Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Experimental demonstration of 201.6-Gbit/s coherent probabilistic shaping QAM transmission with quantum noise stream cipher over a 1200-km standard single mode fiber

Open Access Open Access

Abstract

A probabilistic shaping (PS) quadrature amplitude modulation (QAM) based on Y-00 quantum noise stream cipher (QNSC) has been proposed. We experimentally demonstrated this scheme with data rate of 201.6Gbit/s over a 1200-km standard single mode fiber (SSMF) under a 20% SD-FEC threshold. Accounting for the 20% FEC and 6.25% pilot overhead, the achieved net data rate is ∼160Gbit/s. In the proposed scheme, a mathematical cipher (Y-00 protocol) is utilized to convert the original low-order modulation PS-16 (22 × 22) QAM into ultra-dense high-order modulation PS-65536 (28 × 28) QAM. Then, the physical randomness of quantum (shot) noise at photodetection and amplified spontaneous emission (ASE) noise from optical amplifiers are employed to mask the encrypted ultra-dense high-order signal for further improving the security. We further analyze the security performance by two metrics known in the reported QNSC systems, namely the number of masked signals (NMS) of noise and the detection failure probability (DFP). Experimental results show it is difficult or even impossible to extract transmission signals from quantum or ASE noise for an eavesdropper (Eve). We believe that the proposed PS-QAM/QNSC secure transmission scheme has the potential to be compatible with existing high-speed long-distance optical fiber communication systems.

© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

Optical networks that carry more than 90% of global data traffic are currently developing towards to ultra-high-speed, ultra-large capacity, and ultra-long distance. As the structure of the next-generation optical network becomes more complex and diverse, eavesdropping or interception will become a serious problem for security. It is easy for Eve to monitor fiber-optic cables through bending, splitting, scattering, etc [1]. Therefore, it is necessary to explore advanced encryption methods to ensure the security of high-speed optical fiber transmission systems. In recent years, various advanced encryption methods have been proposed, including quantum key distribution (QKD) [2], quantum secure direct communication (QSDC) [3], optical chaotic encryption [4], quantum noise stream cipher (QNSC) [5], etc. Among these methods, QKD combined with one-time-pad (OTP) is considered to be the only known way to achieve absolute security. However, OTP requires that the length of plaintext must be the same as the length of the key, so the transmission rate of the system is limited by the key rate (e.g. kbit/s) [6]. On the other hand, in the QKD system, photons carrying key information are prepared at the single-photon level and will be mostly scattered and absorbed by the transmission channel. Meanwhile, in order to ensure quantum security, photons cannot pass through classical optical amplification, thus the loss is the main reason to limit its transmission distance [7]. Unlike QKD which mainly completes the negotiation of keys, QSDC has ability to estimate the secrecy capacity of a realistic quantum channel and transmit information in a channel with eavesdropping. Unfortunately, QSDC also requires photons at the single-photon level and there is also considerable loss in the transmission process. The transmission rate and distance of QSDC are limited to few kbit/s and 100 km. As for optical chaotic encryption, it applies the nonlinear dynamics of physical components to generate an optical chaotic carrier for information encryption in a classical channel. The highest record of the reported optical chaotic encryption is about tens of Gbit/s over 100 km. However, it is very difficult to achieve synchronization between the transmitter and the receiver in a high-speed and long-distance system [8]. Meanwhile, in order to generate large bandwidth chaotic sources, dedicated devices and transmission links are required. QNSC realizes secure transmission in the classical channel through digital encryption and noise masking. Digital encryption can be realized through the Y-00 protocol [9]. After digital encryption, the plaintext of low-order modulation format (e.g. 16QAM) can be mapped to an ultra-dense high-order (e.g. 65536QAM) ciphertext. When the optical power reaches the mesoscopic level, the ultra-dense high-order ciphertext is affected by the coherent state quantum (shot) noise [10]. At the same time, amplified spontaneous emission (ASE) noise introduced by an Erbium-doped fiber amplifier (EDFA) plays a positive role in preventing Eve from identifying the correct judgment threshold. Therefore, the quantum noise and ASE noise will mask the ciphertext together. As we mentioned, QNSC does not need to use additional devices and its transmission link is compatible with the current high-speed optical communication systems. Therefore, QNSC has great advantages in realizing high-speed and long-haul secure optical communications.

In recent years, three QNSC encryption schemes have been proposed, including the intensity modulation (IM)/QNSC [1113], the phase modulation (PM)/QNSC [1416], and the QAM/QNSC [6,1719]. Combined with the low cost and simple construction of intensity modulation and direct detection (IMDD) technology, IM/QNSC scheme has been experimentally verified in a 100-Gbit/s IMDD transmission system over 100-km standard single-mode fiber (SSMF) [13]. Although PSK/QNSC scheme can easily achieve long-distance transmission [1416], the transmission rate is only limited to tens of Gbit/s. But so far, these two schemes have not been able to take into account both high-speed and long-distance at the same time. In 2014, M. Nakazawa et al. employed amplitude and phase encryption of the light beam simultaneously to present a QAM/QNSC scheme. Currently, the QAM/QNSC scheme has been proven in various high-speed (≥100-Gbit/s) long-distance (≥100-km) transmission systems by combining with polarization division multiplexing (PDM) and coherent detection.

In 2016, G. Böcherer et al. proposed a probabilistic shaping (PS) method based on a constant composition distribution matcher (CCDM) [20]. A large number of simulation and experimental results show that the probabilistic shaping modulation formats have a significant improvement in the achievable transmission rate and distance compared with the traditional modulation formats applied at optical fiber transmission systems [2123]. In this paper, we introduce probabilistic shaping to the QAM/QNSC secure transmission systems for further improving transmission performance. In the transmitter, we first generate a PS-16QAM signal by CCDM. Then based on Y-00 protocol, the basis symbols are encoded and converted from the original low-order modulation format PS-16 (22 × 22) QAM to the ultra-dense high-order PS-65536 (28 × 28) QAM. The experimental results show that the 201.6Gbit/s PDM-PS-65536QAM/QNSC system can achieve 520 km transmission under 7% hard-decision forward error correction (HD-FEC) threshold (BER = 3.8 × 10−3) and 1200 km under 20% soft-decision (SD) FEC threshold (BER = 2.4 × 10−2), respectively. To the best of our knowledge, the experimental results achieve the largest rate-distance product record for the QAM/QNSC secure transmission systems, as indicated in Fig. 1. Note that the encrypted ultra-dense high-order signal in this work is PS-65536 (28 × 28) QAM limited by the arbitrary waveform generator resolution (Keysight M8195A with 8 bits resolution). As the resolution increases to n-bit, the QNSC system can generate PS-2n × 2n QAM signals to further improve the security.

 figure: Fig. 1.

Fig. 1. Transmission distances and single-channel line rates of QNSC transmission experiments in recent years.

Download Full Size | PDF

2. Principle

Figure 2 shows the generation process of ultra-dense high-order PS-QAM signal based on the Y-00 protocol. In the QNSC scheme, the seed key is often shared in advance between the transmitter (Alice) and the legal receiver (Bob). At present, there are a lot of solutions to realize key distribution such as algorithm-based key distribution, classical physical key distribution and QKD. Alice uses the seed key to drive two pseudorandom number generators (PRNGs) for generating two key streams. One is to encrypt the plaintext bits, and the other is used as bit basis states to randomize the location of constellation points. After bit encryption, the ciphertext bits are first divided into I and Q bits, and entered into the CCDM module, which can achieve probabilistic shaping operation. After that, the amplitude distribution of PS-PAM4 (2 bits per symbol) of I and Q can constitute the PS-16QAM (4 bits per symbol). In order to simplify the Y-00 encryption and decryption, the symbol spacing of PS-PAM4 is redefined in the generation process. For example, if our goal is to generate ultra-dense high-order PS-2(m+ 2) × 2(m+ 2)QAM (2(m+ 2) bits per symbol) where m is the number of basis state, the amplitudes of I and Q components (PS-PAM-2m + 2) are defined in the interval [-2m + 2 + 1,2m + 2-1]. Thus, the original amplitude [0, 1, 2, 3] of I and Q components (PS-PAM4) need to be redefined as [-2m + 2 + 0 × 2m + 1 + 1, -2m + 2 + 1 × 2m + 1 + 1, -2m + 2 + 2 × 2m + 1 + 1, -2m + 2 + 3 × 2m + 1 + 1], where the redefined minimum amplitude level is equal to that of PS-PAM-2m + 2. Meanwhile, since each amplitude level of PS-PAM4 can be encrypted by 2 m basis states, the distance between two amplitude levels is 2m + 1 after redefinition.

 figure: Fig. 2.

Fig. 2. The generation process of ultra-dense high-order PS-QAM.

Download Full Size | PDF

Subsequently, the bit basis states (Bb-I, Bb-Q) from PRNG_2 are converted into the basis symbol (Bs-I, Bs-Q) through binary-decimal mapping operation. Therefore, when the redefined PS-16QAM (Idata, Qdata) is encrypted by different basis states, the ciphertext (DI, DQ) can be obtained by adding (2×Bs-I, 2×Bs-Q) to (Idata, Qdata). With the random change of the basis states in each time slot, the original low-order modulation format can be encrypted into the ultra-dense high-order PS-2(m+ 2) × 2(m+ 2)QAM. For example, we consider converting a PS-16QAM constellation to a PS-1024QAM encrypted constellation. In this case, the bit number of basis state m is 3. The amplitude of the I and Q component (PS-PAM4) of the original PS-16QAM need to first redefine as [-31, -15,1,17]. Here, we consider using basis state (Bb-I, Bb-Q) = (010, 001) to encrypt the plaintext (Idata, Qdata) = (17, -15). After binary-decimal mapping, (Bb-I, Bb-Q) can be mapped into (Bs-I, Bs-Q) as (2, 1) so that the ciphertext (21, -13) can be obtained.

At the receiver side, the received ciphertext can be expressed as (DI + NI, DQ + NQ) where NI and NQ represent the influence of the quantum (shot) noise and ASE noise on I and Q components, respectively. The constellation of the received signal before Y-00 decryption is depicted in Fig. 3(a). For the legal receiver, Bob can get the same two sets of key streams as Alice. Therefore, Bob can use the basis symbol (Bs-I, Bs-Q) to decrypt the received ciphertext and obtain the plaintext (Idata + NI, Qdata + NQ) affected by noise. The constellation of the received signal after Y-00 decryption is depicted in Fig. 3(b).

 figure: Fig. 3.

Fig. 3. Constellations of received signal without (a) and with (b) Y-00 decryption.

Download Full Size | PDF

3. Experimental setup and results

The experimental setup for Y-00 QNSC optical fiber transmission system is shown in Fig. 4. In the digital signal processing (DSP) of transmitter, Alice generates the PS-16QAM signal by CCDM module and completes digital encryption through the Y-00 protocol. We insert one pilot symbol every 15 ciphertext symbols in the data sequence for estimating the laser phase noise. The overhead of pilot symbols is 6.25%. The light from a ∼3kHz narrow linewidth laser at ∼1550.1 nm is modulated by an integrated LiNbO3 I/Q modulator with 25 GHz bandwidth driven by two digital-to-analog converters (DACs) operating at 64GSa/s with 25 GHz analog bandwidth. After photoelectric modulation, the uniform 65536QAM (carrying 16QAM/QNSC) and four types (e.g. H = 3.4, 3.5, 3.6, 3.7) PS-65536QAM (carrying PS-16QAM/QNSC) optical signals can be obtained. Here, H is the information entropy. Note that the DAC (Keysight M8195A) has a nominal resolution of 8 bits, which gives a maximum of 28 = 256 levels per quadrature. The PS-65536 (28 × 28) QAM constellation by itself requires 256 levels, leaving no extra bit for Nyquist pulse shaping [6,24]. After signal modulation, a PDM emulator, which is composed of two polarization controllers (PCs), two variable optical attenuators (VOAs) and an optical delay line, is applied to obtain 199.8Gbit/s (27GBaud × 3.7 × 2), 201.6Gbit/s (28GBaud × 3.6 × 2), 199.5Gbit/s (28.5GBaud × 3.5 × 2), 204Gbit/s (30GBaud × 3.4 × 2) PDM-PS-65536QAM, and 200Gbit/s (25GBaud × 4 × 2) PDM-65536QAM. The optical power Pout is maintained at -10dBm which is a typical power level after an optical modulator [6]. The transmission link is composed of multi-spans SSMF whose dispersion parameter, attenuation, and nonlinear coefficient are D = 16.9-ps/nm/km, α=0.2-dB/km, γ=1.27-km−1·W−1, respectively. Fiber loss of each span is compensated using an EDFA with a noise figure of ∼5 dB. In our transmission system, optical polarization tracking is used to realize polarization demultiplexing, while the data-aided method can also realize the polarization demultiplexing operation in such systems. An optical band-pass filter (OBPF) in the link is used to filter out the out-of-band ASE noise. At the receiver terminal, the transmission signal and the LO are combined at the 90° polarization-and-phase diversity hybrid, and then photo-detected by the balanced photo-detector (BPD). The output electrical signals are sampled at 80GSamples/s by a real-time digital oscilloscope with 33 GHz electrical bandwidth. Finally, the digital signals are processed in the off-line digital signal processing module including IQ imbalance compensation, low-pass filter, chromatic dispersion compensation, timing equalization, carrier phase recovery, Y-00 decryption and BER calculation. For carrier phase recovery operation, Bob extracts the pilot and estimates the phase noise of pilots by the Viterbi-Viterbi algorithm [25].

 figure: Fig. 4.

Fig. 4. The experimental seup for Y-00 QNSC optical fiber transmission system.

Download Full Size | PDF

In Fig. 5(a), the BER curves of different information entropy (H = 3.4, 3.5, 3.6, 3.7, 4) signals under different signal-to-noise rate (SNR) conditions are calculated in the AWGN channel. The symbol rates of these signals in simulation are consistent with the experiment setup. Since the polarization multiplexing operation is not considered in simulation, the bit rate of these signals is half of the experiment. As shown in Fig. 5(a), without the influence of band-limited effect, the lower the information entropy is, the better the tolerance of noise is. Furthermore, we further calculate the BER curves of all five modulation format signals under the back-to-back experiment system, where the ASE module is applied to change the OSNR value which can be measured by the optical spectrum analyzer (OSA). As depicted in Fig. 5(b), the experiment results show that all PS signals have lower BER than the uniform signal at nearly the same bit rate. When H is set at 3.4 and 3.5, the BER performance is worse than that of H = 3.6 and H = 3.7. We consider that the limited bandwidth of the electrical components may be the main factor. When H is set at 3.6, the experiment system can obtain the best performance so that we choose the 201.6Gbit/s (28GBaud × 3.6 × 2) PDM-PS-65536QAM signals for experimental transmission.

 figure: Fig. 5.

Fig. 5. The BER curves under (a) the AWGN and (b) the back-to-back experiment system.

Download Full Size | PDF

In addition, we further analyze the probabilistic shaping gain under different launching powers. As shown in Fig. 6, the optimal launching power is located at around 1dBm. When the launching power increases beyond 1dBm, the influence of the nonlinear impairment (i.e. self-phase modulation) will be more serious, which leads to the performance gain of probabilistic shaping to decrease. Meanwhile, it further causes the BER performance of the probability shaping signals to be gradually close to that of uniform signals. This is mainly because probabilistic shaping has increased standard moments, which results in stronger nonlinear interference (NLI) than uniform signal in highly nonlinear regime [21]. Thus, the gain brought by probabilistic shaping will decrease with the launching power increasing. The constellations before and after decryption under 400 km transmission are inserted in Fig. 7(a) and (b). We further measure the BER performance under different transmission distances in Fig. 7(c), where the launching power is 1dBm. The experimental results show that our PS/QNSC scheme can achieve 520 km and 1200 km transmission under 7%HD-FEC and 20%SD-FEC thresholds, while the distance of uniform scheme is 240 km and 620 km, respectively. The improvement of ∼280 km and ∼580 km can be obtained by using the PS/QNSC scheme under 7%HD-FEC and 20%SD-FEC.

 figure: Fig. 6.

Fig. 6. The BER curves for Bob with different launching powers over 400 km transmission.

Download Full Size | PDF

 figure: Fig. 7.

Fig. 7. Experimental results of Y-00 QNSC system: the constellations (a) before and (b) after decryption under 400 km transmission; (c) the BER curves for Bob with different transmission distances.

Download Full Size | PDF

It is necessary to discuss the security of the PS-QAM/QNSC system. As shown in Fig. 4, we assume that Eve has access to the two best places (point A and point B) for tapping: i) point A, after data modulation and before the first EDFA, where the signal is mainly affected by quantum noise and the ASE noise is the smallest; and ii) point B, after the first EDFA where the OSNR is highest but the signal is corrupted by ASE noise. A ciphertext signal can be masked by noise when the modulation format is high enough. As shown in Fig. 8, the adjacent distance between two symbols decreases as the modulation level of ciphertext signal increases. When the adjacent distance is significantly low, noise can easily cover a large number of symbols.

 figure: Fig. 8.

Fig. 8. Noise-masked constellations of QAM/QNSC.

Download Full Size | PDF

The number of masked signals (NMS) of noise and the detection failure probability (DFP) are considered as two security evaluation criteria which have been applied in the reported QNSC schemes [13]. The NMS ${\Gamma _{\textrm{PS} - \textrm{UD - QAM}}}$ of ultra-dense high-order ciphertext can be defined as

$${\Gamma _{\textrm{PS} - \textrm{UD - QAM}}} = {({{2{{\bar{\sigma }}_{\textrm{PS - 16QAM}}}} / {{\Delta _{\textrm{PS} - \textrm{UD - QAM}}}}})^2}$$

For the encrypted PS-65536QAM signal, we have 256 encrypted I and Q levels normalized to ±1. Hence, the normalized decision level ${\Delta _{\textrm{PS} - \textrm{UD - QAM}}}$ of ultra-dense high-order ciphertext is defined by ${\Delta _{\textrm{PS} - \textrm{UD - QAM}}} = {2 / {(256 - 1)}}$. The average noise distribution ${\bar{\sigma }_{\textrm{PS - 16QAM}}}$ around the symbols for the decrypted PS-16QAM, which is defined as

$${\bar{\sigma }_{\textrm{PS - 16QAM}}} = \sqrt {\frac{1}{{32}}\sum\limits_{n = 1}^{16} {(\sigma _{I,n}^2 + \sigma _{Q,n}^2)} }$$
where $\sigma _{I,n}^2$ and $\sigma _{Q,n}^2$ represent noise variance of I and Q components of the nth constellation point after Y-00 decryption. According to reference [13], DFP is the probability that Eve fails to detect the ciphertext from the noise masked signals. Thus, DFP can be defined as DFP = 1- 1/NMS.

After Y-00 decryption, the constellation of the plaintext affected by noise is depicted in Fig. 9(a), where NI and NQ represent the influence of the quantum (shot) noise and ASE noise on I and Q components. We take the 1th constellation point as an example to calculate the noise variance $\sigma _{I,n}^2$ and $\sigma _{Q,n}^2$, and the other 15 constellation points are calculated accordingly. As shown in Fig. 9(a), the standard deviation $\sigma _{I,1}^{} = 0.1116$ and $\sigma _{Q,1}^{} = 0.1116$ can be obtained from the constellation of the plaintext affected by noise, thus ${\bar{\sigma }_{\textrm{PS - 16QAM}}} = 0.1115$ according to Eq.(2). Meanwhile, the NMS is 808 based on Eq.(1), while the DFP is 1-1/NMS = 0.9988. Note that these results are measured at point B with the received power of -6dBm.

 figure: Fig. 9.

Fig. 9. (a) The constellation after Y-00 decryption; the noise distribution of (b) I and (c) Q of the constellation.

Download Full Size | PDF

In order to analyze the masking performance of shot noise more clearly, we test the NMS and DFP of noise at point A where the signal is mainly affected by quantum noise and the ASE noise is the smallest. As depicted in Fig. 10(a), the NMS of noise in point A is about 830 when the output power of transmitter (considered as the received power of Eve) is -10dBm. Meanwhile, the detection failure probability is about 0.9988. If only a part of the optical power is tapped, then the masking number increases. The practical factor will significantly reduce the probability in real situations, and high practical security with irreducible security bounds based on shot noise can be achieved. Subsequently, the NMS and DFP of noise at point B (after the EDFA where the OSNR is highest but the signal is corrupted by ASE noise) under different received powers are calculated in Fig. 11. Since shot noise and ASE noise are employed to mask the ciphertext, the NMS and DFP are respectively about 840 and 0.99881 when the received power is -10dBm. Due to the influence of ASE noise, the NMS and DFP of point B will be higher than that of point A under the same received power. As the received power increases, ASE noise will play a major role so that the NMS and DFP decreased. Significantly, when the received power is 0dBm, the NMS and DFP are still at a high level about 720 and 0.9986. Thus, point B where ASE noise is the main noise is also considered safe. With the increase of transmission distance, the number of EDFAs is increasing so that the influence of ASE noise is more serious, which can ensure the security of the long-distance transmission system.

 figure: Fig. 10.

Fig. 10. (a) NMS and (b) DFP with different received powers of Eve at point A.

Download Full Size | PDF

 figure: Fig. 11.

Fig. 11. (a) NMS and (b) DFP with different received powers of Eve at point B.

Download Full Size | PDF

4. Conclusions

In this paper, we presented a PS-QAM/QNSC secure transmission scheme which uses the Y-00 protocol to convert the low-order modulation to ultra-dense high-order modulation, and then employs the physical randomness of noise to ensure high security of the encryption system. Since the DAC resolution is limited only with 8-bit, PS-28 × 28QAM signal is generated in our experiments. As the resolution increased to n-bit, PS-2n × 2n QAM signal can be generated and the Y-00 QNSC system can achieve better security. The proposed scheme has been demonstrated in a PDM-PS-65536QAM system carrying a 201.6Gbit/s (28GBaud × 3.6 × 2) PDM-PS-16QAM signal transmitted over 520 km (7% HD-FEC threshold) and 1200 km (20% SD-FEC threshold) SSMF. After accounting for the FEC and pilot overhead, the net rate can reach 178Gbit/s (201.6Gbit/s/(1 + 7%FEC + 6.25%polit)) and 160Gbit/s (201.6Gbit/s/(1 + 20%FEC + 6.25%polit)) under 7% and 20% FEC threshold, respectively. To the best of our knowledge, the experimental results achieve the largest rate-distance product record for the QAM/QNSC secure transmission systems. We believe that the proposed PS-QAM/QNSC secure transmission scheme can be integrated into existing high-speed long-distance optical fiber communication systems.

Funding

National Key Research and Development Program of China (2019YFB1803500); National Natural Science Foundation of China (U22A2089, 62005228); The Major Key Project of PCL; Sichuan Province Science and Technology Support Program (2022YFG0026); Natural Science Foundation of Sichuan Province (2022NSFSC0539); Fundamental Research Funds for the Central Universities (2682021CX050).

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. K. Shaneman and S. Gary, “Optical network security: technical analysis of fiber tapping mechanisms and methods for detection and prevention,” in Proceedings of IEEE Conference on Military Communications Conference (IEEE, 2004), pp.711–716.

2. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81(3), 1301–1350 (2009). [CrossRef]  

3. H. Zhang, Z. Sun, R. Qi, L. Yin, G. L. Long, and J. Lu, “Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states,” Light: Sci. Appl. 11(1), 83 (2022). [CrossRef]  

4. L. Jiang, J. Feng, L. Yan, A. Yi, S. S. Li, H. Yang, Y. Dong, L. Wang, A. Wang, Y. Wang, W. Pan, and B. Luo, “Chaotic optical communications at 56 Gbit/s over 100-km fiber transmission based on a chaos generation model driven by long short-term memory networks,” Opt. Lett. 47(10), 2382–2385 (2022). [CrossRef]  

5. M. Nakazawa, M. Yoshida, T. Hirooka, and K. Kasai, “QAM quantum stream cipher using digital coherent optical transmission,” Opt. Express 22(4), 4098–4107 (2014). [CrossRef]  

6. X. Chen, K. Tanizawa, P. Winzer, P. Dong, J. Cho, F. Futami, K. Kato, A. Melikyan, and K. W. Kim, “Experimental demonstration of a 4,294,967,296-QAM-based Y-00 quantum stream cipher template carrying 160-Gb/s 16-QAM signals,” Opt. Express 29(4), 5658–5664 (2021). [CrossRef]  

7. S. Wang, Z.-Q. Yin, D.-Y. He, W. Chen, R.-Q. Wang, P. Ye, Y. Zhou, G.-J. Fan-Yuan, F.-X. Wang, Y.-G. Zhu, P. V. Morozov, A. V. Divochiy, Z. Zhou, G.-C. Guo, and Z.-F. Han, “Twin-field quantum key distribution over 830-km fiber,” Nat. Photonics 16(2), 154–161 (2022). [CrossRef]  

8. Z. Zhao, M. Cheng, C. Luo, L. Deng, M. Zhang, S. Fu, M. Tang, P. Shum, and D. Liu, “Semiconductor-laser-based hybrid chaos source and its application in secure key distribution,” Opt. Lett. 44(10), 2605–2608 (2019). [CrossRef]  

9. G. A. Barbosa, E. Corndorf, P. Kumar, and H. P. Yuen, “Secure communication using mesoscopic coherent states,” Phys. Rev. Lett. 90(22), 227901 (2003). [CrossRef]  

10. R. Nair, H. P. Yuen, E. Corndorf, T. Eguchi, and P. Kumar, “Quantum-noise randomized ciphers,” Phys. Rev. A 74(5), 052309 (2006). [CrossRef]  

11. F. Futami, K. Tanizawa, and K. Kato, “Y-00 Quantum-Noise Randomized Stream Cipher Using Intensity Modulation Signals for Physical Layer Security of Optical Communications,” J. Lightwave Technol. 38(10), 2774–2781 (2020). [CrossRef]  

12. Y. Wang, H. Li, M. Cheng, D. Liu, and L. Deng, “Experimental demonstration of secure 100 Gb/s IMDD transmission over a 50 km SSMF using a quantum noise stream cipher and optical coarse-to-fine modulation,” Opt. Express 29(4), 5475–5486 (2021). [CrossRef]  

13. Q. Yu, Y. Wang, D. Li, H. Song, Y. Fu, X. Jiang, L. Huang, M. Cheng, D. Liu, and L. Deng, “Secure 100 Gb/s IMDD Transmission Over 100 km SSMF Enabled by Quantum Noise Stream Cipher and Sparse RLS-Volterra Equalizer,” IEEE Access 8, 63585–63594 (2020). [CrossRef]  

14. K. Tanizawa and F. Futami, “Digital coherent PSK Y-00 quantum stream cipher with 217 randomized phase levels,” Opt. Express 27(2), 1071–1079 (2019). [CrossRef]  

15. F. Futam, K. Tanizawa, and K. Kato, “Y-00 quantum stream cipher for physical layer security of optical communications,” in Proceedings of European Conference on Optical Communication (ECOC2019), pp. 1–4.

16. K. Tanizawa and F. Futami, “Ultra-long-haul digital coherent PSK Y-00 quantum stream cipher transmission system,” Opt. Express 29(7), 10451–10464 (2021). [CrossRef]  

17. C. Lei, J. Zhang, Y. Li, Y. Zhao, K. Wang, S. Liu, B. Wang, H. Gao, and J. Li, “16 QAM Quantum Noise Stream Cipher Coherent Transmission Over 300 km Without Intermediate Amplifier,” IEEE Photonics Technol. Lett. 33(18), 1002–1005 (2021). [CrossRef]  

18. M. Yoshida, T. Hirooka, K. Kasai, and M. Nakazawa, “Single-channel 40 Gbit/s digital coherent QAM quantum noise stream cipher transmission over 480 km,” Opt. Express 24(1), 652–661 (2016). [CrossRef]  

19. M. Yoshida, T. Kan, K. Kasai, T. Hirooka, and M. Nakazawa, “10 Tbit/s QAM Quantum Noise Stream Cipher Coherent Transmission Over 160 Km,” J. Lightwave Technol. 39(4), 1056–1063 (2021). [CrossRef]  

20. P. Schulte and G. Böcherer, “Constant composition distribution matching,” IEEE Trans. Inform. Theory 62(1), 430–434 (2016). [CrossRef]  

21. T. Fehenberger, A. Alvarado, G. Böcherer, and N. Hanik, “On Probabilistic Shaping of Quadrature Amplitude Modulation for the Nonlinear Fiber Channel,” J. Lightwave Technol. 34(21), 5063–5073 (2016). [CrossRef]  

22. M. P. Yankovn, F. D. Ros, E. P. Silva, S. Forchhammer, K. J. Larsen, L. K. Oxenløwe, M. Galili, and D. Zibar, “Constellation Shaping for WDM Systems Using 256QAM/1024QAM With Probabilistic Optimization,” J. Lightwave Technol. 34(22), 5146–5156 (2016). [CrossRef]  

23. J. Cho and P. J. Winzer, “Probabilistic constellation shaping for optical fiber communications,” J. Lightwave Technol. 37(6), 1590–1607 (2019). [CrossRef]  

24. X. Chen, J. Cho, A. Adamiecki, and P. Winzer, “16384-QAM transmission at 10 GBd over 25-km SSMF using polarization-multiplexed probabilistic constellation shaping,” in Proceedings of European Conference on Optical Communication (ECOC2019), pp. 1–4.

25. X. Su, L. Dou, Z. Tao, T. Hoshida, and J. C. Rasmussen, “QPSK assisted carrier phase recovery for high order QAM,” in Proceedings of IEEE OptoElectronics and Communications Conference (IEEE2016), pp. 1–3.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (11)

Fig. 1.
Fig. 1. Transmission distances and single-channel line rates of QNSC transmission experiments in recent years.
Fig. 2.
Fig. 2. The generation process of ultra-dense high-order PS-QAM.
Fig. 3.
Fig. 3. Constellations of received signal without (a) and with (b) Y-00 decryption.
Fig. 4.
Fig. 4. The experimental seup for Y-00 QNSC optical fiber transmission system.
Fig. 5.
Fig. 5. The BER curves under (a) the AWGN and (b) the back-to-back experiment system.
Fig. 6.
Fig. 6. The BER curves for Bob with different launching powers over 400 km transmission.
Fig. 7.
Fig. 7. Experimental results of Y-00 QNSC system: the constellations (a) before and (b) after decryption under 400 km transmission; (c) the BER curves for Bob with different transmission distances.
Fig. 8.
Fig. 8. Noise-masked constellations of QAM/QNSC.
Fig. 9.
Fig. 9. (a) The constellation after Y-00 decryption; the noise distribution of (b) I and (c) Q of the constellation.
Fig. 10.
Fig. 10. (a) NMS and (b) DFP with different received powers of Eve at point A.
Fig. 11.
Fig. 11. (a) NMS and (b) DFP with different received powers of Eve at point B.

Equations (2)

Equations on this page are rendered with MathJax. Learn more.

Γ PS UD - QAM = ( 2 σ ¯ PS - 16QAM / Δ PS UD - QAM ) 2
σ ¯ PS - 16QAM = 1 32 n = 1 16 ( σ I , n 2 + σ Q , n 2 )
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.