[go: up one dir, main page]

CN103414540A - Degraded eavesdropping channel rate compatible method based on Polar code - Google Patents

Degraded eavesdropping channel rate compatible method based on Polar code Download PDF

Info

Publication number
CN103414540A
CN103414540A CN2013103540153A CN201310354015A CN103414540A CN 103414540 A CN103414540 A CN 103414540A CN 2013103540153 A CN2013103540153 A CN 2013103540153A CN 201310354015 A CN201310354015 A CN 201310354015A CN 103414540 A CN103414540 A CN 103414540A
Authority
CN
China
Prior art keywords
channel
matrix
polar code
code
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103540153A
Other languages
Chinese (zh)
Inventor
赵生妹
施鹏
武凡涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2013103540153A priority Critical patent/CN103414540A/en
Publication of CN103414540A publication Critical patent/CN103414540A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

本发明公开了一种基于删余Polar码的退化窃听信道速率兼容方法,该方法将删余Polar码与退化窃听信道模型相结合,根据Polar码的构造特点,给出用于传输信息的安全比特信道;根据退化窃听信道的信道速率要求,构造出适合的删余矩阵,实现了基于Polar码的退化窃听信道编码的速率兼容方法;由于窃听者不知道删余矩阵,且删余操作使得编码后的码字长度减少,信息通过删余操作被隐藏,窃听者通过搭线窃听信道所获得的接收码字来恢复原信息的复杂度增加,保证了系统的安全性;而且,删余方法使得同一组速率兼容码中的所有码都可以通过同一组编、译码器实现,这大大降低了发射机和接收机的复杂度。

Figure 201310354015

The invention discloses a degenerate wiretapping channel rate compatible method based on punctured Polar codes. The method combines punctured Polar codes with a degenerated wiretapping channel model, and according to the construction characteristics of Polar codes, secure bits for transmitting information are given. channel; according to the channel rate requirements of the degenerate eavesdropping channel, a suitable puncturing matrix is constructed, and a rate-compatible method of degenerate eavesdropping channel coding based on Polar codes is realized; since the eavesdropper does not know the puncturing matrix, and the puncturing operation makes the encoded The length of the codeword is reduced, the information is hidden through the puncturing operation, and the complexity of the eavesdropper's recovery of the original information by eavesdropping the received codeword on the channel increases, which ensures the security of the system; moreover, the puncturing method makes the same All the codes in the group rate compatible codes can be implemented by the same group encoder and decoder, which greatly reduces the complexity of the transmitter and receiver.

Figure 201310354015

Description

A kind of tapping channel of degeneration based on Polar code rate-compatible method
Technical field
The present invention relates to wireless communication information safe practice field, particularly a kind of tapping channel of degeneration based on Polar code rate-compatible method.
Background technology
In recent years, along with the development of wireless communication technology and the people continuous increase to demand for services, require more and more higher to safety and the rate-compatible of wireless communication system.Physical layer becomes safely an important branch of information security, causes that people pay close attention to widely.Wyner tapping channel (Wiretap Channel) model is an important models of physical layer security study, and its important indicator " safe capacity " becomes the key of information security research.
Wyner tapping channel model comprises main channel (main channel) between validated user Alice and Bob and the channel that wiretaps (eavesdropping channel) between disabled user Eve and sender Alice.Usually supposing to wiretap interchannel noise will be higher than the main channel noise, and the channel that namely wiretaps is the degenerate channel of main channel.Channel coding method is to guarantee that wireless system reaches the important means of " safe capacity ".2005, the people such as Thangaraj for main channel be noiseless channel, the channel that wiretaps is that binary system can be smeared channel (BEC), provided based on random low density parity check code (LDPC), transmission rate reaches the method for safe capacity.2011, the people such as V.Rathi further, when main channel is all the BEC channel with the channel that wiretaps, used convolutional LDPC code, make transmission rate reach whole achievable rate region.The Polar code be 2007 by Arikan propose, unique channel coding method that reaches shannon limit in theory up to now, and be the coding and decoding method with low complex degree.2010, the people such as E.Hof were applied to the Polar code in the Wyner tapping channel, the Polar code structure that has provided the safe capacity of the discrete memoryless symmetrical tapping channel of binary system and obtained safe capacity.Due to main channel and bit channel (bit-channel) difference of channel by " channel-polarization " (channel polarization) acquisition that wiretap, allow information only by for main channel, being for the channel that wiretaps, can obtain safe transmission when entirely making an uproar bit channel without making an uproar bit channel, these bit channels that are used for transmission information are called as " safe bit " channel.The structure of Polar code in the degeneration tapping channel takes full advantage of these characteristics of degenerate channel that the channel that wiretaps is main channel.
Because the time-varying characteristics of radio communication channel environment are stronger, the code check of chnnel coding should meet the demands adaptively, therefore needs a kind of coding method of rate-compatible.More than deleting, be a kind of common method that builds the rate-compatible coding, more than the deleting of code, make all codes in same group of rate-compatible code can be by same group of volume, decoder realization, this greatly reduces the complexity of transmitter and receiver.And, more than deleting, also can improve the fail safe of wyner tapping channel model, as people such as Klinc 2011 in Gauss's tapping channel model, utilization is deleted remaining (puncturing) technology and is combined with LDPC code structure, while making the channel signal to noise ratio that wiretaps be less than the minimum signal to noise ratio of main channel, the listener-in obtains less than any effective information.The present invention utilizes the design of Polar code and the structure of residual matrix, can solve well fail safe and the rate-compatible two aspect problems of degeneration tapping channel.
Summary of the invention
The object of the invention has been to propose a kind of degeneration tapping channel rate-compatible method based on deleting remaining Polar code, the method will be deleted remaining Polar code and be combined with degeneration tapping channel model, according to the construction features of Polar code and the channel circumstance of degeneration tapping channel, construct applicable residual matrix, realize the rate-compatible of degeneration tapping channel coding.Because the listener-in does not know residual matrix, and delete remaining operation and make the code word size after coding reduce, information exchange is crossed and is deleted remaining operation and be hidden.The complexity that the reception code word that the listener-in obtains by the channel that wiretaps is recovered prime information increases, and has guaranteed the fail safe of system.
The technical solution adopted for the present invention to solve the technical problems is: the present invention be take degeneration tapping channel model and is basis, the building method of Polar code of take is prerequisite, utilize puncturing method, design based on the rate-compatible method of deleting remaining Polar code, realize the rate-compatible of degeneration tapping channel and the assurance of fail safe.
Polar code Common Parameters (N, K, A,
Figure BDA00003663610300021
) expression, wherein N(N=2 n, n>=0) and be code length, K is information bit length, A is information bit subscript collection,
Figure BDA00003663610300022
For freezing position, these freeze an information and will remain unchanged before and after coding.By channel-polarization, the bit channel that in the Polar code, the A indexed set is corresponding is without making an uproar bit channel (noiseless bit-channel), and A cThe bit channel that the subscript set pair is answered is the bit channel of entirely making an uproar (noisy bit-channel).In the design of degeneration tapping channel model Polar code, the code length of main channel and the channel Polar code that wiretaps is all N, makes A mWith Be the information bit set of main channel and freeze position set, A wWith
Figure BDA00003663610300024
Be wiretap channel the information bit set and freeze position set.Due to the channel that wiretaps, be the degenerate channel of main channel, therefore
Figure BDA00003663610300026
Can select like this validated user Bob is for listener-in Eve, to be that the bit channel of entirely making an uproar carries out the breath transmission as safe bit channel without making an uproar.Therefore, in degeneration tapping channel model, set corresponding to safe bit channel may be defined as S=A mA w, i.e. A mCollection removes A wIndexed set.In order to make the Polar encoding scheme be applicable to degeneration tapping channel parameter, change with environmental change, can delete remaining operation to the generator matrix of Polar code.By deleting remaining operation, reduced the bit number transmitted in channel after Polar code coding, improved the transmission rate between validated user; Simultaneously, owing to deleting remaining operation, make the code word size after coding reduce, some information are hidden.The signal to noise ratio of channel is lower if wiretap, listener-in Eve wants that the reception code word obtained by the channel that wiretaps recovers the complexity of prime information and increase, the bit error rate of listener-in Eve will be more near 0.5, and this is equivalent to the listener-in and is close to 0 from the channel that wiretaps, obtaining Useful Information.Therefore, by deleting remaining operation, the fail safe of Wyner tapping channel model can be guaranteed.
But deleting remaining operation meeting affects a little the safe capacity theoretical value.Main channel and tapping channel are W and W' if suppose, its channel capacity is respectively I (W) and I (W'), and the theoretically secure capacity is:
Cs = I ( W ) - I ( W ′ ) = n ( I ( W ) - I ( W ′ ) ) n - - - ( 1 )
In Polar code coding, make N of channel W to copy merge and split together, adopted delete remaining after, some copy channel is transmission information not, at the decoding end, the likelihood ratio of these positions will assignment ' 1 ' be worth, show receive ' 0 ' identical with the probability of ' 1 ' symbol, so capacity of these copy channels can think 0.If deleting remaining bit number is np, wherein p is deleted the probability of remaining bit in the n bit information after coding, and safe capacity can be calculated as:
Cs ′ = ( nI ( W ) - npI ( W ) - ( n - np ) I ( W ′ ) ) / n = ( n - np ) ( I ( W ) - I ( W ′ ) ) n - - - ( 2 )
As can be seen here, delete remaining rear safe capacity and will relatively be reduced to original (n-np)/n.If p<<1, the safe capacity value remains unchanged substantially.
Below provide and be applied to degenerate the concrete construction process of the Polar code tapping channel model, the achievable rate compatibility.
Method flow:
The invention provides a kind of tapping channel of degeneration based on Polar code rate-compatible method, the method comprises the steps:
Step 1: at transmitting terminal, Alice is by information u, random noise v and freeze position
Figure BDA00003663610300032
Encode, the coding formula is:
X = u G N ( S ) + v G N ( A w ) + u A m c G N ( A m c ) - - - ( 3 )
Wherein, noise v is that a length is | A w| random sequence, G N(A) be G NIn under be designated as the generator matrix that row that the A set pair answers forms,
Figure BDA00003663610300034
B NBe the bit permutation matrix of one N * N, F is matrix 1 0 1 1 ,
Figure BDA00003663610300036
For the Kronecker tensor product; Like this, information is only at safe bit channel, and namely subscript integrates as the S position and transmits, with the fail safe of guarantee information;
The sequence X that step 2:Alice obtains coding is deleted remaining operation, obtain sequence X ',
X'=XG punc (4)
Wherein, G PuncFor the residual matrix on rank of N * (N-d), d deletes the number of bits do not passed; According to the construction features of Polar code, existing employing cut-off tree (stopping-tree) is deleted remaining method, the participation cut-off is set to the code word node of least number of times and leaves out; According to the cut-off tree, delete the basic principle of remaining method, in conjunction with the characteristics of linear block codes, the code that can obtain every row in Polar code coding generator matrix is exactly heavily the number of times that after coding, this code word participates in the cut-off tree; The position collection that calculates the d row of weight minimum in Polar code generator matrix is labeled as to A d, the unit matrix of N * N is removed to A dMatrix after set is made as residual matrix G Punc
Step 3: at receiving terminal, validated user Bob can obtain the d column position collection A of weight minimum in generator matrix according to a preconcerted arrangement d, then the sequence Y ' received is carried out to extended operation, namely at A dBit is added in position, obtains sequence YY, and wherein bit information is that " 0 " is the same large with the probability for " 1 ";
Step 4: the sequence YY that expansion is obtained carries out decoding, and interpretation method is as follows:
u ^ i = 0 ifi &Element; S c h i ( yy 1 N , u ^ 1 i - 1 ) , ifi &Element; S - - - ( 5 )
H wherein i: YY N* X I-1→ X, i ∈ S is defined as
Figure BDA00003663610300041
Step 5: listener-in Eve is owing to not knowing residual matrix, and it can not determine that those information bits are deleted, reaches N length so only can supplement at random receiving code; Simultaneously, for the smaller channel that wiretaps of noise, due to the remaining operation of deleting of transmitting terminal Alice, make the performance of the channel that wiretaps poorer, thus obtained bit error rate, closer to 0.5, has guaranteed the fail safe of Wyner tapping channel model.
Beneficial effect:
1, the present invention is by deleting the remaining structure of Polar code in the degeneration tapping channel, in the tapping channel that obtains degenerating, obtains a kind of rate-compatible method of high safe capacity.
2, the present invention has guaranteed the fail safe of Wyner tapping channel model, has reduced the complexity of transmitter and receiver.
The accompanying drawing explanation
Fig. 1 deletes remaining Polar code degeneration tapping channel illustraton of model.
Fig. 2 is the service condition schematic diagram of deleting bit channel in remaining Polar code cataloged procedure.
Fig. 3 deletes impact (Polar code code length the be 256) schematic diagram of remaining Polar code on degeneration tapping channel system safety capacity.
Fig. 4 is based on code check (Polar code code length the is 256) schematic diagram of deleting remaining Polar code degeneration tapping channel system.
Fig. 5 is based on the error rate schematic diagram of deleting remaining Polar code degeneration tapping channel system.
Embodiment
Below in conjunction with Figure of description, patent of the present invention is described in further detail.
The invention provides a kind of tapping channel of degeneration based on Polar code rate-compatible method, the method is by deleting the remaining structure of Polar code in the degeneration tapping channel, in the tapping channel that obtains degenerating, obtains a kind of rate-compatible method of high safe capacity.In the method by transmitting terminal Alice to more than the deleting of code word after Polar coding, make the performance of the smaller channel that wiretaps of noise poorer, thus obtained bit error rate, closer to 0.5, has guaranteed the fail safe of Wyner tapping channel model.Simultaneously, in the method the Polar code only need the female code of design, all codes can be by same group of volume, decoder realization, this greatly reduces the complexity of transmitter and receiver.
In the present invention, all to adopt code length be the Polar code of N=256 in numerical simulation, but, because its generator matrix will be 256 * 256 matrixes, be not suitable for describing.For Polar code structure being described and deleting remaining process, existing Polar code of take code length N=8 is described method of the present invention as example:
(1) at transmitting terminal, Alice is by information u, random noise v and freeze position
Figure BDA00003663610300042
Encode, the coding formula is X = u G N ( S ) + v G N ( A w ) + u A m c G N ( A m c ) . Generator matrix expression formula by the Polar code obtains G N = 1 0 1 1 &CircleTimes; n , N = 2 &CircleTimes; n , Can obtain N=2 3=8 generator matrix:
G 8 = 1 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 1 1 0 0 0 0 0 0 1 1 0 0 1 1 0 0 1 1 1 1 0 0 0 0 1 1 1 1 1 1 1 1 - - - ( 7 )
(2) according to cut-off tree, delete the basic principle of remaining method, in conjunction with the characteristics of linear block codes, the code that calculates all row in the Polar code generator matrix of N=8 heavily is respectively { 8,4,4,2,4,2,2,1}, wherein x 4x 6x 7Code is heavily 2, x 8Column weight is 1, and they are namely the number of times that after coding, this code word participates in the cut-off tree.According to the column weight of every row, the code word sequence number being carried out to descending or ascending order arrangement, is d if delete remaining bit number, selects the wherein sequence number of the minimum row of column weight, forms set A d, then, in the unit matrix of N * N, delete set A dThe d row of middle correspondence, can obtain residual matrix G PuncWhen if the column weight of multiple row is identical, can select random column to delete.
If make d=2, for the Polar code of N=8, to its each row code descending again, obtain (1,2,3,5,4,6,7,8).When the dibit of code word does not need to transmit, can delete code word the 7th and 8, i.e. x 7x 8, also can delete x 4x 8, x 6x 8.When deleting x 7x 8While not transmitting, its residual matrix is as follows:
G punc = 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 - - - ( 8 )
Work as x 4x 8While not transmitting, its residual matrix is as follows:
G punc = 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 - - - ( 9 )
Work as x 6x 8While not transmitting, its residual matrix is as follows:
G punc = 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 - - - ( 10 )
Code word X and the residual matrix G that (3) will obtain through Polar coding PuncThe code word that obtains needing to transmit that multiplies each other is X '=XG Punc, by main channel, X ' is passed to validated user Bob (recipient) afterwards.Due to the imperfection of channel, the recipient obtains Y '=X '+n, and wherein n is interchannel noise.At receiving terminal, Bob can obtain the d column position collection A of weight minimum in generator matrix according to a preconcerted arrangement d.Bob, before decoding, at first expands sequence Y ', is deleting remaining position A dPlace adds bit and obtains sequence YY, and the bit information added meets,
L 1 1 ( A d ) = W ( A d | 0 ) W ( A d | 1 ) = 1 - - - ( 11 )
Namely this position occurs that the probability of " 0 " and " 1 " is the same large.And the likelihood ratio of other positions can be tried to achieve in conjunction with channel parameter according to the information received.
(4) according to Polar code SC (Successive Cancellation) interpretation method, carry out decoding, expression formula in its Chinese style (6)
L N ( i ) ( yy 1 N , u ^ 1 i ) = W N i ( yy 1 N , u ^ 1 i - 1 | 0 ) W N i ( yy 1 N , u ^ 1 i - 1 | 1 ) - - - ( 12 )
Available following iterative formula is tried to achieve:
L N ( 2 i - 1 ) ( yy 1 N , u ^ 1 2 i - 2 ) =
L N / 2 ( i ) ( yy 1 N / 2 , u ^ 1 , o 2 i - 2 &CirclePlus; u ^ 1 , e 2 i - 2 ) L N / 2 ( i ) ( yy N / 2 + 1 N , u ^ 1 , e 2 i - 2 ) + 1 L N / 2 ( i ) ( yy 1 N / 2 , u ^ 1 , o 2 i - 2 &CirclePlus; u ^ 1 , e 2 i - 2 ) + L N / 2 ( i ) ( yy N / 2 + 1 N , u ^ 1 , e 2 i - 2 ) - - - ( 13 )
L N ( 2 i ) ( yy 1 N , u ^ 1 2 i - 1 ) = [ L N / 2 ( i ) ( yy 1 N / 2 , u ^ 1 , o 2 i - 2 &CirclePlus; u ^ 1 , e 2 i - 2 ) ] 1 - 2 u ^ 2 i - 1 - - - ( 14 )
&CenterDot; L N / 2 ( i ) ( yy N / 2 + 1 N , u ^ 1 , e 2 i - 2 )
Validated user Bob can obtain the information of transmission at receiving terminal like this.
(5) listener-in Eve is owing to not knowing residual matrix, and it can not determine that those information bits are deleted, reaches N length so only can supplement at random receiving code; Simultaneously, due to the remaining operation of deleting of transmitting terminal Alice, make the performance of the channel that wiretaps poorer, thus obtained bit error rate, closer to 0.5, has guaranteed the fail safe of Wyner tapping channel model.
Fig. 3 deletes the impact of remaining Polar code on degeneration tapping channel system safety capacity according to what Fig. 2 method for designing obtained, and in numerical simulation, the signal to noise ratio of tapping channel is made as-1dB.After result of study showed that remaining operation is deleted in introducing, the safe capacity of tapping channel had minimizing slightly; When deleting complementary probability p<<1, this impact can drop to very little.By deleting remaining operation, reduced the code word bits number transmitted in noisy channel, thereby also increased the transfer rate of code in the main channel.Fig. 4 is that the error rate is less than 10 -5The time, delete and remaining 32 and delete and remaining the comparison diagram of the maximum transmitted code check when not deleting remaining operation of main channel maximum transmitted code check 64 time.Numerical Simulation Results shows that in main channel, the maximum transmitted code check is improved by deleting remaining operation, and deletes the main channel maximum transmitted code check of remaininging 64 time and will remaining main channel maximum transmitted code check 32 time higher than deleting; Further analyze and delete remaining operation to main channel, the channel bit error rate that wiretaps impact.Fig. 5 does not introduce to delete when remaining, the bit error rate comparison diagram of main channel when the main channel bit error rate that code check is 0.5, code length is 512 Polar code and deleting is remaininged 32 and 64.Numerical result shows deletes the bit error rate decline slightly that remaining operation makes main channel.But listener-in's bit error rate (delete remaining 32 time) all remains on 0.5 left and right, show that deleting listener-in in remaining operation can not obtain any useful information.In fact, when more than deleting, figure place was more, listener-in's bit error rate, more near 0.5, showed and deletes the fail safe that remaining operation does not have influence on system.

Claims (4)

1.一种基于删余Polar码的退化窃听信道速率兼容方法,其特征在于,所述方法包括如下步骤:1. a kind of degraded eavesdropping channel rate compatible method based on punctured Polar code, it is characterized in that, described method comprises the steps: 步骤1:在发送端,Alice将信息u、随机噪声v和冻结位
Figure FDA00003663610200011
进行编码,编码公式为:
Step 1: At the sender, Alice combines information u, random noise v and frozen bits
Figure FDA00003663610200011
To encode, the encoding formula is:
Xx == uu GG NN (( SS )) ++ vv GG NN (( AA ww )) ++ uu AA mm cc GG NN (( AA mm cc )) -- -- -- (( 1515 )) 其中,噪声v是一长度为|Aw|随机序列,GN(A)为GN中下标为A集对应的行所构成的生成矩阵,且
Figure FDA00003663610200013
BN是一N×N的比特置换矩阵,F是矩阵 1 0 1 1 ,
Figure FDA00003663610200015
为Kronecker张量积;
Among them, the noise v is a random sequence with a length of |A w |, G N (A) is a generator matrix composed of rows corresponding to the subscript A in G N , and
Figure FDA00003663610200013
B N is a N×N bit permutation matrix, F is the matrix 1 0 1 1 ,
Figure FDA00003663610200015
is the Kronecker tensor product;
步骤2:Alice对编码得到的序列X进行删余操作,得到序列X‘,Step 2: Alice performs a puncturing operation on the encoded sequence X to obtain the sequence X', X'=XGpunc    (16)X'=XG punc (16) 其中,Gpunc为N×(N-d)阶的删余矩阵,d为删掉不传的比特位数;Wherein, G punc is a punctured matrix of N×(Nd) order, and d is the number of bits to be deleted and not transmitted; 步骤3:在接收端,合法用户Bob可以根据约定获得生成矩阵中权重最小的d列位置集Ad然后对接收到的序列Y’进行扩展操作,即在Ad位置处添加比特位得到序列YY,其中比特信息为“0”和为“1”的概率一样大;Step 3: At the receiving end, the legal user Bob can obtain the d-column position set A d with the smallest weight in the generator matrix according to the agreement, and then perform an expansion operation on the received sequence Y', that is, add bits at the A d position to obtain the sequence YY , where the probability of bit information being "0" is as high as being "1"; 步骤4:对扩展得到的序列YY进行译码,译码方法如下:Step 4: Decode the extended sequence YY, the decoding method is as follows: uu ^^ ii == 00 ifiifi &Element;&Element; SS cc hh ii (( yyyy 11 NN ,, uu ^^ 11 ii -- 11 )) ,, ifiifi &Element;&Element; SS -- -- -- (( 1717 )) 其中hi:YYN×Xi-1→X,i∈S定义为where h i : YY N ×X i - 1 →X,i∈S is defined as
Figure FDA00003663610200017
Figure FDA00003663610200017
步骤5:窃听者仅能随机补充接收码达到N长;对于信噪比较小的搭线窃听信道,发送端删余操作,使得误比特率更接近于0.5。Step 5: The eavesdropper can only randomly supplement the receiving code to reach N length; for the eavesdropping channel with a small signal-to-noise ratio, the sending end punctures the operation to make the bit error rate closer to 0.5.
2.根据权利要求1所述的一种基于删余Polar码的退化窃听信道速率兼容方法,其特征在于:在上述步骤2中还包括:2. a kind of degraded eavesdropping channel rate compatible method based on punctured Polar code according to claim 1, it is characterized in that: in above-mentioned step 2, also comprise: 将参与截止树次数最少的码字节点删去;结合线性分组码的特点,获得Polar码编码生成矩阵中每列的码重就是编码后该码字参与截止树的次数,计算出Polar码生成矩阵中权重最小的d列的位置集Ad,将N×N的单位阵去掉Ad集合后的矩阵设为删余矩阵GpuncDelete the code word node with the least number of participation in the cut-off tree; combined with the characteristics of linear block codes, the code weight of each column in the Polar code encoding generation matrix is obtained after encoding. The position set A d of the column d with the smallest weight in the matrix, the matrix obtained by removing the set A d from the N×N unit matrix is set as the puncturing matrix G punc . 3.根据权利要求1所述的一种基于删余Polar码的退化窃听信道速率兼容方法,其特征在于:3. a kind of degraded eavesdropping channel rate compatible method based on punctured Polar code according to claim 1, is characterized in that: 所述方法具有信道速率兼容。The method is channel rate compatible. 4.根据权利要求1所述的一种基于删余Polar码的退化窃听信道速率兼容方法,其特征在于:4. a kind of degraded eavesdropping channel rate compatible method based on punctured Polar code according to claim 1, is characterized in that: 所述方法将删余Polar码与退化窃听信道模型相结合。The method combines punctured Polar codes with a degenerate eavesdropping channel model.
CN2013103540153A 2013-08-14 2013-08-14 Degraded eavesdropping channel rate compatible method based on Polar code Pending CN103414540A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013103540153A CN103414540A (en) 2013-08-14 2013-08-14 Degraded eavesdropping channel rate compatible method based on Polar code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013103540153A CN103414540A (en) 2013-08-14 2013-08-14 Degraded eavesdropping channel rate compatible method based on Polar code

Publications (1)

Publication Number Publication Date
CN103414540A true CN103414540A (en) 2013-11-27

Family

ID=49607527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103540153A Pending CN103414540A (en) 2013-08-14 2013-08-14 Degraded eavesdropping channel rate compatible method based on Polar code

Country Status (1)

Country Link
CN (1) CN103414540A (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105978684A (en) * 2016-04-29 2016-09-28 清华大学 Public limited feedback and dynamic matrix coding-based secure communication system and method
CN106027068A (en) * 2015-03-25 2016-10-12 三星电子株式会社 Harq rate-compatible polar codes for wireless channels
CN106130687A (en) * 2016-06-06 2016-11-16 南京邮电大学 Polar code puncturing method based on decoding bit reliability under fading channel
CN106230489A (en) * 2016-07-15 2016-12-14 西安电子科技大学 It is applicable to the polarization code code modulating method of any high order modulation
CN106452678A (en) * 2016-10-21 2017-02-22 郑州大学西亚斯国际学院 Turbo code puncturing method based on bit error rate distribution
CN106533625A (en) * 2016-11-29 2017-03-22 河南科技大学 Physical layer safety transmission method applicable to ZigBee network star type topology structure
CN106656205A (en) * 2016-09-30 2017-05-10 清华大学深圳研究生院 Polarization code decoding method and system capable of reducing memory consumption
CN106789968A (en) * 2016-12-06 2017-05-31 哈尔滨工程大学 Secure coding method based on polarization code under a kind of reduction tapping channel
WO2017127973A1 (en) * 2016-01-25 2017-08-03 Qualcomm Incorporated Generation of polar codes with a variable block length utilizing puncturing
CN107148015A (en) * 2017-05-31 2017-09-08 北京理工大学 A Continuous Encryption Physical Layer Security Transmission Method Based on Polar Code Construction
CN107294651A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Coding method and device, interpretation method and device
CN107294649A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Coding method and device, interpretation method and device
CN107332571A (en) * 2017-06-14 2017-11-07 中国农业大学 A kind of Polar code constructing methods and device
CN107342842A (en) * 2016-08-11 2017-11-10 华为技术有限公司 Method, apparatus and equipment for Polarization Coding
WO2017193716A1 (en) * 2016-05-12 2017-11-16 华为技术有限公司 Encoding and rate matching method, apparatus and device for polar code
CN108352844A (en) * 2015-12-01 2018-07-31 华为技术有限公司 Enable the Polarization Coding device and decoder of signature
CN108365848A (en) * 2017-01-26 2018-08-03 华为技术有限公司 A kind of interpretation method and device of polar code
WO2018171485A1 (en) * 2017-03-23 2018-09-27 Huawei Technologies Co., Ltd. Methods and apparatus for coding sub-channel selection
CN109039544A (en) * 2017-06-27 2018-12-18 华为技术有限公司 A kind of coding method, wireless device and chip
CN109067501A (en) * 2018-08-28 2018-12-21 北京邮电大学 Polar code communication method and device based on degeneration tapping channel noise jamming
CN109194421A (en) * 2018-08-21 2019-01-11 浙江大学 Based on the secure coding method for having limit for length's polarization code under a kind of Gauss tapping channel
CN109964428A (en) * 2016-09-28 2019-07-02 Idac控股公司 Efficient broadcast channels in beamforming systems for NR
CN110572165A (en) * 2014-02-20 2019-12-13 华为技术有限公司 Coded rate matching processing method and device
CN110612738A (en) * 2017-03-03 2019-12-24 索克普拉科学与工程公司 Generalized polarization code
CN111034057A (en) * 2017-08-23 2020-04-17 华为技术有限公司 Equipment and method for generating multi-core polarization code
CN111464265A (en) * 2020-04-03 2020-07-28 北京邮电大学 Information transmission method based on encrypted polarization coding in degenerate eavesdropping channel
US10784992B2 (en) 2016-07-27 2020-09-22 Huawei Technologies Co., Ltd. Device and method for executing encoding
CN112042139A (en) * 2018-03-29 2020-12-04 三星电子株式会社 Apparatus and method for encoding and decoding using polar codes in a wireless communication system
CN116208297A (en) * 2023-05-06 2023-06-02 中科航迈数控软件(深圳)有限公司 Self-adaptive coding method and device for transmission data of numerical control machine tool and related equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164025A (en) * 2011-04-15 2011-08-24 北京邮电大学 Coder based on repeated coding and channel polarization and coding/decoding method thereof
CN102694625A (en) * 2012-06-15 2012-09-26 北京邮电大学 Polarization code decoding method for cyclic redundancy check assistance

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164025A (en) * 2011-04-15 2011-08-24 北京邮电大学 Coder based on repeated coding and channel polarization and coding/decoding method thereof
CN102694625A (en) * 2012-06-15 2012-09-26 北京邮电大学 Polarization code decoding method for cyclic redundancy check assistance

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MARK M.WIDE等: "Polar codes for degradable quantum channels", 《IEEE TRANSACTIONS ON INFORMATION THEORY》 *
李桂萍等: "极化码串行抵消译码算法的改进设计", 《科学技术与工程》 *
武凡涛: "退化窃听信道中Polar码的优化设计方法研究", 《中国优秀硕士学位论文全文数据库信息科技辑(月刊)》 *

Cited By (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572165B (en) * 2014-02-20 2020-07-24 华为技术有限公司 Method and device for processing rate matching of codes
CN110572165A (en) * 2014-02-20 2019-12-13 华为技术有限公司 Coded rate matching processing method and device
CN106027068A (en) * 2015-03-25 2016-10-12 三星电子株式会社 Harq rate-compatible polar codes for wireless channels
US9742440B2 (en) 2015-03-25 2017-08-22 Samsung Electronics Co., Ltd HARQ rate-compatible polar codes for wireless channels
CN108352844B (en) * 2015-12-01 2024-01-30 华为技术有限公司 Signature-enabled polar encoder and decoder
CN108352844A (en) * 2015-12-01 2018-07-31 华为技术有限公司 Enable the Polarization Coding device and decoder of signature
CN108604903B (en) * 2016-01-25 2021-08-24 高通股份有限公司 Use puncturing to generate polar codes with variable block length
WO2017127973A1 (en) * 2016-01-25 2017-08-03 Qualcomm Incorporated Generation of polar codes with a variable block length utilizing puncturing
CN108604903A (en) * 2016-01-25 2018-09-28 高通股份有限公司 The polar code with variable block length is generated using punctured
US10749633B2 (en) 2016-01-25 2020-08-18 Qualcomm Incorporated Generation of polar codes with a variable block length utilizing
US11309997B2 (en) 2016-01-25 2022-04-19 Qualcomm Incorporated Generation of polar codes with a variable block length utilizing puncturing
CN107294651A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Coding method and device, interpretation method and device
CN107294649A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Coding method and device, interpretation method and device
CN105978684A (en) * 2016-04-29 2016-09-28 清华大学 Public limited feedback and dynamic matrix coding-based secure communication system and method
CN105978684B (en) * 2016-04-29 2019-01-11 清华大学 Safe communication system and method based on open Limited Feedback and dynamic matrix coding
CN107370560B (en) * 2016-05-12 2020-04-21 华为技术有限公司 A kind of polar code coding and rate matching method, device and equipment
WO2017193716A1 (en) * 2016-05-12 2017-11-16 华为技术有限公司 Encoding and rate matching method, apparatus and device for polar code
CN107370560A (en) * 2016-05-12 2017-11-21 华为技术有限公司 Coding and speed matching method, the device and equipment of a kind of polarization code
US10797826B2 (en) 2016-05-12 2020-10-06 Huawei Technologies Co., Ltd. Polar encoding and rate matching method, apparatus, and device
CN106130687B (en) * 2016-06-06 2019-02-19 南京邮电大学 Polar code puncturing method based on decoding bit reliability in fading channel
CN106130687A (en) * 2016-06-06 2016-11-16 南京邮电大学 Polar code puncturing method based on decoding bit reliability under fading channel
CN106230489A (en) * 2016-07-15 2016-12-14 西安电子科技大学 It is applicable to the polarization code code modulating method of any high order modulation
CN106230489B (en) * 2016-07-15 2019-07-16 西安电子科技大学 Polar Code Coding Modulation Method Suitable for Arbitrary High-Order Modulation
US10784992B2 (en) 2016-07-27 2020-09-22 Huawei Technologies Co., Ltd. Device and method for executing encoding
US11870573B2 (en) 2016-08-11 2024-01-09 Huawei Technologies Co., Ltd. Polar coding method, apparatus, and device
CN107342842A (en) * 2016-08-11 2017-11-10 华为技术有限公司 Method, apparatus and equipment for Polarization Coding
US10892851B2 (en) 2016-08-11 2021-01-12 Huawei Technologies Co., Ltd. Polar coding method, apparatus, and device
CN108631945A (en) * 2016-08-11 2018-10-09 华为技术有限公司 Method, apparatus and equipment for Polarization Coding
CN108631945B (en) * 2016-08-11 2019-03-26 华为技术有限公司 Method, apparatus and equipment for Polarization Coding
US10326555B2 (en) 2016-08-11 2019-06-18 Huawei Technologies Co., Ltd. Polar coding method, apparatus, and device
CN107342842B (en) * 2016-08-11 2022-04-05 华为技术有限公司 Method, apparatus and apparatus for polar coding
US11368249B2 (en) 2016-08-11 2022-06-21 Huawei Technologies Co., Ltd. Polar coding method, apparatus, and device
CN109964428A (en) * 2016-09-28 2019-07-02 Idac控股公司 Efficient broadcast channels in beamforming systems for NR
US11356202B2 (en) 2016-09-28 2022-06-07 Idac Holdings, Inc. Efficient broadcast channel in beamformed systems for NR
US11968041B2 (en) 2016-09-28 2024-04-23 Interdigital Patent Holdings, Inc. Efficient broadcast channel in beamformed systems for NR
CN106656205B (en) * 2016-09-30 2020-04-03 清华大学深圳研究生院 Polar code decoding method and system for reducing memory consumption
CN106656205A (en) * 2016-09-30 2017-05-10 清华大学深圳研究生院 Polarization code decoding method and system capable of reducing memory consumption
CN106452678A (en) * 2016-10-21 2017-02-22 郑州大学西亚斯国际学院 Turbo code puncturing method based on bit error rate distribution
CN106452678B (en) * 2016-10-21 2017-07-21 郑州大学西亚斯国际学院 A kind of Turbo code puncturing method being distributed based on bit error rate
CN106533625B (en) * 2016-11-29 2019-09-06 河南科技大学 A Physical Layer Security Transmission Method Applicable to ZigBee Network Star Topology Structure
CN106533625A (en) * 2016-11-29 2017-03-22 河南科技大学 Physical layer safety transmission method applicable to ZigBee network star type topology structure
CN106789968B (en) * 2016-12-06 2019-10-11 哈尔滨工程大学 A Polar Code-Based Security Coding Method for Weakened Eavesdropping Channel
CN106789968A (en) * 2016-12-06 2017-05-31 哈尔滨工程大学 Secure coding method based on polarization code under a kind of reduction tapping channel
CN108365848A (en) * 2017-01-26 2018-08-03 华为技术有限公司 A kind of interpretation method and device of polar code
CN108365848B (en) * 2017-01-26 2021-09-14 华为技术有限公司 Polar code decoding method and device
CN110612738A (en) * 2017-03-03 2019-12-24 索克普拉科学与工程公司 Generalized polarization code
US10735154B2 (en) 2017-03-23 2020-08-04 Huawei Technologies Co., Ltd. Methods and apparatus for coding sub-channel selection
WO2018171485A1 (en) * 2017-03-23 2018-09-27 Huawei Technologies Co., Ltd. Methods and apparatus for coding sub-channel selection
CN107148015B (en) * 2017-05-31 2020-07-07 北京理工大学 Continuous encryption physical layer secure transmission method based on polarization code structure
CN107148015A (en) * 2017-05-31 2017-09-08 北京理工大学 A Continuous Encryption Physical Layer Security Transmission Method Based on Polar Code Construction
CN107332571B (en) * 2017-06-14 2019-10-08 中国农业大学 A kind of Polar code constructing method and device
CN107332571A (en) * 2017-06-14 2017-11-07 中国农业大学 A kind of Polar code constructing methods and device
US10581463B2 (en) 2017-06-27 2020-03-03 Huawei Technologies Co., Ltd. Communication method using polar code, and wireless device
CN109039544A (en) * 2017-06-27 2018-12-18 华为技术有限公司 A kind of coding method, wireless device and chip
CN109039544B (en) * 2017-06-27 2019-11-19 华为技术有限公司 A coding method, wireless device and chip
US11133829B2 (en) 2017-06-27 2021-09-28 Huawei Technologies Co., Ltd. Communciation method using polar code, and wireless device
CN111034057B (en) * 2017-08-23 2022-04-22 华为技术有限公司 Equipment and method for generating multi-core polarization code
CN111034057A (en) * 2017-08-23 2020-04-17 华为技术有限公司 Equipment and method for generating multi-core polarization code
US11245424B2 (en) 2017-08-23 2022-02-08 Huawei Technologies Co., Ltd. Device and method for generating a multi-kernel polar code
CN112042139A (en) * 2018-03-29 2020-12-04 三星电子株式会社 Apparatus and method for encoding and decoding using polar codes in a wireless communication system
CN112042139B (en) * 2018-03-29 2025-02-18 三星电子株式会社 Apparatus and method for encoding and decoding using polar codes in wireless communication systems
CN109194421A (en) * 2018-08-21 2019-01-11 浙江大学 Based on the secure coding method for having limit for length's polarization code under a kind of Gauss tapping channel
CN109194421B (en) * 2018-08-21 2020-08-28 浙江大学 Security coding method based on limited long polarization code under Gaussian eavesdropping channel
CN109067501A (en) * 2018-08-28 2018-12-21 北京邮电大学 Polar code communication method and device based on degeneration tapping channel noise jamming
CN111464265A (en) * 2020-04-03 2020-07-28 北京邮电大学 Information transmission method based on encrypted polarization coding in degenerate eavesdropping channel
CN111464265B (en) * 2020-04-03 2021-07-13 北京邮电大学 An Information Transmission Method Based on Encrypted Polar Coding in Degraded Eavesdropping Channel
CN116208297A (en) * 2023-05-06 2023-06-02 中科航迈数控软件(深圳)有限公司 Self-adaptive coding method and device for transmission data of numerical control machine tool and related equipment
CN116208297B (en) * 2023-05-06 2023-08-08 中科航迈数控软件(深圳)有限公司 Self-adaptive coding method and device for transmission data of numerical control machine tool and related equipment

Similar Documents

Publication Publication Date Title
CN103414540A (en) Degraded eavesdropping channel rate compatible method based on Polar code
CN106161012B (en) A post-processing system and method for quantum key distribution based on polar code error correction
CN101889398B (en) Method and apparatus for channel coding and decoding in a communication system using low density parity-check codes
CN103746708A (en) Method for constructing Polar-LDPC concatenated codes
CN104780022B (en) Safe transmission method of physical layer and system based on channel coding matrix dynamic change
CN103138768B (en) The equipment of the channel in coding and decoding communication system and method
CN103988439A (en) Apparatus and method for transmitting and receiving data in communication/broadcasting system
CN107395319B (en) Puncturing-based rate compatible polar code coding method and system
CN103338092B (en) The method and system of distributed short-wave radio set communication
CN107635250A (en) Optimizing Method for Overload Characteristics of SCMA Uplink Multiple Access System
CN101710850A (en) Convolution Turbo encoding method and device for realizing encoding method
CN101227193B (en) A device and method for encoding and decoding low-density check codes
CN108650029B (en) Error correction coding and decoding method suitable for quantum secure direct communication
CN111771336B (en) Device and method for generating polar codes
CN109361492B (en) A High-Performance Decoding Method Combined with Physical Layer Network Coding and Polar Codes
CN108880748B (en) Coding and decoding method of rateless Spinal code based on Latin square matrix
CN105915231A (en) Long constraint convolutional code construction method base on multiplicative repetition superposition
Chen et al. ARUM: Polar-coded HARQ scheme based on incremental channel polarization
CN107508656A (en) A kind of Spinal joint source-channel decoding methods on BEC channels
CN107566084A (en) A kind of Spinal joint source-channel decoding methods on awgn channel
CN107070586A (en) A kind of relay cooperative coding method and system based on low-density trellis code
Liang et al. Rateless polar-spinal coding scheme with enhanced information unequal error protection
KR101276845B1 (en) Method of Low Density Parity Check Code decoding using a plurality of layers
SHI et al. Design of raptor-like rate compatible SC-LDPC codes
KR101411720B1 (en) Method and apparatus for decoding system consisting of multiple decoders corresponding to variations of a single parity check matrix

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20131127