A Joint Error Correction Security Method Based on Raptor Codes

A technique for keeping secrets and secreting information, which is applied in the field of information communication, can solve the problem of high decoding complexity, and achieve the effect of self-adaptive channel characteristics

Active Publication Date: 2021-02-09
CHONGQING UNIV OF POSTS & TELECOMM
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The simplest fountain code is a random linear fountain code. The codeword symbols output by the encoder are randomly XORed from the source data symbols, and the decoding complexity is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Joint Error Correction Security Method Based on Raptor Codes
  • A Joint Error Correction Security Method Based on Raptor Codes
  • A Joint Error Correction Security Method Based on Raptor Codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0036] The technical scheme that the present invention solves the problems of the technologies described above is:

[0037] The present invention includes the encoding and decoding process of Raptor codes. The structure of the Raptor code (Tanner graph) is as follows figure 1 As shown, the precoding (i.e. the outer code) adopts the encoding of a fixed code rate (LDPC code is adopted in the present invention), the LT encoding (i.e. the inner code) is a rateless encoding, and the encoding process is random, and the final code rate, namely The length N of the codeword is determined according to the channel quality. The specific encoding process of Raptor code is as follows:

[0038] (1) K input symbols s ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention requests protection of a joint error correction security method based on Raptor codes. A pseudo-random number generator is set in the encoder and decoder to generate an approximately random code generation matrix and deletion pattern to realize random generation and random deletion of coded symbols. The seed of the pseudo-random number generator is the key for encryption and decryption. It is nearly impossible for non-cooperative receivers to decode without a seed. The present invention ensures the security of transmitted information while maintaining the good error correction performance of the rateless code, and its security does not depend on the quality gap between the eavesdropping channel and the legitimate channel; in addition, the present invention can also adapt the channel performance .

Description

technical field [0001] The invention belongs to the field of information communication, and in particular relates to an information transmission method that simultaneously realizes error correction and secrecy through a shared key combined with rateless coding. Background technique [0002] Physical layer security is to use the characteristics of wireless channels to achieve information security transmission in the sense of information theory through modulation, coding, signal processing and other methods. An important branch of physical layer security is to use channel coding to achieve reliable and secure transmission of information at the same time. The Goppa code-based public key cryptosystem (M public key system) proposed by McEliece first uses error-correcting codes to realize information encryption. ). Because when the private key is not known, the decoding problem of the general linear code that directly uses the public key to solve the secret information is an NP-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/00H04L29/06H04L9/08
CPCH04L1/0057H04L1/0061H04L1/0065H04L9/0869H04L63/0435
Inventor 雷维嘉李玉玉
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products