Secure key generation encryption scheme based on index parameter updates

被引:0
|
作者
Mao, Yaya [1 ,2 ,3 ]
Xia, Wenchao [1 ,2 ,3 ]
Liu, Bo [1 ,2 ,3 ,4 ]
Ren, Jianxin [1 ,2 ,3 ]
Song, Xiuming [1 ,2 ,3 ]
Wu, Xiangyu [1 ,2 ,3 ]
Zhao, Lilong [1 ,2 ,3 ]
Chen, Shuaidong [1 ,2 ,3 ]
Guo, Zhiruo [1 ,2 ,3 ]
Zhong, Qing [5 ]
Ma, Yiming [1 ,2 ,3 ]
Chen, Weiming [1 ,2 ,3 ]
Li, Ying [1 ,2 ,3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Inst Opt & Elect, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Optoelect Detect Atmosphere & Ocea, Nanjing 210044, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Int Joint Lab Meteorol Photon & Optoelect, Nanjing 210044, Peoples R China
[4] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[5] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
来源
OPTICS EXPRESS | 2024年 / 32卷 / 20期
基金
中国国家自然科学基金;
关键词
TRANSMISSION; NETWORKS; CHAOS;
D O I
10.1364/OE.531035
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose a secure key generation encryption scheme based on index parameter updates. A mutual coupling index parameter database is established at the transmitter and receiver, and different index parameters correspond to different time-varying key. We convert the index parameter into a binary bit stream and put it at the end of the frame header. For the original data, we realize chaotic encryption through the 7-dimensional cellular neural network (7D-CNN) chaotic system after modulation to enhance the security of the data. To ensure that the index parameters do not make mistakes in the transmission process, we have dealt with the times of repetition. The proposed scheme adopts a flexible digital encryption mode, which can encrypt the message with lower delay and higher speed. The experiment successfully demonstrated the transmission of 110.1Gb/s encrypted 16QAM signal in 2 km 7-core optical fiber. We also compare the encrypted signal with the unencrypted signal. The proposed scheme only costs 0.6 dB of receiver sensitivity and brings a huge key space of 10(1,680).To our best knowledge, the key space reached the world leading level in the same period. The proposed scheme can interoperate with all kinds of optical communication systems currently used, and realize the optical communication transmission scheme with low cost and high security.
引用
收藏
页码:35082 / 35094
页数:13
相关论文
共 50 条
  • [1] A DNA Encryption Technique Based on Matrix Manipulation and Secure key Generation Scheme
    Mandge, Tushar
    Choudhary, Vijay
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 47 - 52
  • [2] Secure Distributed Key Generation in Attribute Based Encryption Systems
    Pletea, Daniel
    Sedghi, Saeed
    Veeningen, Meilof
    Petkovic, Milan
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 103 - 107
  • [3] A Lightweight Image Encryption Algorithm Based on Secure Key Generation
    Ali, A'Laa Hussein
    Gbashi, Ekhlas Khalaf
    Alaskar, Haya
    Hussain, Abir Jaafar
    IEEE ACCESS, 2024, 12 : 95871 - 95883
  • [4] A Forward Secure Identity Based Encryption Scheme with Master Key Update
    Yang, Peng
    Matsuura, Kanta
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 336 - 341
  • [5] An optimized DNA based encryption scheme with enforced secure key distribution
    Yunpeng Zhang
    Xin Liu
    Yongqiang Ma
    Liang-Chieh Cheng
    Cluster Computing, 2017, 20 : 3119 - 3130
  • [6] An optimized DNA based encryption scheme with enforced secure key distribution
    Zhang, Yunpeng
    Liu, Xin
    Ma, Yongqiang
    Cheng, Liang-Chieh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (04): : 3119 - 3130
  • [7] A Provably Secure Public Key Encryption Scheme Based on Isogeny Star
    Han, Weiwei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 623 - 627
  • [8] A Secure Order-Preserving Encryption Scheme Based on Encrypted Index
    Chen, Haobin
    Liang, Ji
    Qin, Xiaolin
    WEB AND BIG DATA, PT III, APWEB-WAIM 2022, 2023, 13423 : 247 - 261
  • [9] High-Security Transmission Scheme of Secure Key Generation and Distribution Based on Polling-Permutation Encryption
    Xia, Wenchao
    Liu, Bo
    Ren, Jianxin
    Mao, Yaya
    Wu, Xiangyu
    Ullah, Rahat
    Zhao, Lilong
    Chen, Shuaidong
    Wan, Yibin
    Ma, Yiming
    Li, Ying
    Qi, Zhipeng
    Wu, Yongfong
    Guo, Xuzhou
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2024, 42 (01) : 149 - 157
  • [10] An efficient and provably secure public key encryption scheme based on coding theory
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1440 - 1447