One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key genera...
详细信息
One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key generation method that exploits the physical layer properties of the multipath channel in orthogonal frequency division multiplexing (OFDM) systems with time division duplexing (TDD), and in particular the amplitude and phase of the estimated channel frequency response (CFR). Both the fast space decorrelation and the independency of the amplitude and phase of the multipath fading channel are used to generate the secret key, leading to increased secrecy bit rate and negligible secrecy leakage. The effect of the channel estimation error, delay and mobility are investigated for the presented method. Simulation results corroborate the increased performance of the proposed method over existing ones.
network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemen...
详细信息
network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemented for error bit detection. However, its error correction is simply ignored. To fully exploit this feature, this paper proposes a novel joint Log-Likelihood Ratio (LLR) CRC error mitigation for NC two way relay channel. Specific thresholds are designed to estimate the error number of data block and identify those which can be recovered if the number is within the error correction scope of CRC. We examine two modes of the thresholds, one based on the average Bit Error Rate (BER) of source-relay link, while the other based on that of instantaneous one. We provide the full analysis for the Pair-wise Error Probability (PEP) performance of the scheme. A variety of numerical results are presented to reveal the superiority of the proposed scheme to conventional CRC NC under independent Rayleigh fading channels. Moreover, the efficiencies of the proposed thresholds are also validated.
We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pai...
详细信息
We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pair of less-entangled state and a single mobile electron with a certain probability. With the help of charge detection, it can be repeated to reach a higher success probability. It also does not need to know the coefficient of the original less-entangled states. All these advantages may make this protocol useful in current distributed quantum information processing.
wirelesscommunications employing 60 GHz millimeter wave are quite attractive recently due to the huge clean unlicensed bandwidth (up to 7 GHz) in this frequency band. In this paper, aiming at increasing channel capac...
详细信息
ISBN:
(纸本)9781479958337
wirelesscommunications employing 60 GHz millimeter wave are quite attractive recently due to the huge clean unlicensed bandwidth (up to 7 GHz) in this frequency band. In this paper, aiming at increasing channel capacity and improving the reliability of non-line-of-sight (NLOS) indoor wirelesscommunications, we focus on a first-order-reflection multiple input multiple output (MIMO) model for 60 GHz wireless local area network (WLAN) systems based on the short-range indoor scenario provided by IEEE Std 802.11ad. Considering the special physical properties of 60 GHz millimeter wave in such scenario, we use large scale planar antenna arrays at both transmitter and receiver to eliminate link level interference. The antenna arrays are divided into several sub-arrays and each sub-array is considered as a high-gain steerable directional antenna unit. The essential characteristics of the physical layer of this model is to adjust these antenna units along different first-order-reflection clusters from walls or ceiling simultaneously at both transmitter and receiver to get several parallel channel links. System level simulation results demonstrate that the proposed model with multiple first-order-reflection links can increase the channel capacity for several times compared to the original model in this scenario.
Error propagation seriously degenerate the diversity order of Decode-and-Forward (DF) cooperative communication. To address this problem, a novel Log Likelihood Ratio (LLR)-based Link Adaptive Relaying (LAR) is propos...
详细信息
Error propagation seriously degenerate the diversity order of Decode-and-Forward (DF) cooperative communication. To address this problem, a novel Log Likelihood Ratio (LLR)-based Link Adaptive Relaying (LAR) is proposed to promote adaption accuracy at relay. The instantaneous Bit Error Probability (BEP) is calculated according to the LLR of the received signals firstly, then based on it, the equivalent Signal-to-Noise Ratio (SNR) is employed to operate dynamic power scaling by relay. It is theoretically proved that the full diversity order can be attained by the scheme. Besides, the power sensitivity is also analyzed. Simulation results show that the proposed scheme outperform the conventional LAR and can achieve full diversity order. Moreover, its strong adaptation to SNR fluctuation is validated.
In this paper, we present schemes on implementing the single-photon-added coherent source in quantum key distributions. We apply this source in either the standard BB84 protocol or the recently proposed measurement-de...
详细信息
In this paper, we present schemes on implementing the single-photon-added coherent source in quantum key distributions. We apply this source in either the standard BB84 protocol or the recently proposed measurement-device-independent quantum key distribution, comparing their performance with the cases of using other existing sources, e.g., the weak coherent source or the heralded single-photon source, and giving out corresponding numerical simulations. Our simulation results show that in both protocols the single-photon-added coherent source can greatly exceed all other existing sources. Moreover, even when taking statistical fluctuation into account, a high key generation rate can still be achieved at long distance by applying this source.
We present an efficient entanglement concentration protocol(ECP) for the less-entangled W state with some identical conventional polarized single *** the protocol,two of the parties say Alice and Charlie should perf...
详细信息
We present an efficient entanglement concentration protocol(ECP) for the less-entangled W state with some identical conventional polarized single *** the protocol,two of the parties say Alice and Charlie should perform the parity check measurements and they can ultimately obtain the maximally entangled W state with a certain success ***,they can obtain another less-entangled W state,which can be reconcentrated into the maximally entangled W *** iterating this ECP,a high success probability can be *** ECP may be an optimal one and it is useful in current quantum information processing.
Cooperative Spectrum Sensing (CSS) is well known that, in the fading environment, it can effectively improve the spectrum sensing performance. However, a common problem in CSS requires that the communication links bet...
详细信息
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-...
详细信息
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in wirelesssensornetworks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.
The problem of recovering sparse and low-rank matrices from a given matrix captures many applications. However, this recovery problem is NP-hard and thus not tractable in general. Recently, it has been shown that this...
详细信息
暂无评论