期刊文献+

High efficiency Polar coding key reconciliation scheme in wireless channel

High efficiency Polar coding key reconciliation scheme in wireless channel
原文传递
导出
摘要 Recently, physical layer security in wireless communication system attracts much attention, and the reconciliation protocol plays an important role in the final secure key distillation, since the secret keys extracted from the realistic characteristics of the wireless channel may not be the same between the transmitter and legitimate receiver. A high efficiency Polar coding key reconciliation scheme is proposed in the paper to correct these errors. In the scheme, the transmitter generates a random stream with the known frozen bits and positions. After that, the transmitter encodes the random bit stream to a code stream by Polar encoding and sends the corrupted version of the code stream and the secret keys to the legitimate receiver. The receiver decodes the received stream with Polar successive cancellation decoding algorithm. With Polar encoding, the receiver obtains a random bit stream, and achieves the final secure key by XOR operator. The results show that the proposed scheme has a higher efficiency and a lower computational complexity, along with a high success rate. The consistency of the keys is very good after the reconciliation. Recently, physical layer security in wireless communication system attracts much attention, and the reconciliation protocol plays an important role in the final secure key distillation, since the secret keys extracted from the realistic characteristics of the wireless channel may not be the same between the transmitter and legitimate receiver. A high efficiency Polar coding key reconciliation scheme is proposed in the paper to correct these errors. In the scheme, the transmitter generates a random stream with the known frozen bits and positions. After that, the transmitter encodes the random bit stream to a code stream by Polar encoding and sends the corrupted version of the code stream and the secret keys to the legitimate receiver. The receiver decodes the received stream with Polar successive cancellation decoding algorithm. With Polar encoding, the receiver obtains a random bit stream, and achieves the final secure key by XOR operator. The results show that the proposed scheme has a higher efficiency and a lower computational complexity, along with a high success rate. The consistency of the keys is very good after the reconciliation.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第3期50-55,共6页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (61871234,61475075)
关键词 security of physical layer POLAR CODING channel characteristics COMPUTATIONAL COMPLEXITY SUCCESS rate security of physical layer Polar coding channel characteristics computational complexity success rate
  • 相关文献

参考文献8

二级参考文献61

  • 1高敬伯,周曼丽.规则低密度校验码的比特翻转解码算法研究[J].计算机科学,2006,33(8):76-79. 被引量:1
  • 2BENNETT C H, BRASSARD G. Quantum Cryptography: Public Key Distribution and Coin Tossing [J]. Proc of the IEEE Int Conf on Computers Systems and Signal Processing, 1984, 17 5-17 9.
  • 3BENNETT C H, BESSETTE F, BRASSARD G, et al. Experimental Quantum Cryptography [J]. J Cryptol, 1992, 5: 3-28.
  • 4BRASSARD G, SALVAIL L. Secret-key Reconciliation by Public Discussion. Advances in Cryptography - Euroerypt ' 93 [J]. Lecture Notes in Computer Science, 1993, 1993: 410-423.
  • 5BUTTLER W T, LAMOREAUX S K, TORGERSON J R, et al. Fast, Efficient Error Reconciliation for Quantum Cryptography[J]. PhysRevA, 2003, 67: 052303.
  • 6FUNKAWA E, YAMAZAKI K. Application of Existing Perfect Code to Secret key Reconciliation [J]. Conf Proc Int Symp Commun Inform Tech , 2001, 397-400.
  • 7TOMOHIRO SUGIMOTO, KOUICHI YAMAZAKI. A Study on Secret Key Reconciliation Protocal "Cascade"[J]. IEICE Trans Fundamentals, 2000, E83-A(10): 1987-1991.
  • 8YAN H, PENG X, LIN X, et al. Efficiency of Winnow Protocol in Secret Key Reconciliation [M]. submitted, 2008.
  • 9YAN H, REN T, et al. (2008). Information Reconciliation Protocol in Quantum Key Distribution System. Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 03, IEEE Computer Society.
  • 10DAVID ELKOUSS, ANTHONY LEVERRIER, ROMAIN ALLEAUME, et al. Efficient Reconciliation Protocol for Discrete-variable Euantum Key Distribution, arXiv: 0901. 2140 (January 2009).

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部