共查询到20条相似文献,搜索用时 46 毫秒
1.
本文研究了二元对称信道上,某些BCH码的不可检错误概率。首先得到了几个重要的不等式。然后证明了纠正两个错误二进制本原BCH码的扩展码是最佳检错码。 相似文献
2.
针对现有的密钥生成方案需要在通信流程中增加额外的密钥协商协议,导致在5G等标准通信系统中应用受限的问题,该文提出一种基于极化码的无协商密钥物理层安全传输方案。首先基于信道特征提取未协商的物理层密钥,然后针对物理信道与密钥加密信道共同构成的等效信道设计极化码,最后利用未协商的物理层密钥对编码后的序列进行简单的模二加加密后传输。该方案通过针对性设计的极化码纠正密钥差异和噪声引起的比特错误,实现可靠的安全传输。仿真表明,该文基于等效信道设计的极化码在保证合法双方以最优的码率可靠传输的同时可以防止窃听者窃听,实现了安全与通信的一体化。 相似文献
3.
在建立伽罗华城的基础上,对BCH码的编译过程进行软件模拟,所用信道是移动信道的三状态Markov模型。译码过程采用了简化译码法,使计算机量减少,机时缩短。最后得到了BCH码对移动通信性能改善的统计结果。比较了二组不同码长、每组又包括三种不同编码效率的六种BCH码——(63,45),(63,35),(63,24);(31,21,),(31,16),(31,11)——在典型移动信道中的性能改善。得出结论:BCH码用于移动信道进行差错控制,可提高移动通信的可靠性,且传信率越低,其纠错能力越高;但当用户对通信可靠性有特别高的要求时,用简单的BCH码进行差错控制就可能达不到要求了。 相似文献
4.
本文研究了基于平滑熵进行无条件安全秘密钥协商时的密钥速率,得出了通信双方可以以强密钥速率协商无条件安全的共享密钥的条件。 相似文献
5.
非对称量子纠错码是针对量子通信中不同类型量子错误发生的概率而设计的有效编码方案.纠错性能良好的量子码在量子通信的真实性和可靠性方面起着决定性的作用.本文首先通过研究分圆陪集的性质确定出非本原狭义BCH码满足Hermitian对偶包含的条件;其次,利用推广的CSS构造法构造出一系列特殊码长的非对称量子BCH码;最后,给出了m分别为3和5的两类非对称量子BCH码维数,它们的z-距离远大于已有文献中的结论,因而提高了非对称量子信道中对相位错误的纠错能力. 相似文献
6.
提出二进制BCH码的一种盲识别方法。该算法适用于本原和非本原二进制BCH码。首先,在帧长度已知的条件下,根据循环特性,给出一种分组长度的统计识别方法;然后,根据循环特性及各种约束条件得到备选多项式;再根据校正子权重和最小原则,得到最优多项式;最后通过因式分解得到生成多项式的最终估计表达式。仿真表明,本文算法具有较强的抗随机误码能力,而且其识别性能随着参加统计的码字数增多而提高。该算法不涉及矩阵运算,因此非常适合硬件实现。 相似文献
7.
8.
9.
大气激光通信系统中Turbo码译码性能仿真 总被引:1,自引:0,他引:1
由于大气激光通信信道对光信号的衰减极大,实际通信系统的编码应具有极强纠随机差错和纠突发差错的能力.针对大气激光通信信道的特殊性,结合当前优异的编码技术Turbo码对信道进行编码,通过对大气激光通信信道的分析对Turbo码编译码系统进行修正,建立了基于大气激光通信信道的系统模型,仿真分析了Turbo码实现低误码率的大气激光信息传输的可行性,并分析了采用不同算法和不同交织长度对系统性能的影响,为Turbo码在大气激光通信系统中的应用提供了理论基础. 相似文献
10.
11.
The Stream Control Transmission Protocol (SCTP) is a new general purpose transport protocol defined by the IETF. Originally intended for the transport of voice signaling data (SS7) over IP networks, SCTP together with newly defined extensions is increasingly considered for other application scenarios as well. These require strong security solutions to authenticate the communication partners and protect sensitive data with respect to integrity and confidentiality. Proposals have been issued on how to protect SCTP transport by using standard security protocols such as TLS and IPsec. However, these solutions introduce limitations or inefficiencies und thus may not be able to fully exploit the capabilities of SCTP. Therefore, we propose a security extension to SCTP named Secure SCTP (S-SCTP) to solve these issues in an efficient and user-friendly way. 相似文献
12.
Philip Giordano 《电子产品世界》2009,16(8)
安全设计是一个动态的、与具体系统相关的过程,且往往很复杂.在探讨安全话题时,最重要的事情就是尽早开始安全需求评估,定义系统安全目标,并经常性地根据系统用途及市场的变化来确定是否最初的威胁已经改变或扩展. 相似文献
13.
分析了现有网格安全体系结构模型存在的问题,结合网格固有的特点设计了一个网格环境下的认证模型,该模型以虚拟组织和信任域为基础,针对域内和域间环境采用不同的认证策略并且引入了临时安全域(TSD)的概念,通过分析表明该模型在提供安全身份鉴别的同时简化了实体之间的认证,满足网格环境的安全需求。 相似文献
14.
Schwiderski-Grosche S. Knospe H. 《Electronics & Communication Engineering Journal》2002,14(5):228-238
M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered. 相似文献
15.
Secure circuit evaluation 总被引:3,自引:0,他引:3
We present a simple protocol for two-playersecure circuit evaluation. The protocol enables players C and D to cooperate in the computation off(x) while D conceals her datax from C and C conceals his circuit forf from D. The protocol is based on the technique ofhiding information from an oracle [AFK].An extended abstract of this paper appeared in theProceedings of the Fifth Annual Symposium on Theoretical Aspects of Computer Science [AF]. 相似文献
16.
17.
宽带小区迅速出现,已经成为大中城市居民接入互联网的一种重要形式。例如,当前北京、深圳、广州、杭州、成都等城市都已经出现多家运营公司争抢建设宽带小区的现象。网络化社区也正在成为房地产商一个重要的宣传提升点。可以预见,随着大量新的居民小区的建设并投入使用,以宽带形式接入城域网的用户会大 相似文献
18.
Boaz Barak Ran Canetti Yehuda Lindell Rafael Pass Tal Rabin 《Journal of Cryptology》2011,24(4):720-760
Research on secure multiparty computation has mainly concentrated on the case where the parties can authenticate each other
and the communication between them. This work addresses the question of what security can be guaranteed when authentication
is not available. We consider a completely unauthenticated setting, where all messages sent by the parties may be tampered with and modified by the adversary without the uncorrupted parties being able
to detect this fact. In this model, it is not possible to achieve the same level of security as in the authenticated-channel
setting. Nevertheless, we show that meaningful security guarantees can be provided: Essentially, all the adversary can do is to partition the network into disjoint sets, where in each set the
computation is secure in of itself, and also independent of the computation in the other sets. In this setting we provide, for the first time, nontrivial security guarantees in a
model with no setup assumptions whatsoever. We also obtain similar results while guaranteeing universal composability, in some variants of the common reference string
model. Finally, our protocols can be used to provide conceptually simple and unified solutions to a number of problems that
were studied separately in the past, including password-based authenticated key exchange and nonmalleable commitments. As an application of our results, we study the question of constructing secure protocols in partially authenticated networks,
where some of the links are authenticated, and some are not (as is the case in most networks today). 相似文献
19.
20.
An efficient secure single-sensor camera for captured image copyright protection and ownership authentication is introduced. Visible watermarks are embedded during the colour filter array (CFA) data acquisition process. Subsequent demosaicking of the watermarked CFA grey-scale images generates secure full-colour images readily available for storage or distribution. 相似文献