Supercharge Your Innovation With Domain-Expert AI Agents!

Encoding method, encoding device, decoding method and decoding device

A coding method and coding technology, applied in the field of communication, can solve the problem that coding technology cannot achieve the security of information theory meaning, and achieve the effect of safe coding and decoding

Inactive Publication Date: 2017-10-24
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an encoding method and device, and a decoding method and device to at least solve the problem that the encoding technology in the related art cannot achieve the security of the information theory meaning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encoding method, encoding device, decoding method and decoding device
  • Encoding method, encoding device, decoding method and decoding device
  • Encoding method, encoding device, decoding method and decoding device

Examples

Experimental program
Comparison scheme
Effect test

example

[0134] Example: Rule (3,2) LDPC security code using BP decoding algorithm

[0135] First, when n=280, k=20, l=100 (the actual code word rate is 0.33 at this time), and the signal-to-noise ratio of the legal user is 14, the simulation results show that the bit error rate of the legal user is 4 ×10 -9 , which is the same as the bit error rate of legal users without feedback (the bit error rate of legal users corresponding to this codeword is also 4×10 -9 ). Figure 6 is the curve according to the preferred embodiment of the present invention Figure 1 ,Such as Figure 6 As shown, when n=280, k=20, l=100, the relationship between the ratio of the signal-to-noise ratio of the main channel and the eavesdropping channel and the bit error rate of the eavesdropper is given. From the simulation results and Figure 6 We can see that the feedback can increase the decoding error probability of an eavesdropper, thereby improving the security of the system.

[0136] Next, we reduce th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is an encoding method, an encoding device, a decoding method and a decoding device. The encoding method comprises steps: a to-be-sent message is acquired, wherein the to-be-sent message comprises a real message of k bits and a random message of (l-k) bits, and both l and k are natural numbers; a preset key is used to encrypt the to-be-sent message; the encrypted to-be-sent message is encoded according to a check matrix H, a codeword r<n+k> is acquired, wherein n is a codeword length of the real message, the check matrix H is a matrix generated according to a fading coefficient matrix diag(hb) and a preset check matrix H<*>, and the check matrix H satisfies the following condition: r<n+k> H<T> = 0; and the codeword r<n+k> is sent. By adopting the above technical scheme, the problem that the encoding technology cannot achieve information theory meaning safety can be solved and safety encoding and decoding are realized.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an encoding method and device, and a decoding method and device. Background technique [0002] In the related art, the research on the security of the physical layer of the wireless communication system originates from Wyner's famous paper on eavesdropping channels, in which Wyner studies a channel model in which a point-to-point communication system is eavesdropped by an eavesdropper. Wyner uses conditional entropy to define the doubt degree of the eavesdropper on the confidential information, and gives the maximum value of information transmission efficiency when the eavesdropper's doubt degree is the largest, that is, the security capacity. In the existence proof of security capacity, Wyner proposed the encoding technique of random binning. This technique has become one of the most common coding techniques in channel models where security is considered. Random boxing refer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L9/06
CPCH04L1/0057H04L9/06H04L9/00
Inventor 胡婧婷
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More