A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
スポンサーリンク
概要
- 論文の詳細を見る
Construction of quaternion design for Space-Time-Polarization Block Codes (STPBCs) is a hot but difficult topic. This letter introduces a novel way to construct high dimensional quaternion designs based on any existing low dimensional quaternion orthogonal designs(QODs) for STPBC, while preserving the merits of the original QODs such as full diversity and simple decoding. Furthermore, it also provides a specific schema to reach full diversity and maximized code gain by signal constellation rotation on the polarization plane.
- (社)電子情報通信学会の論文
- 2009-02-01
著者
-
KAN Haibin
School of Computer Science, Fudan University
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
Kan Haibin
Fudan Univ. Shanghai Chn
-
Kan Haibin
School Of Compute Science Fudan University
-
MA Huanfei
School of Computer Science, Fudan University
-
Ma Huanfei
Fudan Univ. Shanghai Chn
-
Imai Hideki
Faculty Of Science And Engineering Chuo University
-
Imai Hideki
Faculty Of Engineering Yokohama National University
関連論文
- Constructing Even-Variable Symmetric Boolean Functions with High Algebraic Immunity
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
- New Balanced Boolean Functions with Good Cryptographic Properties
- A Novel Probabilistic Passive Attack on the Protocols HB and HB^+
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Invisibly Sanitizable Digital Signature Scheme
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes(Information Security)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- New Short Signature Scheme without Random Oracles
- A Trade-off Traitor Tracing Scheme
- Constructing Even-Variable Symmetric Boolean Functions with High Algebraic Immunity
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- Secure Broadcast System with Simultaneous Individual Messaging
- Constructing Correlation Immune Symmetric Boolean Functions
- Annihilators and Algebraic Immunity of Symmetric Boolean Functions
- A Note on "On the Construction of Boolean Functions with Optimal Algebraic Immunity"
- Cascaded Co-Channel Interference Cancelling and Diversity Combining for Spread-Spectrum Multi-Access over Multipath Fading Channels (Special Issue on Land Mobile/Portable Propagation)
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
- A Note on "On the Construction of Boolean Functions with Optimal Algebraic Immunity"
- Practically Feasible Design for Convolutional Network Code