Time scrambling and decoy-state quantum key distribution for optical physical layer encryption

被引:2
|
作者
Li, Zhaoyun [1 ,2 ]
Pang, Haiyue [1 ]
Luo, Qingsong [2 ]
Zhang, Yukun [1 ]
Zhang, Xin [2 ]
Tao, Zhiyong [1 ]
Fan, Yaxian [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Wireless Wideband Commun & Signal, Guilin 541004, Peoples R China
[2] China Elect Technol Grp Corp, Res Inst China Elect Technol Grp Corp 34, Guilin 541004, Peoples R China
关键词
Quantum key distribution; Optical physical layer security; Optical signal temporal scrambling; TRANSMISSION;
D O I
10.1016/j.yofte.2022.102954
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose an optical physical layer encryption method based on real-time optical signal temporal scrambling and decoy-state quantum key distribution. The real-time optical signal processing is operating with an array of tunable Fabry-Perot cavities by using the updating and synchronization keys. Based on this scheme, an experimental demonstration is given to realize secure communication for optical physical layer in a standard 10 Gbps data transmission with quantum key distribution in real time. An on-line transmitted data over 100 km of a standard single mode fiber is realized with power penalty of as low as 3.45 dB, where the average key generation rate is better than 800 bps. The experimental results indicate that, the proposed encryption scheme of dynamic scrambling with quantum keys exhibits significantly potential for improving the confidentiality of optical physical layer.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT
    Hongyang Ma
    Bingquan Chen
    Wireless Personal Communications, 2016, 91 : 1335 - 1344
  • [32] Efficient scheme for passive decoy-state reference-frame-independent quantum key distribution
    Zhu, Jian-Rong
    Zhang, Chun-Mei
    Wang, Qin
    PHYSICS LETTERS A, 2019, 383 (04) : 311 - 315
  • [33] An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT
    Ma, Hongyang
    Chen, Bingquan
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1335 - 1344
  • [34] Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
    Xu, Le-Chen
    Zhang, Chun-Hui
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2024, 33 (02)
  • [35] DECOY STATE QUANTUM KEY DISTRIBUTION
    Ali, Sellami
    Saharudin, Suhairi
    Wahiddin, M. R. B.
    IIUM ENGINEERING JOURNAL, 2009, 10 (02): : 81 - 86
  • [36] Proof-of-principle demonstration of decoy-state quantum key distribution with biased basis choices
    Wu, Wen-Zhe
    Zhu, Jian-Rong
    Ji, Liang
    Zhang, Chun-Mei
    Wang, Qin
    QUANTUM INFORMATION PROCESSING, 2020, 19 (09)
  • [37] Finite-key analysis based on neural network of practical wavelength division multiplexed decoy-state quantum key distribution
    Li Jiahao
    Shi Lei
    Wang Junhui
    Li Tianxiu
    Xue Yang
    AOPC 2021: OPTICAL SENSING AND IMAGING TECHNOLOGY, 2021, 12065
  • [38] Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key
    李源
    鲍皖苏
    李宏伟
    周淳
    汪洋
    Chinese Physics B, 2016, (01) : 456 - 463
  • [39] Proof-of-principle demonstration of decoy-state quantum key distribution with biased basis choices
    Wen-Zhe Wu
    Jian-Rong Zhu
    Liang Ji
    Chun-Mei Zhang
    Qin Wang
    Quantum Information Processing, 2020, 19
  • [40] Passive decoy-state quantum key distribution using weak coherent pulses with modulator attenuation
    李源
    鲍皖苏
    李宏伟
    周淳
    汪洋
    Chinese Physics B, 2015, (11) : 122 - 128