Patents Assigned to Science & Technology Department of Sichuan Province
  • Patent number: 11483704
    Abstract: A method for physical layer secure transmission against an arbitrary number of eavesdropping antennas includes: S1: communication between legitimate transmitter Alice and legitimate receiver Bob is confirmed; S2: Alice randomly generates a key bit bk with MS bits, maps the key bit bk into a key symbol K, and performs an XOR on the key bit bk and to-be-transmitted confidential information b to obtain an encrypted bits bs; S3: Bob transmits a pilot sequence to Alice, and Alice calculates a candidate precoding space W and transmits modulated symbol streams s=(s1, . . , sN) by using precoding W(e); S4: Bob measures received signal strength of each antenna, estimates the corresponding antenna vector e, inversely maps the vector e to obtain key symbols and key bits, and demodulates the received symbol streams in sequence at each activated antenna to obtain demodulated ciphertext bits; S5: Bob performs an XOR on observed key bits and the demodulated ciphertext bits to obtain the confidential information.
    Type: Grant
    Filed: December 27, 2020
    Date of Patent: October 25, 2022
    Assignees: University of Electronic Science and Technology of China, Science & Technology Department of Sichuan Province
    Inventors: Jie Tang, Liang Chen, Hong Wen, Xinchen Xu, Huanhuan Song, Kaiyu Qin
  • Publication number: 20210204117
    Abstract: A method for physical layer secure transmission against an arbitrary number of eavesdropping antennas includes: S1: communication between legitimate transmitter Alice and legitimate receiver Bob is confirmed; S2: Alice randomly generates a key bit bk with MS bits, maps the key bit bk into a key symbol K, and performs an XOR on the key bit bk and to-be-transmitted confidential information b to obtain an encrypted bits bs; S3: Bob transmits a pilot sequence to Alice, and Alice calculates a candidate precoding space W and transmits modulated symbol streams s=(s1, . . , sN) by using precoding W(e); S4: Bob measures received signal strength of each antenna, estimates the corresponding antenna vector e, inversely maps the vector e to obtain key symbols and key bits, and demodulates the received symbol streams in sequence at each activated antenna to obtain demodulated ciphertext bits; S5: Bob performs an XOR on observed key bits and the demodulated ciphertext bits to obtain the confidential information.
    Type: Application
    Filed: December 27, 2020
    Publication date: July 1, 2021
    Applicants: University of Electronic Science and Technology of China, Science & Technology Department of Sichuan Province
    Inventors: Jie Tang, Liang Chen, Hong Wen, Xinchen Xu, Huanhuan Song, Kaiyu Qin