Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Integrating key generation and distribution with the quantum noise stream cipher system without compromising the transmission performance

Not Accessible

Your library or personal account may give you access

Abstract

We propose and experimentally demonstrate a secure quantum noise stream cipher transmission system that integrates key generation and distribution. At the stage of carrier phase recovery, the estimated phase noise is used to generate randomness keys without additional equipment. Based on direct sequence spread spectrum technology, we integrate the distributed keys with quantum noise stream cipher signals. The key distribution and encryption transmission can be completed simultaneously without occupying additional bandwidth or time slots. By changing the position of distributed keys in the encryption base, the BER performance of QAM/QNSC signals cannot be affected by the keys. Experimental results demonstrate that the 54.5 Mbps key distribution and 31 Gbps encryption transmission without OSNR penalty can be achieved simultaneously over a 120 km standard single-mode fiber.

© 2023 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Analysis of the encryption penalty in a QAM-based quantum noise stream cipher

Yuang Li, Yajie Li, Kongni Zhu, Wei Wang, Yongli Zhao, and Jie Zhang
Opt. Express 31(12) 19006-19020 (2023)

Experimental demonstration of 201.6-Gbit/s coherent probabilistic shaping QAM transmission with quantum noise stream cipher over a 1200-km standard single mode fiber

Jihui Sun, Lin Jiang, Anlin Yi, Jiacheng Feng, Xiong Deng, Wei Pan, Bin luo, and Lianshan Yan
Opt. Express 31(7) 11344-11353 (2023)

DAC/ADC-free 4 × 12.9 Gbit/s 65,536-level quantum noise stream cipher secure optical WDM transmission based on delta-sigma modulation

Hanwen Luo, Linsheng Zhong, Xiaoxiao Dai, Mengfan Cheng, Qi Yang, Lei Deng, and Deming Liu
Opt. Lett. 47(19) 5104-5107 (2022)

Supplementary Material (1)

NameDescription
Supplement 1       the analysis of randomness and security

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (8)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.