2022
DOI: 10.1109/jphot.2021.3122909
|View full text |Cite
|
Sign up to set email alerts
|

Highly Secure and Reliable 7-Core Fiber Optical OFDM Access System Based on Chaos Encryption Inside Polar Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 32 publications
0
1
0
Order By: Relevance
“…Various physical layer encryption methods, such as quantum key distribution (QKD) [7], optical steganography [8], optical code division multiple access (OCDMA) [9], hardware chaos encryption [10][11][12][13], and digital chaos encryption [14][15][16][17][18][19][20][21][22][23][24], etc., have all made significant contributions to securing data. Zhang et al used an implementation of high-speed QKD in an SiP QKD encoder using a pass-block architecture and a dedicated SiP decoder based on the polarization-based decoy state Bennett-Brassard 1984 protocol [7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Various physical layer encryption methods, such as quantum key distribution (QKD) [7], optical steganography [8], optical code division multiple access (OCDMA) [9], hardware chaos encryption [10][11][12][13], and digital chaos encryption [14][15][16][17][18][19][20][21][22][23][24], etc., have all made significant contributions to securing data. Zhang et al used an implementation of high-speed QKD in an SiP QKD encoder using a pass-block architecture and a dedicated SiP decoder based on the polarization-based decoy state Bennett-Brassard 1984 protocol [7].…”
Section: Introductionmentioning
confidence: 99%
“…Liang et al used chaotic Hilbert motion encryption, and Hilbert motion on the key and used the hash value generated from the encryption result as a digital signature to effectively secure the OFDM-PON system [15]. Bai et al used Chua's circuit model to realize an OFDM-PON security system with polarity-coded chaotic encryption [16].…”
Section: Introductionmentioning
confidence: 99%
“…However, for one, with the rapid development of technology, the update speed of the algorithm is faster than ever before [6], [7], [8], [9], [10]. Secondly, due to the two-dimensionality of digital images, the redundancy and strong correlation between adjacent pixels are eye-catching [11], [12], [13], [14], [15]. Therefore, information security is facing severe challenges in network communication, which urges us to study more secure digital image encryption schemes [13], [16], [17], [18], [19].…”
Section: Introductionmentioning
confidence: 99%