Accelerated secure key distribution based on localized and asymmetric fiber interferometers

被引:24
作者
Huang, Chaoran [1 ]
Ma, Philip Y. [1 ]
Blow, Eric C. [1 ]
Mittal, Prateek [1 ]
Prucnal, Paul R. [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
PHYSICAL-LAYER SECURITY; RANDOMNESS;
D O I
10.1364/OE.27.032096
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose and experimentally demonstrate an approach to generate and distribute secret keys over optical fiber communication infrastructure. Mach-Zehnder interferometers (MZIs) are adopted for key generation by transferring the environmental noise to random optical signals. A novel combination of wideband optical noise and an asymmetric MZI structure enables the secret keys to be securely transmitted and exchanged over public fiber links without being detected. We experimentally demonstrate this system and show reliable performance: keys are generated at the rate of 502 bit/s, and are successfully exchanged between two parties over a 10 km optical fiber with a bit error of similar to 0.3%. System security analysis is performed by corroborating our experimental findings with simulations. The results show that our system can protect the key distribution under different attacks, attributed to wideband optical noise and asymmetric MZI structures. Compared to the previous schemes based on distributed MZIs, our scheme exploits localized MZI which provides twofold advantages. Firstly, the key generation rate can be increased by a factor of 5.7 at a negligible additional cost. Secondly, the system becomes robust to, in particular, active intrusion attack. The proposed system is a reliable and cost-effective solution for key establishment, and is compatible with the existing optical fiber communication infrastructure. (C) 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
引用
收藏
页码:32096 / 32110
页数:15
相关论文
共 38 条
[1]  
[Anonymous], P 2007 INT C WIR COM
[2]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[3]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[4]  
Brassard G., 1994, WORKSH THEOR APPL CR, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-735, DOI 10.1007/3-540-48285-735]
[5]  
Bromberg Y., 2015, ARXIV150607892PHYSIC
[6]   Key Reconciliation Protocols for Error Correction of Silicon PUF Responses [J].
Colombier B. ;
Bossuet L. ;
Fischer V. ;
Hely D. .
IEEE Transactions on Information Forensics and Security, 2017, 12 (08) :1988-2002
[7]   Practical challenges in quantum key distribution [J].
Diamanti, Eleni ;
Lo, Hoi-Kwong ;
Qi, Bing ;
Yuan, Zhiliang .
NPJ QUANTUM INFORMATION, 2016, 2
[8]   Photonic crystal fiber based Mach-Zehnder interferometer for DPSK signal demodulation [J].
Du, Jiangbing ;
Dai, Yongheng ;
Lei, Gordon K. P. ;
Tong, Weijun ;
Shu, Chester .
OPTICS EXPRESS, 2010, 18 (08) :7917-7922
[9]   Optical Layer Security in Fiber-Optic Networks [J].
Fok, Mable P. ;
Wang, Zhexing ;
Deng, Yanhua ;
Prucnal, Paul R. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :725-736
[10]   Key Distribution Based on Phase Fluctuation Between Polarization Modes in Optical Channel [J].
Hajomer, Adnan A. E. ;
Yang, Xuelin ;
Sultan, Amber ;
Hu, Weisheng .
IEEE PHOTONICS TECHNOLOGY LETTERS, 2018, 30 (08) :704-707