• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用随机调制增强大气光通道中的密钥生成。

Enhanced secret-key generation from atmospheric optical channels with the use of random modulation.

出版信息

Opt Express. 2022 Dec 5;30(25):45862-45882. doi: 10.1364/OE.476856.

DOI:10.1364/OE.476856
PMID:36522981
Abstract

Secret-key extraction from atmospheric optical channels can generate common keys used by two communicating parties to encrypt their transmitted confidential information. The correlation time of turbulence-induced optical fluctuations imposes a restriction on the number of extracted uncorrelated key bits per second. To break this restriction, we propose a novel randomness sharing scheme between two communicating parties using an atmospheric optical channel equipped with random modulation and develop mathematical models for the common randomness source created by such a randomness-sharing scheme. Our randomness-sharing scheme provides the legitimate parties with the ability to decrease the temporal autocorrelation of the said common randomness source, which is called controllable common randomness source with memory (CCRSM), thereby enabling an enhanced secret-key extraction that can break the aforementioned restriction. Both the autocorrelation of the legitimate parties' observations of the CCRSM and the cross-correlation of the two legitimate parties' observations of the CCRSM are formulated and examined theoretically. It is found that the performing random modulation can decorrelate consecutive observations of the CCRSM obtained by the legitimate parties using a sampling interval smaller than the correlation time of turbulence-induced optical fluctuations. The cross-correlation coefficient of the eavesdropper's and legitimate parties' observations of the CCRSM is dealt with theoretically and the eavesdropping risk in the CCRSM-based key extraction is inspected for the fully-disclosed-single-modulation worst eavesdropping (FDSM-WE) scenario, partially-disclosed-single-modulation worst eavesdropping (PDSM-WE) scenario and double-modulation worst eavesdropping (DM-WE) scenario. It is shown that the FDSM-WE scenario has the highest degree of eavesdropping risk. Finally, the lowest limit of the secret-key capacity in consideration of using the CCRSM is theoretically formulated. The effects of random modulation on such the lowest limit are quantitatively analyzed from an information-theoretic perspective. It is manifested that random modulation does not harm the potential of extracting secret keys from the CCRSM's randomness component stemming from turbulence-induced optical fluctuations.

摘要

从大气光学信道中提取密钥,可以生成两个通信方用来加密其传输的机密信息的公共密钥。湍流引起的光闪烁的相关时间限制了每秒提取的不相关密钥位的数量。为了打破这种限制,我们提出了一种新的方案,即使用配备随机调制的大气光学信道,在两个通信方之间共享随机数,并为这种随机数共享方案产生的公共随机源建立数学模型。我们的随机数共享方案为合法方提供了降低上述公共随机源的时间自相关的能力,即具有记忆的可控公共随机源(CCRSM),从而实现了增强的密钥提取,可以打破上述限制。合法方对 CCRSM 的观测的自相关以及两个合法方对 CCRSM 的观测的互相关都进行了理论上的公式化和检验。结果发现,执行随机调制可以使合法方使用小于由湍流引起的光闪烁的相关时间的采样间隔去解相关 CCRSM 的连续观测。从理论上处理了窃听者和合法方对 CCRSM 的观测的互相关系数,并检验了在完全公开单调制最坏窃听(FDSM-WE)场景、部分公开单调制最坏窃听(PDSM-WE)场景和双调制最坏窃听(DM-WE)场景中基于 CCRSM 的密钥提取的窃听风险。结果表明,FDSM-WE 场景具有最高的窃听风险。最后,从信息论的角度理论上制定了考虑使用 CCRSM 时的密钥容量的最低限制。从信息论的角度定量分析了随机调制对这个最低限制的影响。结果表明,随机调制不会损害从 CCRSM 的随机性组件中提取密钥的潜力,而这种随机性组件源于湍流引起的光闪烁。

相似文献

1
Enhanced secret-key generation from atmospheric optical channels with the use of random modulation.利用随机调制增强大气光通道中的密钥生成。
Opt Express. 2022 Dec 5;30(25):45862-45882. doi: 10.1364/OE.476856.
2
Shared secret key generation from signal fading in a turbulent optical wireless channel using common-transverse-spatial-mode coupling.利用共横向空间模式耦合从湍流光学无线信道中的信号衰落生成共享密钥。
Opt Express. 2018 Jun 25;26(13):16422-16441. doi: 10.1364/OE.26.016422.
3
Physical layer secret key generation for fiber-optical networks.用于光纤网络的物理层密钥生成
Opt Express. 2013 Oct 7;21(20):23756-71. doi: 10.1364/OE.21.023756.
4
Secret sharing scheme based on spread spectrum ghost imaging.基于扩频鬼成像的秘密共享方案。
Appl Opt. 2022 Aug 20;61(24):7102-7107. doi: 10.1364/AO.463885.
5
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.具有反向霍夫曼 - 斐波那契树编码的混合阈值自适应量子秘密共享方案
Sci Rep. 2016 Aug 12;6:31350. doi: 10.1038/srep31350.
6
Detection and defense of active attacks for generating secret key from wireless channels in static environment.静态环境中无线信道生成密钥的主动攻击检测与防御
ISA Trans. 2020 Apr;99:231-239. doi: 10.1016/j.isatra.2019.11.001. Epub 2019 Nov 8.
7
Physical-layer key distribution based on commonly-driven laser synchronization with random modulation of drive light.基于驱动光随机调制的共驱动激光同步的物理层密钥分发。
Opt Express. 2023 Dec 18;31(26):42838-42849. doi: 10.1364/OE.506211.
8
Physical Layer Cryptographic Key Generation by Exploiting PMD of an Optical Fiber Link.利用光纤链路的偏振模色散进行物理层密钥生成。
J Lightwave Technol. 2018 Dec 15;36(24):5903-5911. doi: 10.1109/JLT.2018.2880957. Epub 2018 Nov 12.
9
Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network.基于负数据库和无线传感器网络物理信道状态特征的密钥同步方法
Sensors (Basel). 2024 Sep 25;24(19):6217. doi: 10.3390/s24196217.
10
Entangled state quantum cryptography: eavesdropping on the ekert protocol.纠缠态量子密码学:对埃克特协议的窃听
Phys Rev Lett. 2000 May 15;84(20):4733-6. doi: 10.1103/PhysRevLett.84.4733.