Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Semi-quantum noise randomized data encryption based on an amplified spontaneous emission light source

Open Access Open Access

Abstract

The first semi-quantum noise randomized cipher based on amplified spontaneous emission (ASE) light source employing Y-00 protocol is proposed and demonstrated by a proof-of-principle experiment. As the signal carrier, ASE light can provide another fundamental uncertainty, namely, self-beating noise of ASE signal, which is much bigger than quantum shot noise of mesoscopic coherent state and also inevitable. By incorporating both the shot noise and beat noise of ASE signals, the security will be improved with a larger number of masked signals (NMS) under intrinsic noise. After formulating NMS and Q-factor in theory, we investigate the impacts of key system parameters on the security and transmission performances, respectively, in order to optimize the system design. To evidence the theoretical results, an experimental setup with balanced photodetector (BPD) as decoder is constructed. The local light modulated by M/2-ary running key is applied as optical threshold signal, which is fed into BPD together with the M-ary ASE signal, outputting the binary signal. Eventually, a 128-level Y-00 realization based on ASE source is realized at 2.5Gb/s over 100-km fiber. The experimental results agree with the theory in the trend, which indicate the validity and feasibility of the proposed scheme.

© 2018 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

With the everlasting pursuits for large-capacity communications, an increasing amount of personal information and confidential information are transmitted over optical fiber networks. Thus, secure fiber transmission has attracted considerable attention. Although quantum key distribution (QKD) together with one-time pad (OTP) encryption should have been a perfect secrecy communication system [1], the key generation rate is too limited (eg., 2.38Mb/s [2]) to support high-speed data stream with OTP, which needs key stream as long as data. This has led to the seeking of efficient physical-layer encryption technologies that provide data security ensured by physical principles, instead of the large computation complexity of traditional mathematical cipher.

Quantum-noise randomized cipher (QNRC) is an emerging physical-layer encryption method based on Heisenberg’s uncertainty principle [3], which can realize high-speed and long-distance secure transmission [4]. Yuen 2000 (Y-00), the basic QNRC protocol [5], exploits the quantum noise of multiphoton coherent states (i.e., uncertainty of phase [6] or intensity [7]) to mask M-ary signals so as to protect both the key and data in safe. Employing multi-level modulation, QNRC is well compatible with the currently existing optical network infrastructure. So far, QNRC realization with data rate up to single-channel 40Gb/s over 480-km fiber has been reported [8]. Recently, a QNRC system with 70Gb/s single-channel transmission over 100km is realized, whose secret key is on-line generated by continuous variable QKD [9].

According to the previous studies [5,8,10,11], the security level of QNRC is particularly dependent on the number of masked signals (NMS), which means the larger NMS contributes to a safer system. Generally, there are two ways to enlarge NMS, namely, diminishing the adjacent signal distance and enhancing the quantum noise effect. A sophisticated scheme was proposed [11], which further divides the basic state divisions of Y-00 into many regions, whereas two independent key streams were needed. And the former way may be limited by the hardware circuits. The latter one usually resorts to the amplified spontaneous emission (ASE) noise, which is common in optical fiber channel, so as to assist quantum shot noise to mask more states. The previous schemes of the latter method adopt the ordinary laser sources for fiber communications and introduce ASE noise by employing erbium-doped fiber amplifiers (EDFA) [3, 8, 10]. Because ASE is much bigger than the quantum shot noise of coherent state of laser light, the NMS can be quite large.

However, the ASE noise is still a kind of additive noise with broad spectrum in contrast to the coherent-state signal, which can be greatly reduced by optical filtering without damaging the signal. In this paper, we propose and investigate a Y-00 encryption system based on ASE light source, that is, the information is carried on ASE light [13]. Therefore, if eavesdroppers try suppressing the classical ASE, the useful signals will be impaired inevitably, and information will still be unavailable to them. We believe our scheme based on ASE source can provide an improved security with larger NMS than the previous ASE-assisted schemes under the same conditions. This paper is organized as follows. In Section 2, the theoretical model of our scheme is described and investigated. A proof-of-principle experiment is demonstrated in Section 3, which is followed by the discussion and conclusion in Section 4.

2. System model of QNRC based on ASE light source

2.1 System model

As a noise optical source, ASE light with random phase, polarization and wavelength is not the pure coherent state but an incoherent collection of a series of basic coherent states, which also has certain quantum uncertainty. In this paper, we discuss the ASE source based Y-00 system of M-ary intensity modulation (ISK), as shown in Fig. 1. A polarizer is placed after ASE source to ensure only one polarization will be modulated, aiming at reducing the polarization-dependent noise. The modulating signal is the M-ary ciphertext generated according to Y-00 protocol. The optical bandwidth and power spectral density (PSD) of ASE signal are adjusted by optical band-pass filter (OBPF) and variable optical attenuator (VOA), respectively. Suppose the average output power from transmitter (Alice) to be P¯ASE,0=S¯ASEBo, with optical bandwidth Bo and average PSD S¯ASE. And the M-ary modulated signal power P0m, m = 1~M, gives

P¯ASE,0=1Mm=1MP0m=12(P01+P0M)=12(P01+extP01),
where ext is the extinction ratio of modulator. Then the lowest-level power corresponding to ciphertext m = 1 is P01=2P¯ASE,0/(1+ext), and the power difference between adjacent levels is δP=P0MP01M1(P0MP01)/M. So P0m=P01+(m1)δP.

 figure: Fig. 1

Fig. 1 Schematic of ISK semi-QNRC based on ASE source. PRNG: pseudo-random number generator.

Download Full Size | PDF

First, consider eavesdropper Eve. She is assumed to be extremely powerful, who can acquire the original output signals. Because ASE light is incoherent with random characteristics, coherent detection is basically impossible for eavesdroppers. Thus only direct photoelectric detection can be performed in our scheme, through which the corresponding M-level electrical signals will be

Im=Pm0=2S¯ASEBo1+ext[1+(m1)ext1M],m=1~M.
Hereinto, =ηq/hν is detector responsibility with quantum efficiency η, electronic charge q and photon energy hν. Then the difference of adjacent electrical signals is

δI=ext1M2P¯ASE,01+ext.

Meanwhile, Eve is confronted with various kinds of noise, including quantum shot noise, beat noise, thermal noise and other noise sources. Among them, shot noise and self-beating noise of ASE signals can never be eliminated, which both are the uncertainties unavoidable in any case, despite the technical development. Hereinto, the shot noise is originated from quantum noise and the signal self-beating noise is classical, so this scheme is a semi-QNRC in the rigorous sense. Specifically, the quantum shot noise and signal ASE-ASE beat noise can be derived as [14]

σshot,m2=2qImBe=4qS¯ASEBo1+ext[1+(m1)ext1M]BeσASEASE,m2=Im2Be2Bo2(2BoBe)=2(S¯ASE1+ext)2(1+(m1)ext1M)2Be(2BoBe),
where subscript m denotes the noise variance of the m-th level and Be is the electrical bandwidth of receiver. Then, the quantum uncertainty of the m-th level signal is ΔIm=σshot,m2+σASEASE,m2. So the m-th level signal received by Eve can be treated as a random variable following Gaussian distribution with average Im and standard deviation ΔIm. Further, the average uncertainty of M signal levels will be
ΔIavg=1Mm=1Mσshot,m2+σASEASE,m2.
According to Eqs. (3) and (5), the average number of states masked by the intrinsic noise, i.e., NMS, can be denoted as
ΓASEE=ΔIavgδI=m=1M(1+(m1)ext1M)Be[2qBo+(S¯ASE1+ext)(1+(m1)ext1M)(2BoBe)](ext1)Bo2S¯ASE1+ext.
As is known to us, Eve will be unable to discriminate all signal levels physically without mistakes whenΓASEE1.

Now focus on the legitimate transmission to receiver Bob. For long-haul transmission, several relay amplifiers will be employed. The average output power of each relaying EDFA can be expressed as [15]

P¯ASE,i=GiLiP¯ASE,i1+Ni,1izNi=2hνnsp(Gi1)Bo.
Here Gi is the EDFAi gain, Li is the fiber loss of each span before EDFAi, Ni is the added ASE noise from EDFAi, nsp is spontaneous emission factor and Bo is the optical bandwidth of Ni. Then, the ASE average signal power and noise power Bob receives are, respectively,
P¯ASE,s=(i=1zGiLi)S¯ASEBoPASE,N=(i=2zGiLi)N1+(i=3zGiLi)N2++NZ=j=1Z(Nji=j+1zGiLi).
To reduce noise ASE, the same OBPF (bandwidth Bo) as that of Alice is adopted before detection. Suppose the loss of each fiber span is just offset by the EDFA behind, i.e., Gi = 1/Li, then they become: P¯ASE,s=S¯ASEBo and PASE,N=2hνnspi=1Z(Gi1)Bo.

By regulating the decision threshold as the running key generated from shared seed key, the M-ary ISK signal can be recovered into binary. Bob only need make a decision between a pair of basis states {ImB,Im+M/2B}. After channel transmission, the received ASE spectrum is the superposition of source ASE signal and noise ASE from EDFA. Thus, we consider the received PSD of the m-th level ASE light as

SASE,m=(1+(m1)ext1M)2S¯ASE1+ext+2hνnspi=1Z(Gi1),
where the first term is the m-th level ASE signal, and the accumulated ASE noise of the second term has two orthogonal polarization modes. Then ImB=SASE,mBo.

As for the electrical noise at Bob, we take into account thermal noise, shot noise and ASE-ASE beat noise, which are, respectively,

σT2=4kBTRLBeσshot,m2=2q[(1+(m1)ext1M)2S¯ASE1+ext+2hνnspi=1Z(Gi1)]BoBeσASEASE,m2=2[((1+(m1)ext1M)2S¯ASE1+ext+hνnspi=1Z(Gi1))2+(hνnspi=1Z(Gi1))2]Be(2BoBe)2.
Here kB is Boltzmann constant, RL is load resistance, and T is absolute temperature. In σASEASE,m2, there are two independent self-beating noise terms of two polarization modes. As a result, the average Q-factor of the M/2 pairs of bases can be derived as

Q=2Mm=1M/2Im+M/2Imσm+M/2+σm=m=1M/22M(ext1ext+1)S¯ASEBoσT2+σshot,M/2+m2+σASEASE,M/2+m2+σT2+σshot,m2+σASEASE,m2.

2.2 Numerical results

Based on the theoretical model above, we investigate the security and transmission performances of this ASE-based semi-QNRC in terms of NMS and Q-factor, respectively. Some general parameters are configured in Table 1.

Tables Icon

Table 1. Simulation parameters.

Figure 2 illustrates the impact of number of signal levels on security, with P¯ASE,0=6dBm, Bo = 200GHz, and for Eve Be = R/2 = 1.25GHz. It seems that NMS increases exponentially with the length of symbol, l = log2M. Meanwhile, the average symbol error rate of Eve based on Gaussian distribution with mean Im and standard deviation ΔIm rises with the growth of ΓASEE. To compare with the former ASE-assisted scheme, we also present the case, where an inner EDFA is adopted to boost P¯ASE,0 from −24dBm to 6dBm. The NMS of ASE noise assisted ISK schemes, ΓLDE, is calculated based on homodyne coherent detection under the same settings, where the coherent-state light is attenuated to be mesoscopic and then amplified with ASE noise added. The gain of EDFA is Gin = 30dB that saturates its impact on security [10] and outputs are all 6dBm. And the NMS of quadrature amplitude modulation (QAM) QNRC is nearly a square multiple of ISK NMS [12], so (ΓLDE)2 is presented to approximate ΓQAM. In comparison, obviously, ΓASEE is always much larger than ΓLDE, which shows the better security of this scheme. For small M, ΓASEE is superior to (ΓLDE)2, and the NMS of 2-D modulation surpasses that of our ASE scheme for big M. For NMS, here 1335-level ASE scheme is equivalent to a 1335 × 1335 QAM scheme. Further, the adoption of Gin brings a little influence on ΓASEE with the same output power here, since there is already sufficient ASE from source.

 figure: Fig. 2

Fig. 2 NMS and symbol error rate versus the number of signal levels M = 2l, with η = 1 for Eve.

Download Full Size | PDF

We evaluate the NMS, ΓASEE as well as ΓLDE, as a function of the output power from transmitter for the case of Bo = {50GHz, 200GHz} and EDFA gain of ΓLDE at 30dB, as shown in Fig. 3(a). ΓLDE is evidently getting smaller with the growth of output power, while the decrease of ΓASEE with larger power is very tiny, which is almost insensitive to output power (PSD, actually). Thus, to achieve NMS large enough, the former needs to make output not too strong. In contrast, the latter can send out more powerful signal, which resists more fiber loss. Moreover, for the same power, the NMS ΓASEE with narrow optical bandwidth is much bigger apparently. It implies the security of this ASE-based Y-00 realization can be guaranteed by mainly setting the output Bo. Note that too small Bo affects the legitimate Q-factor (see Fig. 4 below).

 figure: Fig. 3

Fig. 3 (a) NMS versus output power, with Be = R/2; (b) NMS versus Be of eavesdropper receiver/bit rate, with average output PSD S¯ASE = −107dBm/Hz. M = 128 and η = 1 for both (a)(b).

Download Full Size | PDF

 figure: Fig. 4

Fig. 4 (a) Q-factor versus optical bandwidth; (b) Q-factor versus average output PSD, S¯ASE, with 20 relay EDFAs. For both, M = 128, Be = 2.7GHz, G0 = 30dB and =0.9.

Download Full Size | PDF

Further, NMS ΓASEE versus the electrical bandwidth of Eve’s receiver normalized to bit rate is shown in Fig. 3(b), for different Bo and the same PSD. It indicates the eavesdropper will reduce Be as far as possible in order to weaken the intrinsic noise masking effect. However, according to the first Nyquist criteria, there is a lower bound for the low-pass bandwidth, i.e., BeR/2. Below the Nyquist criteria, severe intersymbol interference (ISI) will occur, so NMS can’t be decreased infinitely by electrical filtering. Additionally, for the same PSD, narrow Bo also benefits the increase of NMS. Without doubt, Eve cannot diminish NMS by optical filtering, too.

When analyzing transmission performance, we take Gi = 1/Li = G0 for simplicity, implying that the relay EDFAs are deployed at uniformly-spaced positions with equal gains.

The impacts of optical bandwidth and PSD on Q-factor are analyzed in Fig. 4, for different numbers of relay EDFAs. Figure 4(a) focuses on how to set Bo to get optimal Q-factor for certain number of relays and output power. It indicates when there is no ASE noise from relays, Q-factor is better with broader bandwidth. However, as the increase of transmission distance, the accumulative ASE noise from channel gradually becomes the dominant noise, which is more serious with bigger Bo. Therefore, for certain output power, there is an optimal Bo maximizing the Q-factor. And the more ASE noise is accumulated, the smaller the optimal Bo will be. Besides, when output signal power decreases, the optimal Bo also goes narrow. Furthermore, the Q-factor gets better with the growth of output PSD with Bo fixed, as shown in Fig. 4(b). And for the same PSD, although the broader optical bandwidth brings more noise in, the signal power is also larger, which enlarges the Q-factor as a result, even with enough ASE noise (20 EDFAs). Thus, it is no good for Bob adopting a narrower OBPF than Alice, and he had better use the same OBPF.

Figure 5 investigates the Q-factor as a function of the number of EDFA stages, which corresponds to transmission distance, for different values of receiver electrical bandwidth and output power. Here EDFA with G0 = 30dB is deployed every 150-km fiber with loss coefficient of 0.2 dB/km, that is, every stage of EDFA implies a distance of 150km. Normally, Q-factor becomes worse with the accumulation of ASE from relay EDFAs. And the impacts of different power values are increasingly different for longer distance. Importantly, Q-factor can be greatly improved by appropriate electrical filtering, which reduces much noise. For example, an extra 1650km or 750km can be transmitted at Q = 6 (bit-error rate, BER = 10−9) by filtering Be to 0.75R (1.875GHz) from 2.7GHz, as shown in Fig. 5.

 figure: Fig. 5

Fig. 5 Q-factor versus optical amplifier stages corresponding to transmission distance, with M = 128, Bo = 500GHz, G0 = 30dB and =0.9.

Download Full Size | PDF

3. Experiment of ISK-QNRC based on ASE source

3.1 Experimental Setup

Based on the equipment available to us, we perform a proof-of-principle experiment for the proposed scheme. And a 128-ISK ASE-based semi-QNRC is demonstrated at 2.5Gb/s over 100-km optically amplified links.

The experimental setup is presented in Fig. 6. The spectrum of ASE source is centered at 1547.5nm with a 10dB bandwidth of 5THz spanning from 1527.5nm to 1567.5nm, as shown in Fig. 7(a). A polarization beam splitter (PBS) splits the ASE light into two polarization modes, and only one polarization is utilized. Then the polarized ASE is modulated by Mach-Zehnder modulator (MZM), of which the modulating signal is the M-ary electrical signal generated by Arbitrary Waveform Generator (AWG) according to ciphertext symbols. Note that the M-ary ciphertext is mapped from binary data bit and M/2-ary running key symbol according to the Y-00 protocol. The data bit sequence pattern is set by pseudo-random binary sequence (PRBS) with the length of 211-1, and the running key symbol is randomized following uniform distribution. The AWG is running at 2.5Gsymbol/s with a 10-bit resolution, implying a data rate of 2.5Gb/s. The commercial wavelength selective switch (WSS) works as a tunable OBPF to adjust Bo, and VOA1 is to control the output PSD. P¯ASE,0=S¯ASEBo is monitored by an optical power meter (OPM) at the weak branch of a 1:9 optical coupler (OC).

 figure: Fig. 6

Fig. 6 Experimental setup of ISK-QNRC based on ASE source. PC, polarization controller.

Download Full Size | PDF

 figure: Fig. 7

Fig. 7 (a) Full spectrum of ASE source; (b) different spectra of WSS filtering.

Download Full Size | PDF

The transmission line is a 100-km optically amplified links over 2 × 50.4 km standard single-mode fiber (SSMF) spans and the corresponding dispersion compensation fiber (DCF) as well as two EDFAs with gain at 16.9dB. The stability of AWG clock is enhanced by introducing a 10MHz external reference (X72 Rubidium frequency standard), because we find the clock of ciphertext channel becomes unstable after 100-km transmission.

At receiver, a local light source, tunable laser (TLD), is adopted, which is modulated by the MZM driven by the running key signals from a second channel of AWG synchronously. This key-modulated local light is to be applied as the deciphering signal. To match the received encrypted optical signal, the modulated local light will pass the optical tunable delay line (OTDL) and VOA3, where time delay and power levels must be properly adjusted, respectively. Then the received ASE signal carrying ciphertext symbol and the matched local light modulated by corresponding running key symbol are detected by a balanced photodetector (BPD) simultaneously. As a result of balanced detection, the binary signal can be recovered from the M-ary encrypted signal after clock data recovery (CDR). The low-pass filter (LPF) is employed after BPD to restrict the electrical bandwidth, Be. The oscilloscope (OSCP) is to monitor the adjusting results of OTDL and VOA3. At last, the transmission performance is measured by a BER tester.

3.2 Results and Analyses

We perform several experimental tests for back-to-back (B2B) transmission and 100-km transmission, and for different system parameters, so as to investigate the proposed semi-QNRC based on ASE source. Figure 8 presents some visualized results. In contrast, the M-ISK signals of ASE source (Figs. 8(c) and 8(d)) are harder to distinguish than those of coherent laser diode (Figs. 8(a) and 8(b)). Note that the power for the first row is larger to display their difference. Due to the unavoidable quantum noise, the eye-openings of Y-00 encrypted signals can’t be observed fundamentally (Figs. 8(e), 8(g), 8(q) and 8(s)), which are measured directly or with unmatched key and may be regarded as what the eavesdroppers obtain. It implies the security, since Eve cannot acquire the correct Y-00 signals, not to mention the plaintext. However, the eye-openings after decrypted by the running key are clearly measured. Comparing Figs. 8(f) and 8(j), and Figs. 8(h) and 8(l) for the same PSD (−126.3dBm/Hz), we see the eye-openings with larger Bo are better, which conforms to Fig. 4(b). Comparing Figs. 8(n) and 8(p), and Figs. 8(r) and 8(t) for the same M, we find the eye-openings with a properly smaller Be are clearer, which conforms to the results of Fig. 5.

 figure: Fig. 8

Fig. 8 Measured eye diagrams and waveforms. (a)-(d) measured directly by optical port of OSCP. (e)-(t) results of BPD: (e)(g)(q)(s) Y-00 encrypted signals and (f) (h)-(p) (r)(t) corresponding decrypted signals. (e)-(h) Bo = 2.5T, B2B, Be = 2.7G; (i)-(n) Bo = 5T, B2B, Be = 2.7G; (o)(p) Bo = 5T, B2B, Be = 27G; (q)(r) Bo = 5T, 100km, Be = 2.7G; (s)(t) Bo = 5T, 100km, Be = 27G. 132ps/div for all eye diagrams.

Download Full Size | PDF

We further measure the BER curves as functions of M = 2l and Bo in B2B tests, respectively, as shown in Fig. 9. In Fig. 9(a), it shows M becomes a less influential factor on BER for M large enough. And BER with LPF is better than that without LPF by about two orders of magnitude. The dotted line, representing the corresponding theoretical result for Be = 27GHz, agrees with the tendency of experiment result. Despite the similar tendency, system performance in theory can be greatly improved with Be = 2.7GHz, whose BER is far bellow the corresponding experiment result. In Fig. 9(b), the impact of Bo is experimentally (Exp.) tested with the fixed output power for M = 4 and M = 128, where the values of Bo are set by WSS as Fig. 7(b) shows. It is in accordance with the Q-factor trend of Fig. 4(a), but the BER performance is worse than the theoretical results, which is simulated by following the experiment setup with 2 EDFAs of 16.9dB for 100km and M = 128. We attribute these degradations of experiment performances to the lack of a typical QNRC receiver, and some concrete causes will be discussed in Section 4. After all, the theoretical model only considers the main noise sources.

 figure: Fig. 9

Fig. 9 Measured BER curves. (a) BER versus the number of signal levels M = 2l, with Bo = 2.5THz; (b) BER versus Bo, with Be = 2.7G. For both, P¯ASE,0=-2.67dBm and =0.75 of BPD .

Download Full Size | PDF

Figure 10 presents the measured BER as a function of average received power for B2B and 100-km transmission (configured as Fig. 6) at 2.5Gb/s, with M = 128, Bo = 5THz and output power 6.25dBm. In this case with ext = 22.89, for Eve of Be = R/2 and η = 1, NMS of the intrinsic noise is calculated to be NMS = 1.097 as Eq. (6), implying certain guaranteed security. It indicates a BER below the forward error correction (FEC) threshold is achieved after 100-km transmission. The power penalty of our system between B2B and 100km is about 1.545dB and 0.762dB for BER = 10−6 and FEC threshold of 2 × 10−3 [8], respectively. The feasibility of the theoretical scheme is experimentally demonstrated, though, the system performance is worse than the theoretical results in Section 2. And we will discuss the reasons in next part.

 figure: Fig. 10

Fig. 10 Measured BER versus the average received power. M = 128, Bo = 5THz and Be = 2.7GHz.

Download Full Size | PDF

4. Discussion and Conclusion

The receiver of the proposed scheme follows the general QNRC receiver [4], which changes the decision threshold as the running key. However, we don’t have such a sophisticated receiver, so this experimental system based on standard components is a substitute for proof of principle. Although the performance seems not as good as that in theory, it does demonstrate the validity and feasibility of this scheme. The causes of degradations may be described as follows. The receiver lacks a proper OBPF, leading to the extra out-band noise into BPD. The BPD with two photodetectors may double some basic electrical noise, such as shot noise, dark current and so on. And DCF is not perfectly matched with the SSMF and there are some residues of chromatic dispersion, which broadens the transmitted waveform and results in ISI. Moreover, the M-ary ciphertext and M/2-ary running key are best to be uniformly-spaced. However, because the driver of MZM could have some nonlinearity, the output signals driving the MZM may be not uniformly-spaced, so will the modulated optical signals, correspondingly. These causes mainly result from the substitute of QNRC receiver, as well as dispersion residue. We believe this ASE source based scheme should have desirable performance, when employing typical QNRC receiver.

In addition, the NMS in this paper is obtained by theoretical calculation, which only considers the unavoidable intrinsic noise and imagines Eve of the strongest ability, i.e., she has access to the original output signals and has ideal receiver with η=1 and Be = R/2. However, NMS in [8], Yoshida et al, and [12], Nakazawa et al, are obtained from the measurement results of B2B test, which can be quite large. From the comparison under equal conditions (Fig. 2), we believe the NMS of our scheme by practical measurement can be considerably large, too.

In conclusion, we propose and experimentally demonstrate the semi-QNRC based on ASE light source employing ISK Y-00 protocol. This scheme can provide a larger NMS by incorporating the quantum shot noise and beat noise of ASE signals, which are both fundamentally inevitable. The improvement of security and the feasibility for transmission are investigated in terms of NMS and Q-factor, respectively. A proof-of-principle experiment is performed to verify the proposed scheme. Specifically, a BPD is adopted as the optical comparator to decode the M-ary Y-00 encrypted signals with the M/2-ary key-modulated local light as optical threshold signals, correspondingly. The experimental results basically agree with the theory, and a 128-level Y-00 realization based on ASE source is realized at 2.5Gb/s over 100-km optically amplified links. This ASE-based semi-QNRC is believed to be a promising scheme for secrecy communications, and we will work on the quantitative principle of setting parameters for optimal system performance in the next step.

Funding

National Natural Science Foundation of China (NSFC) (61475193, 61504170, 61673393); Natural Science Foundation of Jiangsu Province (BK20140069).

References and links

1. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81(3), 1301–1350 (2009). [CrossRef]  

2. K. Patel, J. Dynes, M. Lucamarini, I. Choi, A. Sharpe, Z. L. Yuan, R. Penty, and A. Shields, “Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks,” Appl. Phys. Lett. 104(5), 051123 (2014). [CrossRef]  

3. G. S. Kanter, D. Reilly, and N. Smith, “Practical physical-layer encryption: The marriage of optical noise with traditional cryptography,” IEEE Commun. Mag. 47(11), 74–81 (2009). [CrossRef]  

4. K. Ohhata, O. Hirota, M. Honda, S. Akutsu, Y. Doi, K. Harasawa, and K. Yamashita, “10-Gb/s Optical Transceiver Using the Yuen 2000 Encryption Protocol,” J. Lightwave Technol. 28(18), 2714–2723 (2010). [CrossRef]  

5. R. Nair, H. P. Yuen, E. Corndorf, T. Eguchi, and P. Kumar, “Quantum-noise randomized ciphers,” Phys. Rev. A 74(5), 052309 (2006). [CrossRef]  

6. G. A. Barbosa, E. Corndorf, P. Kumar, and H. P. Yuen, “Secure communication using mesoscopic coherent states,” Phys. Rev. Lett. 90(22), 227901 (2003). [CrossRef]   [PubMed]  

7. O. Hirota, M. Sohma, M. Fuse, and K. Kato, “Quantum stream cipher by the Yuen 2000 protocol: Design and experiment by an intensity-modulation scheme,” Phys. Rev. A 72(2), 022335 (2005). [CrossRef]  

8. M. Yoshida, T. Hirooka, K. Kasai, and M. Nakazawa, “Single-channel 40 Gbit/s digital coherent QAM quantum noise stream cipher transmission over 480 km,” Opt. Express 24(1), 652–661 (2016). [CrossRef]   [PubMed]  

9. M. Nakazawa, M. Yoshida, T. Hirooka, K. Kasai, T. Hirano, T. Ichikawa, and R. Namiki, “QAM quantum noise stream cipher transmission over 100km with continuous variable quantum key distribution,” IEEE J. Quantum Electron. 53(4), 8000316 (2017).

10. H. Jiao, T. Pu, P. Xiang, J. Zheng, T. Fang, and H. Zhu, “Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links,” Quantum Inform. Process. 16(8), 189 (2017). [CrossRef]  

11. O. Hirota, “Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol,” Phys. Rev. A 76(3), 032307 (2007). [CrossRef]  

12. M. Nakazawa, M. Yoshida, T. Hirooka, and K. Kasai, “QAM quantum stream cipher using digital coherent optical transmission,” Opt. Express 22(4), 4098–4107 (2014). [CrossRef]   [PubMed]  

13. B. Wu, M. P. Chang, B. J. Shastri, P. Y. Ma, and P. R. Prucnal, “Dispersion Deployment and Compensation for Optical Steganography Based on Noise,” IEEE Photonics Technol. Lett. 28(4), 421–424 (2016). [CrossRef]  

14. E. Desurvire, Erbium-Doped Fiber Amplifiers, Principles and Applications (John Wiley & Sons, 2002).

15. C. R. Giles and E. Desurvire, “Propagation of signal and noise in concatenated erbium-doped fiber optical amplifiers,” J. Lightwave Technol. 9(2), 147–154 (1991). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (10)

Fig. 1
Fig. 1 Schematic of ISK semi-QNRC based on ASE source. PRNG: pseudo-random number generator.
Fig. 2
Fig. 2 NMS and symbol error rate versus the number of signal levels M = 2l, with η = 1 for Eve.
Fig. 3
Fig. 3 (a) NMS versus output power, with Be = R/2; (b) NMS versus Be of eavesdropper receiver/bit rate, with average output PSD S ¯ ASE = −107dBm/Hz. M = 128 and η = 1 for both (a)(b).
Fig. 4
Fig. 4 (a) Q-factor versus optical bandwidth; (b) Q-factor versus average output PSD, S ¯ ASE , with 20 relay EDFAs. For both, M = 128, Be = 2.7GHz, G0 = 30dB and =0.9.
Fig. 5
Fig. 5 Q-factor versus optical amplifier stages corresponding to transmission distance, with M = 128, Bo = 500GHz, G0 = 30dB and =0.9.
Fig. 6
Fig. 6 Experimental setup of ISK-QNRC based on ASE source. PC, polarization controller.
Fig. 7
Fig. 7 (a) Full spectrum of ASE source; (b) different spectra of WSS filtering.
Fig. 8
Fig. 8 Measured eye diagrams and waveforms. (a)-(d) measured directly by optical port of OSCP. (e)-(t) results of BPD: (e)(g)(q)(s) Y-00 encrypted signals and (f) (h)-(p) (r)(t) corresponding decrypted signals. (e)-(h) Bo = 2.5T, B2B, Be = 2.7G; (i)-(n) Bo = 5T, B2B, Be = 2.7G; (o)(p) Bo = 5T, B2B, Be = 27G; (q)(r) Bo = 5T, 100km, Be = 2.7G; (s)(t) Bo = 5T, 100km, Be = 27G. 132ps/div for all eye diagrams.
Fig. 9
Fig. 9 Measured BER curves. (a) BER versus the number of signal levels M = 2l, with Bo = 2.5THz; (b) BER versus Bo, with Be = 2.7G. For both, P ¯ ASE,0 =-2.67dBm and =0.75 of BPD .
Fig. 10
Fig. 10 Measured BER versus the average received power. M = 128, Bo = 5THz and Be = 2.7GHz.

Tables (1)

Tables Icon

Table 1 Simulation parameters.

Equations (11)

Equations on this page are rendered with MathJax. Learn more.

P ¯ ASE,0 = 1 M m=1 M P 0m = 1 2 ( P 01 + P 0M )= 1 2 ( P 01 +ext P 01 ) ,
I m = P m0 = 2 S ¯ ASE B o 1+ext [ 1+( m1 ) ext1 M ],m=1~M .
δI= ext1 M 2 P ¯ ASE,0 1+ext .
σ shot,m 2 =2q I m B e = 4q S ¯ ASE B o 1+ext [ 1+( m1 ) ext1 M ] B e σ ASEASE,m 2 = I m 2 B e 2 B o 2 ( 2 B o B e )=2 ( S ¯ ASE 1+ext ) 2 ( 1+( m1 ) ext1 M ) 2 B e ( 2 B o B e ),
Δ I avg = 1 M m=1 M σ shot,m 2 + σ ASEASE,m 2 .
Γ ASE E = Δ I avg δI = m=1 M ( 1+( m1 ) ext1 M ) B e [ 2q B o +( S ¯ ASE 1+ext )( 1+( m1 ) ext1 M )( 2 B o B e ) ] ( ext1 ) B o 2 S ¯ ASE 1+ext .
P ¯ ASE,i = G i L i P ¯ ASE,i1 + N i ,1iz N i =2hν n sp ( G i 1 ) B o .
P ¯ ASE,s =( i=1 z G i L i ) S ¯ ASE B o P ASE,N =( i=2 z G i L i ) N 1 +( i=3 z G i L i ) N 2 ++ N Z = j=1 Z ( N j i=j+1 z G i L i ) .
S ASE,m =( 1+( m1 ) ext1 M ) 2 S ¯ ASE 1+ext +2hν n sp i=1 Z ( G i 1 ) ,
σ T 2 = 4 k B T R L B e σ shot,m 2 =2q[ ( 1+( m1 ) ext1 M ) 2 S ¯ ASE 1+ext +2hν n sp i=1 Z ( G i 1 ) ] B o B e σ ASEASE,m 2 = 2 [ ( ( 1+( m1 ) ext1 M ) 2 S ¯ ASE 1+ext +hν n sp i=1 Z ( G i 1 ) ) 2 + ( hν n sp i=1 Z ( G i 1 ) ) 2 ] B e ( 2 B o B e ) 2 .
Q= 2 M m=1 M/2 I m+M/2 I m σ m+M/2 + σ m = m=1 M/2 2 M ( ext1 ext+1 ) S ¯ ASE B o σ T 2 + σ shot,M/2 +m 2 + σ ASEASE,M/2 +m 2 + σ T 2 + σ shot,m 2 + σ ASEASE,m 2 .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.