Reversible variable length codes (RVLCs) have received much attention due to their excellent error resilient capabilities. In this paper, a novel construction algorithm for symmetrical RVLC is proposed which is indepe...Reversible variable length codes (RVLCs) have received much attention due to their excellent error resilient capabilities. In this paper, a novel construction algorithm for symmetrical RVLC is proposed which is independent of the Huffman code. The proposed algorithm's codeword assignment is only based on symbol occurrence probability. It has many advantages over symmetrical construction algorithms available for easy realization and better code performance. In addition, the proposed algorithm simplifies the codeword selection mechanism dramatically.展开更多
In this paper, we investigated the code over GF(2) which is generated by the incidence matrix of the symmetric (2,4) - net D. By computer search, we found that this binary code of D has rank 13 and the minimum distanc...In this paper, we investigated the code over GF(2) which is generated by the incidence matrix of the symmetric (2,4) - net D. By computer search, we found that this binary code of D has rank 13 and the minimum distance is 8.展开更多
This paper studies the nonsystematic Low-Density Parity-Check(LDPC)codes based onSymmetric Balanced Incomplete Block Design(SBIBD).First,it is concluded that the performancedegradation of nonsystematic linear block co...This paper studies the nonsystematic Low-Density Parity-Check(LDPC)codes based onSymmetric Balanced Incomplete Block Design(SBIBD).First,it is concluded that the performancedegradation of nonsystematic linear block codes is bounded by the average row weight of generalizedinverses of their generator matrices and code rate.Then a class of nonsystematic LDPC codes con-structed based on SBIBD is presented.Their characteristics include:both generator matrices andparity-check matrices are sparse and cyclic,which are simple to encode and decode;and almost arbi-trary rate codes can be easily constructed,so they are rate-compatible codes.Because there aresparse generalized inverses of generator matrices,the performance of the proposed codes is only0.15dB away from that of the traditional systematic LDPC codes.展开更多
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct...Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.展开更多
A three- and an (N+ 1)-party dense coding scheme in the case of non-symmetric Hilbert spaces of the particles of a quantum channel are investigated by using a multipartite entangled state. In the case of the (N ...A three- and an (N+ 1)-party dense coding scheme in the case of non-symmetric Hilbert spaces of the particles of a quantum channel are investigated by using a multipartite entangled state. In the case of the (N + 1)-party dense coding scheme, we show that the amount of classical information transmitted from N senders to one receiver is improved.展开更多
We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful atta...We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message.展开更多
With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless ...With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless communication systems. In cognitive radio network, it is essential that control information is sent securely and reliably. Ensuring the trustworthiness of the transmitting of spectrum sensing information is important in the CR networks since spectrum sensing directly affects spectrum management and incumbent coexistence. In this paper, the first secondary link channel model is presented, then a secure LT Code is proposed to be compatible with presented channel model and acquires good QoS. As we may know, LT code overcomes packet loss when the channel of the SU is reclaimed by PU. In the new proposed combined encoding and ciphered block, a LT code matrix is used to generate a symmetric cryptographic key. Thus, less complexity observed in the processing computation. Besides, cryptographic key is not sent over the channel. As a result, an attacker has no way to eavesdrop the key unless he is prepared to consider all possible key combinations. This replaced block supplies secure controlling channel and increases spectrum efficiency too.展开更多
In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the...In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the nonzero codewords of C are 2 minimal. Therefore, we obtain a corollary.展开更多
具有隐私保护能力的范围查询处理方法是当前无线传感器网络(wireless sensor networks,WSNs)数据管理应用技术中具有挑战性的研究内容.针对2层传感器网络环境,提出了一种能量高效的隐私保护范围查询处理方法(energy-efficient and priva...具有隐私保护能力的范围查询处理方法是当前无线传感器网络(wireless sensor networks,WSNs)数据管理应用技术中具有挑战性的研究内容.针对2层传感器网络环境,提出了一种能量高效的隐私保护范围查询处理方法(energy-efficient and privacy-preserving range query,EPRQ).在数据存储阶段,感知节点对其采集的数据进行加密处理,并利用0-1编码和Hash消息身份认证编码机制计算各采集数据的最小化比较因子,然后将密文和编码数据上传至存储节点.在查询处理阶段,基站计算用户查询的目标范围区间的比较因子,并作为查询指令发送给存储节点;再由存储节点利用0-1编码验证机制的数值比较特性,实现无需明文数值参与下的数据大小比较,进而确定查询结果密文数据集,并返回基站;基站解密密文数据,获得最终的查询结果.理论分析和实验结果表明,该方法能够实现对感知数据、查询结果和目标范围区间的隐私保护,且与现有方法相比具有更高的能耗效率.展开更多
基金Project (No. 60172030) partially supported by the National Natural Science Foundation of China
文摘Reversible variable length codes (RVLCs) have received much attention due to their excellent error resilient capabilities. In this paper, a novel construction algorithm for symmetrical RVLC is proposed which is independent of the Huffman code. The proposed algorithm's codeword assignment is only based on symbol occurrence probability. It has many advantages over symmetrical construction algorithms available for easy realization and better code performance. In addition, the proposed algorithm simplifies the codeword selection mechanism dramatically.
文摘In this paper, we investigated the code over GF(2) which is generated by the incidence matrix of the symmetric (2,4) - net D. By computer search, we found that this binary code of D has rank 13 and the minimum distance is 8.
基金the National Natural Science Foundation of China(No.60272009,No.60472045,and No.60496313).
文摘This paper studies the nonsystematic Low-Density Parity-Check(LDPC)codes based onSymmetric Balanced Incomplete Block Design(SBIBD).First,it is concluded that the performancedegradation of nonsystematic linear block codes is bounded by the average row weight of generalizedinverses of their generator matrices and code rate.Then a class of nonsystematic LDPC codes con-structed based on SBIBD is presented.Their characteristics include:both generator matrices andparity-check matrices are sparse and cyclic,which are simple to encode and decode;and almost arbi-trary rate codes can be easily constructed,so they are rate-compatible codes.Because there aresparse generalized inverses of generator matrices,the performance of the proposed codes is only0.15dB away from that of the traditional systematic LDPC codes.
文摘Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.
文摘A three- and an (N+ 1)-party dense coding scheme in the case of non-symmetric Hilbert spaces of the particles of a quantum channel are investigated by using a multipartite entangled state. In the case of the (N + 1)-party dense coding scheme, we show that the amount of classical information transmitted from N senders to one receiver is improved.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61179026)the Fundamental Research of the Central Universities of China Civil Aviation University of Science Special(Grant No.3122016L005)
文摘We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message.
文摘With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless communication systems. In cognitive radio network, it is essential that control information is sent securely and reliably. Ensuring the trustworthiness of the transmitting of spectrum sensing information is important in the CR networks since spectrum sensing directly affects spectrum management and incumbent coexistence. In this paper, the first secondary link channel model is presented, then a secure LT Code is proposed to be compatible with presented channel model and acquires good QoS. As we may know, LT code overcomes packet loss when the channel of the SU is reclaimed by PU. In the new proposed combined encoding and ciphered block, a LT code matrix is used to generate a symmetric cryptographic key. Thus, less complexity observed in the processing computation. Besides, cryptographic key is not sent over the channel. As a result, an attacker has no way to eavesdrop the key unless he is prepared to consider all possible key combinations. This replaced block supplies secure controlling channel and increases spectrum efficiency too.
文摘In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the nonzero codewords of C are 2 minimal. Therefore, we obtain a corollary.
文摘具有隐私保护能力的范围查询处理方法是当前无线传感器网络(wireless sensor networks,WSNs)数据管理应用技术中具有挑战性的研究内容.针对2层传感器网络环境,提出了一种能量高效的隐私保护范围查询处理方法(energy-efficient and privacy-preserving range query,EPRQ).在数据存储阶段,感知节点对其采集的数据进行加密处理,并利用0-1编码和Hash消息身份认证编码机制计算各采集数据的最小化比较因子,然后将密文和编码数据上传至存储节点.在查询处理阶段,基站计算用户查询的目标范围区间的比较因子,并作为查询指令发送给存储节点;再由存储节点利用0-1编码验证机制的数值比较特性,实现无需明文数值参与下的数据大小比较,进而确定查询结果密文数据集,并返回基站;基站解密密文数据,获得最终的查询结果.理论分析和实验结果表明,该方法能够实现对感知数据、查询结果和目标范围区间的隐私保护,且与现有方法相比具有更高的能耗效率.