2024
DOI: 10.1364/oe.506738
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic phase noise-like encryption based on geometric shaping for coherent data center interconnections

Wenjun Zeng,
Chongfu Zhang,
Xinshuai Liang
et al.

Abstract: The network traffic of data centers (DCs) has increased unprecedentedly with the rapid development of digital economy. However, the data transmission faces security threats in the distributed optical interconnection and intensive interaction of DC networks. In this paper, we propose a chaotic phase noise-like encryption algorithm using geometric shaping (GS) for coherent DC interconnections (DCIs). A GS constellation is used to improve transmission performance, and it is combined with coherent equalization alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…As one of the most intuitive and common data types in information dissemination, images contain a large amount of private information [4][5][6]. Therefore, considering encryption of images can effectively prevent the leakage of important information during transmission [7][8][9]. Digital images are characterized by high data redundancy, high correlation, and large amount of data, which makes a large number of pseudo-random numbers are needed as key streams in the process of encrypting images, and this promotes the research of pseudo-random numbers [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…As one of the most intuitive and common data types in information dissemination, images contain a large amount of private information [4][5][6]. Therefore, considering encryption of images can effectively prevent the leakage of important information during transmission [7][8][9]. Digital images are characterized by high data redundancy, high correlation, and large amount of data, which makes a large number of pseudo-random numbers are needed as key streams in the process of encrypting images, and this promotes the research of pseudo-random numbers [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Various physical layer encryption methods, such as quantum key distribution (QKD) [7], optical steganography [8], optical code division multiple access (OCDMA) [9], hardware chaos encryption [10][11][12][13], and digital chaos encryption [14][15][16][17][18][19][20][21][22][23][24], etc., have all made significant contributions to securing data. Zhang et al used an implementation of high-speed QKD in an SiP QKD encoder using a pass-block architecture and a dedicated SiP decoder based on the polarization-based decoy state Bennett-Brassard 1984 protocol [7].…”
Section: Introductionmentioning
confidence: 99%