Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

QAM quantum stream cipher using digital coherent optical transmission

Open Access Open Access

Abstract

A Quantum Stream Cipher (QSC) using Quadrature Amplitude Modulation (QAM) is presented to greatly increase the secure degree compared with ASK or PSK/QSC. We propose encoding multi-bit data in one symbol with a multi-bit basis state, resulting in QAM/QSC, which employs amplitude and phase encryption of the light beam simultaneously. A 16 QAM/QSC experiment at 10 Gbit/s was successfully carried out over 160 km using a digital coherent optical transmission technique, where 16 QAM data were encrypted in a constellation with 32 × 32~4096 × 4096 symbols. We show experimentally that the Number of Masked Signals (NMS) in the quantum noise ΓQAM for QAM/QSC becomes a square multiple larger than ΓASK for ASK/QSC. ΓQAM exceeds 10,000. This result indicates that the QSC technique is more robust against eavesdroppers than ASK or PSK/QSC.

© 2014 Optical Society of America

1. Introduction

With the advances made on the Internet, wireless phones, and data communication, the need for information capacity has been increasing at 40% every year. Driven by the rapid growth in data traffic, serious attempts are being made to achieve a high capacity and high-speed optical network on both in long-haul and local area networks. Of the various attempts, QAM and Orthogonal Frequency Division Multiplexing (OFDM) are receiving a lot of attention because of their high spectral efficiencies (SEs) [13]. We have achieved a 1024 QAM digital coherent optical transmission over 150 km by using an Optical Phase-Locked Loop (OPLL), Frequency Domain Equalization (FDE), and Digital Back Propagation (DBP). This made it possible to realize a SE exceeding 14 bit/s/Hz [4].

A high-capacity network carries personal and confidential information, and therefore, a secure optical communication network is indispensable to the ICT community. As regards the application of the cipher technique to optical communication, there are two methods, one is one-time pad encryption with Quantum Key Distribution (QKD) using a single-photon [57] and the other is Quantum Stream Cipher (QSC) using quantum noises [811]. The QSC is very interesting since we can encrypt secret data at a very high speed matching that of a conventional optical transmission system. The principle of this stream cipher protocol is to hide the data signal in quantum phase noise or amplitude noise in the receiver of the eavesdropper. PSK/QSC and ASK/QSC transmission experiments over a few hundred kilometers have already been successfully reported in the Giga bit/s region by several authors [1214].

To construct a more robust QSC protocol, it is interesting to introduce multi-level PSK and ASK simultaneously under quantum phase noise and Amplified Spontaneous Emission (ASE) noise, which we call this QAM/QSC. The QAM like QSC was proposed theoretically in 2005 and its security against a cipher text-only attack and a known/chosen plaintext attack have been theoretically investigated [15]. However, in the paper, only one bit data was considered on a two-dimensional basis state using IQ mapping. A multi-bit encoded QSC scheme employing Quadrature Phase Shift Keying (QPSK) has been proposed in a wireless system [16]. However, it is a simple multi-bit extension of the basis state of one-dimensional PSK/QSC along a ring-type encrypted constellation, which is useful for increasing the bit-rate but does not lead to a fundamental enhancement of secureness. No actual encryption and decryption schemes that can send encrypted data consisting of multi-bit and multi-dimensional data and a basis state have yet been proposed.

In this paper, we report the first 10 Gbit/s QAM/QSC transmission over 160 km, where we adopted 2.5 Gsymbol/s, 16 QAM. We show experimentally that the QSC technique enables much higher degree of security when we introduce a QAM encryption and decryption technique. The QAM/QSC can be classified as a two-dimensional cipher encryption.

2. Principle of QAM/QSC

When we use a QAM technique for QSC with a data length of n bits and a basis state length of m bits per dimension (or axis), we prepare a multi-level modulation signal with a total constellation size of 22(n+m), in which one 2(n+m) is for the In-phase (I) channel and the other 2(n+m) is for the Quadrature-phase (Q) channel. Hence, the strength of the secure level as a cipher system would become a square multiplication of that of a one-dimensional QSC system, provided that I and Q are independent. In addition, by increasing the QAM multiplicity, we can easily increase the transmission speed to over 10 Gbit/s per channel. Furthermore, in a QAM system, all the information from both the amplitude and phase of the electric field of the light beam must be measured with high precision. To realize this detection, we prepared an optical local oscillator (LO), which is precisely phase-controlled to a data signal with an OPLL circuit, and its homodyne detection is indispensable [4]. This process also makes it difficult to decrypt the true data since a simple tapping of the light signal from the fiber system may be insufficient to guarantee a successful OPLL operation for Eve because of a low Optical Signal to Noise Ratio (OSNR).

A constellation of 16 QAM/QSC is shown in Fig. 1, where 16 QAM (2 bits for I and Q, respectively) data is encrypted by using 64 basis states (3 bits for I and Q, respectively). That is, I or Q has 2 bit data (n = 2) with a 3 bit basis state (m = 3), and a 5 bit encrypted signal in total. Therefore, we hide 4 bit (I + Q) information in the constellation of 1024 (25 × 25 = 32 × 32) encrypted symbols and the decision level for Eve is covered with ASE noise. As for the I data, each 8 symbol from the left to the right corresponds to 00, 01, 10, and 11 and for the Q data each 8 symbol from the bottom to the top corresponds to 00, 01, 10, and 11 in this case. Here, I and Q data are given by SIRI and SQRQ, respectively, where SI and SQ are the information bits and RI and RQ are the random key bits. The XOR operation enables SI and SQ to be randomly distributed over the entire constellation map. Hence, for example, a combination of (I, Q)data = (11,01) and a basis state (BI, BQ) = (001,010) generates (I, Q)encrypted = (Idata + BI, Qdata + BQ) = (11001, 01010). In each time slot, the 16 QAM constellation is moving with a different basis state.

 figure: Fig. 1

Fig. 1 Operation principle of 16 QAM/QSC. Here, 16 QAM (each 2 bit for I and Q) data is encrypted by using 64 basis states (3 bits for I and Q, respectively).

Download Full Size | PDF

Figure 2 shows a scheme for generating encrypted 16 QAM/QSC. Alice and Bob share the same secret seed key. At the transmitter, the secret seed key for Alice drives pattern generators 1 and 2 using Linear Feedback Shift Registers (LFSRs); one is for Random bit pattern RI (Upper 2 bits) and RQ (Lower 2 bits) for first XOR operation of the I and Q data, and the other is a Random pattern for basis states BI (Upper m bits) and BQ (Lower m bits) for I and Q, respectively. In both cases, a Serial-to-Parallel (S/P) conversion technique is used for the I and Q data. 16 QAM data (4 bit/symbol) are separated into SI (Upper 2 bits) and SQ (Lower 2 bits). As we mentioned earlier, XOR operations between SI and RI and between SQ and RQ are carried out and denoted by SIRI and SQRQ, respectively. Then, SIRI and BI, and SQRQ and BQ are combined with a Parallel-to-Serial (P/S) converter, where the encrypted I and Q data are given by (I, Q)Encrypted = (SIRI + BI, SQRQ + BQ). To drive the IQ modulator, the encrypted analogue data EI,DEC and EQ,DEC between 0~2m+2 −1, which here we call the decimal E unit, are changed to new decimal data DI and DQ between −2m+2 + 1~2m+2 −1 because the electric field of the light beam has positive and negative values, which does not occur in a one dimensional QSC case. That is, DI = 2 × EI,DEC − (2m+2 −1) and DQ = 2 × EQ,DEC − (2m+2 −1), which here we call the decimal D unit.

 figure: Fig. 2

Fig. 2 Generation scheme of encrypted 16 QAM data with a m-bit basis state.

Download Full Size | PDF

In the QAM/QSC decryption process at the receiver, we apply a reverse encryption process using the same key and obtain the original data. We have 2-bit data under a wide 4-level decision width of W = 2m for Bob, where the 3 decision levels in the E unit for I data are given by EI,DEC1 = W/2 = 2m−1, EI,DEC2 = 3W/2 = 3 × 2m−1, and EI,DEC3 = 5W/2 = 5 × 2m−1. When m = 3 in Fig. 1, the decision levels in the E unit are 4, 12, and 20, corresponding to −23, −7, and + 9 in the D unit. In the binary expression, where the E unit is normalized with 2m−1, they become 00100, 01100, 10100, respectively, where the lower 2 bits of “00” come from the decrypted basis state. These binary decision levels are used for Bit Error Rate (BER) measurements.

Constellations of encrypted electrical data are shown in Fig. 3, where (a) is the original 16 QAM data before encryption and (b) is encrypted 22(2+m) QAM data after encryption. The blue, yellow, and green squares indicate three examples with different 6-bit basis states. The position of 16 QAM changes every time slot within M × M symbols, resulting in a noisy constellation for Eve, but it becomes like Fig. 3(a) with a small noise distribution for Bob by using the shared basis state information.

 figure: Fig. 3

Fig. 3 Constellations of encrypted electrical data. (a) Original 16 QAM data before encryption, (b) 22(2+m) QAM data after encryption. The blue, yellow, and green squares show three examples of basis state. The QAM signal is moving every time slot.

Download Full Size | PDF

3. Experimental set-up for 10 Gbit/s 16 QAM/QSC digital coherent transmission over 160 km

The experimental set-up for 16 QAM/QSC digital coherent transmission over 160 km is shown in Fig. 4. The symbol rate is 2.5 Gsymbol/s and the multiplicity for the original data is 24 (16 QAM), resulting in a 10 Gbit/s transmission. The multiplicity M of the encrypted data in bits is equal to 2 bits (data) + m bits (basis state), where m is set between 3 and 10. The lengths of random patterns 1 and 2 (register size) are set at R = 27−1 and B = 215−1, respectively. The data length is given by a PRBS of 215−1.

 figure: Fig. 4

Fig. 4 Experimental set-up for 16 QAM/QSC digital coherent transmission over 160 km. The symbol rate is 2.5 Gsymbol/s and the QAM multiplicity is 4 bit/symbol, resulting in a 10 Gbit/s transmission.

Download Full Size | PDF

The optical source for the transmitter is a CW, C2H2 frequency-stabilized fiber laser with a linewidth of 4 kHz [17]. The signal passes through an EDFA and is coupled to an IQ modulator, where the coherent light is modulated with a 2.5 Gsymbol/s, encrypted 16 QAM signal and a tone signal generated by an Arbitrary Waveform Generator (AWG) running at 10 Gsample/s with a 12-bit resolution. The multiplicity of the encrypted I and Q signals, M, can be arbitrarily set between 32 and 4096. We adopt a Nyquist filter [18] with a roll-off factor α of 0.3 at the AWG, which enables us to reduce the bandwidth of the encrypted QAM signal. The bandwidth is 3.3 GHz, which is given by Symbol-rate × (1 + α), resulting in an SE of 3 bit/s/Hz. This is the highest SE for QSC transmission yet reported. The tone signal is used to track the optical phase of an LO under OPLL operation [19]. The optical power ratio between the encrypted QAM data and the tone signal is set at 4: 1. The power of the encrypted QAM data, Pout, at the transmitter is decreased with an attenuator to increase the level of data security against Eve. That is, we set Pout at the lowest power level where 16 QAM data can be transmitted perfectly over 160 km in an error-free condition. After amplifying the total power of the encrypted QAM and the tone signals to 0 dBm with an EDFA, these signals are coupled into a 160 km-long transmission fiber composed of two 80 km spans of Standard Single-Mode Fiber (SSMF) and an EDFA repeater.

At the receiver, which is followed by an EDFA, the transmitted signal is combined with an LO and detected by balanced photodiodes after passing through a 90-degree optical hybrid. The detected I and Q data signals are then A/D-converted at 20 Gsamples/s with an 8-bit resolution and processed with an offline Digital Signal Processor (DSP). The demodulation bandwidth is set at 3.3 GHz by adopting a Nyquist filter. In the DSP, we first compensate for the fiber dispersion by FDE and Self Phase Modulation (SPM) impairment by time domain phase compensation. Then, the compensated M × M QAM signal is decrypted to a 16 QAM signal with a shared secret seed key. Finally, the decrypted 16 QAM signal is demodulated into binary data, and the BER is evaluated. For comparison, we also evaluate the BER performance of a one-dimensionally-encrypted 4 ASK transmission as a conventional ASK/QSC, where only I data is amplitude-modulated at the transmitter.

The Intermediate Frequency (IF) phase noise, which is estimated from the power spectrum of the Single-Side Band (SSB) phase noise of the IF signal, is 1.55 deg., whereas it is 1.50 deg. before transmission. The phase noise tolerance for 16 QAM, which is determined by the phase difference between the two nearest symbols, is as large as ± 13.3 degrees. This indicates that the OPLL operates successfully within the tolerance of phase errors for 16 QAM error-free operation.

4. Experimental results of 10 Gbit/s 16 QAM/QSC digital coherent transmission over 160 km

Figure 5 compares QAM/QSC (case 1) and ASK/QSC (case 2) before and after decryption. With QAM (case 1), we adopted a multiplicity M of 256 levels, so that the true information is hidden in a constellation of 256 × 256 symbols, which are covered with ASE noise. The normalized minimum decision level, Δ, is defined by Δ = 2/(M−1), where the I and Q levels are normalized to ± 1. Here, the output power from the transmitter, Pout, which is not the transmission power through the fiber, was reduced to – 35 dBm to decrease the OSNR against Eve. After the decryption with the secret seed keys, we can obtain the original data as clear 16 QAM data as shown on the right. Case 2 is shown below and the corresponding decrypted 4 ASK data are shown on the right, where Pout was reduced by 3 dB to – 38 dBm to match the OSNR of the QAM transmission.

 figure: Fig. 5

Fig. 5 Comparison of QAM/QSC (case 1) and ASK/QSC (case 2). The normalized minimum decision level, Δ, is defined by Δ = 2/(256−1), where the I and Q levels are normalized to ± 1.

Download Full Size | PDF

We observed error-free transmissions at Pout above –38 dBm for 16 QAM and at Pout above −41 dBm for 4-ASK. Here, the error-free condition is defined as a BER below 3 × 10−5, which was the minimum BER value that could be measured in our system with a data length of 215−1. Therefore, Pout of −38 dBm, which is equivalent to an OSNR of 12 dB in our experiment, is the optimum operation power for QAM/QSC. The transmission power in the fiber is kept at 0 dBm in all the transmission experiments. A 3 dB difference between the Pout of 4-ASK and 16 QAM comes from the fact that the I and Q components were set at −41 dBm (equivalent to that of 4 ASK) resulting in a total Pout of −38 dBm in the QAM signal.

We estimate the noise distribution values, σ¯16QAM and σ¯4ASK, around the symbols for the decrypted 16 QAM and 4 ASK signals, which arise from a degradation of OSNR. We define the average noise distributions, σ¯16QAM and σ¯4ASK, in each case as follows:

σ¯4ASK=14n=14σI,n2,
σ¯16QAM=132n=116(σI,n2+σQ,n2)
and obtain σ¯16QAM = 0.045 and σ¯4ASK = 0.044 from the experiment. This result indicates that the noise distributions are almost the same in the two cases.

It is important to discuss how the Number of Masked Signals (NMS) of QAM/QSC, ΓQAM, is related to ΓASK (NMS of ASK/QSC). We can calculate ΓQAM and ΓASK from our experiments. In our experimental results as seen in Fig. 5, we have 256 encrypted levels normalized to ± 1. Hence, we have Δ = 2/(256−1). ΓQAM and ΓASK are given by

ΓQAM=(2σ¯16QAM/Δ)2
ΓASK=2σ¯4ASK/Δ
Thus from our experiments we obtain
Γ256×256QAM=(2σ¯16QAM/Δ)2=132.7forPoutof35dBm,
Γ256ASK=2σ¯4ASK/Δ=11.3forPoutof38dBm.
These results indicate that ΓQAM is nearly a square multiple of ΓASK. Figure 6 shows ΓQAM and ΓASK as a function of the output power Pout from the transmitter. Here, M is 256 levels (2 bit data + 6 bit basis states). For a Pout of − 38 dBm, ΓASK is approximately 11.3 as shown with a solid red line and ΓASK2 shown with a dashed line is 128. On the other hand, ΓQAM for a Pout of − 35 dBm is 133. This means that ΓASK2 agrees well with ΓQAM, resulting in each I and Q axis having almost the same ΓASK. It is also important to note that there is a 3 dB difference between QAM/QSC and ASK/QSC.

 figure: Fig. 6

Fig. 6 ΓQAM (Number of Masked Signals in the quantum noise for QAM/QSC) and ΓASK (Number of Masked Signals in the quantum noise for ASK/QSC) as a function of output power Pout from the transmitter. Here, M (multiplicity of I and Q encrypted signal) is set at 256 levels (8 bits).

Download Full Size | PDF

The experimental results of the demodulation performance for the eavesdropper are shown in Fig. 7, where the Detection Failure Probability (DFP) is given as a function of M. Here, DFP is defined as the probability that the encrypted constellation point is shifted to a different constellation point. The DFP is measured by comparing the M × M (32 × 32~4096 × 4096) QAM data pattern at the receiver with the original M × M QAM electrical data pattern at the transmitter. In addition, the DFP is detected under a back-to-back (b-b) condition without transmission fibers because the highest OSNR can be obtained for Eve. When Eve detects the encrypted data from the transmission fiber, the DFP increases. When the transmitted signal is outside the area of Δ2, it becomes an error. In both figures, we kept Pout = −38 dBm for ASK and Pout = −35 dBm for QAM to ensure the same OSNR. It is clearly seen that the DFP reaches unity much faster in M × M QAM than M-ASK. Since each symbol point for Eve has a DFP close to unity, it is very difficult to find the secret seed key because such a DFP continues for a time given by the shared key length divided by the basis state length (m bits). This means that much better performance as an encryption protocol can be obtained in QAM/QSC.

 figure: Fig. 7

Fig. 7 Experimental results of the demodulation performance for the eavesdropper. Here Detection Failure Probability (DFP) can be described as a function of M.

Download Full Size | PDF

ΓQAM and ΓASK as a function of multiplicity M are summarized in Fig. 8. ΓASK reported in ref [20]. is also plotted, which completely overlaps our experimental result plotted with closed squares. On the other hand, the closed circle shows our experimental data for ΓQAM. It is very important to note that ΓQAM becomes a square multiple of ΓASK. That is, the dotted line showing (ΓASK)2 is in good agreement with ΓQAM. It is important to note in Fig. 8 that ΓQAM can easily exceed 10,000. It has been pointed out by several authors that a larger Γ in any modulation format introduces an increase in the brute-force search complexity for the shared key that follows Γk/log2M, where k is the key length [21]. Specifically, the search complexity for M-ary ASK/QSC is given by

(ΓASK)k/log2M=(2σ¯ASK/Δ)k/log2M=[σ¯ASK(M1)]k/log2M(σ¯ASKM)k/log2M=2kσ¯ASKk/log2M
where we assumed M >>1 and used the relationship Δ = 2/(M − 1) and M1/log2M=2. For QAM/QSC, we have
(ΓQAM)k/log2M=(ΓASK2)k/log2M=22kσ¯ASK2k/log2M
These results indicate that the degree of the secure level in two-dimensional QAM/QSC is much higher than that of the one-dimensional ASK case, namely the adoption of QAM/QSC is equivalent to doubling the key length of ASK/QSC in terms of security. Therefore, we can say that the QSC technique can be greatly improved by introducing the QAM method. In addition, regarding the effect of AWG resources on QSC performance, doubling the AWG channels or doubling the single-channel resolution does not benefit ASK as much as it does QAM. This is because the number of masked signal levels, Γ = 2σ/Δ = σ(M − 1), only increases to σ(2M − 1) for ASK while it increases to σ2(M − 1)2 for QAM when the AWG resources are doubled. In this respect, a larger M is advantageous for increasing the magnitude of Γ.

 figure: Fig. 8

Fig. 8 ΓQAM and ΓASK as a function of multiplicity M. ΓASK reported in ref [20]. is also plotted.

Download Full Size | PDF

5. Summary

We have proposed a QAM/QSC and successfully demonstrated a 16 QAM/QSC transmission at 10 Gbit/s over 160 km. We showed experimentally that the strength of the secureness of the QAM/QSC becomes a square multiple compared with that of the ASK/QSC. Since we can increase the total secure capacity by increasing the multiplicity as we did in the 1024 QAM transmission, it is very promising to send 160 Gbit/s QAM/QSC data over 100 km at 10 Gsymbol/s, in a 256 QAM, and polarization-multiplexed system. If we also introduce a WDM technique, it will be possible to realize a Tbit/s secure communication system simply in the near future.

Acknowledgment

This work is supported by a grant from the National Institute of Information and Communications Technology (NICT).

References and links

1. M. Nakazawa, K. Kikuchi, and T. Miyazaki, eds., High Spectral Density Optical Transmission Technologies, Springer (2010).

2. A. J. Lowery, L. Du, and J. Armstrong, “Orthogonal frequency division multiplexing for adaptive dispersion compensation in long-haul WDM systems,” in Proceedings of OFC2006 (Anaheim, USA) PDP39.

3. Q. Yang, Y. Ma, and W. Shieh, “107 Gb/s coherent optical OFDM reception using orthogonal band multiplexing,” in Proceedings of OFC2008 (San Diego, USA) PDP7.

4. Y. Koizumi, K. Toyoda, M. Yoshida, and M. Nakazawa, “1024 QAM (60 Gbit/s) single-carrier coherent optical transmission over 150 km,” Opt. Express 20(11), 12508–12514 (2012). [CrossRef]   [PubMed]  

5. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proc. Int. Conf. Comput., Syst., Signal Process. (Bangalore, India, 2011) 175–179. [CrossRef]  

6. A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67(6), 661–663 (1991). [CrossRef]   [PubMed]  

7. T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett. 84(20), 4729–4732 (2000). [CrossRef]   [PubMed]  

8. G. A. Barbosa, E. Corndorf, P. Kumar, and H. P. Yuen, “Secure communication using mesoscopic coherent states,” Phys. Rev. Lett. 90(22), 227901 (2003). [CrossRef]   [PubMed]  

9. E. Corndorf, C. Liang, G. S. Kanter, P. Kumar, and H. P. Yuen, “Quantum noise randomized data encryption for wavelength division multiplexed fiber optic network,” Phys. Rev. A 71(6), 062326 (2005). [CrossRef]  

10. C. Liang, G. S. Kanter, E. Corndorf, and P. Kumar, “Quantum noise protected data encryption in a WDM network,” IEEE Photon. Technol. Lett. 17(7), 1573–1575 (2005). [CrossRef]  

11. O. Hirota, M. Sohma, M. Fuse, and K. Kato, “Quantum stream cipher by Yuen 2000 protocol: Design and experiment by intensity modulation scheme,” Phys. Rev. A 72(2), 022335 (2005). [CrossRef]  

12. G. S. Kanter, D. Reilly, and N. Smith, “Practical physical-layer encryption: The marriage of optical noise with traditional cryptography,” IEEE Commun. Mag. 47(11), 74–81 (2009). [CrossRef]  

13. K. Harasawa, O. Hirota, K. Yamashita, M. Honda, K. Ohhata, S. Akutsu, T. Hosoi, and Y. Doi, “Quantum encryption communication over a 192-km 2.5-Gbit/s line with optical transceivers employing Yuen-2000 protocol based on intensity modulation,” J. Lightwave Technol. 29(3), 316–323 (2011). [CrossRef]  

14. F. Futami and O. Hirota, “40 Gbit/s (4 x 10 Gbit/s) Y-00 protocol for secure optical communication and its transmission over 120 km,” in Proceedings of OFC2012 (Los Angeles, USA) OTu1H.6.

15. K. Kato and O. Hirota, “Quantum quadrature amplitude modulation system and its applicability to coherent state quantum cryptography,” SPIE 5893, Quantum Communications and Quantum Imaging III (Bellingham, USA, 2005) 589303.

16. D. Reilly and G. S. Kanter, “Noise-enhanced encryption for physical layer security in an OFDM radio,” IEEE Radio and Wireless Symposium (RWS ’09), TU2P–28. [CrossRef]  

17. K. Kasai, A. Suzuki, M. Yoshida, and M. Nakazawa, “Performance improvement of an acetylene (C2H2) frequency-stabilized fiber laser,” IEICE Electron. Express 3(22), 487–492 (2006). [CrossRef]  

18. H. Nyquist, “Certain topics in telegraph transmission theory,” Transact. Am. Inst. Elec. Eng. 47, 617–644 (1928).

19. K. Kasai, J. Hongo, M. Yoshida, and M. Nakazawa, “Optical phase-locked loop for coherent transmission over 500 km using heterodyne detection with fiber lasers,” IEICE Electron. Express 4(3), 77–81 (2007). [CrossRef]  

20. F. Futami and O. Hirota, “Masking of 4096-level intensity modulation signals by noises for secure communication employing Y-00 cipher protocol,” in Proceedings of ECOC2011 (Geneva, Switzerland) Tu.6.C.4.

21. O. Hirota, “Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol,” Phys. Rev. A 76(3), 032307 (2007). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (8)

Fig. 1
Fig. 1 Operation principle of 16 QAM/QSC. Here, 16 QAM (each 2 bit for I and Q) data is encrypted by using 64 basis states (3 bits for I and Q, respectively).
Fig. 2
Fig. 2 Generation scheme of encrypted 16 QAM data with a m-bit basis state.
Fig. 3
Fig. 3 Constellations of encrypted electrical data. (a) Original 16 QAM data before encryption, (b) 22(2+m) QAM data after encryption. The blue, yellow, and green squares show three examples of basis state. The QAM signal is moving every time slot.
Fig. 4
Fig. 4 Experimental set-up for 16 QAM/QSC digital coherent transmission over 160 km. The symbol rate is 2.5 Gsymbol/s and the QAM multiplicity is 4 bit/symbol, resulting in a 10 Gbit/s transmission.
Fig. 5
Fig. 5 Comparison of QAM/QSC (case 1) and ASK/QSC (case 2). The normalized minimum decision level, Δ, is defined by Δ = 2/(256−1), where the I and Q levels are normalized to ± 1.
Fig. 6
Fig. 6 ΓQAM (Number of Masked Signals in the quantum noise for QAM/QSC) and ΓASK (Number of Masked Signals in the quantum noise for ASK/QSC) as a function of output power Pout from the transmitter. Here, M (multiplicity of I and Q encrypted signal) is set at 256 levels (8 bits).
Fig. 7
Fig. 7 Experimental results of the demodulation performance for the eavesdropper. Here Detection Failure Probability (DFP) can be described as a function of M.
Fig. 8
Fig. 8 ΓQAM and ΓASK as a function of multiplicity M. ΓASK reported in ref [20]. is also plotted.

Equations (8)

Equations on this page are rendered with MathJax. Learn more.

σ ¯ 4ASK = 1 4 n=1 4 σ I,n 2 ,
σ ¯ 16QAM = 1 32 n=1 16 ( σ I,n 2 + σ Q,n 2 )
Γ QAM = ( 2 σ ¯ 16QAM /Δ ) 2
Γ ASK =2 σ ¯ 4ASK /Δ
Γ 256×256QAM = ( 2 σ ¯ 16QAM /Δ ) 2 =132.7for P out of 35 dBm,
Γ 256ASK =2 σ ¯ 4ASK /Δ=11.3for P out of 38 dBm.
( Γ ASK ) k/ log 2 M = ( 2 σ ¯ ASK /Δ ) k/ log 2 M = [ σ ¯ ASK (M1)] k/ log 2 M ( σ ¯ ASK M) k/ log 2 M = 2 k σ ¯ ASK k/ log 2 M
( Γ QAM ) k/ log 2 M = ( Γ ASK 2 ) k/ log 2 M = 2 2k σ ¯ ASK 2k/ log 2 M
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.