期刊文献+

基于低密度奇偶校验码的数据协调技术 被引量:1

Reconciliation technology based on low density parity check code
下载PDF
导出
摘要 低密度奇偶校验码(LDPC)是一种(n,k)线性分组码。当分组码码长较短时,利用常规的编码方法可以完成编码工作。但随着分组码码长的增加,利用常规LDPC的编码方式编码,计算机的内存难以承担。为了解决以上问题,提出两种有效的编译码方案。首先,该数据协调方案不同于传统校验位译码,利用边信息和原始数据产生的校验子进行联合译码;其次,将校验矩阵以稀疏矩阵的形式存储,利用双向十字循环链表只记录1的位置的方式存储校验矩阵,这样可极大地节省内存空间;最后,通过C语言实现可提高编译码的有效性。实验中选取码长105的分组长度,译码器误码率(BER)收敛于1.0 dB,每一分组译码时间仅需4 s,译码收敛后速率达到24.85 kb/s,时效性较强。 Low Density Parity Check Code (LDPC) is a kind of (n, k) linear block codes. The conventional encoding method can complete the encoding work when the length of the codes is short, but as the codes become longer, the memory of computer is hard to bear when still using the common encoding methods. To solve this problem, two kinds of effective encoding and decoding schemes were proposed. Firstly, different from the traditional data parity bit decoding, the proposed data reconciliation scheme used side information and syndrome produced by the initial data to employ joint decoding. Secondly, the parity matrix was stored in a way that only the positions of 1 in the form of the cross circular list were recorded, which could greatly save memory space. At last, C implementation could improve effectiveness of the codes. Length of a block of codes in this experiment was l0s. The Bit Error Ratio (BER) of codes was converged above 1.0 dB, only in need of 4 seconds to decode one block, the code rate could reach 24.85 kb/s when the decoder was converged. The results show that the proposed schemes have strong timeliness.
出处 《计算机应用》 CSCD 北大核心 2013年第12期3511-3513,共3页 journal of Computer Applications
基金 量子光学与光量子器件国家重点实验室开放基金资助项目(KF201003)
关键词 低密度奇偶校验码 边信息 校验子 稀疏矩阵 数据协调 low Density Parity Check Code (LDPC) side information syndrome sparse matrix reconciliation
  • 相关文献

参考文献3

二级参考文献30

  • 1宋同强.利用双模压缩真空态实现量子态的远程传输[J].物理学报,2004,53(10):3358-3362. 被引量:9
  • 2马海强,李亚玲,赵环,吴令安.基于双偏振分束器的量子密钥分发系统[J].物理学报,2005,54(11):5014-5017. 被引量:10
  • 3CAVALLAR S, et al. Factorization of a 512-bit RSA modulus[A]. Advances in Cryptology- Eurocrypt 2000[C].LNCS 1807,Springer-Verlag, 2000. 1-18.
  • 4BONEH D. Twenty years of attacks on the RSA cryptosystem[J]. Notices of the American Mathematical Society, 1999, 46(2):203-213.
  • 5DUSSEAND J R, KALISKI B. A cryptographic library for the Motorola DSP56000[A]. Advances in Cryptology-Eurocrypt 1990[C].LNCS 473, Springer-Verlag, 1991.230-244.
  • 6KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987,48:203-209.
  • 7MILLER V. Uses of elliptic curves in cryptography[A]. Advances in Cryptology-Crypto 1985[C].LNCS 218, Springer-Verlag,1986.417 -426.
  • 8KOBLITZ N. Hyperelliptic cryptography[J]. Journal of Cryptology, 1989,1(3):139-150.
  • 9CANTOR D G. Computing in the jacobian of a hyperelliptic curve[J]. Mathematics of Computation, 1987, 48(177): 95-101.
  • 10IEEE P1363. Standard Specifications for Public-Key Cryptography Draft[S].1997.

共引文献35

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部