Id-PC: An Identification Scheme based on Polar Codes

Author(s):  
Reza Hooshmand ◽  
Alireza Jafari ◽  
Gholamreza Karamali
2020 ◽  
Vol E103.B (1) ◽  
pp. 43-51 ◽  
Author(s):  
Yuhuan WANG ◽  
Hang YIN ◽  
Zhanxin YANG ◽  
Yansong LV ◽  
Lu SI ◽  
...  

Author(s):  
R. A. Morozov ◽  
P. V. Trifonov

Introduction:Practical implementation of a communication system which employs a family of polar codes requires either to store a number of large specifications or to construct the codes by request. The first approach assumes extensive memory consumption, which is inappropriate for many applications, such as those for mobile devices. The second approach can be numerically unstable and hard to implement in low-end hardware. One of the solutions is specifying a family of codes by a sequence of subchannels sorted by reliability. However, this solution makes it impossible to separately optimize each code from the family.Purpose:Developing a method for compact specifications of polar codes and subcodes.Results:A method is proposed for compact specification of polar codes. It can be considered a trade-off between real-time construction and storing full-size specifications in memory. We propose to store compact specifications of polar codes which contain frozen set differences between the original pre-optimized polar codes and the polar codes constructed for a binary erasure channel with some erasure probability. Full-size specification needed for decoding can be restored from a compact one by a low-complexity hardware-friendly procedure. The proposed method can work with either polar codes or polar subcodes, allowing you to reduce the memory consumption by 15–50 times.Practical relevance:The method allows you to use families of individually optimized polar codes in devices with limited storage capacity. 


2009 ◽  
Vol 29 (7) ◽  
pp. 1779-1781
Author(s):  
Lian-hao LIU ◽  
Bu-yun QU

2014 ◽  
Author(s):  
David Wasserman
Keyword(s):  

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.


Sign in / Sign up

Export Citation Format

Share Document