[go: up one dir, main page]

CN107294540B - Encoding method and device, decoding method and device - Google Patents

Encoding method and device, decoding method and device Download PDF

Info

Publication number
CN107294540B
CN107294540B CN201610221921.XA CN201610221921A CN107294540B CN 107294540 B CN107294540 B CN 107294540B CN 201610221921 A CN201610221921 A CN 201610221921A CN 107294540 B CN107294540 B CN 107294540B
Authority
CN
China
Prior art keywords
message
codeword
bits
channel
check matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610221921.XA
Other languages
Chinese (zh)
Other versions
CN107294540A (en
Inventor
胡婧婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610221921.XA priority Critical patent/CN107294540B/en
Priority to PCT/CN2016/098727 priority patent/WO2017177609A1/en
Publication of CN107294540A publication Critical patent/CN107294540A/en
Application granted granted Critical
Publication of CN107294540B publication Critical patent/CN107294540B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/11Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
    • H03M13/1102Codes on graphs and decoding on graphs, e.g. low-density parity check [LDPC] codes
    • H03M13/1148Structural properties of the code parity-check or generator matrix
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/11Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Error Detection And Correction (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

本发明提供了一种编码方法及装置,译码方法及装置,其中,该编码方法包括:获取待发送消息,其中,该待发送消息包括:k比特的真实消息,(l‑k)比特的随机消息,其中l,k均为自然数;依据校验矩阵H对该待发送消息进行编码,获取码字rn+k,其中,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;发送该码字rn+k。采用上述技术方案,解决了编码技术不能达到信息论意义安全的问题,实现了安全编码译码。

Figure 201610221921

The present invention provides an encoding method and device, and a decoding method and device, wherein the encoding method includes: obtaining a message to be sent, wherein the message to be sent includes: a real message of k bits, a (l-k) bit Random message, where l and k are both natural numbers; encode the message to be sent according to the parity check matrix H to obtain the codeword r n+k , where n is the codeword length of the real message, and the parity check matrix H The following condition is satisfied: r n+k H T =0; the code word r n+k is sent. By adopting the above-mentioned technical solution, the problem that the coding technology cannot achieve the safety of information theory is solved, and the safe coding and decoding are realized.

Figure 201610221921

Description

编码方法及装置,译码方法及装置Coding method and device, decoding method and device

技术领域Technical Field

本发明涉及通信领域,具体而言,涉及一种编码方法及装置,译码方法及装置。The present invention relates to the field of communications, and in particular to a coding method and device, and a decoding method and device.

背景技术Background Art

在相关技术中,尽管早在1984年香农定理就界定了信道编码的性能,然而直到1993年涡轮Turbo码出现之前,大多数信道编码算法都远不及香农限。所以,Turbo码的诞生意味着在加性高斯白噪声信道中信道编码接近香农限的开始。在两年之后,迈克Mackay和尼尔Neal受Turbo码的启发重新发现,很长时间以来被人们忽视的低密度校验码(LowDensity Parity Check code,简称为LDPC),有着更为接近香农限的性能。LDPC码是在1962年由Gallager提出的,他所提出的这种码是一种基于稀疏校验矩阵的线性分组码。Gallager详细阐述了LDPC码的构造方法、迭代概率译码算法以及其理论描述。然而因为其编码和译码需要较高的硬件需求,以及当时BCH码、Reed-Solomon码和级联码表现出的简单而高效的性能,除了少数的研究人员,例如Pinsker和Margulis之外,研究人员们并不怎么关注LDPC码,甚至于几乎将其遗忘。In the related art, although Shannon's theorem defined the performance of channel coding as early as 1984, most channel coding algorithms were far from the Shannon limit until the emergence of Turbo codes in 1993. Therefore, the birth of Turbo codes means the beginning of channel coding approaching the Shannon limit in additive white Gaussian noise channels. Two years later, inspired by Turbo codes, Mike Mackay and Neil Neal rediscovered that the long-neglected low-density parity check code (LDPC) has performance closer to the Shannon limit. LDPC code was proposed by Gallager in 1962. The code he proposed is a linear block code based on a sparse check matrix. Gallager elaborated in detail the construction method of LDPC code, iterative probability decoding algorithm and its theoretical description. However, due to the high hardware requirements for its encoding and decoding, and the simple and efficient performance of BCH codes, Reed-Solomon codes and concatenated codes at the time, except for a few researchers such as Pinsker and Margulis, researchers did not pay much attention to LDPC codes and almost forgot about them.

在上个世纪九十年代,MacKay等人对低密度奇偶校验码进行了再发现,并且证明了当以低于香农限的任意码率进行通信时,基于最大后验概率译码(Maximum APosteriori,简称为MAP)算法的LDPC码的译码错误概率低至10-7,非常接近于0。In the 1990s, MacKay et al. rediscovered low-density parity-check codes and proved that when communicating at any code rate below the Shannon limit, the decoding error probability of LDPC codes based on the Maximum A Posteriori (MAP) algorithm is as low as 10 -7 , which is very close to 0.

遗憾的是,LDPC码的最优译码算法是一个(Non-deterministic Polynomial,简称为NP)完全问题(非多项式时间的困难问题)。MacKay同时还论证了Gallager译码算法有着出色的经验性能。Luby等人研究了删除信道(Erasure Channel)之后发现,LDPC码能够在较低复杂度的译码下达到信道容量,并且提出了一种在删除信道上的简单线性时间译码算法。目前LDPC码的主要研究领域集中于四个不同的方面,它们分别是:校验矩阵的构造、译码算法优化、性能的分析及LDPC码在实际系统中的应用。Unfortunately, the optimal decoding algorithm for LDPC codes is a (Non-deterministic Polynomial, abbreviated as NP) complete problem (a non-polynomial time difficult problem). MacKay also demonstrated that the Gallager decoding algorithm has excellent empirical performance. After studying the erasure channel, Luby et al. found that LDPC codes can reach the channel capacity under low complexity decoding, and proposed a simple linear time decoding algorithm on the erasure channel. At present, the main research areas of LDPC codes are concentrated in four different aspects, namely: the construction of the check matrix, the optimization of the decoding algorithm, the analysis of the performance and the application of LDPC codes in practical systems.

从信息论的角度来分析通信系统的安全性要追溯到1949年,香农在该年发表了一篇名为《保密系统的通信理论》的重要文章,从而奠定了用信息论去分析通信系统安全性的基础。在此之后,Wyner及其合作者提出了两类窃听信道模型:第一类窃听信道(wiretapchannel I)和第二类窃听信道(wiretap channel of type II)。The analysis of the security of communication systems from the perspective of information theory can be traced back to 1949, when Shannon published an important article entitled "A Theory of Communication for Secrecy Systems", which laid the foundation for using information theory to analyze the security of communication systems. After that, Wyner and his collaborators proposed two types of wiretap channel models: wiretap channel I and wiretap channel of type II.

在第一类窃听信道模型中,发送方想将机密消息通过一个离散无记忆的主信道传送给合法接收者。与此同时,一个窃听者试图通过另外一个离散无记忆的窃听信道来窃听主信道的输出。Wyner用条件熵H(W|ZN)来表示窃听者对机密消息的疑惑度(这里W为正在发送的机密消息,ZN为窃听信道的输出),这个疑惑度也就是第一类窃听信道模型中衡量安全性的重要参数。Wyner刻画了由所有可达的传输效率-疑惑度对组成的区域,我们通常把这个区域叫做容量-疑惑度区域,即这个区域内所有的点都是可达的,而区域外所有的点都是不可达的。在此基础上,Wyner定义并刻画了安全容量这个概念,即在保证窃听者的疑惑度最大的情况下传输效率的最大值。Wyner系统论证了通信系统中传输效率与安全性之间的折衷关系(即通信系统的安全性和最大化传输不能同时得到保证),这奠定了用信息论去分析通信系统安全性和传输效率之间关系的基础。在容量-疑惑度区域的存在性证明中,Wyner提出了随机装箱(random binning)的编码技术。在考虑安全的信道模型中,该技术已经成为一种最常见的编码技术。随机装箱是指发送的消息和一个码本(一堆码字组成的集合)一一对应。当发送方发送一个具体的消息时,首先找出和此消息相对应的码本,然后随机地于此码本中选取一个码字发送出去,该码字就做为编码器的输出。In the first type of eavesdropping channel model, the sender wants to transmit a confidential message to a legitimate receiver through a discrete memoryless main channel. At the same time, an eavesdropper tries to eavesdrop on the output of the main channel through another discrete memoryless eavesdropping channel. Wyner used conditional entropy H(W|Z N ) to represent the eavesdropper's doubt about the confidential message (here W is the confidential message being sent, and Z N is the output of the eavesdropping channel). This doubt is also an important parameter for measuring security in the first type of eavesdropping channel model. Wyner characterized the region composed of all accessible transmission efficiency-doubt pairs. We usually call this region the capacity-doubt region, that is, all points in this region are reachable, and all points outside the region are unreachable. On this basis, Wyner defined and characterized the concept of security capacity, that is, the maximum value of transmission efficiency while ensuring the maximum doubt of the eavesdropper. Wyner systematically demonstrated the trade-off relationship between transmission efficiency and security in communication systems (that is, the security of communication systems and maximum transmission cannot be guaranteed at the same time), which laid the foundation for using information theory to analyze the relationship between security and transmission efficiency of communication systems. In the proof of the existence of the capacity-doubt region, Wyner proposed the random binning coding technique. This technique has become one of the most common coding techniques in the channel model considering security. Random binning means that the message sent corresponds to a codebook (a collection of codewords). When the sender sends a specific message, it first finds the codebook corresponding to the message, and then randomly selects a codeword from the codebook and sends it out. The codeword is used as the output of the encoder.

在Wyner提出了第一类窃听信道模型之后不久,他和Ozarow又提出了一个简化了的窃听信道模型,即第二类窃听信道模型。在第二类窃听信道模型中,主信道是无噪的,同时窃听者可以从主信道输出的N长的码字中任意地选取μ位进行无噪窃听,也即窃听者可以得到N长的码字中任意的μ位。Wyner和Ozarow给出了第二类窃听信道模型的容量-疑惑度区域。Soon after Wyner proposed the first type of eavesdropping channel model, he and Ozarow proposed a simplified eavesdropping channel model, namely the second type of eavesdropping channel model. In the second type of eavesdropping channel model, the main channel is noiseless, and the eavesdropper can arbitrarily select μ bits from the N-length codeword output by the main channel for noiseless eavesdropping, that is, the eavesdropper can obtain any μ bits in the N-length codeword. Wyner and Ozarow gave the capacity-doubt region of the second type of eavesdropping channel model.

第一、二类窃听信道模型提出之后,构造实际的能逼近信息论意义安全的码字就成为了编码领域一个新的研究方向。在第二类窃听信道模型的研究中,通过具体计算窃听者的疑惑度,V.K.Wei以及Forney提出了广义汉明重量的概念。广义汉明重量的提出为第二类窃听信道模型中达到信息论意义安全的实际编码方案的构造指明了方向。当窃听信道是高斯噪声,主信道无噪声的情况下,采用陪集编码方案且子码是任意一种可达窃听信道容量的好码的对偶码时,可以达到信息论意义上的安全。在第一类窃听信道模型编码方案的研究中,Thangaraj指出满足特定结构的码可以使系统达到信息论意义上的安全。After the first and second eavesdropping channel models were proposed, constructing practical codewords that can approach information-theoretic security has become a new research direction in the field of coding. In the study of the second type of eavesdropping channel model, V.K.Wei and Forney proposed the concept of generalized Hamming weight by specifically calculating the eavesdropper's suspicion. The introduction of generalized Hamming weight points out the direction for the construction of practical coding schemes that achieve information-theoretic security in the second type of eavesdropping channel model. When the eavesdropping channel is Gaussian noise and the main channel is noise-free, security in the sense of information theory can be achieved by using a coset coding scheme and the subcode is a dual code of any good code that can reach the capacity of the eavesdropping channel. In the study of coding schemes for the first type of eavesdropping channel model, Thangaraj pointed out that codes that meet specific structures can make the system secure in the sense of information theory.

针对相关技术中的编码技术不能达到信息论意义安全的问题,目前还没有有效地解决方案。There is currently no effective solution to the problem that the coding technology in related technologies cannot achieve information-theoretic security.

发明内容Summary of the invention

本发明提供了一种编码方法及装置,译码方法及装置,以至少解决相关技术中编码技术不能达到信息论意义安全的问题。The present invention provides an encoding method and device, a decoding method and device, so as to at least solve the problem that the encoding technology in the related art cannot achieve information-theoretic security.

根据本发明的一个方面,提供了一种编码方法,包括:According to one aspect of the present invention, there is provided a coding method, comprising:

获取待发送消息,其中,所述待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;Obtaining a message to be sent, wherein the message to be sent includes: a real message of k bits and a random message of (l-k) bits, wherein l and k are both natural numbers;

依据校验矩阵H对所述待发送消息进行编码,获取码字rn+k,其中,所述n为所述真实消息的码字长度,所述校验矩阵H满足以下条件:rn+kHT=0;Encode the message to be sent according to the check matrix H to obtain a codeword r n+k , wherein n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T =0;

发送所述码字rn+kThe codeword r n+k is sent.

进一步地,Further,

所述校验矩阵H为码字长度为n+k比特,并且消息长度为l比特的低密度奇偶校验码LDPC码的校验矩阵,其中,k<l<n+k。The check matrix H is a check matrix of a low-density parity-check code LDPC code with a codeword length of n+k bits and a message length of l bits, wherein k<l<n+k.

进一步地,通过以下方式确定所述(l-k)比特的随机消息:Further, the (1-k)-bit random message is determined in the following manner:

随机产生一个(l-k)比特的随机消息;Randomly generate a (l-k)-bit random message;

将所述(l-k)比特的随机消息通过线性分组码的生成矩阵生成与所述随机消息对应的码字。The (l-k)-bit random message is used to generate a codeword corresponding to the random message through a generator matrix of a linear block code.

进一步地,发送所述码字rn+k之前,所述方法还包括以下之一:Further, before sending the codeword r n+k , the method further includes one of the following:

所述码字rn+k划分为2k个子码,每一个所述子码对应一个k比特长度的消息;The codeword r n+k is divided into 2 k subcodes, each of which corresponds to a message of k bits in length;

从所述k比特真实消息所对应的子码中随机选取一个码字发送;Randomly select a codeword from the subcode corresponding to the k-bit real message and send it;

确定所述码字rn+k的实际传输速率小于主信道的信道容量,以及所述子码的实际传输速率等于窃听信道的信道容量。It is determined that the actual transmission rate of the codeword r n+k is less than the channel capacity of the main channel, and the actual transmission rate of the subcode is equal to the channel capacity of the wiretap channel.

进一步地,通过以下方式确定所述码字rn+k的实际传输速率小于主信道的信道容量,以及所述子码的实际传输速率等于窃听信道的信道容量:Further, it is determined that the actual transmission rate of the codeword r n+k is less than the channel capacity of the main channel, and the actual transmission rate of the subcode is equal to the channel capacity of the wiretap channel by the following method:

Figure BDA0000962623150000031
Figure BDA0000962623150000031

Figure BDA0000962623150000032
Figure BDA0000962623150000032

其中,所述子码的实际传输速率为

Figure BDA0000962623150000033
所述码字rn+k的实际传输速率为
Figure BDA0000962623150000034
Figure BDA0000962623150000035
是主信道高斯噪声的噪声方差,
Figure BDA0000962623150000036
是窃听信道噪声的噪声方差,P是所述码字rn+k的发送功率,主信道的信道容量maxI(X;Y)为
Figure BDA0000962623150000037
窃听信道的信道容量maxI(X;Z)为
Figure BDA0000962623150000038
Among them, the actual transmission rate of the subcode is
Figure BDA0000962623150000033
The actual transmission rate of the codeword r n+k is
Figure BDA0000962623150000034
Figure BDA0000962623150000035
is the noise variance of the main channel Gaussian noise,
Figure BDA0000962623150000036
is the noise variance of the eavesdropping channel noise, P is the transmission power of the codeword r n+k , and the channel capacity maxI(X; Y) of the main channel is
Figure BDA0000962623150000037
The channel capacity maxI(X; Z) of the eavesdropping channel is
Figure BDA0000962623150000038

进一步地,求解所述码字rn+k的方式包括:Further, the method of solving the codeword r n+k includes:

由rn+kHT=0得出(cn+k-l,sk,dl-k)HT=0,解得cn+k-l,其中,所述sk为所述真实消息向量,所述dl-k为所述随机消息向量,所述cn+k-l表示编码之后的n+k-l比特的校验位;From r n+k HT = 0, we get (c n+kl , sk , d lk ) HT = 0, and solve for c n+kl , where sk is the real message vector, d lk is the random message vector, and c n+kl represents the n+kl-bit check bit after encoding;

Figure BDA0000962623150000041
Figure BDA0000962623150000041

根据本发明的一个方面,提供了一种译码方法,包括:According to one aspect of the present invention, there is provided a decoding method, comprising:

接收码字rn+k,其中,所述码字rn+k为通过以下方式得到的码字:依据校验矩阵H对待发送消息进行编码,得到码字rn+k,其中,所述待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数,所述n为所述真实消息的码字长度,所述校验矩阵H满足以下条件:rn+kHT=0;Receive a codeword r n+k , wherein the codeword r n+k is obtained by: encoding a message to be sent according to a check matrix H to obtain the codeword r n+k , wherein the message to be sent includes: a real message of k bits and a random message of (lk) bits, wherein l and k are both natural numbers, n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T =0;

解析所述码字rn+kThe codeword r n+k is parsed.

根据本发明的另一方面,提供了一种编码装置,包括:According to another aspect of the present invention, there is provided an encoding device, comprising:

第一获取模块,用于获取待发送消息,其中,所述待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;A first acquisition module is used to acquire a message to be sent, wherein the message to be sent includes: a real message of k bits and a random message of (l-k) bits, wherein l and k are both natural numbers;

第二获取模块,用于依据校验矩阵H对所述待发送消息进行编码,获取码字rn+k,其中,所述n为所述真实消息的码字长度,所述校验矩阵H满足以下条件:rn+kHT=0;A second acquisition module is used to encode the message to be sent according to a check matrix H to obtain a codeword r n+k , wherein n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T =0;

发送模块,用于发送所述码字rn+kA sending module is used to send the codeword r n+k .

进一步地,求解所述码字rn+k的方式包括:Further, the method of solving the codeword r n+k includes:

由rn+kHT=0得出(cn+k-l,sk,dl-k)HT=0,解得cn+k-l,其中,所述sk为所述真实消息向量,所述dl-k为所述随机消息向量,所述cn+k-l表示编码之后的n+k-l比特的校验位;From r n+k HT = 0, we get (c n+kl , sk , d lk ) HT = 0, and solve for c n+kl , where sk is the real message vector, d lk is the random message vector, and c n+kl represents the n+kl-bit check bit after encoding;

Figure BDA0000962623150000042
Figure BDA0000962623150000042

根据本发明的另一方面,提供了一种译码装置,包括:According to another aspect of the present invention, there is provided a decoding device, comprising:

接收模块,用于接收码字rn+k,其中,所述码字rn+k为通过以下方式得到的码字:依据校验矩阵H对待发送消息进行编码,得到码字rn+k,其中,所述待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数,所述n为所述真实消息的码字长度,所述校验矩阵H满足以下条件:rn+kHT=0;A receiving module, configured to receive a codeword r n+k , wherein the codeword r n+k is obtained by: encoding a message to be sent according to a check matrix H to obtain the codeword r n+k , wherein the message to be sent includes: a real message of k bits and a random message of (lk) bits, wherein l and k are both natural numbers, n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T =0;

解析模块,用于解析所述码字rn+kA parsing module is used to parse the codeword r n+k .

通过本发明,获取待发送消息,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;依据校验矩阵H对该待发送消息进行编码,获取码字rn+k,其中,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;发送该码字rn+k。解决了编码技术不能达到信息论意义安全的问题,实现了安全编码译码。Through the present invention, a message to be sent is obtained, wherein the message to be sent includes: a real message of k bits and a random message of (lk) bits, wherein l and k are both natural numbers; the message to be sent is encoded according to a check matrix H to obtain a code word r n+k , wherein n is the code word length of the real message, and the check matrix H satisfies the following condition: r n+k H T = 0; and the code word r n+k is sent. The problem that the coding technology cannot achieve information-theoretic security is solved, and secure coding and decoding is realized.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are used to provide a further understanding of the present invention and constitute a part of this application. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention. In the drawings:

图1是根据本发明实施例的一种编码方法的流程图;FIG1 is a flow chart of an encoding method according to an embodiment of the present invention;

图2是根据本发明实施例的一种译码方法的流程图;FIG2 is a flow chart of a decoding method according to an embodiment of the present invention;

图3是根据本发明实施例的一种编码装置的结构框图;FIG3 is a structural block diagram of an encoding device according to an embodiment of the present invention;

图4是根据本发明实施例的一种译码装置的结构框图;FIG4 is a structural block diagram of a decoding device according to an embodiment of the present invention;

图5是根据本发明优选实施例的适用的信道模型示意图;FIG5 is a schematic diagram of a channel model applicable to a preferred embodiment of the present invention;

图6是根据本发明优选实施例设计的编码器构造方法示意图;6 is a schematic diagram of an encoder construction method designed according to a preferred embodiment of the present invention;

图7是根据本发明优选实施例的曲线图。FIG. 7 is a graph according to a preferred embodiment of the present invention.

具体实施方式DETAILED DESCRIPTION

下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments. It should be noted that the embodiments and features in the embodiments of the present application can be combined with each other without conflict.

需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It should be noted that the terms "first", "second", etc. in the specification and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence.

在本实施例中提供了一种编码方法,图1是根据本发明实施例的一种编码方法的流程图,如图1所示,该流程包括如下步骤:In this embodiment, a coding method is provided. FIG. 1 is a flow chart of a coding method according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps:

步骤S102,获取待发送消息,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;Step S102, obtaining a message to be sent, wherein the message to be sent includes: a real message of k bits and a random message of (l-k) bits, wherein l and k are both natural numbers;

步骤S104,依据校验矩阵H对该待发送消息进行编码,获取码字rn+k,其中,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;Step S104, encoding the message to be sent according to the check matrix H to obtain a codeword rn+k , wherein n is the codeword length of the real message, and the check matrix H satisfies the following condition: rn+k H T = 0;

步骤S106,发送该码字rn+kStep S106: Send the codeword r n+k .

通过上述步骤,获取待发送消息,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;依据校验矩阵H对该待发送消息进行编码,获取码字rn+k,其中,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;发送该码字rn+k。解决了编码技术不能达到信息论意义安全的问题,实现了安全编码译码。Through the above steps, a message to be sent is obtained, wherein the message to be sent includes: a real message of k bits and a random message of (lk) bits, wherein l and k are both natural numbers; the message to be sent is encoded according to a check matrix H to obtain a codeword r n+k , wherein n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T = 0; and the codeword r n+k is sent. The problem that the coding technology cannot achieve information-theoretic security is solved, and secure coding and decoding is realized.

在本实施例中,该校验矩阵H为码字长度为n+k比特,并且消息长度为l比特的低密度奇偶校验码LDPC码的校验矩阵,其中,k<l<n+k。In this embodiment, the check matrix H is a check matrix of a low-density parity-check code LDPC code with a codeword length of n+k bits and a message length of l bits, wherein k<l<n+k.

在本实施例中,通过以下方式确定该(l-k)比特的随机消息:In this embodiment, the (1-k)-bit random message is determined in the following manner:

随机产生一个(l-k)比特的随机消息;Randomly generate a (l-k)-bit random message;

将该(l-k)比特的随机消息通过线性分组码的生成矩阵生成与该随机消息对应的码字。The (l-k)-bit random message is used to generate a codeword corresponding to the random message through a generator matrix of a linear block code.

在本实施例中,发送该码字rn+k之前,该方法还包括以下之一:In this embodiment, before sending the codeword r n+k , the method further includes one of the following:

该码字rn+k划分为2k个子码,每一个该子码对应一个k比特长度的消息;The codeword r n+k is divided into 2 k subcodes, each of which corresponds to a message of k bits in length;

从该k比特真实消息所对应的子码中随机选取一个码字发送;A codeword is randomly selected from the subcode corresponding to the k-bit true message and sent;

确定该码字rn+k的实际传输速率小于主信道的信道容量,以及该子码的实际传输速率等于窃听信道的信道容量。It is determined that the actual transmission rate of the codeword r n+k is less than the channel capacity of the main channel, and the actual transmission rate of the subcode is equal to the channel capacity of the wiretap channel.

在本实施例中,通过以下方式确定该码字rn+k的实际传输速率小于主信道的信道容量,以及该子码的实际传输速率等于窃听信道的信道容量:In this embodiment, it is determined that the actual transmission rate of the codeword r n+k is less than the channel capacity of the main channel, and the actual transmission rate of the subcode is equal to the channel capacity of the wiretap channel in the following manner:

Figure BDA0000962623150000061
Figure BDA0000962623150000061

Figure BDA0000962623150000062
Figure BDA0000962623150000062

其中,该子码的实际传输速率为

Figure BDA0000962623150000063
该码字rn+k的实际传输速率为
Figure BDA0000962623150000064
Figure BDA0000962623150000065
是主信道高斯噪声的噪声方差,
Figure BDA0000962623150000066
是窃听信道噪声的噪声方差,P是该码字rn+k的发送功率,主信道的信道容量maxI(X;Y)为
Figure BDA0000962623150000067
窃听信道的信道容量maxI(X;Z)为Among them, the actual transmission rate of the subcode is
Figure BDA0000962623150000063
The actual transmission rate of the codeword r n+k is
Figure BDA0000962623150000064
Figure BDA0000962623150000065
is the noise variance of the main channel Gaussian noise,
Figure BDA0000962623150000066
is the noise variance of the eavesdropping channel noise, P is the transmission power of the codeword r n+k , and the channel capacity maxI(X; Y) of the main channel is
Figure BDA0000962623150000067
The channel capacity maxI(X; Z) of the eavesdropping channel is

Figure BDA0000962623150000071
Figure BDA0000962623150000071

在本实施例中,求解该码字rn+k的方式包括:In this embodiment, the method of solving the codeword r n+k includes:

由rn+kHT=0得出(cn+k-l,sk,dl-k)HT=0,解得cn+k-l,其中,该sk为该真实消息向量,该dl-k为该随机消息向量,该cn+k-l表示编码之后的n+k-l比特的校验位;From r n+k HT = 0, we get (c n+kl , sk , d lk ) HT = 0, and solve for c n+kl , where sk is the real message vector, d lk is the random message vector, and c n+kl represents the check bit of n+kl bits after encoding;

Figure BDA0000962623150000072
Figure BDA0000962623150000072

图2是根据本发明实施例的一种译码方法的流程图,如图2所示,该流程包括如下步骤:FIG. 2 is a flow chart of a decoding method according to an embodiment of the present invention. As shown in FIG. 2 , the flow chart includes the following steps:

步骤S202,接收码字rn+k,其中,该码字rn+k为通过以下方式得到的码字:依据校验矩阵H对待发送消息进行编码,得到码字rn+k,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;Step S202, receiving a codeword r n+k , wherein the codeword r n+k is obtained by: encoding a message to be sent according to a check matrix H to obtain a codeword r n+k , wherein the message to be sent includes: a real message of k bits and a random message of (lk) bits, wherein l and k are both natural numbers, n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T = 0;

步骤S204,解析该码字rn+kStep S204: parsing the codeword r n+k .

在本实施例中还提供了一种编码装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In the present embodiment, a coding device is also provided, which is used to implement the above-mentioned embodiments and preferred implementation modes, and the descriptions that have been made will not be repeated. As used below, the term "module" can implement a combination of software and/or hardware of a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, the implementation of hardware, or a combination of software and hardware is also possible and conceived.

图3是根据本发明实施例的一种编码装置的结构框图,如图3所示,该装置包括FIG. 3 is a structural block diagram of an encoding device according to an embodiment of the present invention. As shown in FIG. 3 , the device includes

第一获取模块32,用于获取待发送消息,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;A first acquisition module 32 is used to acquire a message to be sent, wherein the message to be sent includes: a real message of k bits and a random message of (l-k) bits, wherein l and k are both natural numbers;

第二获取模块34,用于依据校验矩阵H对该待发送消息进行编码,获取码字rn+k,其中,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;The second acquisition module 34 is used to encode the message to be sent according to the check matrix H to obtain the codeword r n+k , where n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T =0;

发送模块36,用于发送该码字rn+kThe sending module 36 is configured to send the codeword r n+k .

通过上述步骤,第一获取模块32获取待发送消息,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;第二获取模块34依据校验矩阵H对该待发送消息进行编码,获取码字rn+k,其中,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;发送模块36发送该码字rn+k,解决了编码技术不能达到信息论意义安全的问题,实现了安全编码译码。Through the above steps, the first acquisition module 32 acquires the message to be sent, wherein the message to be sent includes: a k-bit real message and a (lk)-bit random message, wherein l and k are both natural numbers; the second acquisition module 34 encodes the message to be sent according to the check matrix H to obtain the codeword r n+k , wherein n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T =0; the sending module 36 sends the codeword r n+k , which solves the problem that the coding technology cannot achieve information-theoretic security and realizes secure coding and decoding.

在本实施例中,求解该码字rn+k的方式包括:In this embodiment, the method of solving the codeword r n+k includes:

由rn+kHT=0得出(cn+k-l,sk,dl-k)HT=0,解得cn+k-l,其中,该sk为该真实消息向量,该dl-k为该随机消息向量,该cn+k-l表示编码之后的n+k-l比特的校验位;From r n+k HT = 0, we get (c n+kl , sk , d lk ) HT = 0, and solve for c n+kl , where sk is the real message vector, d lk is the random message vector, and c n+kl represents the check bit of n+kl bits after encoding;

Figure BDA0000962623150000081
Figure BDA0000962623150000081

图4是根据本发明实施例的一种译码装置的结构框图,如图4所示,该装置包括:FIG. 4 is a structural block diagram of a decoding device according to an embodiment of the present invention. As shown in FIG. 4 , the device includes:

接收模块42,用于接收码字rn+k,其中,该码字rn+k为通过以下方式得到的码字:依据校验矩阵H对待发送消息进行编码,得到码字rn+k,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;The receiving module 42 is used to receive a codeword r n+k , wherein the codeword r n+k is obtained by: encoding a message to be sent according to a check matrix H to obtain a codeword r n+k , wherein the message to be sent includes: a real message of k bits and a random message of (lk) bits, wherein l and k are both natural numbers, n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T =0;

解析模块44,用于解析该码字rn+kThe parsing module 44 is configured to parse the codeword r n+k .

需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述各个模块均位于同一处理器中;或者,上述各个模块分别位于不同的处理器中。It should be noted that the above modules can be implemented by software or hardware. For the latter, it can be implemented in the following ways, but not limited to: the above modules are all located in the same processor; or the above modules are respectively located in different processors.

下面结合本发明优选实施例进行详细说明。The following is a detailed description with reference to the preferred embodiments of the present invention.

本发明优选实施例公开了一种用于高斯窃听信道的基于LDPC码的安全编译码方法。本优选实施例所设计的编码译码都相对简单,译码时的迭代收敛速度较快。仿真实验表明本发明在窃听信道信噪比较小时具有非常好的效果。The preferred embodiment of the present invention discloses a secure coding method based on LDPC code for Gaussian eavesdropping channels. The coding and decoding designed in the preferred embodiment are relatively simple, and the iterative convergence speed during decoding is relatively fast. Simulation experiments show that the present invention has a very good effect when the signal-to-noise ratio of the eavesdropping channel is small.

由于在实际通信场景中,计算窃听者的疑惑度H(W|ZN)是一件非常困难的事情,于是我们定义窃听者的误比特率来近似代替疑惑度。这里需要注意的是从信息熵的定义来看,窃听者的疑惑度H(W|ZN)取得最大时等价于窃听者的误比特率等于0.5,也即窃听者的译码错误概率等于0.5。基于此,本发明优选实施例希望为高斯窃听信道模型设计出的编译码方案具有如下两个特征:(1)该方案使得合法接收者的误比特率任意小(即逼近于0);(2)该方案使得窃听者的误比特率逼近0.5。Since it is very difficult to calculate the eavesdropper's doubt H(W|Z N ) in actual communication scenarios, we define the eavesdropper's bit error rate to approximate the doubt. It should be noted here that from the definition of information entropy, when the eavesdropper's doubt H(W|Z N ) is maximized, it is equivalent to the eavesdropper's bit error rate being equal to 0.5, that is, the eavesdropper's decoding error probability is equal to 0.5. Based on this, the preferred embodiment of the present invention hopes that the coding scheme designed for the Gaussian eavesdropping channel model has the following two characteristics: (1) The scheme makes the legitimate receiver's bit error rate arbitrarily small (that is, close to 0); (2) The scheme makes the eavesdropper's bit error rate close to 0.5.

本发明优选实施例记载了一种基于LDPC码的安全编译码方法,设计编码方案如下:The preferred embodiment of the present invention records a secure encoding and decoding method based on LDPC code, and the encoding scheme is designed as follows:

本发明优选实施例安全编译码方案设计的理论依据:在窃听信道模型的安全编码定理的存在性证明中,Wyner指出要设计出达到信息论安全的编译码方案,需要使用一种被称为“随机装箱”的编码技术。该编码技术将发射的消息和一堆码字所组成的箱子一一对应,当给定要传输的消息时,随机的从该消息所对应的码字箱子中选取一个码字发送出去。为了让窃听者不能正确译出发送的消息,需要消耗窃听者的译码能力,Wyner指出假设窃听者知道发送的具体消息时,如果窃听者能从该具体消息所对应的码字箱子中正确找到(“译出”)发送的那个随机码字时,则窃听者的译码能力就得到了消耗。如果将该具体消息所对应的码字箱子也看成是一种新的码字的话,本发明优选实施例希望该新的码字所对应的传输效率等于窃听信道的信道容量,因为这代表着窃听者的全部译码能力都消耗在译出该新码字上,这样窃听者就没有额外的能力去译出究竟发送的是哪个消息上了。基于Wyner的安全编码定理证明的上述思想,假设发送的消息是k比特,码字的长度为n比特,则本发明优选实施例设计的安全编码方案需要具备以下三个特点:(a)该安全编码的码字可划分为2k个子码,每一个子码对应一个发送的k位长的消息比特;(b)该码字的实际传输效率

Figure BDA0000962623150000091
要小于主信道的信道容量C(SNR1),而子码的实际传输效率要等于窃听信道的信道容量C(SNR2);(c)给定发送的消息比特k,要随机的从k比特消息所对应的子码中选取一个码字发送出去。Theoretical basis for the design of the secure coding scheme of the preferred embodiment of the present invention: In the existence proof of the secure coding theorem of the eavesdropping channel model, Wyner pointed out that in order to design a coding scheme that achieves information-theoretic security, it is necessary to use a coding technique called "random binning". This coding technique corresponds the transmitted message to a box consisting of a bunch of code words one by one. When a message to be transmitted is given, a code word is randomly selected from the code word box corresponding to the message and sent out. In order to prevent the eavesdropper from correctly deciphering the sent message, the eavesdropper's decoding ability needs to be consumed. Wyner pointed out that if the eavesdropper knows the specific message sent, if the eavesdropper can correctly find ("decode") the random code word sent from the code word box corresponding to the specific message, the eavesdropper's decoding ability is consumed. If the code box corresponding to the specific message is also regarded as a new code word, the preferred embodiment of the present invention hopes that the transmission efficiency corresponding to the new code word is equal to the channel capacity of the eavesdropping channel, because this means that the entire decoding capacity of the eavesdropper is consumed in decoding the new code word, so the eavesdropper has no additional ability to decode which message is actually sent. Based on the above idea of Wyner's secure coding theorem proof, assuming that the message sent is k bits and the length of the code word is n bits, the secure coding scheme designed by the preferred embodiment of the present invention needs to have the following three characteristics: (a) The secure coding code word can be divided into 2k subcodes, each subcode corresponds to a sent message bit of k bits; (b) The actual transmission efficiency of the code word
Figure BDA0000962623150000091
It must be smaller than the channel capacity C(SNR 1 ) of the main channel, while the actual transmission efficiency of the subcode must be equal to the channel capacity C(SNR 2 ) of the wiretap channel; (c) Given a message bit k to be sent, a codeword is randomly selected from the subcode corresponding to the k-bit message and sent out.

上述设计方案的参数说明:首先我们需要知道主信道高斯噪声的噪声方差

Figure BDA0000962623150000092
窃听信道噪声的噪声方差
Figure BDA0000962623150000093
编码之后的码字的发送功率P。由香农的信道容量公式我们可知主信道的容量maxI(X;Y)为
Figure BDA0000962623150000094
窃听信道的容量maxI(X;Z)为
Figure BDA0000962623150000095
我们假设发送的消息是k比特的,我们通过随机数产生器随机生成一个l-k比特的随机消息。此外,我们假设码字的长度是n+k比特。Parameter description of the above design scheme: First, we need to know the noise variance of the main channel Gaussian noise
Figure BDA0000962623150000092
Noise variance of eavesdropping channel noise
Figure BDA0000962623150000093
The transmission power of the encoded codeword is P. From Shannon's channel capacity formula, we know that the capacity of the main channel maxI(X; Y) is
Figure BDA0000962623150000094
The capacity of the eavesdropping channel maxI(X; Z) is
Figure BDA0000962623150000095
We assume that the message to be sent is k bits, and we use a random number generator to randomly generate a random message of lk bits. In addition, we assume that the length of the codeword is n+k bits.

本发明优选实施例安全编译码方案的设计步骤如下:The design steps of the secure encoding and decoding scheme of the preferred embodiment of the present invention are as follows:

一,按照经典的LDPC码的设计思路设计一个码字长度为n+k比特,消息长度为l比特的LDPC码的校验矩阵,记为H,该矩阵有n+k-l行,有n+k列。First, according to the design idea of the classic LDPC code, a check matrix of an LDPC code with a codeword length of n+k bits and a message length of l bits is designed, denoted as H. The matrix has n+k-l rows and n+k columns.

二,l比特的消息中包含了k比特的真实的发送消息和l-k比特的随机消息。显而易见,l满足如下约束条件k<l<n+k。Second, the l-bit message contains the k-bit real message and the l-k-bit random message. Obviously, l satisfies the following constraint k<l<n+k.

三,为了实现Wyner在窃听信道模型的安全编码定理证明中所描述的编码方法,即当发送的k比特消息确定时,随机的从其对应的码字箱子中选取一个码字这种编码方式,本发明优选实施例首先需要将上述所设计的校验矩阵为H,长度为n+k比特的LDPC码按照k比特的真实消息划分为2k个子码,每一个子码的长度为n比特。该类子码也是一种线性分组码,该子码的消息比特即是l-k比特的随机消息。我们采用如下方式实现“随机从子码中选取一个码字传送”的编码方式:(a)通过随机数生成器随机产生一个l-k比特的随机消息;(b)将该l-k比特的随机消息通过线性分组码的生成矩阵生成一个和其一一对应的码字,然后该将码字传送。Third, in order to implement the coding method described by Wyner in the proof of the secure coding theorem of the eavesdropping channel model, that is, when the k-bit message to be sent is determined, a codeword is randomly selected from the corresponding codeword box. The preferred embodiment of the present invention first needs to divide the above-designed check matrix H and the LDPC code with a length of n+k bits into 2k subcodes according to the real message of k bits, and the length of each subcode is n bits. This type of subcode is also a linear block code, and the message bit of the subcode is a random message of lk bits. We use the following method to implement the coding method of "randomly selecting a codeword from the subcode to transmit": (a) randomly generate a random message of lk bits through a random number generator; (b) generate a codeword corresponding to the random message of the lk bits through the generator matrix of the linear block code, and then transmit the codeword.

四,上述子码的实际传输效率为

Figure BDA0000962623150000101
校验矩阵为H,码字长度为n+k比特,消息长度为l比特的LDPC码的实际传输效率为
Figure BDA0000962623150000102
为了满足前面所述的安全编码方案的特点(b),令Fourth, the actual transmission efficiency of the above subcode is
Figure BDA0000962623150000101
The actual transmission efficiency of an LDPC code with a check matrix of H, a codeword length of n+k bits, and a message length of l bits is
Figure BDA0000962623150000102
In order to satisfy the characteristic (b) of the secure coding scheme described above, let

Figure BDA0000962623150000103
Figure BDA0000962623150000103

五,在给出了上述n,k,l的约束关系之后,校验矩阵为H,码字长度为n+k比特,消息长度为l比特的LDPC码设计方法如下:(a)将该校验矩阵H通过高斯消元法化为[A|B]型矩阵,这里注意H矩阵为n+k-l行,n+k列的矩阵,A矩阵为单位矩阵,其行数和列数均为n+k-l。B矩阵为一个行数为n+k-l,列数为l的矩阵。当给定发送的真实消息sk,随机生成的消息为dl -k时,由校验矩阵的定义,5. After the constraints of n, k, and l are given, the design method of LDPC code with check matrix H, codeword length n+k bits, and message length l bits is as follows: (a) The check matrix H is transformed into an [A|B] type matrix by Gaussian elimination. Note that the H matrix is a matrix with n+kl rows and n+k columns, and the A matrix is the unit matrix with n+kl rows and columns. The B matrix is a matrix with n+kl rows and l columns. When the real message s k is given and the randomly generated message is d l -k , according to the definition of the check matrix,

(cn+k-l,sk,dl-k)HT=0, (公式1)(cn +kl , sk , dlk ) HT = 0, (Formula 1)

这里cn+k-l表示编码之后的n+k-l比特的校验位。Here, c n+kl represents the n+kl-bit check bit after encoding.

将H=[A|B]代入(公式1)中,我们有Substituting H = [A | B] into (Formula 1), we have

Figure BDA0000962623150000104
Figure BDA0000962623150000104

将(公式2)整理,我们可得Rearranging (Formula 2), we can get

cn+k-l·AT+(sk,dl-k)·BT=0 (公式3)c n+kl ·A T +(s k ,d lk )·B T =0 (Formula 3)

进一步整理(公式3),Further arrangement (Formula 3),

cn+k-l=(sk,dl-k)·BT·(A-1)T (公式4)c n+kl = (s k ,d lk )·B T ·(A -1 ) T (Formula 4)

(公式4)给出了当我们知道真实消息sk和随机生成的消息dl-k时,计算码字的校验位的公式。知道了校验位之后,通过校验矩阵H而得到的码字rn+k可表示为(Formula 4) gives the formula for calculating the check digit of the codeword when we know the real message sk and the randomly generated message dlk . After knowing the check digit, the codeword rn+k obtained by the check matrix H can be expressed as

rn+k=(cn+k-l,sk,dl-k)=((sk,dl-k)·BT·(A-1)T,sk,dl-k) (公式5)r n+k = (c n+kl ,s k ,d lk )=((s k ,d lk )·B T ·(A -1 ) T ,s k ,d lk ) (Formula 5)

六,对于合法用户来说,码字rn+k的实际传输效率

Figure BDA0000962623150000105
是小于主信道的信道容量的,所以合法用户可以以趋近于0的译码错误概率同时译出真实消息sk和随机生成的消息dl-k。对于窃听者而言,首先我们希望他将其全部的译码能力都消耗在正确译出子码rn上,这里6. For legitimate users, the actual transmission efficiency of codeword r n+k
Figure BDA0000962623150000105
is smaller than the channel capacity of the main channel, so the legitimate user can decode the real message sk and the randomly generated message dlk at the same time with a decoding error probability close to 0. For the eavesdropper, first we hope that he will consume all his decoding capabilities on correctly decoding the subcode rn , where

rn=(cn+k-l,sk,dl-k)=((sk,dl-k)·BT·(A-1)T,dl-k) (公式6)r n =(c n+kl ,s k ,d lk )=((s k ,d lk )·B T ·(A -1 ) T ,d lk ) (Formula 6)

将rn和rn+k相比,很容易发现rn是将rn+k中发送的真实消息sk删掉,即rn是rn+k的子码。对于rn而言,其中的消息为dl-k,我们希望窃听者能正确译出dl-k,且将其全部的译码能力都消耗在译出dl-k上,这就需要子码rn的传输效率

Figure BDA0000962623150000111
Figure BDA0000962623150000112
以及k<l<n+k,我们可以得出Comparing rn and rn +k , it is easy to find that rn is the real message sk sent in rn +k without being deleted, that is, rn is the subcode of rn +k . For rn , the message is dlk , and we hope that the eavesdropper can correctly decode dlk and consume all its decoding capabilities in decoding dlk , which requires the transmission efficiency of subcode rn
Figure BDA0000962623150000111
Depend on
Figure BDA0000962623150000112
And k<l<n+k, we can conclude

Figure BDA0000962623150000113
Figure BDA0000962623150000113

(公式7)说明对于窃听者而言,码字rn+k的实际传输效率

Figure BDA0000962623150000114
是大于窃听信道的信道容量的,由香农定理可知,窃听者的译码错误概率是不能趋近于0的。(Formula 7) shows that for an eavesdropper, the actual transmission efficiency of the codeword r n+k is
Figure BDA0000962623150000114
It is greater than the channel capacity of the eavesdropping channel. According to Shannon's theorem, the probability of decoding error of the eavesdropper cannot approach 0.

合法用户和窃听者的译码器均采用经典置信传播(Belief Propagation,简称为BP)译码算法,该译码算法分为以下步骤:(1)首先对高斯信道预设信息比特的先验概率;(2)由信息节点的信息概率按照置信传播算法得出各校验节点的后验概率;(3)由校验节点的后验概率推算出信息节点的后验概率;(4)将信息节点的后验概率对照判决条件作硬判决,若满足则译码结束;若不满足,则重复以上的(2)~(4)步骤,反复迭代,直到满足条件,得出译码结果。如果迭代次数达到一个预设的最大次数(例如100),条件仍然不满足,则宣布译码失败。The decoders of both the legitimate user and the eavesdropper use the classic belief propagation (BP) decoding algorithm, which is divided into the following steps: (1) First, the prior probability of the information bit is preset for the Gaussian channel; (2) The posterior probability of each check node is obtained from the information probability of the information node according to the belief propagation algorithm; (3) The posterior probability of the information node is inferred from the posterior probability of the check node; (4) The posterior probability of the information node is compared with the decision condition to make a hard decision. If it is satisfied, the decoding ends; if it is not satisfied, the above steps (2) to (4) are repeated, and the iteration is repeated until the condition is satisfied and the decoding result is obtained. If the number of iterations reaches a preset maximum number (for example, 100) and the condition is still not satisfied, the decoding is declared to have failed.

图5是根据本发明优选实施例的适用的信道模型示意图,如图5所示,包括:编码器,主信道,译码器,窃听信道。FIG5 is a schematic diagram of a channel model applicable to a preferred embodiment of the present invention. As shown in FIG5 , the channel model includes: an encoder, a main channel, a decoder, and an eavesdropping channel.

图6是根据本发明优选实施例设计的编码器构造方法示意图,如图6所示。FIG6 is a schematic diagram of an encoder construction method designed according to a preferred embodiment of the present invention, as shown in FIG6 .

本发明优选实施例的实例的具体实施方式采用BP译码算法的规则(3,2)LDPC安全码。The specific implementation of the example of the preferred embodiment of the present invention adopts the rule (3,2) LDPC security code of the BP decoding algorithm.

本实例介绍一种简单的规则(3,2)LDPC安全码。基于如前所述的安全编码方法,在此例中,n=280,k=20,l=100,SNR1=14,SNR2取10个不同的值(0.5,0.1,0.05,0.02,0.01,0.0085,0.005,0.0035,0.002,0.001)。首先,我们造一个200行,300列的校验矩阵(n+k-l行,n+k列),该校验矩阵由0,1构成,每行中1的个数为2个,每列中1的个数为3个。这样的校验矩阵构成的LDPC码叫做规则(3,2)LDPC码。每次我们产生一个20比特的真实消息,以及一个80比特的随机消息,我们将这些消息通过规则(3,2)LDPC码编码成一个拥有100比特消息位,200比特校验位的码字,然后将该码字通过主信道发送给合法用户,通过窃听信道发送给窃听者,且合法用户和窃听者的译码器均采用经典BP译码算法进行译码。这里需要注意的是我们假设主信道的信噪比固定,而窃听信道的信噪比是变化的。由n=280,k=20,l=100,SNR1=14,我们可以得到

Figure BDA0000962623150000121
即规则(3,2)LDPC码的实际传输效率是远小于主信道的信道容量的。在仿真中我们设置发送的总消息比特l=5000000×100,合法用户译码错误的比特数是2次,其译码错误比率为4×10-9。由于窃听信道的信噪比是变化的,我们不可能让固定的n,k,l满足
Figure BDA0000962623150000122
这里本实例希望发现同一个固定的编码方案对于不同的窃听信道的信噪比情况下的安全性变化趋势。我们发现,当窃听信道的信噪比越小(即窃听信道的噪声方差越大),窃听者的译码错误概率越逼近0.5,即本发明优选实施例所设计的安全编码方案越安全。表1给出了当主信道信噪比等于14时,窃听信道信噪比与窃听者译码误比特率之间的关系,如表1所示。This example introduces a simple regular (3,2) LDPC security code. Based on the security coding method described above, in this example, n = 280, k = 20, l = 100, SNR 1 = 14, SNR 2 takes 10 different values (0.5, 0.1, 0.05, 0.02, 0.01, 0.0085, 0.005, 0.0035, 0.002, 0.001). First, we create a 200-row, 300-column check matrix (n+kl rows, n+k columns). The check matrix consists of 0, 1, with 2 1s in each row and 3 1s in each column. The LDPC code composed of such a check matrix is called a regular (3,2) LDPC code. Each time we generate a 20-bit real message and an 80-bit random message, we encode these messages into a codeword with 100 message bits and 200 check bits through a regular (3,2) LDPC code, and then send the codeword to the legitimate user through the main channel and to the eavesdropper through the eavesdropping channel. The decoders of the legitimate user and the eavesdropper both use the classic BP decoding algorithm for decoding. It should be noted here that we assume that the signal-to-noise ratio of the main channel is fixed, while the signal-to-noise ratio of the eavesdropping channel is variable. From n = 280, k = 20, l = 100, SNR 1 = 14, we can get
Figure BDA0000962623150000121
That is, the actual transmission efficiency of the rule (3,2) LDPC code is much lower than the channel capacity of the main channel. In the simulation, we set the total message bits sent to l = 5000000 × 100, the number of bits decoded incorrectly by the legitimate user is 2 times, and the decoding error rate is 4 × 10 -9 . Since the signal-to-noise ratio of the eavesdropping channel is variable, we cannot make fixed n, k, l satisfy
Figure BDA0000962623150000122
Here, this example hopes to find the security change trend of the same fixed coding scheme under different signal-to-noise ratios of the eavesdropping channel. We found that when the signal-to-noise ratio of the eavesdropping channel is smaller (that is, the noise variance of the eavesdropping channel is larger), the eavesdropper's decoding error probability is closer to 0.5, that is, the security coding scheme designed by the preferred embodiment of the present invention is more secure. Table 1 shows the relationship between the signal-to-noise ratio of the eavesdropping channel and the eavesdropper's decoding bit error rate when the main channel signal-to-noise ratio is equal to 14, as shown in Table 1.

表1Table 1

Figure BDA0000962623150000131
Figure BDA0000962623150000131

图7是根据本发明优选实施例的曲线图,如图7所示,图7给出了主信道的信噪比与窃听信道信噪比的比值和窃听者误比特率之间的关系。不难看出当比值越大,安全编码器的效果越好,即当窃听信道信噪比越小,本发明所设计的安全编码器的性能越安全。Fig. 7 is a curve diagram according to a preferred embodiment of the present invention, as shown in Fig. 7, Fig. 7 shows the relationship between the ratio of the signal-to-noise ratio of the main channel to the signal-to-noise ratio of the wiretap channel and the bit error rate of the eavesdropper. It is not difficult to see that when the ratio is larger, the effect of the security encoder is better, that is, when the signal-to-noise ratio of the wiretap channel is smaller, the performance of the security encoder designed by the present invention is safer.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above implementation methods, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course can also be implemented by hardware, but in many cases the former is a better implementation method. Based on such an understanding, the technical solution of the present invention, or the part that contributes to the prior art, can be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal device (which can be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in each embodiment of the present invention.

本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:An embodiment of the present invention further provides a storage medium. Optionally, in this embodiment, the storage medium may be configured to store program codes for executing the following steps:

S1,获取待发送消息,其中,该待发送消息包括:k比特的真实消息,(l-k)比特的随机消息,其中l,k均为自然数;S1, obtaining a message to be sent, wherein the message to be sent includes: a real message of k bits and a random message of (l-k) bits, wherein l and k are both natural numbers;

S2,依据校验矩阵H对该待发送消息进行编码,获取码字rn+k,其中,该n为该真实消息的码字长度,该校验矩阵H满足以下条件:rn+kHT=0;S2, encoding the message to be sent according to the check matrix H to obtain a codeword r n+k , where n is the codeword length of the real message, and the check matrix H satisfies the following condition: r n+k H T = 0;

S3,发送该码字rn+kS3, sending the codeword r n+k .

可选地,存储介质还被设置为存储用于执行上述实施例的方法步骤的程序代码:Optionally, the storage medium is further configured to store program codes for executing the method steps of the above embodiment:

可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the above-mentioned storage medium may include but is not limited to: a USB flash drive, a read-only memory (ROM), a random access memory (RAM), a mobile hard disk, a magnetic disk or an optical disk, and other media that can store program codes.

可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行上述实施例的方法步骤。Optionally, in this embodiment, the processor executes the method steps of the above embodiment according to the program code stored in the storage medium.

可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation modes, and this embodiment will not be described in detail here.

显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general computing device, they can be concentrated on a single computing device, or distributed on a network composed of multiple computing devices, and optionally, they can be implemented by a program code executable by a computing device, so that they can be stored in a storage device and executed by the computing device, and in some cases, the steps shown or described can be executed in a different order than here, or they can be made into individual integrated circuit modules, or multiple modules or steps therein can be made into a single integrated circuit module for implementation. Thus, the present invention is not limited to any specific combination of hardware and software.

以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention. For those skilled in the art, the present invention may have various modifications and variations. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included in the protection scope of the present invention.

Claims (8)

1. A method of encoding, comprising:
obtaining a message to be sent, wherein the message to be sent comprises: k bits of true message, (l-k) bits of random message, wherein l and k are natural numbers;
coding the message to be sent according to the check matrix H to obtain a codeword r n+k Wherein n is a codeword length of the real message, and the check matrix H satisfies the following conditions: r is (r) n+k H T =0;
-dividing said codeword r n+k Divided into 2 k A plurality of subcodes, each of which has a length of n bits;
from said 2 k Randomly selecting one sub-code from the sub-codes and transmitting the sub-code;
transmitting the codeword r n+k
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the check matrix H is a check matrix of a low density parity check code LDPC code with a codeword length of n+k bits and a message length of l bits, wherein k is less than l and less than n+k.
3. The method of claim 1, wherein the (l-k) bit random message is determined by:
randomly generating a (l-k) bit random message;
generating a codeword corresponding to the random message by generating a matrix of the linear block code from the random message of the (l-k) bits.
4. The method of claim 1, wherein the codeword r n+k The actual transmission rate of the sub-code is smaller than the channel capacity of the main channel, and the actual transmission rate of the sub-code is equal to the channel capacity of the eavesdropping channel.
5. The method of claim 4, wherein the codeword r is determined by n+k The actual transmission rate of the subcode is less than the channel capacity of the primary channel and the actual transmission rate of the subcode is equal to the channel capacity of the eavesdropping channel:
Figure FDA0003978735240000011
Figure FDA0003978735240000012
wherein the actual transmission rate of the subcode is
Figure FDA0003978735240000013
The codeword r n+k Is +.>
Figure FDA0003978735240000014
Is the noise variance of the gaussian noise of the main channel,
Figure FDA0003978735240000021
is the noise variance of the eavesdropping channel noise, P is the codeword r n+k Is equal to or greater than the transmission power of the main channel>
Figure FDA0003978735240000022
The channel capacity maxI (X; Z) of the eavesdropping channel is +.>
Figure FDA0003978735240000023
6. A method of decoding, comprising:
receive Slave 2 k Randomly selecting one subcode from the subcodes, wherein the number 2 k The subcode is to code the code word r n+k The length of each subcode is n bits, which is obtained after division;
receiving codeword r n+k Wherein the codeword r n+k Is a codeword obtained by: coding the message to be transmitted according to the check matrix H to obtain a codeword r n+k Wherein the message to be sent comprises: a real message of k bits is provided,
(l-k) bits of random message, wherein l, k are natural numbers, n is the codeword length of the real message, and the check matrix H satisfies the following condition: r is (r) n+k H T =0;
Parsing the codeword r n+k
7. An encoding device, comprising:
the first acquisition module is configured to acquire a message to be sent, where the message to be sent includes: k bits of true message, (l-k) bits of random message, wherein l and k are natural numbers;
a second obtaining module, configured to encode the message to be sent according to a check matrix H, to obtain a codeword r n+k Wherein n is a codeword length of the real message, and the check matrix H satisfies the following conditions: r is (r) n+k H T =0;
A transmitting module for transmitting the codeword r n+k
Wherein the encoding device is further configured to, when transmitting the codeword r n+k BeforeThe codeword r n+k Divided into 2 k A plurality of subcodes, each of which has a length of n bits; from said 2 k And randomly selecting one subcode from the subcodes to send.
8. A decoding apparatus, comprising:
a receiving module for receiving the code word r n+k Wherein the codeword r n+k Is a codeword obtained by: coding the message to be transmitted according to the check matrix H to obtain a codeword r n+k Wherein the message to be sent comprises: k-bit true message, (l-k) -bit random message, wherein l and k are natural numbers, n is the codeword length of the true message, and the check matrix H satisfies the following conditions: r is (r) n+k H T =0;
A parsing module for parsing the codeword r n+k
Wherein the decoding device is further configured to, upon receiving the codeword r n+k Previously, receive from 2 k Randomly selecting one subcode from the subcodes; wherein said 2 k The subcode is to code the code word r n+k And the length of each subcode is n bits, which is obtained after division.
CN201610221921.XA 2016-04-11 2016-04-11 Encoding method and device, decoding method and device Active CN107294540B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610221921.XA CN107294540B (en) 2016-04-11 2016-04-11 Encoding method and device, decoding method and device
PCT/CN2016/098727 WO2017177609A1 (en) 2016-04-11 2016-09-12 Encoding method and device, and decoding method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610221921.XA CN107294540B (en) 2016-04-11 2016-04-11 Encoding method and device, decoding method and device

Publications (2)

Publication Number Publication Date
CN107294540A CN107294540A (en) 2017-10-24
CN107294540B true CN107294540B (en) 2023-05-30

Family

ID=60042297

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610221921.XA Active CN107294540B (en) 2016-04-11 2016-04-11 Encoding method and device, decoding method and device

Country Status (2)

Country Link
CN (1) CN107294540B (en)
WO (1) WO2017177609A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266321B (en) * 2019-06-04 2020-12-18 北京大学 A new polar code-based communication method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
CN103117749A (en) * 2012-12-31 2013-05-22 中国科学院微电子研究所 Check matrix construction and encoding and decoding method and device for low-density parity check code
CN103973314A (en) * 2013-01-24 2014-08-06 中国科学院声学研究所 Signal coding and decoding method based on LDPC, receiving end and sending end
JP2014220713A (en) * 2013-05-09 2014-11-20 日本電信電話株式会社 Coding apparatus, decoding apparatus, method, and program
CN104780022A (en) * 2015-04-10 2015-07-15 清华大学 Physical layer secure transmission method and system based on dynamic change of channel encoding matrix

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7702986B2 (en) * 2002-11-18 2010-04-20 Qualcomm Incorporated Rate-compatible LDPC codes
CN101005333B (en) * 2006-01-17 2010-05-12 华为技术有限公司 Low Density Parity Check Code Coding Method
CN101488819B (en) * 2008-01-15 2013-02-27 华为技术有限公司 A method and device for encoding and modulating a low-density parity-check code
CN101969354B (en) * 2009-07-28 2013-04-10 武汉大学 Channel coding and decoding method based on Chinese conversion codes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
CN103117749A (en) * 2012-12-31 2013-05-22 中国科学院微电子研究所 Check matrix construction and encoding and decoding method and device for low-density parity check code
CN103973314A (en) * 2013-01-24 2014-08-06 中国科学院声学研究所 Signal coding and decoding method based on LDPC, receiving end and sending end
JP2014220713A (en) * 2013-05-09 2014-11-20 日本電信電話株式会社 Coding apparatus, decoding apparatus, method, and program
CN104780022A (en) * 2015-04-10 2015-07-15 清华大学 Physical layer secure transmission method and system based on dynamic change of channel encoding matrix

Also Published As

Publication number Publication date
CN107294540A (en) 2017-10-24
WO2017177609A1 (en) 2017-10-19

Similar Documents

Publication Publication Date Title
Liu et al. Secure nested codes for type II wiretap channels
Bloch et al. Error-control coding for physical-layer secrecy
Baldi et al. Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem
Stankovic et al. Design of Slepian-Wolf codes by channel code partitioning
US20070067694A1 (en) Set of irregular LDPC codes with random structure and low encoding complexity
KR101559076B1 (en) Efficient information reconciliation method using turbo codes over the quantum channel
Suresh et al. Strong secrecy for erasure wiretap channels
Sartipi et al. Distributed source coding using short to moderate length rate-compatible LDPC codes: the entire Slepian-Wolf rate region
Zhang et al. Time-invariant quasi-cyclic spatially coupled LDPC codes based on packings
CN109075805B (en) Apparatus and method for implementing polar codes
Ye et al. Optimized rate-adaptive protograph-based LDPC codes for source coding with side information
JPWO2006106841A1 (en) Error correction coding device
Zhang et al. Build‐in wiretap channel I with feedback and LDPC codes by soft decision decoding
Shakiba-Herfeh et al. Comparison of short blocklength slepian-wolf coding for key reconciliation
Ratzer et al. Sparse low-density parity-check codes for channels with cross-talk
CN107294540B (en) Encoding method and device, decoding method and device
Yang et al. One-way information reconciliation schemes of quantum key distribution
Wen et al. On achieving unconditional secure communications over binary symmetric channels (BSC)
Almeida et al. Random puncturing for secrecy
Liu et al. Nested codes for secure transmission
WO2017177613A1 (en) Encoding method and device, and decoding method and device
Johnson et al. Combinatorial interleavers for systematic regular repeat-accumulate codes [transactions letters]
Andersson Coding for the wiretap channel
WO2017177610A1 (en) Coding method and device
Kolokotronis et al. Secretly pruned convolutional codes: Security analysis and performance results

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TG01 Patent term adjustment
TG01 Patent term adjustment