A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil...A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.展开更多
With cloud computing,large chunks of data can be handled at a small cost.However,there are some reservations regarding the security and privacy of cloud data stored.For solving these issues and enhancing cloud computi...With cloud computing,large chunks of data can be handled at a small cost.However,there are some reservations regarding the security and privacy of cloud data stored.For solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption system.The TLSA underlines the need for the protection of sensitive data.This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and secrecy.Surprisingly,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized access.Role-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and resources.In RBAC,each user is allowed a specific role and Permission.This implies that permitted users can access some data stored in the Cloud.This layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the process.Layer 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion attempts.The proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection system.This method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and threats.An extensive performance test was carried out to confirm the efficiency of the proposed three-tier security method.Comparisons have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption time.The proposed TLSA method provides an accuracy of 89.23%,F-Measure of 0.876,and SSIM of 0.8564 at a computation time of 5.7 s.A comparison with existing methods shows the better performance of the proposed method,thus confirming the enhanced ability to address security issues in cloud computing.展开更多
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ...The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).展开更多
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the...An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.展开更多
A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of ...A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of 15 wavelengths, number of CS is 6, so total number of wavelengths is 90 too, total capacity is 6 Terabit, but optical power is 4/15P. Over ULH and EULH markets, standard approach will be forced to reduce the total capacity to 2.4 Terabit with optical power 4/15P as in proposed method. But the new can reach 6 Terabit with the same optical power 4/15P.展开更多
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac...This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.展开更多
Recent advancements in AI have spurred interest in ferroelectric memristors for neuromorphic chips due to their ability to precisely control resistive states through polarization flip-flop without electroforming.Howev...Recent advancements in AI have spurred interest in ferroelectric memristors for neuromorphic chips due to their ability to precisely control resistive states through polarization flip-flop without electroforming.However,oxygen vacancies in these devices often cause high leakage current,low endurance,and dispersed switching voltages.Here,we introduce a silicon-based integrated(Ba_(0.6)Sr_(0.4)TiO_(3))_(0.5)(Nd_(2)O_(3))_(0.5)(BSTN)nanoscaffolded ferroelectric thin film memristor with a vertically self-assembled nanocomposite structure(VSNs)optimally oriented on La_(0.67)Sr_(0.33)MnO_(3)/SrTiO_(3)/Psingle bondSi substrates.This device demonstrates a widely tunable ferroelectric domain range(0°-180°),high remnant polarization(21.04μC/cm^(2)),and a greater number of unitary states(16 states or 4 bits).It exhibits high durability,enduring over 109 switching cycles.The switching mechanism combines ferroelectric polarization and oxygen vacancy migration,enabling the simulation of biological synaptic functions via bi-directional conductance tunability.Additionally,we implemented a low-power(0.57 pJ per event)multi-factor secure encryption system for smart locks using 16×16 BSTN memristor crossbar arrays and a pressure sensor.Under multiple factors(disordered inputs,specific users,and corresponding passwords)the system recognized passwords with 97.6%accuracy and a 3.8%loss rate after 500 iterations.Overall,this work establishes a robust foundation for advancing multilevel storage,neuromorphic computing,and AI chip applications based on ferroelectric memristors.展开更多
In this paper,a high-security three-dimensional carrierless amplitude and phase(3D-CAP)modulation technique is proposed,integrating deep learning with four-level masking.The 3D constellation geometry is optimized usin...In this paper,a high-security three-dimensional carrierless amplitude and phase(3D-CAP)modulation technique is proposed,integrating deep learning with four-level masking.The 3D constellation geometry is optimized using an autoencoder(AE)with an additive white Gaussian noise(AWGN)channel model,reducing complexity by 40%compared to a variational autoencoder(VAE).Experimental validation on a 2 km seven-core fiber intensity modulation/direct detection(IM/DD)system shows a 1 dB improvement in receiver sensitivity.A 3D chaotic oscillator model is used for chaotic selective mapping,polynomial-like masking,constellation rotation,and subcarrier masking.The encrypted 3D-CAP signal achieves a key space of up to 10^(103),with strong anti-noise and confidentiality performance.展开更多
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi...We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.展开更多
We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results sho...We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results showing how the radiofrequency spectrum of the laser can be exploited as a carrier to exchange information.The test bench for our proof of principle is a 50-km-long fiber laser linking two users,Alice and Bob,where each user can randomly add an extra 1-km-long segment of fiber.The choice of laser length is driven by two independent random binary values,which makes such length become itself a random variable.The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and,hence,to the same free spectral range.展开更多
文摘A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
基金funded by UKRI EPSRC Grant EP/W020408/1 Project SPRITE+2:The Security,Privacy,Identity and Trust Engagement Network plus(phase 2)for this studyThe authors also have been funded by PhD project RS718 on Explainable AI through UKRI EPSRC Grant funded Doctoral Training Centre at Swansea University.
文摘With cloud computing,large chunks of data can be handled at a small cost.However,there are some reservations regarding the security and privacy of cloud data stored.For solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption system.The TLSA underlines the need for the protection of sensitive data.This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and secrecy.Surprisingly,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized access.Role-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and resources.In RBAC,each user is allowed a specific role and Permission.This implies that permitted users can access some data stored in the Cloud.This layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the process.Layer 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion attempts.The proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection system.This method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and threats.An extensive performance test was carried out to confirm the efficiency of the proposed three-tier security method.Comparisons have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption time.The proposed TLSA method provides an accuracy of 89.23%,F-Measure of 0.876,and SSIM of 0.8564 at a computation time of 5.7 s.A comparison with existing methods shows the better performance of the proposed method,thus confirming the enhanced ability to address security issues in cloud computing.
基金supported by the National Natural Science Foundation of China(6120200461472192)+1 种基金the Special Fund for Fast Sharing of Science Paper in Net Era by CSTD(2013116)the Natural Science Fund of Higher Education of Jiangsu Province(14KJB520014)
文摘The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61475075 and 61271238)the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,China(Grant No.NYKL2015011)
文摘An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
文摘A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of 15 wavelengths, number of CS is 6, so total number of wavelengths is 90 too, total capacity is 6 Terabit, but optical power is 4/15P. Over ULH and EULH markets, standard approach will be forced to reduce the total capacity to 2.4 Terabit with optical power 4/15P as in proposed method. But the new can reach 6 Terabit with the same optical power 4/15P.
文摘This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.
基金supported by the National Key R&D Plan“Nano Frontier”Key Special Project(Grant No.2021YFA1200502 and 2024YFA1208400)Cultivation Projects of National Major R&D Project(Grant No.92164109)+19 种基金Disruptive Technology Innovation Project of the National Key R&D Program(Grant No.DT01202402075)the National Natural Science Foundation of China(Grant Nos.61874158,62004056,and 62104058)the Special Project of Strategic Leading Science and Technology of Chinese Academy of Sciences(Grant No.XDB44000000-7)Key Projects Supported by the Regional Innovation and Development Joint Fund(Grant No.U23A20365)Yanzhao Young Scientist Project of Hebei Province(Grant No.F2023201076)Key R&D Plan Projects in Hebei Province(Grant No.22311101D)Hebei Basic Research Special Key Project(Grant No.F2021201045)the Support Program for the Top Young Talents of Hebei Province(Grant No.70280011807)the Supporting Plan for 100 Excellent Innovative Talents in Colleges and Universities of Hebei Province(Grant No.SLRC2019018)the Interdisciplinary Research Program of Natural Science of Hebei University(No.DXK202101)the Institute of Life Sciences and Green Development(No.521100311)the Natural Science Foundation of Hebei Province(Nos.F2022201002,F2022201054 and F2021201022,F2021201045)Baoding Science and Technology Plan Project(Grant Nos.2172P011,2272P014)Baoding Science and Technology Plan Project(Grant Nos.2172P011,2272P014)the Outstanding Young Scientific Research and Innovation Team of Hebei University(Grant No.605020521001)the Special Support Funds for National High Level Talents(Grant No.041500120001)the Advanced Talents Incubation Program of the Hebei University(Grant Nos.521000981426,521100221071,and 521000981363)the Science and Technology Project of Hebei Education Department(Grant Nos.QN2020178 and QN2021026)Hebei Province High-level Talent Funding Program(Grant Nos.B20231003)Post-graduate's Innovation Fund Project of Hebei University(HBU2024SS029).
文摘Recent advancements in AI have spurred interest in ferroelectric memristors for neuromorphic chips due to their ability to precisely control resistive states through polarization flip-flop without electroforming.However,oxygen vacancies in these devices often cause high leakage current,low endurance,and dispersed switching voltages.Here,we introduce a silicon-based integrated(Ba_(0.6)Sr_(0.4)TiO_(3))_(0.5)(Nd_(2)O_(3))_(0.5)(BSTN)nanoscaffolded ferroelectric thin film memristor with a vertically self-assembled nanocomposite structure(VSNs)optimally oriented on La_(0.67)Sr_(0.33)MnO_(3)/SrTiO_(3)/Psingle bondSi substrates.This device demonstrates a widely tunable ferroelectric domain range(0°-180°),high remnant polarization(21.04μC/cm^(2)),and a greater number of unitary states(16 states or 4 bits).It exhibits high durability,enduring over 109 switching cycles.The switching mechanism combines ferroelectric polarization and oxygen vacancy migration,enabling the simulation of biological synaptic functions via bi-directional conductance tunability.Additionally,we implemented a low-power(0.57 pJ per event)multi-factor secure encryption system for smart locks using 16×16 BSTN memristor crossbar arrays and a pressure sensor.Under multiple factors(disordered inputs,specific users,and corresponding passwords)the system recognized passwords with 97.6%accuracy and a 3.8%loss rate after 500 iterations.Overall,this work establishes a robust foundation for advancing multilevel storage,neuromorphic computing,and AI chip applications based on ferroelectric memristors.
基金supported by the National Natural Science Foundation of China(Nos.62225503,62205151,62171227,U22B2009,and 61935011)the Jiangsu Provincial Key Research and Development Program(Nos.BE2022079 and BE2022055-2)+1 种基金the Natural Science Foundation of Jiangsu Higher Education Institutions of China(No.22KJB510031)the Startup Foundation for Introducing Talent of NUIST.
文摘In this paper,a high-security three-dimensional carrierless amplitude and phase(3D-CAP)modulation technique is proposed,integrating deep learning with four-level masking.The 3D constellation geometry is optimized using an autoencoder(AE)with an additive white Gaussian noise(AWGN)channel model,reducing complexity by 40%compared to a variational autoencoder(VAE).Experimental validation on a 2 km seven-core fiber intensity modulation/direct detection(IM/DD)system shows a 1 dB improvement in receiver sensitivity.A 3D chaotic oscillator model is used for chaotic selective mapping,polynomial-like masking,constellation rotation,and subcarrier masking.The encrypted 3D-CAP signal achieves a key space of up to 10^(103),with strong anti-noise and confidentiality performance.
基金supported in part by the Basic Science Research Program through the National Research Foundation of Korea Funded by the Ministry of Science,ICT & Future Planning(No.2011-0030079)the Ministry of Education(No.NRF-2013R1A1A2057549)
文摘We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.
基金This work was supported by the French National Research Agency(grants LABEX SIGMALIM and ANR 08-JCJC-0122 PARADHOQS)the European Research Council(project ULTRALASER)+2 种基金the Leverhulme Trust(grant RPG-278)the Spanish MICINN project TEC2011-27314(RAMAS)We also acknowledge support by the XLIM Institute(grant VIP2013).
文摘We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results showing how the radiofrequency spectrum of the laser can be exploited as a carrier to exchange information.The test bench for our proof of principle is a 50-km-long fiber laser linking two users,Alice and Bob,where each user can randomly add an extra 1-km-long segment of fiber.The choice of laser length is driven by two independent random binary values,which makes such length become itself a random variable.The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and,hence,to the same free spectral range.