1. Li G Y, Hu A Q, Shi L. Secret key extraction in wireless channel. Journal of Cryptography Research, 2014, 1(3) : 211-224 (in Chinese).
2. Zhang J Q, Woods R, Duong T Q, et al. Experimental study on key generation for physical layer security in wireless communications. IEEE Access, 2016, 4: 4464-4477.
3. Ma W F, Zeng G H. An improvement on “Cascade” protocol in quantum key distribution. Acta Sinica Quantum Optica, 2010, 16(4): 271-275 (in Chinese).
4. Dai Q, Jin L, Huang K Z. Adaptive key distillation from channel characteristics. Journal of Communications, 2014, 35(1): 191-197 (in Chinese).
5. Treeviriyanupab P, Sangwongngam P, Sripimanwat K, et al. Performance of 1/2-rate convolutional code on Winnow protocol for quantum key reconciliation. Proceedings of the 10th International Symposium on Communications and Information Technologies, Oct 26-29, 2010, Tokyo, Japan. Piscataway, NJ, USA: IEEE, 2010: 550-553.
6. Lin Y, He G Q, Zeng G H. The application of LDPC codes in the multidimensional reconciliation of quantum key distribution. Journal of Quantum Optics, 2013, 19 (2): 116-121 (in Chinese).
7. Wang C L, Wu X F, Zhu W P. The research of using LDPC encoding and decoding to structure wireless key reconciliation protocol. Journal of Signal Processing, 2017, 33(8): 1115-1121 (in Chinese).
8. Fang Y, Bi G A, Guan Y L, et al. A survey on protograph LDPC codes and their applications. IEEE Communications Surveys & Tutorials, 2015, 17(4): 1989-2016.
9. Ar?kan E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Transactions on Information Theory, 2009, 55(7): 3051–3073.
10. Af?er H, Deliç H. On the channel-specific construction of Polar codes. IEEE Communications Letters, 2015, 19(9): 1480-1483.
11. Korada S B, Sasoglu E, Urbanke R. Polar codes: Characterization of exponent, bounds, and constructions. IEEE Transactions on Information Theory, 2010, 56(12): 6253-6264.
12. Zhang Z Y, Zhang L, Wang X B, et al. A split-reduced Successive cancellation list decoder for polar codes. IEEE Communications Letters, 2016, 34(2): 292-302.
13. Jouguet P, Kunz-Jacques S. High performance error correction for quantum key distribution using polar codes. Quantum Information and Computation, 2012, 14(3/4): 329-338.
14. Guo J F, Shi Z P, Liu Z L, et al. Multi-CRC polar codes and their applications. IEEE Communications Letters, 2015, 20(2): 211-215.
15. Taha H, Alsusa E. A MIMO precoding based physical layer security technique for key exchange encryption. Proceedings of the IEEE 81st Vehicular Technology Conference (VTC Spring'15), May 11-14, 2015, Glasgow, UK. Piscataway, NJ, USA: IEEE, 2015: 5p.
16. Ding Y , Zhang J Q, Fusco V F. Retrodirective assisted secure wireless key establishment. IEEE Transactions on Communications, 2017, 65(1): 320-334.
17. Liu Y L, Chen H H, Wang L M. Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys & Tutorials, 2017, 19(1): 347-376.
18. Zhang X T, Zhao S M, Zheng B Y. Key reconciliationusing polar code in wireless channel. Journal of Signal Processing, 2018, 34(7): 793-798 (in Chinese).
19. Qian K, Zhao S M, Shi P. Design of the Gaussian wiretap channel with punctured polar codes. Journal of Signal Processing, 2014, 30(11): 1345-1348 (in Chinese).
20. Xiao H, Shi P, Zhao S M. A reconciliation protocol with delayed error correction for quantum key distribution . Scientia Sinica: Technologica, 2015, 45(8): 843-848 (in Chinese).
21. Ou M S, Liao W, Yuan Z M. Key agreement of channel characteristics in wireless channel. Computer Engineering and Design, 2016, 37(8): 1986-1989, 2076 (in Chinese). |