Time scrambling and decoy-state quantum key distribution for optical physical layer encryption

被引:2
|
作者
Li, Zhaoyun [1 ,2 ]
Pang, Haiyue [1 ]
Luo, Qingsong [2 ]
Zhang, Yukun [1 ]
Zhang, Xin [2 ]
Tao, Zhiyong [1 ]
Fan, Yaxian [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Wireless Wideband Commun & Signal, Guilin 541004, Peoples R China
[2] China Elect Technol Grp Corp, Res Inst China Elect Technol Grp Corp 34, Guilin 541004, Peoples R China
关键词
Quantum key distribution; Optical physical layer security; Optical signal temporal scrambling; TRANSMISSION;
D O I
10.1016/j.yofte.2022.102954
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose an optical physical layer encryption method based on real-time optical signal temporal scrambling and decoy-state quantum key distribution. The real-time optical signal processing is operating with an array of tunable Fabry-Perot cavities by using the updating and synchronization keys. Based on this scheme, an experimental demonstration is given to realize secure communication for optical physical layer in a standard 10 Gbps data transmission with quantum key distribution in real time. An on-line transmitted data over 100 km of a standard single mode fiber is realized with power penalty of as low as 3.45 dB, where the average key generation rate is better than 800 bps. The experimental results indicate that, the proposed encryption scheme of dynamic scrambling with quantum keys exhibits significantly potential for improving the confidentiality of optical physical layer.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Detecting the possibility of a type of photon number splitting attack in decoy-state quantum key distribution
    Chen, Xiao-Ming
    Chen, Lei
    Yan, Ya-Long
    CHINESE PHYSICS B, 2022, 31 (12)
  • [42] Passive Decoy-State Quantum Key Distribution with Orbital Angular Momentum and Pulse Position Modulation
    Wang, Lian
    Zhou, Yuanyuan
    Zhou, Xuejun
    Chen, Xiao
    Xu, HuaBin
    2017 9TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT 2017), 2017, : 105 - 109
  • [43] Passive decoy-state quantum key distribution using weak coherent pulses with modulator attenuation
    Li Yuan
    Bao Wan-Su
    Li Hong-Wei
    Zhou Chun
    Wang Yang
    CHINESE PHYSICS B, 2015, 24 (11)
  • [44] Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key
    Li, Yuan
    Bao, Wansu
    Li, Hongwei
    Zhou, Chun
    Wang, Yang
    CHINESE PHYSICS B, 2016, 25 (01)
  • [45] Application of an improved version of McDiarmid inequality in finite-key-length decoy-state quantum key distribution
    Chau, H. F.
    Ng, K. C. Joseph
    NEW JOURNAL OF PHYSICS, 2020, 22 (02):
  • [46] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Zijian Li
    Bingbing Zheng
    Chengxian Zhang
    Zhenrong Zhang
    Hong-Bo Xie
    Kejin Wei
    Quantum Information Processing, 23
  • [47] Decoy-state quantum key distribution with direct modulated commercial off-the-shelf VCSEL lasers
    De La Cruz, Noel
    Paudel, Uttam
    Ionov, Pavel
    Tucker, Ethan H.
    Mollner, Andrew
    Touch, Joseph
    Betser, Joseph
    Stoermer, Joshua
    IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE20), 2020, : 205 - 211
  • [48] Study on Statistical Analysis Method of Decoy-state Quantum Key Distribution with Finite-length Data
    Yu, Wei
    Zhou, Yuanyuan
    Zhou, Xuejun
    Wang, Lei
    Chen, Shang
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2435 - 2440
  • [49] Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method
    Xue, Ke
    Shen, Zhigang
    Zhao, Shengmei
    Mao, Qianping
    ENTROPY, 2022, 24 (05)
  • [50] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Li, Zijian
    Zheng, Bingbing
    Zhang, Chengxian
    Zhang, Zhenrong
    Xie, Hong-Bo
    Wei, Kejin
    QUANTUM INFORMATION PROCESSING, 2024, 23 (02)