Secure key generation encryption scheme based on index parameter updates

被引:0
|
作者
Mao, Yaya [1 ,2 ,3 ]
Xia, Wenchao [1 ,2 ,3 ]
Liu, Bo [1 ,2 ,3 ,4 ]
Ren, Jianxin [1 ,2 ,3 ]
Song, Xiuming [1 ,2 ,3 ]
Wu, Xiangyu [1 ,2 ,3 ]
Zhao, Lilong [1 ,2 ,3 ]
Chen, Shuaidong [1 ,2 ,3 ]
Guo, Zhiruo [1 ,2 ,3 ]
Zhong, Qing [5 ]
Ma, Yiming [1 ,2 ,3 ]
Chen, Weiming [1 ,2 ,3 ]
Li, Ying [1 ,2 ,3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Inst Opt & Elect, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Optoelect Detect Atmosphere & Ocea, Nanjing 210044, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Int Joint Lab Meteorol Photon & Optoelect, Nanjing 210044, Peoples R China
[4] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[5] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
来源
OPTICS EXPRESS | 2024年 / 32卷 / 20期
基金
中国国家自然科学基金;
关键词
TRANSMISSION; NETWORKS; CHAOS;
D O I
10.1364/OE.531035
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose a secure key generation encryption scheme based on index parameter updates. A mutual coupling index parameter database is established at the transmitter and receiver, and different index parameters correspond to different time-varying key. We convert the index parameter into a binary bit stream and put it at the end of the frame header. For the original data, we realize chaotic encryption through the 7-dimensional cellular neural network (7D-CNN) chaotic system after modulation to enhance the security of the data. To ensure that the index parameters do not make mistakes in the transmission process, we have dealt with the times of repetition. The proposed scheme adopts a flexible digital encryption mode, which can encrypt the message with lower delay and higher speed. The experiment successfully demonstrated the transmission of 110.1Gb/s encrypted 16QAM signal in 2 km 7-core optical fiber. We also compare the encrypted signal with the unencrypted signal. The proposed scheme only costs 0.6 dB of receiver sensitivity and brings a huge key space of 10(1,680).To our best knowledge, the key space reached the world leading level in the same period. The proposed scheme can interoperate with all kinds of optical communication systems currently used, and realize the optical communication transmission scheme with low cost and high security.
引用
收藏
页码:35082 / 35094
页数:13
相关论文
共 50 条
  • [21] A secure distributed symmetric key generation scheme
    Shang, Jianwei
    Li, Feng
    Zhang, Yanyan
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 375 - +
  • [22] Secure Underwater Acoustic Communication Based on a Robust Key Generation Scheme
    Liu, Yicong
    Jing, Jiwu
    Yang, Jun
    ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 1839 - +
  • [23] Searchable Encryption with Secure and Efficient Updates
    Hahn, Florian
    Kerschbaum, Florian
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 310 - 320
  • [24] A Revocable and Key Secure Ciphertext-Policy Attribute-based Encryption Scheme Based on Blockchain
    Zhou, Xingyu
    Li, Wenmin
    Zhang, Huimin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 7 - 10
  • [25] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 41 - 57
  • [26] Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system
    Khan, Majid
    Masood, Fawad
    Alghafis, Abdullah
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (15): : 11837 - 11857
  • [27] A probabilistic public key encryption switching scheme for secure cloud storage
    Bhat R.
    Sunitha N.R.
    Iyengar S.S.
    International Journal of Information Technology, 2023, 15 (2) : 675 - 690
  • [28] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [29] Secure OFDM transmission scheme based on chaotic encryption and noise-masking key distribution
    Wan, Yibin
    Ren, Jianxin
    Liu, Bo
    Mao, Yaya
    Chen, Shuaidong
    Wu, Xiangyu
    Li, Ying
    Wu, Yongfeng
    Zhao, Lilong
    Sun, Tingting
    Ullah, Rahat
    OPTICS LETTERS, 2022, 47 (11) : 2903 - 2906
  • [30] A fast and secure public-key image encryption scheme based on Mordell elliptic curves
    Azam, Naveed Ahmed
    Ullah, Ikram
    Hayat, Umar
    OPTICS AND LASERS IN ENGINEERING, 2021, 137