Secure key generation encryption scheme based on index parameter updates

被引:0
|
作者
Mao, Yaya [1 ,2 ,3 ]
Xia, Wenchao [1 ,2 ,3 ]
Liu, Bo [1 ,2 ,3 ,4 ]
Ren, Jianxin [1 ,2 ,3 ]
Song, Xiuming [1 ,2 ,3 ]
Wu, Xiangyu [1 ,2 ,3 ]
Zhao, Lilong [1 ,2 ,3 ]
Chen, Shuaidong [1 ,2 ,3 ]
Guo, Zhiruo [1 ,2 ,3 ]
Zhong, Qing [5 ]
Ma, Yiming [1 ,2 ,3 ]
Chen, Weiming [1 ,2 ,3 ]
Li, Ying [1 ,2 ,3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Inst Opt & Elect, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Optoelect Detect Atmosphere & Ocea, Nanjing 210044, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Int Joint Lab Meteorol Photon & Optoelect, Nanjing 210044, Peoples R China
[4] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[5] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
来源
OPTICS EXPRESS | 2024年 / 32卷 / 20期
基金
中国国家自然科学基金;
关键词
TRANSMISSION; NETWORKS; CHAOS;
D O I
10.1364/OE.531035
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose a secure key generation encryption scheme based on index parameter updates. A mutual coupling index parameter database is established at the transmitter and receiver, and different index parameters correspond to different time-varying key. We convert the index parameter into a binary bit stream and put it at the end of the frame header. For the original data, we realize chaotic encryption through the 7-dimensional cellular neural network (7D-CNN) chaotic system after modulation to enhance the security of the data. To ensure that the index parameters do not make mistakes in the transmission process, we have dealt with the times of repetition. The proposed scheme adopts a flexible digital encryption mode, which can encrypt the message with lower delay and higher speed. The experiment successfully demonstrated the transmission of 110.1Gb/s encrypted 16QAM signal in 2 km 7-core optical fiber. We also compare the encrypted signal with the unencrypted signal. The proposed scheme only costs 0.6 dB of receiver sensitivity and brings a huge key space of 10(1,680).To our best knowledge, the key space reached the world leading level in the same period. The proposed scheme can interoperate with all kinds of optical communication systems currently used, and realize the optical communication transmission scheme with low cost and high security.
引用
收藏
页码:35082 / 35094
页数:13
相关论文
共 50 条
  • [41] A novel encryption scheme for secure communication based on RNA
    Muhammad Aoun
    Tehseen Mazhar
    Muhammad Asgher Nadeem
    Tariq Shahzad
    Shafiq Ur Rehman
    Ateeq Ur Rehman
    CSI Transactions on ICT, 2024, 12 (4) : 71 - 80
  • [42] A fully secure attribute based broadcast encryption scheme
    Li, Qinyi
    Zhang, Fengli
    International Journal of Network Security, 2015, 17 (03) : 263 - 271
  • [43] On the Secure Multimedia Distribution Scheme Based on Partial Encryption
    Lian, Shiguo
    Chen, Xi
    Dong, Yuan
    Wang, Haila
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [44] A Secure Accountability Protocol Based on Public Key Encryption
    Techapanupreeda, Chian
    Kungpisdan, Supakorn
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2491 - 2495
  • [45] Secure Video Distribution Scheme Based on Partial Encryption
    Lian, Shiguo
    INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2009, 19 (03) : 227 - 235
  • [46] ON THE SECURE WATERMARK EMBEDDING SCHEME BASED ON SELECTIVE ENCRYPTION
    Chen, Xi
    Lian, Shiguo
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 205 - 217
  • [47] A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation
    Sundas Tariq
    Majid Khan
    Abdullah Alghafis
    Muhammad Amin
    Multimedia Tools and Applications, 2020, 79 : 23507 - 23529
  • [48] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [49] A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation
    Tariq, Sundas
    Khan, Majid
    Alghafis, Abdullah
    Amin, Muhammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 23507 - 23529
  • [50] Secure Scheme for Locating Disease-Causing Genes Based on Multi-Key Homomorphic Encryption
    Tanping Zhou
    Wenchao Liu
    Ningbo Li
    Xiaoyuan Yang
    Yiliang Han
    Shangwen Zheng
    TsinghuaScienceandTechnology, 2022, 27 (02) : 333 - 343