2023
DOI: 10.1364/ol.503743
|View full text |Cite
|
Sign up to set email alerts
|

Integrating key generation and distribution with the quantum noise stream cipher system without compromising the transmission performance

Yuang Li,
Yajie Li,
Kongni Zhu
et al.

Abstract: We propose and experimentally demonstrate a secure quantum noise stream cipher transmission system that integrates key generation and distribution. At the stage of carrier phase recovery, the estimated phase noise is used to generate randomness keys without additional equipment. Based on direct sequence spread spectrum technology, we integrate the distributed keys with quantum noise stream cipher signals. The key distribution and encryption transmission can be completed simultaneously without occupying additio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
0
0
Order By: Relevance
“…Photonic-layer secure communication safeguards against adversarial detection in the optical domain by employing a range of security technologies, including optical chaos [1][2][3][4][5], optical code division multiplexing [6][7][8], quantum noise randomized ciphers [9][10][11][12], optical frequency hopping [13][14][15], quantum key distribution [16,17], and optical covert communication (OCC) [18][19][20][21][22][23]. OCC requires a higher level of security than merely protecting the content from unauthorized access through encryption, and the security requirement is imperceptibility for optical covert communication.…”
Section: Introductionmentioning
confidence: 99%
“…Photonic-layer secure communication safeguards against adversarial detection in the optical domain by employing a range of security technologies, including optical chaos [1][2][3][4][5], optical code division multiplexing [6][7][8], quantum noise randomized ciphers [9][10][11][12], optical frequency hopping [13][14][15], quantum key distribution [16,17], and optical covert communication (OCC) [18][19][20][21][22][23]. OCC requires a higher level of security than merely protecting the content from unauthorized access through encryption, and the security requirement is imperceptibility for optical covert communication.…”
Section: Introductionmentioning
confidence: 99%