LDPC Codes Based on Latin Squares: Cycle Structure, Stopping Set, and Trapping Set Analysis

2007 ◽  
Vol 55 (2) ◽  
pp. 303-312 ◽  
Author(s):  
S. Laendner ◽  
O. Milenkovic
2012 ◽  
Vol 20 (5) ◽  
pp. 227-263 ◽  
Author(s):  
Douglas S. Stones ◽  
Petr Vojtěchovský ◽  
Ian M. Wanless

Author(s):  
Anxiao Andrew Jiang ◽  
Pulakesh Upadhyaya ◽  
Ying Wang ◽  
Krishna R. Narayanan ◽  
Hongchao Zhou ◽  
...  
Keyword(s):  

2010 ◽  
Vol 58 (11) ◽  
pp. 3126-3139 ◽  
Author(s):  
Li Zhang ◽  
Qin Huang ◽  
Shu Lin ◽  
Khaled Abdel-Ghaffar ◽  
Ian F. Blake

2021 ◽  
Author(s):  
Debarnab Mitra ◽  
Lev Tauz ◽  
Lara Dolecek

<div>In blockchain systems, full nodes store the entire blockchain ledger and validate all transactions in the system by operating on the entire ledger. However, for better scalability and decentralization of the system, blockchains also run light nodes that only store a small portion of the ledger. In blockchain systems having a majority of malicious full nodes, light nodes are vulnerable to a data availability (DA) attack. In this attack, a malicious node makes the light nodes accept an invalid block by hiding the invalid portion of the block from the nodes in the system. Recently, a technique based on LDPC codes called Coded Merkle Tree (CMT) was proposed by Yu et al. that enables light nodes to detect a DA attack by randomly requesting/sampling portions of the block from the malicious node. However, light nodes fail to detect a DA attack with high probability if a malicious node hides a small stopping set of the LDPC code. To mitigate this problem, Yu et al. used well-studied techniques to design random LDPC codes with high minimum stopping set size. Although effective, these codes are not necessarily optimal for this application. In this paper, we demonstrate that a suitable co-design of specialized LDPC codes and the light node sampling strategy can improve the probability of detection of DA attacks. We consider different adversary models based on their computational capabilities of finding stopping sets in LDPC codes. For a weak adversary model, we devise a new LDPC code construction termed as the entropy-constrained PEG (EC-PEG) algorithm which concentrates stopping sets to a small group of variable nodes. We demonstrate that the EC-PEG algorithm coupled with a greedy sampling strategy improves the probability of detection of DA attacks. For stronger adversary models, we provide a co-design of a sampling strategy called linear-programming-sampling (LP-sampling) and an LDPC code construction called linear-programming-constrained PEG (LC-PEG) algorithm. The new co-design demonstrates a higher probability of detection of DA attacks compared to approaches proposed in earlier literature.</div>


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Hai Zhu ◽  
Liqun Pu ◽  
Hengzhou Xu ◽  
Bo Zhang

Quasi-cyclic (QC) LDPC codes play an important role in 5G communications and have been chosen as the standard codes for 5G enhanced mobile broadband (eMBB) data channel. In this paper, we study the construction of QC LDPC codes based on an arbitrary given expansion factor (or lifting degree). First, we analyze the cycle structure of QC LDPC codes and give the necessary and sufficient condition for the existence of short cycles. Based on the fundamental theorem of arithmetic in number theory, we divide the integer factorization into three cases and present three classes of QC LDPC codes accordingly. Furthermore, a general construction method of QC LDPC codes with girth of at least 6 is proposed. Numerical results show that the constructed QC LDPC codes perform well over the AWGN channel when decoded with the iterative algorithms.


Sign in / Sign up

Export Citation Format

Share Document