmission efficiency of the codeword r n+k is smaller than the channel capacity of the primary channel.
根据本发明实施例的另一个方面,还提供了一种编码装置,包括:According to another aspect of the embodiments of the present invention, an encoding apparatus is further provided, including:
编码模块,设置为依据校验矩阵H*对主信道上的待发送消息进行编码, 其中,通过瑞利衰落主信道的系数衰落矩阵diag(hb)和无衰落时的校验矩阵H确定所述H*,所述待发送消息包括:真实消息sk和随机消息dl-k。An encoding module arranged to encode the parity check matrix H * based on the transmitted message to be the main channel, wherein the coefficient Rayleigh fading primary channel fading matrix diag (h b) and the check matrix H at the time of no fading determining H * , the to-be-sent message includes: a real message s k and a random message d lk .
可选地,还包括:发送模块,设置为发送所述编码后的待发送消息。Optionally, the method further includes: a sending module, configured to send the encoded message to be sent.
优选地,所述编码模块,还设置为通过以下公式得到所述校验矩阵H*:H*=diag(hb)H。Preferably, the encoding module is further arranged to obtain the following equation by check matrix H *: H * = diag (h b) H.
优选地,所述编码模块得到的所述校验矩阵H*为码字长度为n+k比特,消息长度为l比特的低密度奇偶校验码LDPC码的校验矩阵;Preferably, the check matrix H * obtained by the encoding module is a check matrix of a low density parity check code LDPC code with a codeword length of n+k bits and a message length of 1 bit;
其中,k<l<n+k,所述真实消息sk包括k个比特,所述随机消息dl-k包括l-k个比特,通过所述校验矩阵H*对所述待发送消息进行编码后的码字长度为n+k比特,n,k,l均为正整数。Where k<1<n+k, the real message s k includes k bits, the random message d lk includes lk bits, and the to-be-sent message is encoded by the check matrix H * The codeword length is n+k bits, and n, k, and l are positive integers.
优选地,所述n,k,l满足以下等式:Preferably, the n, k, l satisfy the following equation:
其中,diag(he)为所述主信道对应的瑞利衰落窃听信道的系数衰落矩阵,SNR1,SNR2分别为所述主信道和所述窃听信道的信噪比,且SNR2的值小于SNR1的值。 Where diag(h e ) is a coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the primary channel, and SNR 1 and SNR 2 are respectively a signal to noise ratio of the primary channel and the eavesdropping channel, and a value of SNR 2 Less than the value of SNR 1 .
本发明实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述任一项的编码方法。The embodiment of the present invention further provides a computer readable storage medium storing computer executable instructions for performing the encoding method of any of the above.
通过本发明实施例中采用依据校验矩阵H*对待发送消息中的真实消息和随机消息进行编码的技术方案,解决了相关技术中编码技术不能满足信息安全的问题,进而达到了提高主信道安全性,窃听信道无法破译出真实发送的消息的效果。The technical solution for encoding the real message and the random message in the message to be sent according to the check matrix H * is adopted in the embodiment of the present invention, and the problem that the coding technology cannot satisfy the information security in the related art is solved, thereby improving the security of the primary channel. Sex, eavesdropping channel can't decipher the effect of the message actually sent.
本发明实施例的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。本发明的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。Other features and advantages of the embodiments of the invention will be set forth in the description in the description which The objectives and other advantages of the invention may be realized and obtained by means of the structure particularly pointed in the appended claims.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述 BRIEF abstract
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the invention, and are intended to be a part of the invention. In the drawing:
图1是根据本发明实施例的编码方法的流程图;1 is a flow chart of an encoding method in accordance with an embodiment of the present invention;
图2是根据本发明实施例的编码装置的结构框图;2 is a block diagram showing the structure of an encoding apparatus according to an embodiment of the present invention;
图3为根据本发明优选实施例所应用的信道模型;3 is a channel model applied in accordance with a preferred embodiment of the present invention;
图4为根据本发明优选实施例的主信道和窃听信道信噪比的比值和窃听者误比特率之间的一种关系示意图;4 is a diagram showing a relationship between a ratio of a signal to noise ratio of a primary channel and an eavesdropping channel and an error rate of an eavesdropper according to a preferred embodiment of the present invention;
图5为根据本发明优选实施例的主信道和窃听信道信噪比的比值和窃听者误比特率之间的又一种关系示意图;5 is a schematic diagram showing another relationship between the ratio of the signal to noise ratio of the primary channel and the eavesdropping channel and the error rate of the eavesdropper according to a preferred embodiment of the present invention;
图6为根据本发明优选实施例的主信道和窃听信道信噪比的比值和窃听者误比特率之间的再一种关系示意图。6 is a diagram showing still another relationship between the ratio of the signal to noise ratio of the primary channel and the eavesdropping channel and the error rate of the eavesdropper according to a preferred embodiment of the present invention.
本发明的较佳实施方式Preferred embodiment of the invention
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The invention will be described in detail below with reference to the drawings in conjunction with the embodiments. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It is to be understood that the terms "first", "second" and the like in the specification and claims of the present invention are used to distinguish similar objects, and are not necessarily used to describe a particular order or order.
在本实施例中提供了一种编码方法,图1是根据本发明实施例的编码方法的流程图,如图1所示,该流程包括如下步骤:An encoding method is provided in this embodiment. FIG. 1 is a flowchart of an encoding method according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
步骤S102,依据校验矩阵H*对主信道上的待发送消息进行编码,其中,通过瑞利衰落主信道的系数衰落矩阵diag(hb)和无衰落时的校验矩阵H确定H*,待发送消息包括:真实消息sk和随机消息dl-k。Step S102, based on the parity check matrix H * message to be transmitted on the primary channel encoding, wherein the matrix diag (h b) and the check matrix H is determined when there is no fading coefficients H * by the primary channel fading Rayleigh fading, The message to be sent includes: a real message s k and a random message d lk .
可选地,本发明实施例还包括:步骤S104,发送进行编码后的待发送消息。Optionally, the embodiment of the present invention further includes: Step S104, sending the coded to-be-sent message.
通过上述各个步骤,采用依据校验矩阵H*对待发送消息中的真实消息和随机消息进行编码的技术方案,解决了相关技术中编码技术不能满足信息安 全的问题,进而达到了提高主信道安全性,窃听信道无法破译出真实发送的消息的效果。Through the above various steps, the technical solution for encoding the real message and the random message in the message to be sent according to the check matrix H * is solved, and the problem that the coding technology cannot satisfy the information security in the related art is solved, thereby improving the security of the main channel. The eavesdropping channel cannot decipher the effect of the message actually sent.
优选地,依据衰落系数矩阵diag(hb)和预设校验矩阵H生成校验矩阵H*,主要通过以下公式得到校验矩阵H*:H*=diag(hb)H,在一个可选示例中,校验矩阵H*为码字长度为n+k比特,消息长度为l比特的低密度奇偶校验码(LDPC)的校验矩阵,其中,k<l<n+k,sk包括k个比特,dl-k包括l-k个比特,通过校验矩阵H*对待发送消息进行编码后的码字长度为n+k比特;其中,n,k,l均为正整数。Preferably, according to the fading coefficient matrix diag (h b) generating a parity check matrix H and the preset check matrix H *, H * main check matrix obtained by the following equation: H * = diag (h b ) H, in a In the example, the check matrix H * is a check matrix of a low-density parity check code (LDPC) having a codeword length of n+k bits and a message length of 1 bit, where k<l<n+k,s k includes k bits, d lk includes lk bits, and the length of the codeword encoded by the check matrix H * to be transmitted is n+k bits; wherein n, k, l are positive integers.
在一个可选实施例中,n,k,l满足以下等式:其中,diag(he)为主信道对应的瑞利衰落窃听信道的系数衰落矩阵,SNR1,SNR2分别为主信道和窃听信道的信噪比,且SNR2的值小于SNR1的值。In an alternative embodiment, n, k, l satisfy the following equation: Where diag(h e ) is the coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the main channel, and SNR 1 and SNR 2 are the signal-to-noise ratios of the main channel and the eavesdropping channel, respectively, and the value of SNR 2 is smaller than the value of SNR 1 .
需要说明的是,LDPC码的实际传输效率大于窃听信道的信道容量,根据香农信道编码定理,窃听者的译码错误概率必然不会趋近于0。It should be noted that the actual transmission efficiency of the LDPC code More than the channel capacity of the eavesdropping channel, according to the Shannon channel coding theorem, the eavesdropper's decoding error probability will inevitably not approach zero.
对于合法用户而言,由于实际的传输效率小于主信道的信道容量,根据香农信道编码定理,当给定信道的信噪比时,只要LDPC码字的长度足够长,任意小(趋近于0)的译码错误概率指标都可以达到。例如,当主信道的信噪比为14时,如果要求合法用户的译码错误概率为10-8,则可以用码字长度n=280,消息比特数k=20,随机比特l-k=80的本发明实施例中安全编码方法来实现,仿真中可以发送的总消息比特l=5000000×100,译码错误的比特数是2次,译码错误比率为4×10-9。For legitimate users, due to the actual transmission efficiency Less than the channel capacity of the primary channel, according to the Shannon channel coding theorem, when the signal-to-noise ratio of the channel is given, as long as the length of the LDPC codeword is sufficiently long, any small (nearly 0) decoding error probability index can be achieved. For example, when the signal-to-noise ratio of the primary channel is 14, if the decoding error probability of the legitimate user is required to be 10 -8 , the codeword length n=280, the message bit number k=20, and the random bit lk=80 can be used. In the embodiment of the invention, the secure coding method is implemented. The total message bit that can be transmitted in the simulation is l=5000000×100, the number of decoding errors is 2, and the decoding error ratio is 4×10 -9 .
由于窃听信道的信道容量等于窃听者能够利用上述译码方法从码字rn中正确译出随机消息比特l-k,这里rn=(dL-k,[sk,dL-k]AT(B-1)T),这里注意到即使rn被窃听者得到,窃听者也不能从rn中获取sk,因为线性方程x·AT(B-1)T=b的解的个数不是唯一的,且存在很多解。根据窃听信道模型理论上的分析,如果窃听者将其所有的译码能力都消耗在译出随机消息比特k上,则窃听者完全不能译出发送的真实消息比特k。仿真结果表明,当窃听信道的信噪比较大时,窃听者译出真实消息比特k的错误比率逼近0.5,即本发明实施例设计的安全编译码方法逼近绝对安全(即信息论意义上的安全)。 Since the channel capacity of the eavesdropping channel is equal to The eavesdropper can correctly decode the random message bit lk from the codeword r n using the above decoding method, where r n =(d Lk ,[s k ,d Lk ]A T (B -1 ) T ), notice here Even if r n is obtained by the eavesdropper, the eavesdropper cannot obtain s k from r n because the number of solutions of the linear equation x·A T (B -1 ) T =b is not unique and there are many solutions. According to the theoretical analysis of the eavesdropping channel model, if the eavesdropper consumes all of its decoding capabilities on the translated random message bit k, the eavesdropper cannot decode the transmitted real message bit k at all. The simulation results show that when the signal-to-noise ratio of the eavesdropping channel is relatively large, the error rate of the eavesdropper translating the real message bit k is close to 0.5, that is, the secure coding and coding method designed by the embodiment of the present invention approaches absolute security (ie, information-based security). ).
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, The optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
在本实施例中还提供了一种编码装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In the embodiment, an encoding device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and will not be described again. As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
图2是根据本发明实施例的编码装置的结构框图,如图2所示,该装置包括:2 is a structural block diagram of an encoding apparatus according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes:
编码模块20,设置为依据校验矩阵H*对主信道上的待发送消息进行编码,其中,通过瑞利衰落主信道的系数衰落矩阵diag(hb)和无衰落时的校验矩阵H确定H*,待发送消息包括:真实消息sk和随机消息dl-k。
可选地,本发明实施例还包括:发送模块22,设置为发送进行编码后的待发送消息。Optionally, the embodiment of the present invention further includes: a sending
通过上述各个模块的综合作用,采用依据校验矩阵H*对待发送消息中的真实消息和随机消息进行编码的技术方案,解决了相关技术中编码技术不能满足信息安全的问题,进而达到了提高主信道安全性,窃听信道无法破译出真实发送的消息的效果。Through the comprehensive action of the above modules, the technical solution of encoding the real message and the random message in the message to be sent according to the check matrix H * is solved, and the problem that the coding technology cannot satisfy the information security in the related art is solved, thereby achieving the improvement of the main Channel security, the eavesdropping channel can't decipher the effect of the real sent message.
可选地,编码模块20,还设置为通过以下公式得到校验矩阵H*:H*=diag(hb)H,具体地,编码模块20得到的校验矩阵H*为码字长度为n+k比特,消息长度为l比特的低密度奇偶校验码LDPC码的校验矩阵,其中,k<l<n+k,sk包括k个比特,dl-k包括l-k个比特,通过校验矩阵H*对待发送消息进行编码后的码字长度为n+k比特,n,k,l均为正整数。Alternatively,
优选地,n,k,l满足以下等式: Preferably, n, k, l satisfy the following equation:
其中,diag(he)为主信道对应的瑞利衰落窃听信道的系数衰落矩阵,SNR1,SNR2分别为主信道和窃听信道的信噪比,且SNR2的值小于SNR1的值。 Where diag(h e ) is the coefficient fading matrix of the Rayleigh fading eavesdropping channel corresponding to the main channel, and SNR 1 and SNR 2 are the signal-to-noise ratios of the main channel and the eavesdropping channel, respectively, and the value of SNR 2 is smaller than the value of SNR 1 .
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述模块分别位于多个处理器中。It should be noted that each of the above modules may be implemented by software or hardware. For the latter, the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
以上结合优选实施例对上述实施例的技术方案进行解释说明,但不用于限定本发明实施例的技术方案。The technical solutions of the foregoing embodiments are explained in conjunction with the preferred embodiments, but are not used to limit the technical solutions of the embodiments of the present invention.
瑞利衰落窃听信道的数学模型可以表述为:yn=diag(hb)xn+vb,zn=diag(he)xn+ve,The mathematical model of the Rayleigh fading eavesdropping channel can be expressed as: y n =diag(h b )x n +v b ,z n =diag(h e )x n +v e ,
这里,vb和ve分别表示合法用户和窃听者信道的噪声,它们都是均值为0,方差分别为的高斯噪声,而diag(hb),diag(he)为信道衰落系数矩阵,且为如下对角矩阵,Here, v b and v e represent the noise of the legitimate user and the eavesdropper channel, respectively, and they all have a mean of 0, and the variances are respectively Gaussian noise, and diag(h b ), diag(h e ) is a matrix of channel fading coefficients, and is a diagonal matrix as follows,
这里,hb,i,he,i(1≤i≤n)为复高斯随机变量,且它们的方差分别为由以上定义不难得知|hb,i|,|he,i|服从瑞利衰落分布,将待发送的消息表示为u,编码的生成矩阵表示为M(这里注意M可由H直接得到,因为M·HT=0)。将编码后的码字xn=M·u代入瑞利衰落信道的数学表达式:Here, h b,i ,h e,i (1≤i≤n) are complex Gaussian random variables, and their variances are respectively It is not difficult to know from the above definition that |h b,i |,|h e,i | obeys the Rayleigh fading distribution, and the message to be transmitted is represented as u, and the generated matrix of the code is represented as M (note that M can be directly obtained by H, Because M·H T =0). Substituting the encoded codeword x n =M·u into the mathematical expression of the Rayleigh fading channel:
yn=diag(hb)Mu+vb,zn=diag(he)Mu+ve,y n =diag(h b )Mu+v b ,z n =diag(h e )Mu+v e ,
定义M*=diag(hb)M,上述表达式可以改写为:Define M * =diag(h b )M, the above expression can be rewritten as:
yn=M*u+vb,zn=diag(he)diag-1(hb)M*u+ve.,y n =M * u+v b ,z n =diag(h e )diag -1 (h b )M * u+v e .,
上式可知,如果信道衰落系数矩阵diag(hb),diag(he)能被发送方和接收方都获取的话,则可以利用无衰落时的生成矩阵M和衰落系数矩阵diag(hb)来产生一个新的编码生成矩阵M*=diag(hb)M。而由上式可知,如果还是利用M*来 进行编码,则合法用户的信道可以等价为一个高斯信道。而窃听者的信道还是衰落信道,只不过其衰落系数变成了diag(he)diag-1(hb)。综上所述,当利用衰落系数矩阵来对高斯窃听信道编码方案的生成矩阵进行预处理之后,所得到的新生成矩阵就可以用来作为瑞利衰落窃听信道安全编码方案的生成矩阵。这样,沿着高斯窃听信道模型编码方案的设计思路,就能设计出瑞利衰落窃听信道的安全编译码方案。It can be seen from the above equation that if the channel fading coefficient matrix diag(h b ), diag(h e ) can be obtained by both the sender and the receiver, the generation matrix M and the fading coefficient matrix diag(h b ) can be utilized without fading. To generate a new code generation matrix M * =diag(h b )M. From the above equation, if the M * is still used for encoding, the channel of the legitimate user can be equivalent to a Gaussian channel. The eavesdropper's channel is still a fading channel, except that its fading coefficient becomes diag(h e )diag -1 (h b ). In summary, after the fading coefficient matrix is used to preprocess the generation matrix of the Gaussian eavesdropping channel coding scheme, the obtained new generation matrix can be used as a generation matrix of the Rayleigh fading eavesdropping channel security coding scheme. In this way, along the design idea of the Gaussian eavesdropping channel model coding scheme, the secure coding and decoding scheme of the Rayleigh fading eavesdropping channel can be designed.
本发明优选实施例的编码方案的设计如下:The design of the coding scheme of the preferred embodiment of the present invention is as follows:
安全编译码方案设计的理论依据:在窃听信道模型的安全编码定理的存在性证明中,关于窃听信道的相关技术指出要设计出达到信息论安全的编译码方案,需要使用一种被称为“随机装箱”的编码技术。该编码技术将发射的消息和一堆码字所组成的箱子一一对应,当给定要传输的消息时,随机的从该消息所对应的码字箱子中选取一个码字发送出去。为了让窃听者不能正确译出发送的消息,需要消耗窃听者的译码能力,关于窃听信道的相关技术指出假设窃听者知道发送的具体消息时,如果窃听者能从该具体消息所对应的码字箱子中正确找到(“译出”)发送的那个随机码字时,则窃听者的译码能力就得到了消耗。如果将该具体消息所对应的码字箱子也看成是一种新的码字的话,我们希望该新的码字所对应的传输效率等于窃听信道的信道容量,因为这代表着窃听者的全部译码能力都消耗在译出该新码字上,这样他就没有额外的能力去译出究竟发送的是哪个消息上了。基于关于窃听信道的相关技术的安全编码定理证明的上述思想,假设发送的消息是k比特,码字的长度为n比特,则设计的安全编码方案需要具备以下三个特点:(a)该码可划分窃听信道的信道容量C(SNR2);(c)给定发送的消息比特k,要随机的从其所对应的子码中选取一个码字发送出去。The theoretical basis for the design of secure coding and coding schemes: In the existence proof of the security coding theorem of the eavesdropping channel model, the related technology on the eavesdropping channel points out that to design a coding and decoding scheme that achieves information theory security, it is necessary to use a kind of randomization called "Packing" coding technology. The encoding technique corresponds one-to-one correspondence between the transmitted message and the stack of codewords. When a message to be transmitted is given, a codeword is randomly selected from the codeword box corresponding to the message and sent out. In order for the eavesdropper to not correctly decode the transmitted message, it is necessary to consume the ability of the eavesdropper to decode. The related art on the eavesdropping channel indicates that if the eavesdropper knows the specific message sent, if the eavesdropper can obtain the code corresponding to the specific message. When the random codeword sent is correctly found ("translated") in the word box, the ability of the eavesdropper to decode is consumed. If the codeword box corresponding to the specific message is also regarded as a new codeword, we hope that the transmission efficiency corresponding to the new codeword is equal to the channel capacity of the eavesdropping channel, because this represents the entire eavesdropper. The decoding power is consumed by translating the new codeword so that he has no additional ability to translate which message was sent. Based on the above idea of the security coding theorem of the related art on the eavesdropping channel, assuming that the transmitted message is k bits and the length of the codeword is n bits, the designed secure coding scheme needs to have the following three characteristics: (a) the code Dividable The channel capacity C (SNR 2 ) of the eavesdropping channel; (c) given the transmitted message bit k, a random selection of one codeword from its corresponding subcode is sent.
安全编译码方案设计的参数说明:假设发送的消息是k比特的,我们通过随机数产生器随机生成一个l-k比特的随机消息。此外,我们假设码字的长度是n+k比特。Parameter Description of Secure Coding Scheme Design: Assuming that the transmitted message is k-bit, we randomly generate a 1-k-bit random message by the random number generator. Furthermore, we assume that the length of the codeword is n+k bits.
安全编译码方案的方案可以通过如下步骤实现: The scheme of the secure coding and coding scheme can be implemented by the following steps:
需要说明的是,以下步骤并不用于限定本发明实施例的具体执行顺序。It should be noted that the following steps are not intended to limit the specific execution order of the embodiments of the present invention.
1)按照经典的LDPC码的设计思路设计一个码字长度为n+k比特,消息长度为l比特的LDPC码的校验矩阵,记为H*,该矩阵有n+k-l行,有n+k列,再利用衰落系数矩阵diag(hb)和已有的H*生成一个新的校验矩阵H=diag-1(hb)H*。1) According to the design idea of the classic LDPC code, design a check matrix of LDPC code with length of code n+k bits and message length of l bits, denoted as H*, the matrix has n+kl lines, with n+ In the k column, a new check matrix H=diag -1 (h b )H * is generated by using the fading coefficient matrix diag(hb) and the existing H * .
2)l比特的消息中包含了k比特的真实的发送消息和l-k比特的随机消息。显而易见,l满足如下约束条件k<l<n+k。2) The 1-bit message contains a k-bit real transmission message and a 1-k-bit random message. Obviously, l satisfies the following constraint k < l < n + k.
3)为了实现关于窃听信道的相关技术在窃听信道模型的安全编码定理证明中所描述的编码方法,即当发送的k比特消息确定时,随机的从其对应的码字箱子中选取一个码字这种编码方式,首先需要将上述所设计的校验矩阵为H,长度为n+k比特的LDPC码按照k比特的真实消息划分为2k个子码,每一个子码的长度为n比特。该类子码也是一种线性分组码,该子码的消息比特即是l-k比特的随机消息。本发明实施例采用如下方式实现“随机从子码中选取一个码字传送”的编码方式:(a)通过随机数生成器随机产生一个l-k比特的随机消息;(b)将该l-k比特的随机消息通过线性分组码的生成矩阵生成一个和其一一对应的码字,然后该将码字传送。3) In order to implement the related art on the eavesdropping channel, the encoding method described in the proof of the secure coding theorem of the eavesdropping channel model, that is, when the transmitted k-bit message is determined, randomly selects a codeword from its corresponding codeword box. In this encoding method, first, the check matrix designed above is H, and the LDPC code of length n+k bits is divided into 2 k subcodes according to the k-bit real message, and each subcode has a length of n bits. This type of subcode is also a linear block code, and the message bits of the subcode are lk-bit random messages. In the embodiment of the present invention, the coding mode of “selecting one codeword transmission from the subcodes randomly” is implemented in the following manner: (a) randomly generating a random message of lk bits by a random number generator; (b) randomly selecting the lk bits; The message generates a one-to-one codeword through the generation matrix of the linear block code, and then the codeword is transmitted.
上述子码的实际传输效率为校验矩阵为H,码字长度为n+k比特,消息长度为l比特的LDPC码的实际传输效率为为了满足前面所述的安全编码方案的特点(b),需要令 The actual transmission efficiency of the above subcode is The parity transmission matrix is H, the codeword length is n+k bits, and the actual transmission efficiency of the LDPC code with a message length of 1 bit is In order to meet the characteristics of the security coding scheme described above (b), it is necessary to
在给出了上述n,k,l的约束关系之后,校验矩阵为H,码字长度为n+k比特,消息长度为l比特的LDPC码设计方法如下:(a)将该校验矩阵H通过高斯消元法化为[A|B]型矩阵,这里注意H矩阵为n+k-l行,n+k列的矩阵,A矩阵为单位矩阵,其行数和列数均为n+k-l。B矩阵为一个行数为n+k-l,列数为l的矩阵。当给定发送的真实消息sk,随机生成的消息为dl-k时,由校验矩阵的定义,可以得到公式(1):After the constraint relationship of n, k, l is given, the check matrix is H, the codeword length is n+k bits, and the LDPC code with a message length of 1 bit is designed as follows: (a) the check matrix H is reduced to [A|B] type matrix by Gaussian elimination. Note that the H matrix is n+kl row, n+k column matrix, A matrix is unit matrix, and its row number and column number are n+kl . The B matrix is a matrix with a row number of n+kl and a column number of l. When a real message s k is sent and the randomly generated message is d lk , the formula (1) can be obtained by the definition of the check matrix:
(cn+k-l,sk,dl-k)HT=0, (1) (c n+kl , s k ,d lk )H T =0, (1)
这里,cn+k-l表示编码之后的n+k-l比特的校验位。Here, c n+kl represents a parity bit of n+k1 bits after encoding.
将H=[A|B]代入公式(1)中,可以得到:Substituting H=[A|B] into equation (1), you can get:
将公式(2)整理,可以得到:By formula (2), you can get:
cn+k-l·AT+(sk,dl-k)·BT=0 (3)c n+kl ·A T +(s k ,d lk )·B T =0 (3)
进一步整理公式(3),可以得到:Further finishing formula (3), you can get:
cn+k-l=(sk,dl-k)·BT·(A-1)T (4)c n+kl =(s k ,d lk )·B T ·(A -1 ) T (4)
公式(4)给出了当知道真实消息sk和随机生成的消息dl-k时,计算码字的校验位的公式。知道了校验位之后,通过校验矩阵H而得到的码字rn+k可表示为公式(5)所示:Equation (4) gives the formula for calculating the check digit of the codeword when the real message s k and the randomly generated message d lk are known. After knowing the parity bit, the codeword r n+k obtained by checking the matrix H can be expressed as shown in equation (5):
rn+k=(cn+k-l,sk,dl-k)=((sk,dl-k)·BT·(A-1)T,sk,dl-k) (5)r n+k =(c n+kl ,s k ,d lk )=((s k ,d lk )·B T ·(A -1 ) T ,s k ,d lk ) (5)
对于合法用户来说,码字rn+k的实际传输效率是小于主信道的信道容量的,所以合法用户可以以趋近于0的译码错误概率同时译出真实消息sk和随机生成的消息dl-k。对于窃听者而言,首先,希望他将其全部的译码能力都消耗在正确译出子码rn上,这里,如公式(6),For legitimate users, the actual transmission efficiency of the codeword r n+k It is smaller than the channel capacity of the primary channel, so the legitimate user can simultaneously decode the real message s k and the randomly generated message d lk with a decoding error probability close to zero. For the eavesdropper, first of all, I hope that he will consume all of his decoding ability on the correctly translated subcode r n , here, as in formula (6),
rn=(cn+k-l,sk,dl-k)=((sk,dl-k)·BT·(A-1)T,dl-k) (6)r n =(c n+kl ,s k ,d lk )=(( s k ,d lk )·B T ·(A -1 ) T ,d lk ) (6)
将rn和rn+k相比,很容易发现rn是将rn+k中发送的真实消息sk删掉,即rn是rn+k的子码。对于rn而言,其中的消息为dl-k,窃听者能正确译出dl-k,且其全部的译码能力都消耗在译出dl-k上。由于码字rn+k的实际传输效率是大于窃听信道的信道容量的,由香农定理可知,窃听者译出rn+k的错误概率是不能趋近于0的。Comparing r n with r n+k , it is easy to find that r n is to delete the real message s k sent in r n+k , that is, r n is a subcode of r n+k . For r n , the message is d lk , the eavesdropper can correctly translate d lk , and all its decoding capabilities are consumed on the translated d lk . Since the actual transmission efficiency of the codeword r n+k is greater than the channel capacity of the eavesdropping channel, it can be known from Shannon's theorem that the error probability of the eavesdropper translating r n+k cannot be close to zero.
合法用户和窃听者的译码器均采用经典BP译码算法,该译码算法分为以下步骤:(1)首先对瑞利衰落信道预设信息比特的先验概率;(2)由信息节点的信息概率按照置信传播算法得出各校验节点的后验概率;(3)由校验节点的后验概率推算出信息节点的后验概率;(4)将信息节点的后验概率对照判决条件作硬判决,若满足则译码结束;若不满足,则重复以上的(2)~(4)步骤,反复迭代,直到满足条件,得出译码结果。如果迭代次数达到一个预设的最大 次数(例如100),条件仍然不满足,则宣布译码失败;Both the legitimate user and the eavesdropper decoder adopt the classical BP decoding algorithm, and the decoding algorithm is divided into the following steps: (1) firstly priori probability of the information bit of the Rayleigh fading channel; (2) by the information node The information probability is obtained according to the belief propagation algorithm, and the posterior probability of each check node is obtained; (3) the posterior probability of the information node is derived from the posterior probability of the check node; (4) the posterior probability of the information node is compared with the judgment The condition is a hard decision. If it is satisfied, the decoding ends. If it is not satisfied, the above steps (2) to (4) are repeated, and the iteration is repeated until the condition is satisfied, and the decoding result is obtained. If the number of iterations reaches a preset maximum The number of times (for example, 100), if the condition is still not met, the decoding failure is declared;
采用BP译码算法的规则(3,2)LDPC安全码:Rules (3, 2) LDPC security code using BP decoding algorithm:
首先,图3为根据本发明优选实施例所应用的信道模型,如图3所示,将规则(3,2)LDPC安全码(n=280,k=20,l=100)用于瑞利衰落信道中,观察其在实际无线信道中的表现。具体来讲,将上述所设计的安全编译码方案在瑞利衰落的环境下进行仿真。令主信道信噪比等于14,和高斯噪声的情况相比,发现瑞利衰落情况下合法用户的译码错误概率大大增加(高斯噪声情况下合法用户的译码错误概率为4×10-9,而瑞利衰落情况下合法用户的译码错误概率为0.0075)。瑞利衰落和高斯情况下窃听者的译码错误概率和窃听信道的信噪比之间的关系见图4所示。需要说明的是,图4的横坐标采用标准化的单位,即取10倍以10为底的关于主信道和窃听信道信噪比比值的对数函数。由图4不难看出,同一种编码方案在瑞利衰落环境下的抗窃听能力明显强于高斯噪声下的抗窃听能力。First, FIG. 3 is a channel model applied according to a preferred embodiment of the present invention. As shown in FIG. 3, a rule (3, 2) LDPC security code (n=280, k=20, l=100) is used for Rayleigh. In the fading channel, observe its performance in the actual wireless channel. Specifically, the above-designed secure coding and coding scheme is simulated in a Rayleigh fading environment. The signal-to-noise ratio of the primary channel is equal to 14. Compared with the case of Gaussian noise, the probability of decoding error of legitimate users is greatly increased in the case of Rayleigh fading (the probability of decoding error of legitimate users in the case of Gaussian noise is 4×10 -9) However, the probability of decoding error of a legitimate user in the case of Rayleigh fading is 0.0075). The relationship between the decoding error probability of the eavesdropper and the signal-to-noise ratio of the eavesdropping channel in Rayleigh fading and Gaussian cases is shown in Fig. 4. It should be noted that the abscissa of FIG. 4 adopts a standardized unit, that is, takes 10 times the base 10 logarithmic function of the ratio of the signal to noise ratio of the primary channel and the eavesdropping channel. It can be seen from Fig. 4 that the anti-eavesdropping ability of the same coding scheme in the Rayleigh fading environment is significantly stronger than the anti-eavesdropping capability under Gaussian noise.
但是正如前面所述,瑞利衰落环境下合法用户的正确译码能力要比高斯环境下弱些。仿真实验表明,为了减小瑞利衰落环境下合法用户的译码错误概率,需要降低码字的实际传输效率l/(n+k)。当n=380,k=20,l=50时(此时实际的码字效率为0.125,远低于n=280,k=20,l=100时码字的码率0.33),合法用户在瑞利衰落环境下的译码错误概率和高斯环境下的合法用户译码错误概率持平,即都为4×10-9。图5给出了当n=380,k=20,l=50时,窃听者的译码错误概率和窃听信道的信噪比之间的关系。由仿真结果以及图5可以看出,在以牺牲码字的传输效率为代价的情况下,瑞利衰落环境下窃听者的译码错误概率能表现得比高斯环境下更出色,同时瑞利衰落环境下合法用户的译码错误概率能和高斯环境下持平。However, as mentioned earlier, the correct decoding ability of legitimate users in the Rayleigh fading environment is weaker than in the Gaussian environment. Simulation experiments show that in order to reduce the decoding error probability of legitimate users in Rayleigh fading environment, it is necessary to reduce the actual transmission efficiency of codewords l/(n+k). When n=380, k=20, l=50 (when the actual codeword efficiency is 0.125, which is much lower than n=280, k=20, and the code rate of the codeword is 0.33 when l=100), the legal user is The decoding error probability in the Rayleigh fading environment is the same as the legal user decoding error probability in the Gaussian environment, that is, 4×10 -9 . Figure 5 shows the relationship between the probability of the eavesdropper's decoding error and the signal-to-noise ratio of the eavesdropping channel when n = 380, k = 20, and l = 50. It can be seen from the simulation results and FIG. 5 that the decoding error probability of the eavesdropper in the Rayleigh fading environment can be better than that in the Gaussian environment at the expense of the transmission efficiency of the codeword, and the Rayleigh fading The probability of decoding errors of legitimate users in the environment can be the same as in the Gaussian environment.
最后,如果进一步降低码字的效率,例如采用n=980,k=20,l=100的规则(3,2)LDPC码,此时码字的实际效率为0.1。图7给出了此时窃听者的译码错误概率和窃听信道的信噪比之间的关系。仿真实验表明,n=980,k=20,l=100的规则(3,2)LDPC码在瑞利衰落环境下会让合法用户的译码错误概率进一步降低,达到了2×10-9。同时,由图6不难看出,此时瑞利衰落环境下窃听者的译码错误概率比高斯环境下表现的依旧更为出色。 Finally, if the efficiency of the codeword is further reduced, for example, a regular (3, 2) LDPC code of n = 980, k = 20, l = 100 is used, in which case the actual efficiency of the codeword is 0.1. Figure 7 shows the relationship between the probability of decoding error of the eavesdropper and the signal-to-noise ratio of the eavesdropping channel. Simulation experiments show that the rule (3, 2) LDPC codes with n=980, k=20 and l=100 will further reduce the decoding error probability of legitimate users in the Rayleigh fading environment, reaching 2×10 -9 . At the same time, it is not difficult to see from Figure 6. At this time, the probability of decoding error of the eavesdropper in the Rayleigh fading environment is still better than that in the Gaussian environment.
由以上仿真实验得出以下结论:第一、在瑞利衰落环境下,规则LDPC码使得窃听者的译码错误概率比高斯环境下更逼近0.5,这也就使得系统更加的安全;第二、在瑞利衰落环境下,规则LDPC码使得合法用户的译码错误概率增大,这也就使得合法用户的译码难度增加;第三、为了降低瑞利衰落环境下合法用户的译码难度,必须牺牲码字的效率,即通过减小l/(n+k)来使得合法用户译码难度降低。From the above simulation experiments, the following conclusions are drawn: First, in the Rayleigh fading environment, the regular LDPC code makes the eavesdropper's decoding error probability closer to 0.5 than in the Gaussian environment, which makes the system more secure; In the Rayleigh fading environment, the regular LDPC code increases the probability of decoding errors of legitimate users, which makes the decoding difficulty of legitimate users increase. Third, in order to reduce the decoding difficulty of legitimate users in the Rayleigh fading environment, The efficiency of the codeword must be sacrificed, that is, the difficulty of decoding by legitimate users is reduced by reducing l/(n+k).
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:Embodiments of the present invention also provide a storage medium. Optionally, in the embodiment, the foregoing storage medium may be configured to store program code for performing the following steps:
S1,依据校验矩阵H*对主信道上的待发送消息进行编码,其中,通过瑞利衰落主信道的系数衰落矩阵diag(hb)和无衰落时的校验矩阵H确定H*,待发送消息包括:真实消息sk和随机消息dl-k;Sl, it was based on the parity check matrix H * to be transmitted on the primary channel encoded message, wherein the fading matrix diag (h b) and the check matrix H is determined when there is no fading Rayleigh fading coefficient H by the primary channel * to be The sending message includes: a real message s k and a random message d lk ;
S2,发送进行编码后的待发送消息。S2: Send the encoded message to be sent.
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory. A variety of media that can store program code, such as a disc or a disc.
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。For example, the specific examples in this embodiment may refer to the examples described in the foregoing embodiments and the optional embodiments, and details are not described herein again.
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。It will be apparent to those skilled in the art that the various modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. The steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
本发明实施例提出的编码方法及装置,所述方法包括:依据校验矩阵H*对主信道上的待发送消息进行编码,其中,通过瑞利衰落主信道的系数衰落矩阵diag(hb)和无衰落时的校验矩阵H确定所述H*,所述待发送消息包括:真实消息sk和随机消息dl-k;发送进行编码后的待发送消息。采用上述技术方案,解决了相关技术中编码技术不能满足信息安全的问题,进而达到了提高主信道安全性,窃听信道无法破译出真实发送的消息的效果。 Encoding method and apparatus provided by the embodiments of the present invention, the method comprising: sending a message * check matrix H based on the main channel to be encoded, wherein the fading matrix diag (h b) by a factor of primary channel Rayleigh fading And the check matrix H when there is no fading determines the H * , the to-be-sent message includes: a real message s k and a random message d lk ; and sends the encoded message to be sent. The above technical solution solves the problem that the coding technology in the related art cannot satisfy the information security, thereby achieving the effect of improving the security of the primary channel, and the eavesdropping channel cannot decipher the message actually transmitted.
Claims (13)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610221775.0 | 2016-04-11 | ||
| CN201610221775.0A CN107294650A (en) | 2016-04-11 | 2016-04-11 | Coding method and device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017177610A1 true WO2017177610A1 (en) | 2017-10-19 |
Family
ID=60041319
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/098729 Ceased WO2017177610A1 (en) | 2016-04-11 | 2016-09-12 | Coding method and device |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN107294650A (en) |
| WO (1) | WO2017177610A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112187290A (en) * | 2020-10-13 | 2021-01-05 | 中山大学 | Multi-element code coding and decoding method and system based on Polar coding and decoding tree |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7631246B2 (en) * | 2006-01-09 | 2009-12-08 | Broadcom Corporation | LDPC (low density parity check) code size adjustment by shortening and puncturing |
| US9037945B2 (en) * | 2013-03-26 | 2015-05-19 | Seagate Technology Llc | Generating partially sparse generator matrix for a quasi-cyclic low-density parity-check encoder |
| CN104836635A (en) * | 2014-02-11 | 2015-08-12 | 熵敏通讯公司 | LDPC code matrix |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104917558B (en) * | 2015-06-19 | 2018-02-16 | 电子科技大学 | Based on beam forming and the united unconditional security traffic model method for building up of safe coding |
| CN105306168B (en) * | 2015-09-18 | 2017-04-26 | 西安交通大学 | Method for guaranteeing secure transmission of wireless data based on fountain codes |
-
2016
- 2016-04-11 CN CN201610221775.0A patent/CN107294650A/en not_active Withdrawn
- 2016-09-12 WO PCT/CN2016/098729 patent/WO2017177610A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7631246B2 (en) * | 2006-01-09 | 2009-12-08 | Broadcom Corporation | LDPC (low density parity check) code size adjustment by shortening and puncturing |
| US9037945B2 (en) * | 2013-03-26 | 2015-05-19 | Seagate Technology Llc | Generating partially sparse generator matrix for a quasi-cyclic low-density parity-check encoder |
| CN104836635A (en) * | 2014-02-11 | 2015-08-12 | 熵敏通讯公司 | LDPC code matrix |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112187290A (en) * | 2020-10-13 | 2021-01-05 | 中山大学 | Multi-element code coding and decoding method and system based on Polar coding and decoding tree |
| CN112187290B (en) * | 2020-10-13 | 2023-02-17 | 中山大学 | A multi-code encoding and decoding method and system based on Polar encoding and decoding tree |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107294650A (en) | 2017-10-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Li et al. | A practical construction method for polar codes in AWGN channels | |
| Jouguet et al. | Long-distance continuous-variable quantum key distribution with a Gaussian modulation | |
| CN110011792B (en) | Single-step quantum key distribution post-processing method, system, medium and equipment based on polar code | |
| El‐Khamy et al. | Binary polar codes are optimised codes for bitwise multistage decoding | |
| WO2018137663A1 (en) | Encoding method, decoding method, encoding device, and decoding device | |
| Chen et al. | Practical polar code construction over parallel channels | |
| CN107124251B (en) | Polarization code encoding method based on any kernel | |
| Khodaiemehr et al. | LDPC lattice codes for full-duplex relay channels | |
| Ratzer et al. | Sparse low-density parity-check codes for channels with cross-talk | |
| Yi et al. | Achieving strong security based on fountain code with coset pre‐coding | |
| Liu et al. | Lattice codes for CRYSTALS-Kyber | |
| Almeida et al. | Random puncturing for secrecy | |
| CN101854179B (en) | 5bit quantization method applied to LDPC decoding | |
| Zhurakovskyi et al. | Enhancing information transmission security with stochastic codes | |
| WO2017177610A1 (en) | Coding method and device | |
| CN101789795B (en) | Encoding method based on multi-rate protograph low density parity check code and encoder | |
| WO2017177613A1 (en) | Encoding method and device, and decoding method and device | |
| CN107294540B (en) | Encoding method and device, decoding method and device | |
| Bonik et al. | A variant of list plus CRC concatenated polar code | |
| Li et al. | Robust steganography based on polar codes | |
| Yang et al. | Rateless coded blockchain for dynamic IoT networks | |
| Nguyen et al. | Highly reliable and secure system with multi-layer parallel LDPC and Kyber for 5G communications | |
| Wu et al. | Encrypted polar codes for wiretap channel | |
| CN101404504B (en) | Encoding method for non-multiplex low-density check code | |
| US20220006475A1 (en) | Performance enhancement of polar codes for short frame lengths considering error propagation effects |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16898425 Country of ref document: EP Kind code of ref document: A1 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16898425 Country of ref document: EP Kind code of ref document: A1 |