A Joint Scheme for Error Correction and Secrecy Based on Rateless Error Correction Codes

被引:0
|
作者
Lei W.-J. [1 ]
Li Y.-Y. [1 ]
机构
[1] School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing
关键词
Error correction; Physical layer security; Rateless codes; Secrecy;
D O I
10.13190/j.jbupt.2018-101
中图分类号
学科分类号
摘要
A secure and reliable transmission scheme based on rateless codes is proposed. The encoder and decoder generete random coding matrix and deleting pattern by setting up pseudo-random number generators, enabling random generation and deletion of encoded symbols, and the seed of pseudo-random number generator is the secret key. Since the degree distribution of the encoded symbols after random deletion is not changed, the error correction performance of the rateless codes is not affected. Simulation under additive white Gaussian noise channel and Rayleigh fading channel indicates that the bit-error-rate of the eavesdropper is kept near 0.5, and the word-error-rate remains 1, while the error performance of the legitimate receiver is the same as conventional rateless coding systems, thus error correction and encryption are realized simultaneously. © 2019, Editorial Department of Journal of Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:74 / 80
页数:6
相关论文
共 6 条
  • [1] Mceliece R.J., A public-key cryptosystem based on algebraic coding theory, Deep Space Network Progress Report, 44, pp. 114-116, (1978)
  • [2] Sawant V., Bhise A., Cryptographic turbo code for image transmission over mobile networks, International Conference on Advances in Computing, Communications and Informatics, pp. 844-850, (2016)
  • [3] Ng T.Y., Chew L.Y., Puthusserypady S., Error correction with chaotic switching between convolutional codecs, IEEE Transactions on Circuits & Systems, 55, 11, pp. 3655-3662, (2008)
  • [4] Esmaeili M., Gulliver T.A., Joint channel coding-crypto-graphy based on random insertions and deletions in quasi-cyclic-low-density parity check codes, IET Communications, 9, 12, pp. 1555-1560, (2015)
  • [5] Ye C., Mathur S., Reznik A., Et al., Information-theoretically secret key generation for fading wireless channels, IEEE Transactions on Information Forensics and Security, 5, 2, pp. 240-254, (2010)
  • [6] Shokrollahi A., Raptor codes, IEEE Transcations on Information Theory, 52, 6, pp. 2551-2567, (2006)