Deep holes are very important in the decoding of generalized RS codes, and deep holes of RS codes have been widely studied, but there are few works on constructing general linear codes based on deep holes. Therefore, ...Deep holes are very important in the decoding of generalized RS codes, and deep holes of RS codes have been widely studied, but there are few works on constructing general linear codes based on deep holes. Therefore, we consider constructing binary linear codes by combining deep holes with binary BCH codes. In this article, we consider the 2-error-correcting binary primitive BCH codes and the extended codes to construct new binary linear codes by combining them with deep holes, respectively. Furthermore, three classes of binary linear codes are constructed, and then we determine the parameters and the weight distributions of these new binary linear codes.展开更多
In this work, the homomorphism of the classic linear block code in linear network coding for the case of binary field and its extensions is studied. It is proved that the classic linear error-control block code is hom...In this work, the homomorphism of the classic linear block code in linear network coding for the case of binary field and its extensions is studied. It is proved that the classic linear error-control block code is homomorphic network error-control code in network coding. That is, if the source packets at the source node for a linear network coding are precoded using a linear block code, then every packet flowing in the network regarding to the source satisfies the same constraints as the source. As a consequence, error detection and correction can be performed at every intermediate nodes of multicast flow, rather than only at the destination node in the conventional way, which can help to identify and correct errors timely at the error-corrupted link and save the cost of forwarding error-corrupted data to the destination node when the intermediate nodes are ignorant of the errors. In addition, three examples are demonstrated which show that homomorphic linear code can be combined with homomorphic signature, McEliece public-key cryptosystem and unequal error protection respectively and thus have a great potential of practical utility.展开更多
Linear dispersion codes (LDCs) were originally designed based on maximum likelihood detection. They do not have good performance when using ordered successive interference cancellation (OSIC) detection. In this paper,...Linear dispersion codes (LDCs) were originally designed based on maximum likelihood detection. They do not have good performance when using ordered successive interference cancellation (OSIC) detection. In this paper,we propose a new improved linear dispersion codes transmission scheme to combat performance loss of original LDCs when using OSIC detection. We introduce an interleaver to each data substream transmitted over different antennas after LDCs encoder. Furthermore,a new computer search criterion for a linear transformation matrix is also proposed. New search criterion is to minimize the symbol error rate based on OSIC detection. Computer simulations show that the performance of proposed LDCs transmission scheme is better than the original LDCs.展开更多
To adjust the variance of source rate in linear broadcast networks, global encoding kernels should have corresponding dimensions to instruct the decoding process. The algorithm of constructing such global encoding ker...To adjust the variance of source rate in linear broadcast networks, global encoding kernels should have corresponding dimensions to instruct the decoding process. The algorithm of constructing such global encoding kernels is to adjust heterogeneous network to possible link failures. Linear algebra, graph theory and group theory are applied to construct one series of global encoding kernels which are applicable to all source rates. The effectiveness and existence of such global encoding kernels are proved. Based on 2 information flow, the algorithm of construction is explicitly given within polynomial time O(|E| |T|.ω^2max), and the memory complexity of algorithm is O(|E|). Both time and memory complexity of this algorithm proposed can be O(ωmax) less than those of algorithms in related works.展开更多
In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenar...In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenario where the demands of a vehicle are satisfied by cooperative transmissions from those one in front is considered.Since the topology of the vehicle network is dynamic,random linear network coding is applied in such a multisource single-sink vehicle-to-vehicle network,where each vehicle is assumed to broadcast messages to others so that the intermediate vehicles between sources and sink can reduce the latency collaboratively.It is shown that the coding scheme can significantly reduce the time delay compared with the non-coding scheme even in the channels with high packet loss rate.In order to further optimize the coding scheme,one can increase the generation size,where the generation size means the number of raw data packets sent by the source node to the sink node in each round of communication.Under the premise of satisfying the coding validity,we can dynamically select the Galois field size according to the number of intermediate nodes.It is not surprised that the reduction in the Galois field size can further reduce the transmission latency.展开更多
Abraham Lempel et al made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding proc...Abraham Lempel et al made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.展开更多
Let F_qbe afinite field with q=pmelements,where pis an odd prime and mis apositive integer.Here,let D_0={(x_1,x_2)∈F_q^2\{(0,0)}:Tr(x_1^(pk1+1)+x_2^(pk2+1))=c},where c∈F_q,Tr is the trace function fromFF_qtoFpand m/...Let F_qbe afinite field with q=pmelements,where pis an odd prime and mis apositive integer.Here,let D_0={(x_1,x_2)∈F_q^2\{(0,0)}:Tr(x_1^(pk1+1)+x_2^(pk2+1))=c},where c∈F_q,Tr is the trace function fromFF_qtoFpand m/(m,k_1)is odd,m/(m,k_2)is even.Define ap-ary linear code C_D =c(a_1,a_2):(a_1,a_2)∈F_q^2},where c(a_1,a_2)=(Tr(a_1x_1+a_2x_2))_((x1,x2)∈D).At most three-weight distributions of two classes of linear codes are settled.展开更多
The optimal and suboptimal structured algorithms of linear block codes from the geometrical perspective are represented.The minimum distance and weight property lemmas and the theorem are proved for the generator matr...The optimal and suboptimal structured algorithms of linear block codes from the geometrical perspective are represented.The minimum distance and weight property lemmas and the theorem are proved for the generator matrix.Based upon the property of generator matrix,the structured algorithms of linear block codes are demonstrated.Since the complexity of optimal structured algorithm is very high,the binary linear block codes is searched by using the suboptimal structured algorithm.The comparison with Bose-Chaudhuri-Hocquenqhem(BCH) codes shows that the searched linear block codes are equivalent on minimum distance and can be designed for more block lengths.Because the linear block codes are used widely in communication systems and digital applications,the optimal and suboptimal structured algorithms must have great future being widely used in many applications and perspectives.展开更多
The binary extended Golay code has a two-level structure, which can be used in the decoding of the code. However, such structure is not limited to the Golay code, in fact, several binary linear codes can be constructe...The binary extended Golay code has a two-level structure, which can be used in the decoding of the code. However, such structure is not limited to the Golay code, in fact, several binary linear codes can be constructed by a projective method which is related to the structure. In this correspondence, the binary (4n,n + 2k, ≥min(8, n,2d)) linear codes are resulted from quaternary (n,k,d) linear block codes. Based on the structure, the efficient maximum likelihood decoding algorithms can be presented correspondingly for the derived codes.展开更多
Firstly,the Fourier transforms in finite fields and the concept of linear complexityof sequences are described.Then several known lower bounds on the minimum distance of cycliccodes are outlined.Finally,the minimum di...Firstly,the Fourier transforms in finite fields and the concept of linear complexityof sequences are described.Then several known lower bounds on the minimum distance of cycliccodes are outlined.Finally,the minimum distance of cyclic codes is analyzed via linear complexityof sequences,and new theorems about the lower bounds are obtained.展开更多
m-weight, as a new generalization of classical Hamming weight, was discussedin this paper. A condition for the existence of linear codes of certain m-weights was given; theSingleton bound, Plotkin bound and Sphere Par...m-weight, as a new generalization of classical Hamming weight, was discussedin this paper. A condition for the existence of linear codes of certain m-weights was given; theSingleton bound, Plotkin bound and Sphere Parking bound of Hamming weight were correspondinglygeneralized to the m-weight.展开更多
A new architecture of space-time codes as a combination of orthogonal space-time block codes (OSTBC) and linear dispersion codes (LDC) is proposed in order to improve the bit error rate(BER) performance of OSTBC...A new architecture of space-time codes as a combination of orthogonal space-time block codes (OSTBC) and linear dispersion codes (LDC) is proposed in order to improve the bit error rate(BER) performance of OSTBC.The scheme proposed is named linear dispersion orthogonal space-time block codes (LDOSTBC).In LDOSTBC scheme,firstly,the data is coded into LDC codewords.Then,the coded LDC substreams are coded into OSTBC codewords again.The decoding algorithm of LDOSTBC combines linear decoding of OSTBC and ML decoding or suboptimum detection algorithms of LDC.Compared with OSTBC scheme when the rate of LDC is MtR,the performance of LDOSTBC scheme can be improved without decreasing the data rate,where Mt is the number of transmit antennas and R is the spectral efficiency of the modulation constellation.If some rate penalty is allowed,when the rate of LDC is less than MtR the performance of LDOSTBC can be improved further.展开更多
This study proposes a novel multi-fractal spectrumbasedapproach to distinguish linear block codes from its selfsynchronousscrambled codes. Given that the linear block codeand self-synchronous scrambled linear block co...This study proposes a novel multi-fractal spectrumbasedapproach to distinguish linear block codes from its selfsynchronousscrambled codes. Given that the linear block codeand self-synchronous scrambled linear block code share the propertyof linear correlation, the existing linear correlation-basedidentification method is invalid for this case. This drawback can becircumvented by introducing a novel multi-fractal spectrum-basedmethod. Simulation results show that the new method has highrobustness and under the same conditions of bit error, the lowerthe code rate, the higher the recognition rate. Thus, the methodhas significant potential for future application in engineering.展开更多
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h...A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.展开更多
We know that for a code C,it‘s very important to find out the Automorphism groupAutC of C.However,it is very difficult to seek entire AutC.In this paper,using the G.I of matrices over a finite field,we give several m...We know that for a code C,it‘s very important to find out the Automorphism groupAutC of C.However,it is very difficult to seek entire AutC.In this paper,using the G.I of matrices over a finite field,we give several methods to judge whether a permutation σ∈S_n.(Symmetric group) belongs to AutC or not.They are helpful for the purpose to ex-展开更多
Genetic algorithms offer very good performances for solving large optimization problems, especially in the domain of error-correcting codes. However, they have a major drawback related to the time complexity and memor...Genetic algorithms offer very good performances for solving large optimization problems, especially in the domain of error-correcting codes. However, they have a major drawback related to the time complexity and memory occupation when running on a uniprocessor computer. This paper proposes a parallel decoder for linear block codes, using parallel genetic algorithms (PGA). The good performance and time complexity are confirmed by theoretical study and by simulations on BCH(63,30,14) codes over both AWGN and flat Rayleigh fading channels. The simulation results show that the coding gain between parallel and single genetic algorithm is about 0.7 dB at BER = 10﹣5 with only 4 processors.展开更多
Aiming at the local intensity anamorphosis in general linearly coded profilometry, the post treatment methods under different decoding conditions are proposed, in which the distorted intensities are rehabilitated or e...Aiming at the local intensity anamorphosis in general linearly coded profilometry, the post treatment methods under different decoding conditions are proposed, in which the distorted intensities are rehabilitated or eliminated by our routines. The experimental results show that the measuring error and system cost can be effectively reduced while the reliability can be improved by introducing those methods into decoding process.展开更多
Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.F...Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.For practical implementation,the consensus based on random linear block code(RLBC)is proposed and applied to blockchain voting scheme.Along with achieving the record correctness and consistency among all nodes,the consensus method indicates the active and inactive consensus nodes.This ability can assist the management of consensus nodes and restrain the generating of chain forks.To achieve end-to-end verifiability,cast-or-audit and randomized partial checking(RPC)are used in the proposed scheme.The voter can verify the high probability of correctness in ballot encryption and decryption.The experiments illustrate that the efficiency of proposed consensus is suitable for blockchain.The proposed electronic voting scheme is adapted to practical implementation of voting.展开更多
The cooperative diversity schemes can effectively create a virtual antenna array for path fading combating multiin wireless channels. However, a lot of cooperative diversity schemes require perfect synchronization whi...The cooperative diversity schemes can effectively create a virtual antenna array for path fading combating multiin wireless channels. However, a lot of cooperative diversity schemes require perfect synchronization which is, in practice, difficult and even impossible to be realized. In this paper, we propose an asynchronous cooperative diversity scheme based on the linear dispersion code (LDC). By adding the zero padding (ZP) between linear dispersion codewords, our scheme mitigates the effect of asynchronism effectively. The length of ZP is decided by relative timing errors between different relays. Besides, an easy decoding method of our scheme is given in this paper by restructuring the stacked channel matrix.展开更多
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin...Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme.展开更多
文摘Deep holes are very important in the decoding of generalized RS codes, and deep holes of RS codes have been widely studied, but there are few works on constructing general linear codes based on deep holes. Therefore, we consider constructing binary linear codes by combining deep holes with binary BCH codes. In this article, we consider the 2-error-correcting binary primitive BCH codes and the extended codes to construct new binary linear codes by combining them with deep holes, respectively. Furthermore, three classes of binary linear codes are constructed, and then we determine the parameters and the weight distributions of these new binary linear codes.
基金supported by Natural Science Foundation of China (No.61271258)
文摘In this work, the homomorphism of the classic linear block code in linear network coding for the case of binary field and its extensions is studied. It is proved that the classic linear error-control block code is homomorphic network error-control code in network coding. That is, if the source packets at the source node for a linear network coding are precoded using a linear block code, then every packet flowing in the network regarding to the source satisfies the same constraints as the source. As a consequence, error detection and correction can be performed at every intermediate nodes of multicast flow, rather than only at the destination node in the conventional way, which can help to identify and correct errors timely at the error-corrupted link and save the cost of forwarding error-corrupted data to the destination node when the intermediate nodes are ignorant of the errors. In addition, three examples are demonstrated which show that homomorphic linear code can be combined with homomorphic signature, McEliece public-key cryptosystem and unequal error protection respectively and thus have a great potential of practical utility.
文摘Linear dispersion codes (LDCs) were originally designed based on maximum likelihood detection. They do not have good performance when using ordered successive interference cancellation (OSIC) detection. In this paper,we propose a new improved linear dispersion codes transmission scheme to combat performance loss of original LDCs when using OSIC detection. We introduce an interleaver to each data substream transmitted over different antennas after LDCs encoder. Furthermore,a new computer search criterion for a linear transformation matrix is also proposed. New search criterion is to minimize the symbol error rate based on OSIC detection. Computer simulations show that the performance of proposed LDCs transmission scheme is better than the original LDCs.
基金Project(60872005) supported by National Natural Science Foundation of China
文摘To adjust the variance of source rate in linear broadcast networks, global encoding kernels should have corresponding dimensions to instruct the decoding process. The algorithm of constructing such global encoding kernels is to adjust heterogeneous network to possible link failures. Linear algebra, graph theory and group theory are applied to construct one series of global encoding kernels which are applicable to all source rates. The effectiveness and existence of such global encoding kernels are proved. Based on 2 information flow, the algorithm of construction is explicitly given within polynomial time O(|E| |T|.ω^2max), and the memory complexity of algorithm is O(|E|). Both time and memory complexity of this algorithm proposed can be O(ωmax) less than those of algorithms in related works.
基金This work was supported in part by the Guangdong Basic and Applied Basic Research Foundation under Key Project 2019B1515120032in part by the National Science Foundation of China(NSFC)with grant no.61901534+3 种基金in part by the Science,Technology and Innovation Commission of Shenzhen Municipality with grant no.JCYJ20190807155617099in part by the University Basic Research Fund 20lgpy43in part by the Guangdong Natural Science Foundation of Grant No.2019A1515011622the Foundation of Grant No.2019-JCJQ-JJ-411.
文摘In the Internet of vehicles(IoV),direct communication between vehicles,i.e.,vehicle-tovehicle(V2V)may have lower latency,compared to the schemes with help of Road Side Unit(RSU)or base station.In this paper,the scenario where the demands of a vehicle are satisfied by cooperative transmissions from those one in front is considered.Since the topology of the vehicle network is dynamic,random linear network coding is applied in such a multisource single-sink vehicle-to-vehicle network,where each vehicle is assumed to broadcast messages to others so that the intermediate vehicles between sources and sink can reduce the latency collaboratively.It is shown that the coding scheme can significantly reduce the time delay compared with the non-coding scheme even in the channels with high packet loss rate.In order to further optimize the coding scheme,one can increase the generation size,where the generation size means the number of raw data packets sent by the source node to the sink node in each round of communication.Under the premise of satisfying the coding validity,we can dynamically select the Galois field size according to the number of intermediate nodes.It is not surprised that the reduction in the Galois field size can further reduce the transmission latency.
基金She was with the Department of Mathematics in Wuhan University while writting this paper.
文摘Abraham Lempel et al made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.
文摘Let F_qbe afinite field with q=pmelements,where pis an odd prime and mis apositive integer.Here,let D_0={(x_1,x_2)∈F_q^2\{(0,0)}:Tr(x_1^(pk1+1)+x_2^(pk2+1))=c},where c∈F_q,Tr is the trace function fromFF_qtoFpand m/(m,k_1)is odd,m/(m,k_2)is even.Define ap-ary linear code C_D =c(a_1,a_2):(a_1,a_2)∈F_q^2},where c(a_1,a_2)=(Tr(a_1x_1+a_2x_2))_((x1,x2)∈D).At most three-weight distributions of two classes of linear codes are settled.
文摘The optimal and suboptimal structured algorithms of linear block codes from the geometrical perspective are represented.The minimum distance and weight property lemmas and the theorem are proved for the generator matrix.Based upon the property of generator matrix,the structured algorithms of linear block codes are demonstrated.Since the complexity of optimal structured algorithm is very high,the binary linear block codes is searched by using the suboptimal structured algorithm.The comparison with Bose-Chaudhuri-Hocquenqhem(BCH) codes shows that the searched linear block codes are equivalent on minimum distance and can be designed for more block lengths.Because the linear block codes are used widely in communication systems and digital applications,the optimal and suboptimal structured algorithms must have great future being widely used in many applications and perspectives.
文摘The binary extended Golay code has a two-level structure, which can be used in the decoding of the code. However, such structure is not limited to the Golay code, in fact, several binary linear codes can be constructed by a projective method which is related to the structure. In this correspondence, the binary (4n,n + 2k, ≥min(8, n,2d)) linear codes are resulted from quaternary (n,k,d) linear block codes. Based on the structure, the efficient maximum likelihood decoding algorithms can be presented correspondingly for the derived codes.
文摘Firstly,the Fourier transforms in finite fields and the concept of linear complexityof sequences are described.Then several known lower bounds on the minimum distance of cycliccodes are outlined.Finally,the minimum distance of cyclic codes is analyzed via linear complexityof sequences,and new theorems about the lower bounds are obtained.
文摘m-weight, as a new generalization of classical Hamming weight, was discussedin this paper. A condition for the existence of linear codes of certain m-weights was given; theSingleton bound, Plotkin bound and Sphere Parking bound of Hamming weight were correspondinglygeneralized to the m-weight.
基金Sponsored by the "111" Project of China (B08038)Important National Science & Technology Specific Projects (2009ZX03003-003+2 种基金2009ZX03003-004) the NSFC-Guangdong (U0635003)Program for Changjiang Scholars and Innovative Research Team in University(IRT0852)
文摘A new architecture of space-time codes as a combination of orthogonal space-time block codes (OSTBC) and linear dispersion codes (LDC) is proposed in order to improve the bit error rate(BER) performance of OSTBC.The scheme proposed is named linear dispersion orthogonal space-time block codes (LDOSTBC).In LDOSTBC scheme,firstly,the data is coded into LDC codewords.Then,the coded LDC substreams are coded into OSTBC codewords again.The decoding algorithm of LDOSTBC combines linear decoding of OSTBC and ML decoding or suboptimum detection algorithms of LDC.Compared with OSTBC scheme when the rate of LDC is MtR,the performance of LDOSTBC scheme can be improved without decreasing the data rate,where Mt is the number of transmit antennas and R is the spectral efficiency of the modulation constellation.If some rate penalty is allowed,when the rate of LDC is less than MtR the performance of LDOSTBC can be improved further.
基金supported by the National Natural Science Foundation of China(61171170) the Natural Science Foundation of Anhui Province(1408085QF115)
文摘This study proposes a novel multi-fractal spectrumbasedapproach to distinguish linear block codes from its selfsynchronousscrambled codes. Given that the linear block codeand self-synchronous scrambled linear block code share the propertyof linear correlation, the existing linear correlation-basedidentification method is invalid for this case. This drawback can becircumvented by introducing a novel multi-fractal spectrum-basedmethod. Simulation results show that the new method has highrobustness and under the same conditions of bit error, the lowerthe code rate, the higher the recognition rate. Thus, the methodhas significant potential for future application in engineering.
文摘A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.
文摘We know that for a code C,it‘s very important to find out the Automorphism groupAutC of C.However,it is very difficult to seek entire AutC.In this paper,using the G.I of matrices over a finite field,we give several methods to judge whether a permutation σ∈S_n.(Symmetric group) belongs to AutC or not.They are helpful for the purpose to ex-
文摘Genetic algorithms offer very good performances for solving large optimization problems, especially in the domain of error-correcting codes. However, they have a major drawback related to the time complexity and memory occupation when running on a uniprocessor computer. This paper proposes a parallel decoder for linear block codes, using parallel genetic algorithms (PGA). The good performance and time complexity are confirmed by theoretical study and by simulations on BCH(63,30,14) codes over both AWGN and flat Rayleigh fading channels. The simulation results show that the coding gain between parallel and single genetic algorithm is about 0.7 dB at BER = 10﹣5 with only 4 processors.
文摘Aiming at the local intensity anamorphosis in general linearly coded profilometry, the post treatment methods under different decoding conditions are proposed, in which the distorted intensities are rehabilitated or eliminated by our routines. The experimental results show that the measuring error and system cost can be effectively reduced while the reliability can be improved by introducing those methods into decoding process.
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis(No.HCIC201502,HCIC201701)。
文摘Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.For practical implementation,the consensus based on random linear block code(RLBC)is proposed and applied to blockchain voting scheme.Along with achieving the record correctness and consistency among all nodes,the consensus method indicates the active and inactive consensus nodes.This ability can assist the management of consensus nodes and restrain the generating of chain forks.To achieve end-to-end verifiability,cast-or-audit and randomized partial checking(RPC)are used in the proposed scheme.The voter can verify the high probability of correctness in ballot encryption and decryption.The experiments illustrate that the efficiency of proposed consensus is suitable for blockchain.The proposed electronic voting scheme is adapted to practical implementation of voting.
基金Supported by the National High Technology Research and Development Program of China ( No. 2006AA01Z270), the Programane of Introducing Talents of Discipline to University of China (No. B08038) and the Joint Funds of National Natural Science Foundation of China-Guangdong Province (No. U0635003).
文摘The cooperative diversity schemes can effectively create a virtual antenna array for path fading combating multiin wireless channels. However, a lot of cooperative diversity schemes require perfect synchronization which is, in practice, difficult and even impossible to be realized. In this paper, we propose an asynchronous cooperative diversity scheme based on the linear dispersion code (LDC). By adding the zero padding (ZP) between linear dispersion codewords, our scheme mitigates the effect of asynchronism effectively. The length of ZP is decided by relative timing errors between different relays. Besides, an easy decoding method of our scheme is given in this paper by restructuring the stacked channel matrix.
文摘Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme.