期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code 被引量:3
1
作者 Xu Yinbo Gao Mingyi +3 位作者 Zhu Huaqing Chen Bowen Xiang Lian Shen Gangxiang 《China Communications》 SCIE CSCD 2024年第3期174-188,共15页
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e... Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security. 展开更多
关键词 physical layer encryption polar code quantum noise stream cipher
在线阅读 下载PDF
Physical layer data encryption using two-level constellation masking in 3D-CAP-PON
2
作者 Shuaidong Chen Bo Liu +9 位作者 Yaya Mao Jianxin Ren Xiumin Song Rahat Ullah Delin Zhao Lei Jiang Shun Han Jianye Zhao Jiajia Shen Xueyang Liu 《Chinese Optics Letters》 SCIE EI CAS CSCD 2021年第1期1-6,共6页
A novel physical layer data encryption scheme using two-level constellation masking in three-dimensional(3D)carrier-less amplitude and phase modulation(CAP)passive optical network(PON)is proposed in this Letter.The ch... A novel physical layer data encryption scheme using two-level constellation masking in three-dimensional(3D)carrier-less amplitude and phase modulation(CAP)passive optical network(PON)is proposed in this Letter.The chaotic sequence generated by Chua’s circuit model realizes two-level encryption of displacement masking and constellation rotation for3 D constellations.We successfully conduct an experiment demonstrating 8.7 Gb/s 3 D-CAP-8 data transmission over25 km standard single-mode fiber.With two-level constellation masking,a key space size of 2.1×1085 is achieved to bring about high security and good encryption performance,suggesting broad application prospects in future short-range secure communications. 展开更多
关键词 physical layer data encryption constellation masking carrier-less amplitude and phase modulation passive optical network
原文传递
Security analysis of quantum noise stream cipher systems under quantization-attack
3
作者 JIHUI SUN LIN JIANG +2 位作者 ANLIN YI WEI PAN LIANSHAN YAN 《Photonics Research》 2026年第2期411-425,共15页
Among physical layer encryption schemes,the quantum noise stream cipher(QNSC)has garnered significant attention due to its compatibility with high-speed commercial fiber-optic communication systems.After careful analy... Among physical layer encryption schemes,the quantum noise stream cipher(QNSC)has garnered significant attention due to its compatibility with high-speed commercial fiber-optic communication systems.After careful analysis of the encryption scheme,we reveal that QNSC transmission systems exhibit a security vulnerability in their encoding scheme.This vulnerability limits quantum noise to alerting high-order information bits in plaintext-dependent regions,creating structured ciphertext concealment.Numerical simulation and experimental verification both indicate that an eavesdropper can use quantization-attack to crack this vulnerability.Existing security assessment methods will overestimate the system's security under quantization-attack.In addition,system security demonstrates a strong linear dependence on the plaintext modulation format,rather than the ciphertext modulation format as is widely presumed.To further enhance system security,the probability distribution is further introduced into the encoding process of ciphertext.The experiment results show that we not only achieved random concealment of ciphertext by quantum noise but also enhanced the eavesdropper's symbol error rate by~86%and maximally expanded the key space of the QAM-QNSC system by 2^(27.2). 展开更多
关键词 quantization attack plaintext modulation format encryption schemewe quantum noise quantum noise stream cipher quantum noise stream cipher qnsc physical layer encryption schemesthe encoding schemethis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部