CN106656487B - A kind of cryptographic key negotiation method and communication device - Google Patents
A kind of cryptographic key negotiation method and communication device Download PDFInfo
- Publication number
- CN106656487B CN106656487B CN201611111316.3A CN201611111316A CN106656487B CN 106656487 B CN106656487 B CN 106656487B CN 201611111316 A CN201611111316 A CN 201611111316A CN 106656487 B CN106656487 B CN 106656487B
- Authority
- CN
- China
- Prior art keywords
- communication party
- discrete series
- sampled value
- stochastic variable
- subinterval
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
Abstract
The present invention proposes a kind of cryptographic key negotiation method, is applied to first communication party, comprising: sampled to obtain sampled value to the stochastic variable of acquisition;The value interval of all sampled values is divided into the subinterval of setting quantity;The subinterval location index of all sampled values is sent to second communication party, second communication party is made to generate quantization Soft Inform ation;Quantification treatment is carried out to each sampled value respectively, obtains discrete series;Discrete series are encoded to obtain coding codeword;Coding codeword is sent to second communication party, second communication party is made to decode to obtain discrete series;The cryptographic Hash that second communication party sends is received, and judges whether the discrete series that second communication party decodes are correct according to cryptographic Hash.The present invention uses quantization Soft Inform ation to input as decoding, more remain raw information entropy, it avoids that wrong log-likelihood ratio is calculated because of mistake is estimated to the inconsistent rate of the bit of initiation sequence, the log-likelihood ratio of mistake is used to influence error correction result as decoding input.
Description
Technical field
The present invention relates to safety communication technology field more particularly to a kind of cryptographic key negotiation methods and communication device.
Background technique
Carrying out encryption to information is the important method to ensure communication safety.In wireless communication procedure, communicating pair is to letter
Road carries out bi-directional probing, estimates the parameters such as amplitude, phase and time delay for receiving signal, then by channel quantitative, close
Key is negotiated and secrecy enhances to complete the generation of key.Due to information sender and receiving party's hardware device difference and
After the presence of interchannel noise, information sender and receiving party send information to other side respectively, information sender and information are connect
The discrete series that debit receives information and quantization obtains are not fully consistent.Receiving party just needs with information sender at this time
It is by the method for key agreement that discrete series are consensus.
In the prior art, the process that information sender and receiving party hold consultation are as follows: information sender will quantify
To discrete series carry out coded treatment after be sent to receiving party, after receiving party receives coding codeword, to reception
To coding codeword carry out relevant treatment and estimate that oneself obtained discrete series of quantization is handled with the coding codeword by receiving
Preliminary log likelihood ratio, Jin Erji is calculated according to the inconsistent rate that estimation obtains in the inconsistent rate of obtained discrete series
Calculation obtains final log-likelihood ratio, is translated using the discrete series that the log-likelihood comparison being finally calculated is handled
Code, obtains correct discrete series.In above-mentioned negotiations process, if the inconsistent rate that receiving party estimates is inaccurate
Really, it will the discrete series for causing receiving party to decode and the discrete series that information sender is sent are more inconsistent.
Summary of the invention
Defect and deficiency based on the above-mentioned prior art, the present invention propose a kind of cryptographic key negotiation method and communication device, institute
When stating communication device and carrying out key agreement, initially inconsistent rate generates decoding algorithm to the discrete series for not utilizing estimation to obtain
Initial information avoids influencing key agreement performance because of initial inconsistent rate estimation inaccuracy.
First aspect present invention provides a kind of cryptographic key negotiation method, applied to the first communication party of key agreement, the party
Method to the stochastic variable of acquisition the following steps are included: sampled to obtain sampled value;The value interval of all sampled values is divided
For the subinterval for setting quantity, and subinterval location index is respectively set for each sampled value;By all of the stochastic variable
The subinterval location index of sampled value is sent to the second communication party that key agreement is carried out with first communication party, so that described second
Communication party generates quantization Soft Inform ation;Quantification treatment is carried out to each sampled value of the stochastic variable respectively, obtains discrete series;
Coded treatment is carried out to the discrete series, obtains the coding codeword of the discrete series;By the coding code of the discrete series
Word is sent to the second communication party, so that the second communication party decodes to obtain discrete series;Receive the second communication party
The cryptographic Hash of transmission, and judge whether the discrete series that the second communication party decodes are correct according to the cryptographic Hash;Institute
It states cryptographic Hash and is calculated by the second communication party according to the discrete series that decoding obtains.In above-mentioned cipher key agreement process,
The subinterval location index of each sampled value is sent to second communication party by first communication party, on the one hand more convenient for second communication party
Subinterval where accurately confirming each sampled value reduces second communication party to the uncertainty of first communication party sampled value.Separately
On the one hand, the soft letter of first communication party sampled value quantization is calculated according to the subinterval location index received in second communication party
Breath, using the quantization Soft Inform ation as the preliminary log likelihood information of decoding algorithm, more remains raw information entropy, gets rid of
In the prior art because decoding inaccurate predicament caused by estimating inconsistent rate inaccuracy.
Second aspect of the present invention provides another cryptographic key negotiation method, should applied to the second communication party of key agreement
Method is the following steps are included: receive the subinterval position rope that the first communication party for carrying out key agreement with second communication party is sent
Draw;According to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, institute is calculated
State the quantization Soft Inform ation of each sampled value of the stochastic variable of first communication party acquisition;Receive the volume that the first communication party is sent
Code code word;According to the quantization Soft Inform ation and the coding codeword of all sampled values, decoding information group is calculated;It is translated according to described
Code information group, decoding obtain discrete series;Cryptographic Hash is calculated according to the discrete series, and the cryptographic Hash is sent to
The first communication party.In above-mentioned cipher key agreement process, second communication party is sub according to each sampled value that first communication party is sent
The quantization Soft Inform ation of each sampled value is calculated in section location index, using the quantization Soft Inform ation as the initial right of decoding algorithm
Number likelihood information, protects the comentropy between original channel information, makes to decode more acurrate.
Third aspect present invention provides a kind of communication device, comprising: receiving unit, transmission unit and processing unit;Its
In, the transmission unit, subinterval location index, discrete series coding codeword and Hash for sending the processing unit
Value is sent to the communication device that key agreement is carried out with itself;The receiving unit carries out key agreement with itself for receiving
Communication device the subinterval location index, coding codeword and the cryptographic Hash that send, and be sent to the processing unit;The processing
Unit is connect with the receiving unit and the transmission unit, for being sampled to obtain sampled value to the stochastic variable of acquisition;
The value interval of all sampled values is divided into the subinterval of setting quantity, subinterval position rope is respectively set for each sampled value
Draw and the subinterval location index of all sampled values is sent to the transmission unit;To each sampled value of the stochastic variable
Quantification treatment is carried out respectively, obtains discrete series, and coded treatment is carried out to the discrete series, obtains the volume of the discrete series
Code code word, and the discrete series coding codeword is sent to the transmission unit;According to the received Hash of the receiving unit
Whether the discrete series that value judgement is decoded with the communication device for itself carrying out key agreement are correct;According to the receiving unit
The sampled value of received subinterval location index and the stochastic variable itself obtained is calculated and carries out key agreement with itself
The quantization Soft Inform ation of each sampled value for the stochastic variable that communication device obtains;According to the quantization Soft Inform ation of all sampled values and institute
It states the received coding codeword of receiving unit and decoding information group is calculated;It decodes to obtain discrete sequence according to the decoding information group
Column are calculated cryptographic Hash according to the discrete series that decoding obtains, and the cryptographic Hash are sent to the transmission unit.
In one implementation, the value interval by all sampled values is divided into the subinterval of setting quantity, packet
It includes: value interval of all sampled values etc. generally is divided into the section of the first setting quantity, and be each Interval Coding;Respectively
By each section in the section of the first setting quantity, the subinterval for being generally quantified as the second setting quantity is waited.At above-mentioned stroke
During point, after the value interval of all sampled values to be divided into the section of the first setting quantity, due to channel estimation errors
Presence, will increase the bit error rate of both sides' quantization bit close to the sampled value of quantization boundary, each quantified area again at this time
Between the equal subinterval for being generally quantified as the second setting quantity, in this way for each sampled value, position ownership in more detail, reduces mistake
Bit rate.
In one implementation, described that coded treatment is carried out to the discrete series, obtain the volume of the discrete series
Code code word, comprising: the discrete series are divided into the first discrete series and the second discrete series;To first discrete series
Coded treatment is carried out, the first discrete series coding codeword is obtained;By the first discrete series coding codeword with described second from
It dissipates sequence and carries out mould 2 plus calculation process, obtain the coding codeword of the discrete series.It is above-mentioned that first discrete series are encoded into code
Word and second discrete series carry out mould 2 plus calculation process, can prevent from sending the first discrete series coding codeword
When, the side's of being ravesdropping eavesdropping.
In one implementation, carry out quantification treatment respectively in each sampled value to the stochastic variable, obtain from
After dissipating sequence, coded treatment, before obtaining the coding codeword of the discrete series, this method are being carried out to the discrete series
Further include: receive the characterization quantization generated information of Soft Inform ation that the second communication party sends.
In one implementation, described to be obtained according to the subinterval location index and the second communication party
The soft letter of quantization of each sampled value for the stochastic variable that the first communication party obtains is calculated in the sampled value of stochastic variable
Breath, comprising: according to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, respectively
, the first communication party acquisition corresponding with each sampled value of stochastic variable that the second communication party obtains is calculated
Stochastic variable each sampled value, conditional probability that each coded-bit is 0 and the conditional probability for being 1;According to described
Random change corresponding with each sampled value of stochastic variable that the second communication party obtains, that the first communication party obtains
Each sampled value of amount, conditional probability that each coded-bit is 0 and the conditional probability for being 1, calculate separately to obtain and institute
The each sampled value for stating the stochastic variable of second communication party's acquisition is corresponding, the stochastic variable that the first communication party obtains
The log-likelihood ratio of each coded-bit of each sampled value, as quantization Soft Inform ation.
In one implementation, the quantization Soft Inform ation and the coding codeword according to all sampled values, calculates
To decoding information group, comprising: by the quantization Soft Inform ation of all sampled values, be divided into the first quantization Soft Inform ation and the second soft letter of quantization
Breath;Hard decision process is carried out to the second quantization Soft Inform ation, obtains the second quantized sequences;By second quantized sequences and institute
It states coding codeword and carries out mould 2 plus calculation process, obtain the first coded sequence;First coded sequence is carried out at soft-decision
Reason, obtains the second coded sequence;Second coded sequence is subjected to corresponding position with the absolute value of the second quantization Soft Inform ation
Multiplication processing is set, third coded sequence is obtained;By the third coded sequence and the first quantization Soft Inform ation composition decoding letter
Breath group.It is inconsistent to can be seen that the bits of original that second communication party does not obtain according to estimation in the present invention from above-mentioned treatment process
Preliminary log likelihood ratio information is calculated in rate, and then log-likelihood ratio is calculated, and the log-likelihood being calculated is compared to
For the input of decoding algorithm, but use quantization Soft Inform ation as decoder input, more remain original channel information it
Between comentropy, avoid due to estimation bits of original inconsistent rate inaccuracy and lead to decoding inaccuracy, improve decoding and entangle
Wrong performance.
In one implementation, according to the subinterval location index and the second communication party acquisition with
The sampled value of machine variable, be calculated each sampled value for the stochastic variable that the first communication party obtains quantization Soft Inform ation it
Afterwards, this method further include: Xiang Suoshu first communication party sends the characterization quantization generated information of Soft Inform ation.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of cryptographic key negotiation method provided in an embodiment of the present invention;
Fig. 2 is channel adjustment quantization algorithm schematic diagram provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of communication device provided in an embodiment of the present invention.
Specific embodiment
Information encryption is the important method to ensure communication safety, and existing encryption and decryption technique is all to be used without stringent card
The complexity of bright difficult math question and calculating increases the calculation amount that password is cracked, so that communications security is improved, but not
It can guarantee unconditional safety.With the high speed development of mathematics and quantum computer, the communications security under traditional system faces
Acid test.Because wireless channel has the characteristics that time variation, space-variant and reciprocity, the key based on wireless channel generation
Characteristic with " one-time pad " perfect password that Shannon proposes, is not easy to be cracked, can ensure communication safety to a greater extent,
Therefore it is used more and more.
In the secret signalling encrypted based on wireless channel key, legitimate correspondence both sides complete pair within coherence time
Then the bi-directional probing of channel is estimated the special parameters such as amplitude, phase and the time delay for receiving signal, last channel amount
Change, key agreement and secrecy enhance to complete the generation of key.Due to the difference of information sender and receiving party's hardware device
After the presence of noise in other and channel, information sender and receiving party send information to other side respectively, information sender
It receives information respectively with receiving party and to quantify obtained stochastic variable not fully consistent, just need communicating pair logical at this time
Cross key agreement respective stochastic variable is consensus.
The present invention proposes a kind of cryptographic key negotiation method and communication device, enable communicating pair by it is each it is de-quantization obtain with
Machine variable is consensus.
Below in conjunction with attached drawing, technical solution of the present invention is clearly and completely described, it is clear that this described hair
The embodiment of bright technical solution is only a part of the embodiment of technical solution of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, the embodiment of the present invention propose cryptographic key negotiation method the following steps are included:
S101, first communication party are sampled to obtain sampled value to the stochastic variable X of acquisition;
Before communicating pair carries out key agreement, it is stronger that communicating pair has obtained two correlations respectively, and obeys
The stochastic variable of identical probability distribution.Specifically, first communication party sends an information, second communication party to second communication party
The information is received, a stochastic variable is obtained;Likewise, second communication party sends an identical information to first communication party,
First communication party receives the information, obtains a stochastic variable.Due to the difference of first communication party and second communication party's hardware device
Different and interchannel noise presence, first communication party and second communication party are directed to the stochastic variable phase that same information quantization obtains
Closing property is relatively strong and obeys identical probability distribution, but is not identical.
Assuming that first communication party Alice sends information S, Bob a reception S to second communication party Bob, stochastic variable is obtained
Y;Then Bob sends information S to Alice, and Alice receives S, obtains stochastic variable X.The X and Y is to be used to generate key
Initial information source, and X and Y correlation is relatively strong and obeys identical probability distribution.
Value interval of the stochastic variable X itself obtained etc. generally is divided into M section by S102, first communication party, and is
Each Interval Coding;
Channel adjustment quantization algorithm schematic diagram shown in Figure 2, first communication party is by the stochastic variable X's itself obtained
Value interval etc. generally is divided into M section, then the quantizing bit number R=log of each sampled value2M.Next, the first communication
Side encodes M section respectively, specifically, in embodiments of the present invention, using Gray code to each Interval Coding, example
As shown in Figure 2, the value interval of X is divided into four sections by Alice, and each interval quantization bit is 2 bits, then each section
Coding is respectively 00,01,11,10.
It should be noted that the embodiment of the present invention is for ease of description, while being encoded to each section, will take
Value belongs to the sampled value in this section, also thinks that it has a coding, and its coding is identical as the coding in section where it.?
That is value belongs to the sampled value in a certain section, all there is coding identical with the Interval Coding, it is only each in the section
Sampled value is different the location of in the section.
Each value interval of X generally is divided into N number of subinterval respectively etc. by S103, first communication party;
Due to the presence of channel estimation errors, the errored bit of both sides' quantization bit will increase close to the sampled value of quantization boundary
Rate, in order to reduce bit error rate, each quantized interval etc. is generally quantified as N number of subinterval again by first communication party, and determines it
Subinterval position where sampled value.
Such as shown in Fig. 2, if the bit number of each sampled value quantization is R, and Gray code is used, then quantized interval number
It is 2R, then each section etc. is generally quantified as N number of minizone, then first communication party receives the value interval of signal X by equal general point
It is 2R* N number of subinterval, subinterval boundary are respectivelyAnd
ai=F-1(i/(2R*N))
WhereinFor inverse scores accumulated function.
The boundary that each minizone is determined according to above-mentioned formula carries out each section according to the boundary of each minizone
Minizone etc. generally divides.
S104, first communication party confirmation X each sampled value where subinterval, and by subinterval where the sampled value
Number be set as the subinterval location index of the sampled value;
Specifically, the value interval of X is divided into M section by first communication party, and each section is further distinguished
Be divided into N number of subinterval, it is therefore an objective to more accurately determine the subinterval where each sampled value, in order to second communication party according to
Subinterval where sampled value calculates sampled value and quantifies Soft Inform ation.
As shown in Fig. 2, Alice first value interval of X etc. it is general be divided into 4 sections (i.e. M=4), and use Gray
Coding, being separately encoded is 00,01,11,10, then carries out equal general quantization to each section again, and the subinterval number of quantization is N=
2, then total quantization subinterval number is 4*2=8.Then location index q of the Alice the subinterval where his each sampled value
It is sent to Bob.
When Bob calculates Alice to the sampled value x of its stochastic variableiFirst bit (from left to right) after coding
When log-likelihood ratio, i.e. quantization Soft Inform ation, it is assumed that Bob receives q, and when q is equal to 1, just speculating xiFirst ratio after coding
First subinterval of A and B is accurate to by two sections A and B specially for 0 possible probability interval, to make Bob to sampled value
xiUncertain reduce.
The location index q in the subinterval where each sampled value of X is sent to second communication party by S105, first communication party;
In fact, due to the sampled value of X have it is multiple, first communication party is by the subinterval where each sampled value
Location index q constitutes sequence and is sent to second communication party, subinterval where a sampled value of each element representation X in sequence
Location index, each element is arranged according to sequencing corresponding with sampled value sequencing in sequence.
S106, second communication party receive the subinterval location index q that first communication party is sent;
Specifically, when first communication party sends q, although eavesdropping side may also obtain q, since eavesdropping side is logical with second
Stochastic variable acquired in letter side is different, therefore eavesdropping side is not aware which quantized interval q particularly belongs to, so even if eavesdropping
Side, which obtains index value q, will not cause the leakage of key information.Because there is a corresponding q in each section, then second is logical
After letter side receives q, the sampled value sampled according to their own to stochastic variable is needed to speculate that first communication party becomes to random
Quantized interval where the sampled value that amount sampling obtains.
S107, second communication party are sampled to obtain sampled value to the stochastic variable Y received, the sampled value with it is described
First communication party is identical to the quantity of the sampled value of stochastic variable X;
Specifically, first is logical in order to which the sampled value for guaranteeing that first communication party and second communication party sample as far as possible is identical
Letter side and second communication party sample obtained stochastic variable using identical method, specifically include according to identical week
Phase carries out the sampling of same number to obtained stochastic variable.Therefore, it for second communication party, is adopted to what Y sample obtained
Sample value, it is corresponding with the sampled value that first communication party samples X respectively, only since interchannel noise and hardware device are poor
The size of different influence, sampled value may be different.
S108, second communication party subintervals location index q and the sampled value that obtains to Y sample according to what is received, point
Corresponding with the sampled value of Y, each coded-bit of the sampled value of X is 0 conditional probability and each volume are not calculated
The conditional probability that code bit is 1;
Specifically, it is stated that, for ease of description, first communication party is encoded to each section in step s 102
While, value is belonged to the sampled value of the X in this section, also thinks that it has a coding, and its coding and its location
Between coding it is identical.Therefore, for the sampled value of each X, there is a coding, and the coding has multiple encoding ratios
It is special.
In step S108, second communication party is according to the subinterval location index received and to the discrete sequence received
The sampled value for arranging Y, is calculated corresponding with the sampled value of each Y, each coded-bit of the sampled value of each X is 0
Conditional probability and each coded-bit be 1 conditional probability.Specifically, second communication party is obtaining y to Y samplei, and
Under conditions of the q for receiving first communication party transmission, thus it is speculated that with yiThe sampled value x of corresponding XiU bits after Gray code
For the process of ' 0 ' conditional probability specifically:
The sampled value x of XiThe conditional probability that u bits after Gray code are ' 0 ' may be expressed as:
Again because q is that first communication party is sent to the value of second communication party by overt channel, for known quantity, and yiRelatively
It is also known quantity for second communication party, so can be by q and yi, directly regard known quantity as and above formula derived, obtain X's
Sampled value xiThe conditional probability that u bits after Gray code are ' 0 ' is expressed as:
Wherein, yiIt is the ith sample value of Y, xiIt is the ith sample value of X;It is expressed as sampled value xiGray code
The section that u bits are ' 0 ' afterwards, luFor the serial number in the section, and 0≤lu≤M-1;LuIndicate amount all in X value range
The section serial number set that u bits are ' 0 ' after change section Gray code, and 1≤u≤R.
F (x, y) is the joint probability density function of stochastic variable X and Y in formula:
Wherein, the mean value of X and Y is 0, σ1For the standard deviation of X, σ2For the standard deviation of Y, ρ is related coefficient.
Similarly, second communication party calculates the sampled value x of XiThe conditional probability table that u bits after Gray code are ' 0 '
It is shown as:
Wherein, yiIt is the ith sample value of Y, xiIt is the ith sample value of X;Indicate sampled value xiAfter Gray code
The section that u bits are ' 1 ', kuFor the serial number and 0≤k in the sectionu≤M-1;KuIndicate quantization all in X value range
The section serial number set that u bits are ' 1 ' after the Gray code of section, and 1≤u≤R.
Second communication party can calculate separately to obtain and each sample value y for sampling to Y according to above-mentioned formulai
Each sample value x corresponding, that first communication party samples to Xi, each coded-bit be 0 conditional probability with
And the conditional probability that each coded-bit is 1.
S109, second communication party are according to item corresponding with the sampled value of Y, that each coded-bit of the sampled value of X is 0
The conditional probability that part probability and each coded-bit are 1, calculates separately to obtain, each X corresponding with the sampled value of each Y
Sampled value each coded-bit log-likelihood ratio, as quantization Soft Inform ation.
Specifically, second communication party calculate quantization Soft Inform ation essence be exactly calculate each coded-bit position of sampled value be 0
The log-likelihood ratio of conditional probability and the conditional probability for 1.
In step S108, second communication party has been calculated and each sample value y for sampling to YiRelatively
It answers, each sample value x that first communication party samples to Xi, conditional probability that each coded-bit is 0 and every
The conditional probability that a coded-bit is 1.Therefore in step S109, conditional probability that each coded-bit is 0 and every is calculated
The ratio for the conditional probability that a coded-bit is 1, can be obtained the log-likelihood ratio of the coded-bit.Similarly, second communication party
According to being calculated in S108 as a result, the quantization Soft Inform ation of each coded-bit of each sampled value of X can be calculated,
Specific formula for calculation is as follows:
Wherein, Yi,uThe log-likelihood ratio of u bits, y after expression ith sample value Gray codeiIt is that i-th of Y is adopted
Sample value, xiIt is the ith sample value of X.Indicate sampled value xiThe section that u bits are ' 0 ' after Gray code, luFor this
The serial number and 0≤l in sectionu≤M-1;It is expressed as sampled value xiThe section that u bits are ' 1 ' after Gray code, kuFor
The serial number and 0≤k in the sectionu≤M-1。LuU bits are after all quantized interval Gray codes in expression X value range
' 0 ' section serial number set, KuThe area that u bits are ' 1 ' after all quantized interval Gray codes in expression X value range
Between serial number set, and 1≤u≤R.
S110, second communication party send the characterization quantization generated information of Soft Inform ation to first communication party;
After the completion of second communication party calculates quantization Soft Inform ation, characterization quantization Soft Inform ation is sent to first communication party and has been generated
Information, inform first communication party can carry out follow-up processing flow.
After S111, first communication party carry out quantification treatment respectively to each sampled value of stochastic variable X, second is being received
When the characterization quantization generated information of Soft Inform ation that communication party sends, the discrete series that quantization obtains are divided into the first discrete sequence
Arrange X1With the second discrete series X2;
Specifically, first communication party to stochastic variable X sampling after, to each sampled value carry out quantification treatment, obtain from
Scattered Serial No..After obtaining discrete numerical sequences, after first communication party waits second communication party to complete quantization Soft Inform ation generation,
Carry out follow-up processing flow.
Optionally, in implementation process of the embodiment of the present invention, can also be set for first communication party the waiting time, when first
Communication party samples stochastic variable and quantifies after obtaining discrete series, draws again to the discrete series after waiting setting time
Depending on the time required to dividing processing, the setting time that quantization Soft Inform ation is calculated according to the second communication party, guarantee in institute
It states in the time, quantization Soft Inform ation can be calculated in second communication party.
After first communication party to quantifying respectively from the sampled value that stochastic variable X is sampled, discrete series X is obtained,
When dividing to X, discrete series X is divided into the first discrete series of equal length by the method divided using equalization
X1With the second discrete series X2。
S112, first communication party are to the first discrete series X1Coded treatment is carried out, the first discrete series coding codeword is obtained
Although low density parity check code has preferable error-correcting performance, in long code length, encoder complexity compares
Height, in order to keep coding simple, the embodiment of the present invention is used in the standard of the new-generation digital satellite broadcasting with linear complexity
Low density parity check code coding.
S113, first communication party are by the first discrete series coding codewordWith the second discrete series X2It carries out
Mould 2 plus calculation process, obtain the coding codeword C of the discrete series X;
If directly transmitting the first discrete series coding codewordMay the side's of being ravesdropping eavesdropping, lead to information-leakage.
Therefore, first communication party is by the first discrete series coding codewordWith the second discrete series X2Mould 2 plus calculation process are carried out, is obtained
To the coding codeword C of the discrete series X.
Coding codeword C is sent to second communication party by S114, first communication party;
S115, second communication party receive coding codeword C, by the quantization Soft Inform ation for all sampled values being calculatedIt draws
It is divided into the first quantization Soft Inform ationWith the second quantization Soft Inform ation
It is the side divided according to equalization since first communication party is when the discrete series obtained to oneself quantization divide
What formula divided, therefore, according to the rule made an appointment, for the quantization Soft Inform ation and first communication party for obtaining second communication party
Obtained discrete series are corresponding, herein second communication party also by equalization divide in the way of, to the soft letter of the quantization being calculated
Breath is divided, the quantization Soft Inform ation that will be calculatedIt is divided into the first quantization Soft Inform ationWith the second quantization Soft Inform ation
S116, second communication party are to the second quantization Soft Inform ationHard decision process is carried out, the second quantized sequences are obtained
Y2;
What the quantization Soft Inform ation that second communication party is calculated indicated is the conditional probability that a certain coded-bit of sampled value is 0
It is not real sequence symbol with the ratio of the conditional probability for 1, for convenient for obtaining the with receiving code word and carry out calculation process
The information that one communication party sends, carries out hard decision process for quantization Soft Inform ation herein, and quantization Soft Inform ation is converted to symbol sebolic addressing.
Specific hard decision formula is as follows:
By above formula as it can be seen that when quantifying Soft Inform ation is negative, illustrate that the probability that the coded-bit is 1 is greater than the probability for being 0,
It therefore is 1 by coded-bit judgement;When Deng quantization Soft Inform ation being positive number, illustrating that probability that the coded-bit is 0 is greater than is 1
Probability, therefore be 0 by coded-bit judgement.The second obtained quantized sequences Y2Corresponding first communication party draws discrete series X
The the second discrete series X got2。
S117, first communication party are by the second quantized sequences Y2Mould 2 plus calculation process are carried out with the coding codeword C,
Obtain the first coded sequence
First communication party is by the first discrete series coding codewordWith the second discrete series X2Carry out mould 2 plus operation
Processing, obtains the coding codeword C of the discrete series X.Again since second communication party obtains in step S116 treatment process
With the second discrete series X2Corresponding second quantized sequences Y2.Therefore, correspondingly, second communication party is with the second quantized sequences Y2With
Coding codeword C carries out mould 2 plus calculation process to get arriving and the first discrete series coding codewordThere is the of certain error
One coded sequenceIt is describedIt may be considered second communication party restores from the coding codeword C received first
Discrete series coding codewordOnly there is certain errorTherefore it usesIt indicates.
S118, second communication party are to first coded sequenceSoft-decision processing is carried out, the second coded sequence is obtained
The first coded sequence that second communication party obtainsActually be equivalent to that second communication party obtains with X2With
Y2Between error pattern X1Code word after coding.Second communication party needs the first coded sequenceIt is calculated with oneself
First quantization Soft Inform ationInput decoder for decoding obtains correct X1Sequence, in order to meet decoder input data form
Demand, need byIt is converted to log-likelihood ratio form.
The rule of quantization Soft Inform ation is calculated according to second communication party: being 1 when the conditional probability that a certain coded-bit is 0 is greater than
Conditional probability (coded-bit judgement be 0) when, quantization Soft Inform ation is positive number;When the conditional probability that the coded-bit is 0
When less than conditional probability (coded-bit judgement be 1) for 1, quantization Soft Inform ation is negative.Therefore, second communication party is to institute
State the first coded sequenceSoft-decision processing is carried out,In ' 0 ' be judged to ' 1 ', ' 1 ' and be judged to ' -1 ', obtain the second coding
Sequence
S119, second communication party are by second coded sequenceWith the second quantization Soft Inform ationAbsolute valueCorresponding position multiplication processing is carried out, third coded sequence is obtained
As described in step S118, the first coded sequence that second communication party obtainsIt is logical to be actually equivalent to second
What letter side obtained has X2And Y2Between error pattern X1Code word after coding.Due to X2And Y2It is not necessarily consistent, thereforeWithIt is also not necessarily identical,It isEstimated value, second communication party is not aware thatSo can only useTo replace.
Second communication party is by second coded sequenceWith the second quantization Soft Inform ationAbsolute valueCarry out corresponding position
Multiplication processing, is not changingUnder the premise of being judged to 1 or 0 value of likelihood ratio, obtainLog-likelihood ratio form
Estimated value, carry out decoding use convenient for subsequent step.
S120, second communication party are by the third coded sequenceWith the first quantization Soft Inform ationComposition decoding letter
Breath group, inputs belief propagation decoder, and decoding obtains discrete series;
Specifically, second communication party is by third coded sequenceIt is placed on original second and quantifies Soft Inform ationPosition, with first
Quantify Soft Inform ationForm decoding information group.
In prior art, estimation is obtainedWithBetween the inconsistent rate p of bit, it is odd to generate low-density
The preliminary log likelihood information of the BP decoding algorithm of even parity check code is different, and technical solution of the embodiment of the present invention obtains quantization
Soft Inform ation, what is obtained is the log-likelihood ratio for coded-bit being judged to 0 with being judged to 1, (directly will without carrying out hard decision
Coded-bit is judged to 1 or is judged to 0), then using quantization Soft Inform ation as the input of decoder, is equivalent to and original channel is protected to believe
Mutual information (comentropy) between breath, as far as possible more reservation raw information entropys, do not utilize the initial inconsistent rate p's of raw information
Estimated value generates the initial information of decoding, guarantees that Error Correction of Coding does not influence the performance of Error Correction of Coding because of the evaluated error of p, mentions
Rise the error correcting capability of error correcting code.
The discrete series that S121, second communication party obtain decoding input hash algorithm, and the cryptographic Hash that will be calculated
It is sent to first communication party;
Second communication party decodes after obtaining discrete series, also needs whether just further to verify the discrete series for decoding and obtaining
Really, if correctly, illustrating the success of this key agreement.If incorrect, illustrate that this key agreement fails, need again
Carry out key agreement.
Specifically, the discrete series that decoding obtains are issued first communication party by second communication party, tested by first communication party
Whether the discrete series that card second communication party decodes are the discrete series of oneself transmission, to verify second communication party's decoding
Whether obtained discrete series are correct.In order to avoid decoding the obtained discrete series side of being ravesdropping eavesdropping, second communication party will be translated
The discrete series input hash algorithm that code obtains obtains cryptographic Hash, which is sent to first communication party.
S122, first communication party receive the cryptographic Hash that second communication party sends, and the first discrete series that division is obtained
X1Cryptographic Hash is calculated in input hash algorithm, by the cryptographic Hash for comparing the cryptographic Hash that receives and itself calculating, judges the
Whether the discrete series that two communication parties decode are correct, and judging result is sent to second communication party.
Specifically, if the Kazakhstan that the cryptographic Hash that first communication party comparison discovery second communication party sends is calculated with oneself
Uncommon value is identical, then illustrates discrete series and the first discrete series X oneself divided that second communication party decodes1It is identical, this
Secondary key is negotiated successfully;Conversely, then illustrating the discrete series and the first discrete sequence oneself divided that second communication party decodes
Arrange X1Difference, the failure of this key agreement.
By the embodiments of the present invention as it can be seen that technical solution of the present invention by first communication party by the sampled value of stochastic variable
Value interval carries out subinterval division, and the subinterval location index of each sampled value is sent to second communication party, and second is logical
Letter root calculates the quantization Soft Inform ation of each sampled value according to the subinterval location index received, is used as and is set by the quantization Soft Inform ation
Believe that the input of propagation decoding algorithm, decoding obtain discrete series.Entire scheme implementation does not utilize the initial inconsistent of raw information
The estimated value of rate generates the initial information of decoding, but will more retain the quantization Soft Inform ation of raw information entropy as translating
Code input, guarantee Error Correction of Coding not because raw information initially the evaluated error of inconsistent rate due to influence the performance of Error Correction of Coding, mention
The ability of Error Correction of Coding is risen.
Fig. 3 is can be using the structural schematic diagram of the communication device for the cryptographic key negotiation method that the embodiments of the present invention propose.
The communication device includes: receiving unit 301, transmission unit 302 and processing unit 303;
Wherein, the transmission unit 302, subinterval location index, discrete sequence for sending the processing unit 303
Column coding codeword and cryptographic Hash are sent to the communication device that key agreement is carried out with itself;
The receiving unit 301, the subinterval position that the communication device for receiving with itself carrying out key agreement is sent
Index, coding codeword and cryptographic Hash, and it is sent to the processing unit 303;
The processing unit 303 connect with the receiving unit 301 and the transmission unit 302, for acquisition with
Machine variable is sampled to obtain sampled value;The value interval of all sampled values is divided into the subinterval of setting quantity, is each
Sampled value is respectively set subinterval location index and the subinterval location index of all sampled values is sent to the transmission unit
302;Quantification treatment is carried out to each sampled value of the stochastic variable respectively, obtains discrete series, to the discrete series into
Row coded treatment obtains the coding codeword of the discrete series, and the discrete series coding codeword is sent to the transmission
Unit 302;It is decoded according to the communication device that the judgement of the receiving unit 301 received cryptographic Hash carries out key agreement with itself
Whether the discrete series arrived are correct;According to the received subinterval location index of the receiving unit 301 and itself obtain random
Each sampled value of the stochastic variable obtained with the communication device for itself carrying out key agreement is calculated in the sampled value of variable
Quantify Soft Inform ation;Decoding is calculated according to the quantization Soft Inform ation of all sampled values and the received coding codeword of the receiving unit
Information group;It decodes to obtain discrete series according to the decoding information group, Hash is calculated according to the discrete series that decoding obtains
Value, and the cryptographic Hash is sent to the transmission unit 302.
The specific works content of each unit of communication device shown in Fig. 3 refers to above-mentioned corresponding key agreement side
The content of method embodiment, details are not described herein again.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of cryptographic key negotiation method, which is characterized in that it is applied to first communication party, this method comprises:
The stochastic variable of acquisition is sampled to obtain sampled value;
The value interval of all sampled values is divided into the subinterval of setting quantity, and subinterval is respectively set for each sampled value
Location index;
The subinterval location index of all sampled values of the stochastic variable is sent to and carries out key agreement with first communication party
Second communication party so that the second communication party generate quantization Soft Inform ation;
Quantification treatment is carried out to each sampled value of the stochastic variable respectively, obtains discrete series;
The discrete series are divided into the first discrete series and the second discrete series;
Coded treatment is carried out to first discrete series, obtains the first discrete series coding codeword;
The first discrete series coding codeword and second discrete series are subjected to mould 2 plus calculation process, obtain it is described from
Dissipate the coding codeword of sequence;
The coding codeword of the discrete series is sent to the second communication party so that the second communication party decode to obtain from
Dissipate sequence;
The cryptographic Hash that the second communication party sends is received, and judges that the second communication party decodes to obtain according to the cryptographic Hash
Discrete series it is whether correct;The cryptographic Hash is calculated by the second communication party according to the discrete series that decoding obtains.
2. the method according to claim 1, wherein the value interval by all sampled values is divided into setting
The subinterval of quantity, comprising:
Value interval etc. by all sampled values generally is divided into the section of the first setting quantity, and is each Interval Coding;
Respectively by each section in the section of the first setting quantity, the subinterval for being generally quantified as the second setting quantity is waited.
3. the method according to claim 1, wherein being carried out respectively in each sampled value to the stochastic variable
Quantification treatment after obtaining discrete series, is carrying out coded treatment to the discrete series, is obtaining the coding of the discrete series
Before code word, this method further include:
Receive the characterization quantization generated information of Soft Inform ation that the second communication party sends.
4. a kind of cryptographic key negotiation method, which is characterized in that it is applied to second communication party, this method comprises:
Receive the subinterval location index that the first communication party for carrying out key agreement with second communication party is sent;
According to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, it is calculated
The quantization Soft Inform ation of each sampled value for the stochastic variable that the first communication party obtains;
Receive the coding codeword that the first communication party is sent;
By the quantization Soft Inform ation of all sampled values, the first quantization Soft Inform ation and the second quantization Soft Inform ation are divided into second amount
Change Soft Inform ation and carry out hard decision process, obtains the second quantized sequences;
Second quantized sequences and the coding codeword are subjected to mould 2 plus calculation process, obtain the first coded sequence;
Soft-decision processing is carried out to first coded sequence, obtains the second coded sequence;
Second coded sequence is carried out corresponding position with the absolute value of the second quantization Soft Inform ation to be multiplied processing, obtains the
Three coded sequences;
The third coded sequence and the first quantization Soft Inform ation are formed into decoding information group;
According to the decoding information group, decoding obtains discrete series;
Cryptographic Hash is calculated according to the discrete series, and the cryptographic Hash is sent to the first communication party.
5. according to the method described in claim 4, it is characterized in that, described according to the subinterval location index and described
The sampled value for the stochastic variable that second communication party obtains is calculated each of the stochastic variable that the first communication party obtains and adopts
The quantization Soft Inform ation of sample value, comprising:
According to the sampled value for the stochastic variable that the subinterval location index and the second communication party obtain, calculate separately
Obtain it is corresponding with each sampled value of stochastic variable that the second communication party obtains, the first communication party obtain with
Each sampled value of machine variable, conditional probability that each coded-bit is 0 and the conditional probability for being 1;
Corresponding, the first communication party according to each sampled value of stochastic variable obtained with the second communication party
Each sampled value of the stochastic variable of acquisition, conditional probability that each coded-bit is 0 and the conditional probability for being 1, respectively
, the first communication party acquisition corresponding with each sampled value of stochastic variable that the second communication party obtains is calculated
Stochastic variable each sampled value each coded-bit log-likelihood ratio, as quantization Soft Inform ation.
6. according to the method described in claim 4, it is characterized in that, according to the subinterval location index and described
The each sampling for the stochastic variable that the first communication party obtains is calculated in the sampled value for the stochastic variable that two communication parties obtain
After the quantization Soft Inform ation of value, this method further include:
The characterization quantization generated information of Soft Inform ation is sent to the first communication party.
7. a kind of communication device characterized by comprising
Receiving unit, transmission unit and processing unit;
Wherein, the transmission unit, subinterval location index, discrete series coding codeword for sending the processing unit
And cryptographic Hash is sent to other communication devices that key agreement is carried out with the communication device;
The receiving unit, the subinterval sent for receiving the other communication devices for carrying out key agreement with the communication device
Location index, coding codeword and cryptographic Hash, and it is sent to the processing unit;
The processing unit is connect with the receiving unit and the transmission unit, for sampling to the stochastic variable of acquisition
Obtain sampled value;The value interval of all sampled values is divided into the subinterval of setting quantity, is respectively set for each sampled value
The subinterval location index of all sampled values is simultaneously sent to the transmission unit by subinterval location index;To the stochastic variable
Each sampled value carry out quantification treatment respectively, obtain discrete series, by the discrete series be divided into the first discrete series and
Second discrete series;Coded treatment is carried out to first discrete series, obtains the first discrete series coding codeword;By described
One discrete series coding codeword and second discrete series carry out mould 2 plus calculation process, obtain the coding of the discrete series
Code word, and the discrete series coding codeword is sent to the transmission unit;According to the received cryptographic Hash of the receiving unit
Whether the discrete series for judging that the other communication devices for carrying out key agreement with the communication device decode are correct;According to institute
The sampled value for stating the received subinterval location index of receiving unit and the stochastic variable itself obtained, is calculated and the communication
The quantization Soft Inform ation of each sampled value for the stochastic variable that other communication devices that device carries out key agreement obtain;It is adopted all
The quantization Soft Inform ation of sample value is divided into the first quantization Soft Inform ation and the second quantization Soft Inform ation;To it is described second quantization Soft Inform ation into
Row hard decision process obtains the second quantized sequences;Second quantized sequences and the coding codeword are carried out at mould 2 plus operation
Reason, obtains the first coded sequence;Soft-decision processing is carried out to first coded sequence, obtains the second coded sequence;It will be described
Second coded sequence carries out corresponding position with the absolute value of the second quantization Soft Inform ation and is multiplied processing, obtains third code sequence
Column;The third coded sequence and the first quantization Soft Inform ation are formed into decoding information group;It is translated according to the decoding information group
Code obtains discrete series, and cryptographic Hash is calculated according to the obtained discrete series of decoding, and the cryptographic Hash is sent to described
Transmission unit.
8. communication device according to claim 7, which is characterized in that the processing unit is by the value area of all sampled values
Between be divided into setting quantity subinterval when, be specifically used for:
Value interval etc. by all sampled values generally is divided into the section of the first setting quantity, and is each Interval Coding;
Respectively by each section in the section of the first setting quantity, the subinterval for being generally quantified as the second setting quantity is waited.
9. communication device according to claim 7, which is characterized in that the processing unit is received according to the receiving unit
Subinterval location index and itself obtain stochastic variable sampled value, be calculated and the communication device carry out key association
When the quantization Soft Inform ation of each sampled value for the stochastic variable that other communication devices of quotient obtain, it is specifically used for:
According to the received subinterval location index of the receiving unit and the sampled value of the stochastic variable itself obtained, respectively
It is calculated corresponding with each sampled value of stochastic variable that itself is obtained, carries out key agreement with the communication device
The each sampled value for the stochastic variable that other communication devices obtain, conditional probability that each coded-bit is 0 and the item for being 1
Part probability;
It is corresponding according to each sampled value of stochastic variable obtained with itself, key association is carried out with the communication device
The each sampled value for the stochastic variable that other communication devices of quotient obtain, the conditional probability and be 1 that each coded-bit is 0
Conditional probability, calculate separately to obtain it is corresponding with each sampled value of stochastic variable that itself is obtained, it is described with it is described logical
Pair of each coded-bit of each sampled value for the stochastic variable that other communication devices that T unit carries out key agreement obtain
Number likelihood ratio, as quantization Soft Inform ation.
10. communication device according to claim 7, which is characterized in that the processing unit is also used to:
According to the received subinterval location index of the receiving unit and the sampled value of the stochastic variable itself obtained, it is calculated
The soft letter of quantization of each sampled value for the stochastic variable that the other communication devices for carrying out key agreement with the communication device obtain
After breath, characterization quantization is sent to the other communication devices for carrying out key agreement with the communication device by the transmission unit
The generated information of Soft Inform ation;
Correspondingly, when the other communication devices for carrying out key agreement with the communication device quantify Soft Inform ation to characterization itself is sent
When generated information, the processing unit is also used to: being received by the receiving unit and is carried out key with the communication device
The characterization that the other communication devices negotiated are sent quantifies the generated information of Soft Inform ation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611111316.3A CN106656487B (en) | 2016-12-06 | 2016-12-06 | A kind of cryptographic key negotiation method and communication device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611111316.3A CN106656487B (en) | 2016-12-06 | 2016-12-06 | A kind of cryptographic key negotiation method and communication device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106656487A CN106656487A (en) | 2017-05-10 |
CN106656487B true CN106656487B (en) | 2019-08-30 |
Family
ID=58818429
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611111316.3A Active CN106656487B (en) | 2016-12-06 | 2016-12-06 | A kind of cryptographic key negotiation method and communication device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106656487B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107171795B (en) * | 2017-06-27 | 2019-12-13 | 郑州信大先进技术研究院 | Key agreement method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105024801A (en) * | 2015-07-06 | 2015-11-04 | 国网山东寿光市供电公司 | Quantum encryption communication method |
CN105634508A (en) * | 2015-12-21 | 2016-06-01 | 西安空间无线电技术研究所 | Realization method of low complexity performance limit approximate Turbo decoder |
CN106059758A (en) * | 2016-07-08 | 2016-10-26 | 大连理工大学 | Key generation method capable of ensuring security of wireless communication |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120284785A1 (en) * | 2011-05-05 | 2012-11-08 | Motorola Mobility, Inc. | Method for facilitating access to a first access nework of a wireless communication system, wireless communication device, and wireless communication system |
-
2016
- 2016-12-06 CN CN201611111316.3A patent/CN106656487B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105024801A (en) * | 2015-07-06 | 2015-11-04 | 国网山东寿光市供电公司 | Quantum encryption communication method |
CN105634508A (en) * | 2015-12-21 | 2016-06-01 | 西安空间无线电技术研究所 | Realization method of low complexity performance limit approximate Turbo decoder |
CN106059758A (en) * | 2016-07-08 | 2016-10-26 | 大连理工大学 | Key generation method capable of ensuring security of wireless communication |
Also Published As
Publication number | Publication date |
---|---|
CN106656487A (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7941726B2 (en) | Low dimensional spectral concentration codes and direct list decoding | |
EP1969760B1 (en) | Method and system for generating a secret key from joint randomness | |
CN101998390B (en) | Method and device for ensuring communication security | |
RU2367007C2 (en) | Method of transmission and complex protection of information | |
CN103167490B (en) | Wireless key distribution method, Apparatus and system | |
Zhan et al. | On the using of discrete wavelet transform for physical layer key generation | |
CN111670543B (en) | Multi-component encoding for signal shaping | |
CN106027230A (en) | Method for carrying out Hamming error correction for error code in quantum secret key distribution postprocessing | |
CN111478885A (en) | Asymmetric encryption and decryption method, equipment and storage medium | |
CN110351085B (en) | Method and system for quantum key distribution post-processing | |
CN106656487B (en) | A kind of cryptographic key negotiation method and communication device | |
KR20160120062A (en) | Quantum signature apparatus for quantum message | |
WO2013000174A1 (en) | Method for generating consistent cryptographic key based on wireless channel features | |
EP3906634A1 (en) | Device and method for processing data of a quantum key distribution system | |
US20130132806A1 (en) | Convolutional Turbo Code Decoding in Receiver With Iteration Termination Based on Predicted Non-Convergence | |
CN109698706B (en) | Polarization code incoherent iterative detection method and device based on decision feedback | |
CN114362945B (en) | Quantum secret sharing method based on entanglement exchange | |
KR20150142718A (en) | Data transmission method and apparatus | |
US8230217B2 (en) | Method and system for secure collaboration using slepian-wolf codes | |
CN109067501B (en) | Polar code communication method and device based on degraded wiretap channel noise interference | |
CN111756541A (en) | Method, server, terminal and system for transmitting secret key | |
CN108599912B (en) | Method and device for generating pilot frequency pattern, electronic equipment and storage medium | |
RU2319199C2 (en) | Universal method for transmitting information with controllable parameters | |
Fernando et al. | Reed solomon codes for the reconciliation of wireless phy layer based secret keys | |
CN108696283A (en) | The method and apparatus of data encoding and decoding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |