A joint error correction security method based on Raptor code

A security method and technology for keeping information, applied in the field of information communication, can solve the problem of high decoding complexity and achieve the effect of adaptive channel characteristics

Active Publication Date: 2018-12-18
CHONGQING UNIV OF POSTS & TELECOMM
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The simplest fountain code is a random linear fountain code. The codeword symbols output by the encoder are randomly XORed from the source data symbols, and the decoding complexity is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A joint error correction security method based on Raptor code
  • A joint error correction security method based on Raptor code
  • A joint error correction security method based on Raptor code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0036] The technical scheme that the present invention solves the problems of the technologies described above is:

[0037] The present invention includes the encoding and decoding process of Raptor codes. The structure of the Raptor code (Tanner graph) is as follows figure 1 As shown, the precoding (i.e. the outer code) adopts the encoding of a fixed code rate (LDPC code is adopted in the present invention), the LT encoding (i.e. the inner code) is a rateless encoding, and the encoding process is random, and the final code rate, namely The length N of the codeword is determined according to the channel quality. The specific encoding process of Raptor code is as follows:

[0038] (1) K input symbols s ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention claims a joint error correction security method based on Raptor code. A pseudorandom number generator is set in the encoder and decoder to generate an approximate random encoding generation matrix and a deletion pattern to realize random generation and random deletion of encoded symbols. The seed of the pseudorandom number generator is the encryption and decryption key. Non-cooperative recipients are almost impossible to decode without seeds. The invention not only maintains the good error correction performance of the rate-free code, but also ensures the safety of the transmitted information, and the safety does not depend on the quality difference between the eavesdropping channel and the legal channel. In addition, the invention can also adapt the channel performance.

Description

technical field [0001] The invention belongs to the field of information communication, and in particular relates to an information transmission method that simultaneously realizes error correction and secrecy through a shared key combined with rateless coding. Background technique [0002] Physical layer security is to use the characteristics of wireless channels to achieve information security transmission in the sense of information theory through modulation, coding, signal processing and other methods. An important branch of physical layer security is to use channel coding to achieve reliable and secure transmission of information at the same time. The Goppa code-based public key cryptosystem (M public key system) proposed by McEliece first uses error-correcting codes to realize information encryption. ). Because when the private key is not known, the decoding problem of the general linear code that directly uses the public key to solve the secret information is an NP-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L29/06H04L9/08
CPCH04L1/0057H04L1/0061H04L1/0065H04L9/0869H04L63/0435
Inventor 雷维嘉李玉玉
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products