2007
DOI: 10.1109/jlt.2007.901329
|View full text |Cite
|
Sign up to set email alerts
|

WDM-Compatible Channel Scrambling for Secure High-Data-Rate Optical Transmissions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…A simple way to achieve it is by means of conventional existing optical elements (this architecture is mainly used for ultrashort pulse OCDMA [7,8], or __ J /e35% pulse shaping), i.e. using a highly dispersive diffraction grating, in a 4-f set-up (symmetrical set-up is used for decoding) providing a 1-D dispersion of input-signal spectral information.…”
Section: Time-frequency Scrambling Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…A simple way to achieve it is by means of conventional existing optical elements (this architecture is mainly used for ultrashort pulse OCDMA [7,8], or __ J /e35% pulse shaping), i.e. using a highly dispersive diffraction grating, in a 4-f set-up (symmetrical set-up is used for decoding) providing a 1-D dispersion of input-signal spectral information.…”
Section: Time-frequency Scrambling Approachmentioning
confidence: 99%
“…Then, the mask transmission becomes the critical parameter of the encryption technique. The key transmission may be carry out by classical way with POCS algorithm [8] or using quantum key distribution (QKD) [15].…”
Section: Potential Attack Based On Spectral Phase Measurementmentioning
confidence: 99%
See 1 more Smart Citation
“…We remark that this encoding scheme is a coherent spectral phase encoded timespreading technique and it is vulnerable with respect to the use of differential phase shift keying (DPSK) demodulator or an optical spectral analyzer, due to the presence of dips in the spectrum of the encoded data [5]. Different approaches can be used to overcome these impairments, as increasing the number of phases [6] or using a phase masking technique [10]. Using a device with N ports, and phase shifters that can assume only two values, the number of the optical codes (secret keys) is K=2 N .…”
Section: Bit-cipheringmentioning
confidence: 99%
“…This strategy encompasses the physical encryption of signals in the optical layer. In fact, several recent proposals approach this subject by utilizing hybrid electro-optical schemes [3], nonlinear effects [4], and spectral phase-encoding (SPE) [5].…”
Section: Introductionmentioning
confidence: 99%