CN106656487B - A kind of cryptographic key negotiation method and communication device - Google Patents

A kind of cryptographic key negotiation method and communication device Download PDF

Info

Publication number
CN106656487B
CN106656487B CN201611111316.3A CN201611111316A CN106656487B CN 106656487 B CN106656487 B CN 106656487B CN 201611111316 A CN201611111316 A CN 201611111316A CN 106656487 B CN106656487 B CN 106656487B
Authority
CN
China
Prior art keywords
communication party
discrete series
sampled value
stochastic variable
subinterval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611111316.3A
Other languages
Chinese (zh)
Other versions
CN106656487A (en
Inventor
辛刚
于大鹏
郭福星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN201611111316.3A priority Critical patent/CN106656487B/en
Publication of CN106656487A publication Critical patent/CN106656487A/en
Application granted granted Critical
Publication of CN106656487B publication Critical patent/CN106656487B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Abstract

The present invention proposes a kind of cryptographic key negotiation method, is applied to first communication party, comprising: sampled to obtain sampled value to the stochastic variable of acquisition;The value interval of all sampled values is divided into the subinterval of setting quantity;The subinterval location index of all sampled values is sent to second communication party, second communication party is made to generate quantization Soft Inform ation;Quantification treatment is carried out to each sampled value respectively, obtains discrete series;Discrete series are encoded to obtain coding codeword;Coding codeword is sent to second communication party, second communication party is made to decode to obtain discrete series;The cryptographic Hash that second communication party sends is received, and judges whether the discrete series that second communication party decodes are correct according to cryptographic Hash.The present invention uses quantization Soft Inform ation to input as decoding, more remain raw information entropy, it avoids that wrong log-likelihood ratio is calculated because of mistake is estimated to the inconsistent rate of the bit of initiation sequence, the log-likelihood ratio of mistake is used to influence error correction result as decoding input.

Description

A kind of cryptographic key negotiation method and communication device
Technical field
The present invention relates to safety communication technology field more particularly to a kind of cryptographic key negotiation methods and communication device.
Background technique
Carrying out encryption to information is the important method to ensure communication safety.In wireless communication procedure, communicating pair is to letter Road carries out bi-directional probing, estimates the parameters such as amplitude, phase and time delay for receiving signal, then by channel quantitative, close Key is negotiated and secrecy enhances to complete the generation of key.Due to information sender and receiving party's hardware device difference and After the presence of interchannel noise, information sender and receiving party send information to other side respectively, information sender and information are connect The discrete series that debit receives information and quantization obtains are not fully consistent.Receiving party just needs with information sender at this time It is by the method for key agreement that discrete series are consensus.
In the prior art, the process that information sender and receiving party hold consultation are as follows: information sender will quantify To discrete series carry out coded treatment after be sent to receiving party, after receiving party receives coding codeword, to reception To coding codeword carry out relevant treatment and estimate that oneself obtained discrete series of quantization is handled with the coding codeword by receiving Preliminary log likelihood ratio, Jin Erji is calculated according to the inconsistent rate that estimation obtains in the inconsistent rate of obtained discrete series Calculation obtains final log-likelihood ratio, is translated using the discrete series that the log-likelihood comparison being finally calculated is handled Code, obtains correct discrete series.In above-mentioned negotiations process, if the inconsistent rate that receiving party estimates is inaccurate Really, it will the discrete series for causing receiving party to decode and the discrete series that information sender is sent are more inconsistent.
Summary of the invention
Defect and deficiency based on the above-mentioned prior art, the present invention propose a kind of cryptographic key negotiation method and communication device, institute When stating communication device and carrying out key agreement, initially inconsistent rate generates decoding algorithm to the discrete series for not utilizing estimation to obtain Initial information avoids influencing key agreement performance because of initial inconsistent rate estimation inaccuracy.
First aspect present invention provides a kind of cryptographic key negotiation method, applied to the first communication party of key agreement, the party Method to the stochastic variable of acquisition the following steps are included: sampled to obtain sampled value;The value interval of all sampled values is divided For the subinterval for setting quantity, and subinterval location index is respectively set for each sampled value;By all of the stochastic variable The subinterval location index of sampled value is sent to the second communication party that key agreement is carried out with first communication party, so that described second Communication party generates quantization Soft Inform ation;Quantification treatment is carried out to each sampled value of the stochastic variable respectively, obtains discrete series; Coded treatment is carried out to the discrete series, obtains the coding codeword of the discrete series;By the coding code of the discrete series Word is sent to the second communication party, so that the second communication party decodes to obtain discrete series;Receive the second communication party The cryptographic Hash of transmission, and judge whether the discrete series that the second communication party decodes are correct according to the cryptographic Hash;Institute It states cryptographic Hash and is calculated by the second communication party according to the discrete series that decoding obtains.In above-mentioned cipher key agreement process, The subinterval location index of each sampled value is sent to second communication party by first communication party, on the one hand more convenient for second communication party Subinterval where accurately confirming each sampled value reduces second communication party to the uncertainty of first communication party sampled value.Separately On the one hand, the soft letter of first communication party sampled value quantization is calculated according to the subinterval location index received in second communication party Breath, using the quantization Soft Inform ation as the preliminary log likelihood information of decoding algorithm, more remains raw information entropy, gets rid of In the prior art because decoding inaccurate predicament caused by estimating inconsistent rate inaccuracy.
Second aspect of the present invention provides another cryptographic key negotiation method, should applied to the second communication party of key agreement Method is the following steps are included: receive the subinterval position rope that the first communication party for carrying out key agreement with second communication party is sent Draw;According to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, institute is calculated State the quantization Soft Inform ation of each sampled value of the stochastic variable of first communication party acquisition;Receive the volume that the first communication party is sent Code code word;According to the quantization Soft Inform ation and the coding codeword of all sampled values, decoding information group is calculated;It is translated according to described Code information group, decoding obtain discrete series;Cryptographic Hash is calculated according to the discrete series, and the cryptographic Hash is sent to The first communication party.In above-mentioned cipher key agreement process, second communication party is sub according to each sampled value that first communication party is sent The quantization Soft Inform ation of each sampled value is calculated in section location index, using the quantization Soft Inform ation as the initial right of decoding algorithm Number likelihood information, protects the comentropy between original channel information, makes to decode more acurrate.
Third aspect present invention provides a kind of communication device, comprising: receiving unit, transmission unit and processing unit;Its In, the transmission unit, subinterval location index, discrete series coding codeword and Hash for sending the processing unit Value is sent to the communication device that key agreement is carried out with itself;The receiving unit carries out key agreement with itself for receiving Communication device the subinterval location index, coding codeword and the cryptographic Hash that send, and be sent to the processing unit;The processing Unit is connect with the receiving unit and the transmission unit, for being sampled to obtain sampled value to the stochastic variable of acquisition; The value interval of all sampled values is divided into the subinterval of setting quantity, subinterval position rope is respectively set for each sampled value Draw and the subinterval location index of all sampled values is sent to the transmission unit;To each sampled value of the stochastic variable Quantification treatment is carried out respectively, obtains discrete series, and coded treatment is carried out to the discrete series, obtains the volume of the discrete series Code code word, and the discrete series coding codeword is sent to the transmission unit;According to the received Hash of the receiving unit Whether the discrete series that value judgement is decoded with the communication device for itself carrying out key agreement are correct;According to the receiving unit The sampled value of received subinterval location index and the stochastic variable itself obtained is calculated and carries out key agreement with itself The quantization Soft Inform ation of each sampled value for the stochastic variable that communication device obtains;According to the quantization Soft Inform ation of all sampled values and institute It states the received coding codeword of receiving unit and decoding information group is calculated;It decodes to obtain discrete sequence according to the decoding information group Column are calculated cryptographic Hash according to the discrete series that decoding obtains, and the cryptographic Hash are sent to the transmission unit.
In one implementation, the value interval by all sampled values is divided into the subinterval of setting quantity, packet It includes: value interval of all sampled values etc. generally is divided into the section of the first setting quantity, and be each Interval Coding;Respectively By each section in the section of the first setting quantity, the subinterval for being generally quantified as the second setting quantity is waited.At above-mentioned stroke During point, after the value interval of all sampled values to be divided into the section of the first setting quantity, due to channel estimation errors Presence, will increase the bit error rate of both sides' quantization bit close to the sampled value of quantization boundary, each quantified area again at this time Between the equal subinterval for being generally quantified as the second setting quantity, in this way for each sampled value, position ownership in more detail, reduces mistake Bit rate.
In one implementation, described that coded treatment is carried out to the discrete series, obtain the volume of the discrete series Code code word, comprising: the discrete series are divided into the first discrete series and the second discrete series;To first discrete series Coded treatment is carried out, the first discrete series coding codeword is obtained;By the first discrete series coding codeword with described second from It dissipates sequence and carries out mould 2 plus calculation process, obtain the coding codeword of the discrete series.It is above-mentioned that first discrete series are encoded into code Word and second discrete series carry out mould 2 plus calculation process, can prevent from sending the first discrete series coding codeword When, the side's of being ravesdropping eavesdropping.
In one implementation, carry out quantification treatment respectively in each sampled value to the stochastic variable, obtain from After dissipating sequence, coded treatment, before obtaining the coding codeword of the discrete series, this method are being carried out to the discrete series Further include: receive the characterization quantization generated information of Soft Inform ation that the second communication party sends.
In one implementation, described to be obtained according to the subinterval location index and the second communication party The soft letter of quantization of each sampled value for the stochastic variable that the first communication party obtains is calculated in the sampled value of stochastic variable Breath, comprising: according to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, respectively , the first communication party acquisition corresponding with each sampled value of stochastic variable that the second communication party obtains is calculated Stochastic variable each sampled value, conditional probability that each coded-bit is 0 and the conditional probability for being 1;According to described Random change corresponding with each sampled value of stochastic variable that the second communication party obtains, that the first communication party obtains Each sampled value of amount, conditional probability that each coded-bit is 0 and the conditional probability for being 1, calculate separately to obtain and institute The each sampled value for stating the stochastic variable of second communication party's acquisition is corresponding, the stochastic variable that the first communication party obtains The log-likelihood ratio of each coded-bit of each sampled value, as quantization Soft Inform ation.
In one implementation, the quantization Soft Inform ation and the coding codeword according to all sampled values, calculates To decoding information group, comprising: by the quantization Soft Inform ation of all sampled values, be divided into the first quantization Soft Inform ation and the second soft letter of quantization Breath;Hard decision process is carried out to the second quantization Soft Inform ation, obtains the second quantized sequences;By second quantized sequences and institute It states coding codeword and carries out mould 2 plus calculation process, obtain the first coded sequence;First coded sequence is carried out at soft-decision Reason, obtains the second coded sequence;Second coded sequence is subjected to corresponding position with the absolute value of the second quantization Soft Inform ation Multiplication processing is set, third coded sequence is obtained;By the third coded sequence and the first quantization Soft Inform ation composition decoding letter Breath group.It is inconsistent to can be seen that the bits of original that second communication party does not obtain according to estimation in the present invention from above-mentioned treatment process Preliminary log likelihood ratio information is calculated in rate, and then log-likelihood ratio is calculated, and the log-likelihood being calculated is compared to For the input of decoding algorithm, but use quantization Soft Inform ation as decoder input, more remain original channel information it Between comentropy, avoid due to estimation bits of original inconsistent rate inaccuracy and lead to decoding inaccuracy, improve decoding and entangle Wrong performance.
In one implementation, according to the subinterval location index and the second communication party acquisition with The sampled value of machine variable, be calculated each sampled value for the stochastic variable that the first communication party obtains quantization Soft Inform ation it Afterwards, this method further include: Xiang Suoshu first communication party sends the characterization quantization generated information of Soft Inform ation.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of cryptographic key negotiation method provided in an embodiment of the present invention;
Fig. 2 is channel adjustment quantization algorithm schematic diagram provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of communication device provided in an embodiment of the present invention.
Specific embodiment
Information encryption is the important method to ensure communication safety, and existing encryption and decryption technique is all to be used without stringent card The complexity of bright difficult math question and calculating increases the calculation amount that password is cracked, so that communications security is improved, but not It can guarantee unconditional safety.With the high speed development of mathematics and quantum computer, the communications security under traditional system faces Acid test.Because wireless channel has the characteristics that time variation, space-variant and reciprocity, the key based on wireless channel generation Characteristic with " one-time pad " perfect password that Shannon proposes, is not easy to be cracked, can ensure communication safety to a greater extent, Therefore it is used more and more.
In the secret signalling encrypted based on wireless channel key, legitimate correspondence both sides complete pair within coherence time Then the bi-directional probing of channel is estimated the special parameters such as amplitude, phase and the time delay for receiving signal, last channel amount Change, key agreement and secrecy enhance to complete the generation of key.Due to the difference of information sender and receiving party's hardware device After the presence of noise in other and channel, information sender and receiving party send information to other side respectively, information sender It receives information respectively with receiving party and to quantify obtained stochastic variable not fully consistent, just need communicating pair logical at this time Cross key agreement respective stochastic variable is consensus.
The present invention proposes a kind of cryptographic key negotiation method and communication device, enable communicating pair by it is each it is de-quantization obtain with Machine variable is consensus.
Below in conjunction with attached drawing, technical solution of the present invention is clearly and completely described, it is clear that this described hair The embodiment of bright technical solution is only a part of the embodiment of technical solution of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, the embodiment of the present invention propose cryptographic key negotiation method the following steps are included:
S101, first communication party are sampled to obtain sampled value to the stochastic variable X of acquisition;
Before communicating pair carries out key agreement, it is stronger that communicating pair has obtained two correlations respectively, and obeys The stochastic variable of identical probability distribution.Specifically, first communication party sends an information, second communication party to second communication party The information is received, a stochastic variable is obtained;Likewise, second communication party sends an identical information to first communication party, First communication party receives the information, obtains a stochastic variable.Due to the difference of first communication party and second communication party's hardware device Different and interchannel noise presence, first communication party and second communication party are directed to the stochastic variable phase that same information quantization obtains Closing property is relatively strong and obeys identical probability distribution, but is not identical.
Assuming that first communication party Alice sends information S, Bob a reception S to second communication party Bob, stochastic variable is obtained Y;Then Bob sends information S to Alice, and Alice receives S, obtains stochastic variable X.The X and Y is to be used to generate key Initial information source, and X and Y correlation is relatively strong and obeys identical probability distribution.
Value interval of the stochastic variable X itself obtained etc. generally is divided into M section by S102, first communication party, and is Each Interval Coding;
Channel adjustment quantization algorithm schematic diagram shown in Figure 2, first communication party is by the stochastic variable X's itself obtained Value interval etc. generally is divided into M section, then the quantizing bit number R=log of each sampled value2M.Next, the first communication Side encodes M section respectively, specifically, in embodiments of the present invention, using Gray code to each Interval Coding, example As shown in Figure 2, the value interval of X is divided into four sections by Alice, and each interval quantization bit is 2 bits, then each section Coding is respectively 00,01,11,10.
It should be noted that the embodiment of the present invention is for ease of description, while being encoded to each section, will take Value belongs to the sampled value in this section, also thinks that it has a coding, and its coding is identical as the coding in section where it.? That is value belongs to the sampled value in a certain section, all there is coding identical with the Interval Coding, it is only each in the section Sampled value is different the location of in the section.
Each value interval of X generally is divided into N number of subinterval respectively etc. by S103, first communication party;
Due to the presence of channel estimation errors, the errored bit of both sides' quantization bit will increase close to the sampled value of quantization boundary Rate, in order to reduce bit error rate, each quantized interval etc. is generally quantified as N number of subinterval again by first communication party, and determines it Subinterval position where sampled value.
Such as shown in Fig. 2, if the bit number of each sampled value quantization is R, and Gray code is used, then quantized interval number It is 2R, then each section etc. is generally quantified as N number of minizone, then first communication party receives the value interval of signal X by equal general point It is 2R* N number of subinterval, subinterval boundary are respectivelyAnd
ai=F-1(i/(2R*N))
WhereinFor inverse scores accumulated function.
The boundary that each minizone is determined according to above-mentioned formula carries out each section according to the boundary of each minizone Minizone etc. generally divides.
S104, first communication party confirmation X each sampled value where subinterval, and by subinterval where the sampled value Number be set as the subinterval location index of the sampled value;
Specifically, the value interval of X is divided into M section by first communication party, and each section is further distinguished Be divided into N number of subinterval, it is therefore an objective to more accurately determine the subinterval where each sampled value, in order to second communication party according to Subinterval where sampled value calculates sampled value and quantifies Soft Inform ation.
As shown in Fig. 2, Alice first value interval of X etc. it is general be divided into 4 sections (i.e. M=4), and use Gray Coding, being separately encoded is 00,01,11,10, then carries out equal general quantization to each section again, and the subinterval number of quantization is N= 2, then total quantization subinterval number is 4*2=8.Then location index q of the Alice the subinterval where his each sampled value It is sent to Bob.
When Bob calculates Alice to the sampled value x of its stochastic variableiFirst bit (from left to right) after coding When log-likelihood ratio, i.e. quantization Soft Inform ation, it is assumed that Bob receives q, and when q is equal to 1, just speculating xiFirst ratio after coding First subinterval of A and B is accurate to by two sections A and B specially for 0 possible probability interval, to make Bob to sampled value xiUncertain reduce.
The location index q in the subinterval where each sampled value of X is sent to second communication party by S105, first communication party;
In fact, due to the sampled value of X have it is multiple, first communication party is by the subinterval where each sampled value Location index q constitutes sequence and is sent to second communication party, subinterval where a sampled value of each element representation X in sequence Location index, each element is arranged according to sequencing corresponding with sampled value sequencing in sequence.
S106, second communication party receive the subinterval location index q that first communication party is sent;
Specifically, when first communication party sends q, although eavesdropping side may also obtain q, since eavesdropping side is logical with second Stochastic variable acquired in letter side is different, therefore eavesdropping side is not aware which quantized interval q particularly belongs to, so even if eavesdropping Side, which obtains index value q, will not cause the leakage of key information.Because there is a corresponding q in each section, then second is logical After letter side receives q, the sampled value sampled according to their own to stochastic variable is needed to speculate that first communication party becomes to random Quantized interval where the sampled value that amount sampling obtains.
S107, second communication party are sampled to obtain sampled value to the stochastic variable Y received, the sampled value with it is described First communication party is identical to the quantity of the sampled value of stochastic variable X;
Specifically, first is logical in order to which the sampled value for guaranteeing that first communication party and second communication party sample as far as possible is identical Letter side and second communication party sample obtained stochastic variable using identical method, specifically include according to identical week Phase carries out the sampling of same number to obtained stochastic variable.Therefore, it for second communication party, is adopted to what Y sample obtained Sample value, it is corresponding with the sampled value that first communication party samples X respectively, only since interchannel noise and hardware device are poor The size of different influence, sampled value may be different.
S108, second communication party subintervals location index q and the sampled value that obtains to Y sample according to what is received, point Corresponding with the sampled value of Y, each coded-bit of the sampled value of X is 0 conditional probability and each volume are not calculated The conditional probability that code bit is 1;
Specifically, it is stated that, for ease of description, first communication party is encoded to each section in step s 102 While, value is belonged to the sampled value of the X in this section, also thinks that it has a coding, and its coding and its location Between coding it is identical.Therefore, for the sampled value of each X, there is a coding, and the coding has multiple encoding ratios It is special.
In step S108, second communication party is according to the subinterval location index received and to the discrete sequence received The sampled value for arranging Y, is calculated corresponding with the sampled value of each Y, each coded-bit of the sampled value of each X is 0 Conditional probability and each coded-bit be 1 conditional probability.Specifically, second communication party is obtaining y to Y samplei, and Under conditions of the q for receiving first communication party transmission, thus it is speculated that with yiThe sampled value x of corresponding XiU bits after Gray code For the process of ' 0 ' conditional probability specifically:
The sampled value x of XiThe conditional probability that u bits after Gray code are ' 0 ' may be expressed as:
Again because q is that first communication party is sent to the value of second communication party by overt channel, for known quantity, and yiRelatively It is also known quantity for second communication party, so can be by q and yi, directly regard known quantity as and above formula derived, obtain X's Sampled value xiThe conditional probability that u bits after Gray code are ' 0 ' is expressed as:
Wherein, yiIt is the ith sample value of Y, xiIt is the ith sample value of X;It is expressed as sampled value xiGray code The section that u bits are ' 0 ' afterwards, luFor the serial number in the section, and 0≤lu≤M-1;LuIndicate amount all in X value range The section serial number set that u bits are ' 0 ' after change section Gray code, and 1≤u≤R.
F (x, y) is the joint probability density function of stochastic variable X and Y in formula:
Wherein, the mean value of X and Y is 0, σ1For the standard deviation of X, σ2For the standard deviation of Y, ρ is related coefficient.
Similarly, second communication party calculates the sampled value x of XiThe conditional probability table that u bits after Gray code are ' 0 ' It is shown as:
Wherein, yiIt is the ith sample value of Y, xiIt is the ith sample value of X;Indicate sampled value xiAfter Gray code The section that u bits are ' 1 ', kuFor the serial number and 0≤k in the sectionu≤M-1;KuIndicate quantization all in X value range The section serial number set that u bits are ' 1 ' after the Gray code of section, and 1≤u≤R.
Second communication party can calculate separately to obtain and each sample value y for sampling to Y according to above-mentioned formulai Each sample value x corresponding, that first communication party samples to Xi, each coded-bit be 0 conditional probability with And the conditional probability that each coded-bit is 1.
S109, second communication party are according to item corresponding with the sampled value of Y, that each coded-bit of the sampled value of X is 0 The conditional probability that part probability and each coded-bit are 1, calculates separately to obtain, each X corresponding with the sampled value of each Y Sampled value each coded-bit log-likelihood ratio, as quantization Soft Inform ation.
Specifically, second communication party calculate quantization Soft Inform ation essence be exactly calculate each coded-bit position of sampled value be 0 The log-likelihood ratio of conditional probability and the conditional probability for 1.
In step S108, second communication party has been calculated and each sample value y for sampling to YiRelatively It answers, each sample value x that first communication party samples to Xi, conditional probability that each coded-bit is 0 and every The conditional probability that a coded-bit is 1.Therefore in step S109, conditional probability that each coded-bit is 0 and every is calculated The ratio for the conditional probability that a coded-bit is 1, can be obtained the log-likelihood ratio of the coded-bit.Similarly, second communication party According to being calculated in S108 as a result, the quantization Soft Inform ation of each coded-bit of each sampled value of X can be calculated, Specific formula for calculation is as follows:
Wherein, Yi,uThe log-likelihood ratio of u bits, y after expression ith sample value Gray codeiIt is that i-th of Y is adopted Sample value, xiIt is the ith sample value of X.Indicate sampled value xiThe section that u bits are ' 0 ' after Gray code, luFor this The serial number and 0≤l in sectionu≤M-1;It is expressed as sampled value xiThe section that u bits are ' 1 ' after Gray code, kuFor The serial number and 0≤k in the sectionu≤M-1。LuU bits are after all quantized interval Gray codes in expression X value range ' 0 ' section serial number set, KuThe area that u bits are ' 1 ' after all quantized interval Gray codes in expression X value range Between serial number set, and 1≤u≤R.
S110, second communication party send the characterization quantization generated information of Soft Inform ation to first communication party;
After the completion of second communication party calculates quantization Soft Inform ation, characterization quantization Soft Inform ation is sent to first communication party and has been generated Information, inform first communication party can carry out follow-up processing flow.
After S111, first communication party carry out quantification treatment respectively to each sampled value of stochastic variable X, second is being received When the characterization quantization generated information of Soft Inform ation that communication party sends, the discrete series that quantization obtains are divided into the first discrete sequence Arrange X1With the second discrete series X2
Specifically, first communication party to stochastic variable X sampling after, to each sampled value carry out quantification treatment, obtain from Scattered Serial No..After obtaining discrete numerical sequences, after first communication party waits second communication party to complete quantization Soft Inform ation generation, Carry out follow-up processing flow.
Optionally, in implementation process of the embodiment of the present invention, can also be set for first communication party the waiting time, when first Communication party samples stochastic variable and quantifies after obtaining discrete series, draws again to the discrete series after waiting setting time Depending on the time required to dividing processing, the setting time that quantization Soft Inform ation is calculated according to the second communication party, guarantee in institute It states in the time, quantization Soft Inform ation can be calculated in second communication party.
After first communication party to quantifying respectively from the sampled value that stochastic variable X is sampled, discrete series X is obtained, When dividing to X, discrete series X is divided into the first discrete series of equal length by the method divided using equalization X1With the second discrete series X2
S112, first communication party are to the first discrete series X1Coded treatment is carried out, the first discrete series coding codeword is obtained
Although low density parity check code has preferable error-correcting performance, in long code length, encoder complexity compares Height, in order to keep coding simple, the embodiment of the present invention is used in the standard of the new-generation digital satellite broadcasting with linear complexity Low density parity check code coding.
S113, first communication party are by the first discrete series coding codewordWith the second discrete series X2It carries out Mould 2 plus calculation process, obtain the coding codeword C of the discrete series X;
If directly transmitting the first discrete series coding codewordMay the side's of being ravesdropping eavesdropping, lead to information-leakage. Therefore, first communication party is by the first discrete series coding codewordWith the second discrete series X2Mould 2 plus calculation process are carried out, is obtained To the coding codeword C of the discrete series X.
Coding codeword C is sent to second communication party by S114, first communication party;
S115, second communication party receive coding codeword C, by the quantization Soft Inform ation for all sampled values being calculatedIt draws It is divided into the first quantization Soft Inform ationWith the second quantization Soft Inform ation
It is the side divided according to equalization since first communication party is when the discrete series obtained to oneself quantization divide What formula divided, therefore, according to the rule made an appointment, for the quantization Soft Inform ation and first communication party for obtaining second communication party Obtained discrete series are corresponding, herein second communication party also by equalization divide in the way of, to the soft letter of the quantization being calculated Breath is divided, the quantization Soft Inform ation that will be calculatedIt is divided into the first quantization Soft Inform ationWith the second quantization Soft Inform ation
S116, second communication party are to the second quantization Soft Inform ationHard decision process is carried out, the second quantized sequences are obtained Y2
What the quantization Soft Inform ation that second communication party is calculated indicated is the conditional probability that a certain coded-bit of sampled value is 0 It is not real sequence symbol with the ratio of the conditional probability for 1, for convenient for obtaining the with receiving code word and carry out calculation process The information that one communication party sends, carries out hard decision process for quantization Soft Inform ation herein, and quantization Soft Inform ation is converted to symbol sebolic addressing. Specific hard decision formula is as follows:
By above formula as it can be seen that when quantifying Soft Inform ation is negative, illustrate that the probability that the coded-bit is 1 is greater than the probability for being 0, It therefore is 1 by coded-bit judgement;When Deng quantization Soft Inform ation being positive number, illustrating that probability that the coded-bit is 0 is greater than is 1 Probability, therefore be 0 by coded-bit judgement.The second obtained quantized sequences Y2Corresponding first communication party draws discrete series X The the second discrete series X got2
S117, first communication party are by the second quantized sequences Y2Mould 2 plus calculation process are carried out with the coding codeword C, Obtain the first coded sequence
First communication party is by the first discrete series coding codewordWith the second discrete series X2Carry out mould 2 plus operation Processing, obtains the coding codeword C of the discrete series X.Again since second communication party obtains in step S116 treatment process With the second discrete series X2Corresponding second quantized sequences Y2.Therefore, correspondingly, second communication party is with the second quantized sequences Y2With Coding codeword C carries out mould 2 plus calculation process to get arriving and the first discrete series coding codewordThere is the of certain error One coded sequenceIt is describedIt may be considered second communication party restores from the coding codeword C received first Discrete series coding codewordOnly there is certain errorTherefore it usesIt indicates.
S118, second communication party are to first coded sequenceSoft-decision processing is carried out, the second coded sequence is obtained
The first coded sequence that second communication party obtainsActually be equivalent to that second communication party obtains with X2With Y2Between error pattern X1Code word after coding.Second communication party needs the first coded sequenceIt is calculated with oneself First quantization Soft Inform ationInput decoder for decoding obtains correct X1Sequence, in order to meet decoder input data form Demand, need byIt is converted to log-likelihood ratio form.
The rule of quantization Soft Inform ation is calculated according to second communication party: being 1 when the conditional probability that a certain coded-bit is 0 is greater than Conditional probability (coded-bit judgement be 0) when, quantization Soft Inform ation is positive number;When the conditional probability that the coded-bit is 0 When less than conditional probability (coded-bit judgement be 1) for 1, quantization Soft Inform ation is negative.Therefore, second communication party is to institute State the first coded sequenceSoft-decision processing is carried out,In ' 0 ' be judged to ' 1 ', ' 1 ' and be judged to ' -1 ', obtain the second coding Sequence
S119, second communication party are by second coded sequenceWith the second quantization Soft Inform ationAbsolute valueCorresponding position multiplication processing is carried out, third coded sequence is obtained
As described in step S118, the first coded sequence that second communication party obtainsIt is logical to be actually equivalent to second What letter side obtained has X2And Y2Between error pattern X1Code word after coding.Due to X2And Y2It is not necessarily consistent, thereforeWithIt is also not necessarily identical,It isEstimated value, second communication party is not aware thatSo can only useTo replace. Second communication party is by second coded sequenceWith the second quantization Soft Inform ationAbsolute valueCarry out corresponding position Multiplication processing, is not changingUnder the premise of being judged to 1 or 0 value of likelihood ratio, obtainLog-likelihood ratio form Estimated value, carry out decoding use convenient for subsequent step.
S120, second communication party are by the third coded sequenceWith the first quantization Soft Inform ationComposition decoding letter Breath group, inputs belief propagation decoder, and decoding obtains discrete series;
Specifically, second communication party is by third coded sequenceIt is placed on original second and quantifies Soft Inform ationPosition, with first Quantify Soft Inform ationForm decoding information group.
In prior art, estimation is obtainedWithBetween the inconsistent rate p of bit, it is odd to generate low-density The preliminary log likelihood information of the BP decoding algorithm of even parity check code is different, and technical solution of the embodiment of the present invention obtains quantization Soft Inform ation, what is obtained is the log-likelihood ratio for coded-bit being judged to 0 with being judged to 1, (directly will without carrying out hard decision Coded-bit is judged to 1 or is judged to 0), then using quantization Soft Inform ation as the input of decoder, is equivalent to and original channel is protected to believe Mutual information (comentropy) between breath, as far as possible more reservation raw information entropys, do not utilize the initial inconsistent rate p's of raw information Estimated value generates the initial information of decoding, guarantees that Error Correction of Coding does not influence the performance of Error Correction of Coding because of the evaluated error of p, mentions Rise the error correcting capability of error correcting code.
The discrete series that S121, second communication party obtain decoding input hash algorithm, and the cryptographic Hash that will be calculated It is sent to first communication party;
Second communication party decodes after obtaining discrete series, also needs whether just further to verify the discrete series for decoding and obtaining Really, if correctly, illustrating the success of this key agreement.If incorrect, illustrate that this key agreement fails, need again Carry out key agreement.
Specifically, the discrete series that decoding obtains are issued first communication party by second communication party, tested by first communication party Whether the discrete series that card second communication party decodes are the discrete series of oneself transmission, to verify second communication party's decoding Whether obtained discrete series are correct.In order to avoid decoding the obtained discrete series side of being ravesdropping eavesdropping, second communication party will be translated The discrete series input hash algorithm that code obtains obtains cryptographic Hash, which is sent to first communication party.
S122, first communication party receive the cryptographic Hash that second communication party sends, and the first discrete series that division is obtained X1Cryptographic Hash is calculated in input hash algorithm, by the cryptographic Hash for comparing the cryptographic Hash that receives and itself calculating, judges the Whether the discrete series that two communication parties decode are correct, and judging result is sent to second communication party.
Specifically, if the Kazakhstan that the cryptographic Hash that first communication party comparison discovery second communication party sends is calculated with oneself Uncommon value is identical, then illustrates discrete series and the first discrete series X oneself divided that second communication party decodes1It is identical, this Secondary key is negotiated successfully;Conversely, then illustrating the discrete series and the first discrete sequence oneself divided that second communication party decodes Arrange X1Difference, the failure of this key agreement.
By the embodiments of the present invention as it can be seen that technical solution of the present invention by first communication party by the sampled value of stochastic variable Value interval carries out subinterval division, and the subinterval location index of each sampled value is sent to second communication party, and second is logical Letter root calculates the quantization Soft Inform ation of each sampled value according to the subinterval location index received, is used as and is set by the quantization Soft Inform ation Believe that the input of propagation decoding algorithm, decoding obtain discrete series.Entire scheme implementation does not utilize the initial inconsistent of raw information The estimated value of rate generates the initial information of decoding, but will more retain the quantization Soft Inform ation of raw information entropy as translating Code input, guarantee Error Correction of Coding not because raw information initially the evaluated error of inconsistent rate due to influence the performance of Error Correction of Coding, mention The ability of Error Correction of Coding is risen.
Fig. 3 is can be using the structural schematic diagram of the communication device for the cryptographic key negotiation method that the embodiments of the present invention propose. The communication device includes: receiving unit 301, transmission unit 302 and processing unit 303;
Wherein, the transmission unit 302, subinterval location index, discrete sequence for sending the processing unit 303 Column coding codeword and cryptographic Hash are sent to the communication device that key agreement is carried out with itself;
The receiving unit 301, the subinterval position that the communication device for receiving with itself carrying out key agreement is sent Index, coding codeword and cryptographic Hash, and it is sent to the processing unit 303;
The processing unit 303 connect with the receiving unit 301 and the transmission unit 302, for acquisition with Machine variable is sampled to obtain sampled value;The value interval of all sampled values is divided into the subinterval of setting quantity, is each Sampled value is respectively set subinterval location index and the subinterval location index of all sampled values is sent to the transmission unit 302;Quantification treatment is carried out to each sampled value of the stochastic variable respectively, obtains discrete series, to the discrete series into Row coded treatment obtains the coding codeword of the discrete series, and the discrete series coding codeword is sent to the transmission Unit 302;It is decoded according to the communication device that the judgement of the receiving unit 301 received cryptographic Hash carries out key agreement with itself Whether the discrete series arrived are correct;According to the received subinterval location index of the receiving unit 301 and itself obtain random Each sampled value of the stochastic variable obtained with the communication device for itself carrying out key agreement is calculated in the sampled value of variable Quantify Soft Inform ation;Decoding is calculated according to the quantization Soft Inform ation of all sampled values and the received coding codeword of the receiving unit Information group;It decodes to obtain discrete series according to the decoding information group, Hash is calculated according to the discrete series that decoding obtains Value, and the cryptographic Hash is sent to the transmission unit 302.
The specific works content of each unit of communication device shown in Fig. 3 refers to above-mentioned corresponding key agreement side The content of method embodiment, details are not described herein again.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of cryptographic key negotiation method, which is characterized in that it is applied to first communication party, this method comprises:
The stochastic variable of acquisition is sampled to obtain sampled value;
The value interval of all sampled values is divided into the subinterval of setting quantity, and subinterval is respectively set for each sampled value Location index;
The subinterval location index of all sampled values of the stochastic variable is sent to and carries out key agreement with first communication party Second communication party so that the second communication party generate quantization Soft Inform ation;
Quantification treatment is carried out to each sampled value of the stochastic variable respectively, obtains discrete series;
The discrete series are divided into the first discrete series and the second discrete series;
Coded treatment is carried out to first discrete series, obtains the first discrete series coding codeword;
The first discrete series coding codeword and second discrete series are subjected to mould 2 plus calculation process, obtain it is described from Dissipate the coding codeword of sequence;
The coding codeword of the discrete series is sent to the second communication party so that the second communication party decode to obtain from Dissipate sequence;
The cryptographic Hash that the second communication party sends is received, and judges that the second communication party decodes to obtain according to the cryptographic Hash Discrete series it is whether correct;The cryptographic Hash is calculated by the second communication party according to the discrete series that decoding obtains.
2. the method according to claim 1, wherein the value interval by all sampled values is divided into setting The subinterval of quantity, comprising:
Value interval etc. by all sampled values generally is divided into the section of the first setting quantity, and is each Interval Coding;
Respectively by each section in the section of the first setting quantity, the subinterval for being generally quantified as the second setting quantity is waited.
3. the method according to claim 1, wherein being carried out respectively in each sampled value to the stochastic variable Quantification treatment after obtaining discrete series, is carrying out coded treatment to the discrete series, is obtaining the coding of the discrete series Before code word, this method further include:
Receive the characterization quantization generated information of Soft Inform ation that the second communication party sends.
4. a kind of cryptographic key negotiation method, which is characterized in that it is applied to second communication party, this method comprises:
Receive the subinterval location index that the first communication party for carrying out key agreement with second communication party is sent;
According to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, it is calculated The quantization Soft Inform ation of each sampled value for the stochastic variable that the first communication party obtains;
Receive the coding codeword that the first communication party is sent;
By the quantization Soft Inform ation of all sampled values, the first quantization Soft Inform ation and the second quantization Soft Inform ation are divided into second amount Change Soft Inform ation and carry out hard decision process, obtains the second quantized sequences;
Second quantized sequences and the coding codeword are subjected to mould 2 plus calculation process, obtain the first coded sequence;
Soft-decision processing is carried out to first coded sequence, obtains the second coded sequence;
Second coded sequence is carried out corresponding position with the absolute value of the second quantization Soft Inform ation to be multiplied processing, obtains the Three coded sequences;
The third coded sequence and the first quantization Soft Inform ation are formed into decoding information group;
According to the decoding information group, decoding obtains discrete series;
Cryptographic Hash is calculated according to the discrete series, and the cryptographic Hash is sent to the first communication party.
5. according to the method described in claim 4, it is characterized in that, described according to the subinterval location index and described The sampled value for the stochastic variable that second communication party obtains is calculated each of the stochastic variable that the first communication party obtains and adopts The quantization Soft Inform ation of sample value, comprising:
According to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, calculate separately Obtain it is corresponding with each sampled value of stochastic variable that the second communication party obtains, the first communication party obtain with Each sampled value of machine variable, conditional probability that each coded-bit is 0 and the conditional probability for being 1;
Corresponding, the first communication party according to each sampled value of stochastic variable obtained with the second communication party Each sampled value of the stochastic variable of acquisition, conditional probability that each coded-bit is 0 and the conditional probability for being 1, respectively , the first communication party acquisition corresponding with each sampled value of stochastic variable that the second communication party obtains is calculated Stochastic variable each sampled value each coded-bit log-likelihood ratio, as quantization Soft Inform ation.
6. according to the method described in claim 4, it is characterized in that, according to the subinterval location index and described The each sampling for the stochastic variable that the first communication party obtains is calculated in the sampled value for the stochastic variable that two communication parties obtain After the quantization Soft Inform ation of value, this method further include:
The characterization quantization generated information of Soft Inform ation is sent to the first communication party.
7. a kind of communication device characterized by comprising
Receiving unit, transmission unit and processing unit;
Wherein, the transmission unit, subinterval location index, discrete series coding codeword for sending the processing unit And cryptographic Hash is sent to other communication devices that key agreement is carried out with the communication device;
The receiving unit, the subinterval sent for receiving the other communication devices for carrying out key agreement with the communication device Location index, coding codeword and cryptographic Hash, and it is sent to the processing unit;
The processing unit is connect with the receiving unit and the transmission unit, for sampling to the stochastic variable of acquisition Obtain sampled value;The value interval of all sampled values is divided into the subinterval of setting quantity, is respectively set for each sampled value The subinterval location index of all sampled values is simultaneously sent to the transmission unit by subinterval location index;To the stochastic variable Each sampled value carry out quantification treatment respectively, obtain discrete series, by the discrete series be divided into the first discrete series and Second discrete series;Coded treatment is carried out to first discrete series, obtains the first discrete series coding codeword;By described One discrete series coding codeword and second discrete series carry out mould 2 plus calculation process, obtain the coding of the discrete series Code word, and the discrete series coding codeword is sent to the transmission unit;According to the received cryptographic Hash of the receiving unit Whether the discrete series for judging that the other communication devices for carrying out key agreement with the communication device decode are correct;According to institute The sampled value for stating the received subinterval location index of receiving unit and the stochastic variable itself obtained, is calculated and the communication The quantization Soft Inform ation of each sampled value for the stochastic variable that other communication devices that device carries out key agreement obtain;It is adopted all The quantization Soft Inform ation of sample value is divided into the first quantization Soft Inform ation and the second quantization Soft Inform ation;To it is described second quantization Soft Inform ation into Row hard decision process obtains the second quantized sequences;Second quantized sequences and the coding codeword are carried out at mould 2 plus operation Reason, obtains the first coded sequence;Soft-decision processing is carried out to first coded sequence, obtains the second coded sequence;It will be described Second coded sequence carries out corresponding position with the absolute value of the second quantization Soft Inform ation and is multiplied processing, obtains third code sequence Column;The third coded sequence and the first quantization Soft Inform ation are formed into decoding information group;It is translated according to the decoding information group Code obtains discrete series, and cryptographic Hash is calculated according to the obtained discrete series of decoding, and the cryptographic Hash is sent to described Transmission unit.
8. communication device according to claim 7, which is characterized in that the processing unit is by the value area of all sampled values Between be divided into setting quantity subinterval when, be specifically used for:
Value interval etc. by all sampled values generally is divided into the section of the first setting quantity, and is each Interval Coding;
Respectively by each section in the section of the first setting quantity, the subinterval for being generally quantified as the second setting quantity is waited.
9. communication device according to claim 7, which is characterized in that the processing unit is received according to the receiving unit Subinterval location index and itself obtain stochastic variable sampled value, be calculated and the communication device carry out key association When the quantization Soft Inform ation of each sampled value for the stochastic variable that other communication devices of quotient obtain, it is specifically used for:
According to the received subinterval location index of the receiving unit and the sampled value of the stochastic variable itself obtained, respectively It is calculated corresponding with each sampled value of stochastic variable that itself is obtained, carries out key agreement with the communication device The each sampled value for the stochastic variable that other communication devices obtain, conditional probability that each coded-bit is 0 and the item for being 1 Part probability;
It is corresponding according to each sampled value of stochastic variable obtained with itself, key association is carried out with the communication device The each sampled value for the stochastic variable that other communication devices of quotient obtain, the conditional probability and be 1 that each coded-bit is 0 Conditional probability, calculate separately to obtain it is corresponding with each sampled value of stochastic variable that itself is obtained, it is described with it is described logical Pair of each coded-bit of each sampled value for the stochastic variable that other communication devices that T unit carries out key agreement obtain Number likelihood ratio, as quantization Soft Inform ation.
10. communication device according to claim 7, which is characterized in that the processing unit is also used to:
According to the received subinterval location index of the receiving unit and the sampled value of the stochastic variable itself obtained, it is calculated The soft letter of quantization of each sampled value for the stochastic variable that the other communication devices for carrying out key agreement with the communication device obtain After breath, characterization quantization is sent to the other communication devices for carrying out key agreement with the communication device by the transmission unit The generated information of Soft Inform ation;
Correspondingly, when the other communication devices for carrying out key agreement with the communication device quantify Soft Inform ation to characterization itself is sent When generated information, the processing unit is also used to: being received by the receiving unit and is carried out key with the communication device The characterization that the other communication devices negotiated are sent quantifies the generated information of Soft Inform ation.
CN201611111316.3A 2016-12-06 2016-12-06 A kind of cryptographic key negotiation method and communication device Active CN106656487B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611111316.3A CN106656487B (en) 2016-12-06 2016-12-06 A kind of cryptographic key negotiation method and communication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611111316.3A CN106656487B (en) 2016-12-06 2016-12-06 A kind of cryptographic key negotiation method and communication device

Publications (2)

Publication Number Publication Date
CN106656487A CN106656487A (en) 2017-05-10
CN106656487B true CN106656487B (en) 2019-08-30

Family

ID=58818429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611111316.3A Active CN106656487B (en) 2016-12-06 2016-12-06 A kind of cryptographic key negotiation method and communication device

Country Status (1)

Country Link
CN (1) CN106656487B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171795B (en) * 2017-06-27 2019-12-13 郑州信大先进技术研究院 Key agreement method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105024801A (en) * 2015-07-06 2015-11-04 国网山东寿光市供电公司 Quantum encryption communication method
CN105634508A (en) * 2015-12-21 2016-06-01 西安空间无线电技术研究所 Realization method of low complexity performance limit approximate Turbo decoder
CN106059758A (en) * 2016-07-08 2016-10-26 大连理工大学 Key generation method capable of ensuring security of wireless communication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120284785A1 (en) * 2011-05-05 2012-11-08 Motorola Mobility, Inc. Method for facilitating access to a first access nework of a wireless communication system, wireless communication device, and wireless communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105024801A (en) * 2015-07-06 2015-11-04 国网山东寿光市供电公司 Quantum encryption communication method
CN105634508A (en) * 2015-12-21 2016-06-01 西安空间无线电技术研究所 Realization method of low complexity performance limit approximate Turbo decoder
CN106059758A (en) * 2016-07-08 2016-10-26 大连理工大学 Key generation method capable of ensuring security of wireless communication

Also Published As

Publication number Publication date
CN106656487A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
US7941726B2 (en) Low dimensional spectral concentration codes and direct list decoding
EP1969760B1 (en) Method and system for generating a secret key from joint randomness
CN101998390B (en) Method and device for ensuring communication security
RU2367007C2 (en) Method of transmission and complex protection of information
CN103167490B (en) Wireless key distribution method, Apparatus and system
Zhan et al. On the using of discrete wavelet transform for physical layer key generation
CN111670543B (en) Multi-component encoding for signal shaping
CN106027230A (en) Method for carrying out Hamming error correction for error code in quantum secret key distribution postprocessing
CN111478885A (en) Asymmetric encryption and decryption method, equipment and storage medium
CN110351085B (en) Method and system for quantum key distribution post-processing
CN106656487B (en) A kind of cryptographic key negotiation method and communication device
KR20160120062A (en) Quantum signature apparatus for quantum message
WO2013000174A1 (en) Method for generating consistent cryptographic key based on wireless channel features
EP3906634A1 (en) Device and method for processing data of a quantum key distribution system
US20130132806A1 (en) Convolutional Turbo Code Decoding in Receiver With Iteration Termination Based on Predicted Non-Convergence
CN109698706B (en) Polarization code incoherent iterative detection method and device based on decision feedback
CN114362945B (en) Quantum secret sharing method based on entanglement exchange
KR20150142718A (en) Data transmission method and apparatus
US8230217B2 (en) Method and system for secure collaboration using slepian-wolf codes
CN109067501B (en) Polar code communication method and device based on degraded wiretap channel noise interference
CN111756541A (en) Method, server, terminal and system for transmitting secret key
CN108599912B (en) Method and device for generating pilot frequency pattern, electronic equipment and storage medium
RU2319199C2 (en) Universal method for transmitting information with controllable parameters
Fernando et al. Reed solomon codes for the reconciliation of wireless phy layer based secret keys
CN108696283A (en) The method and apparatus of data encoding and decoding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant