2023
DOI: 10.3390/photonics10070786
|View full text |Cite
|
Sign up to set email alerts
|

Parallel CV-QRNG with Strict Entropy Evaluation

Abstract: Continuous-variable quantum random number generators (CV-QRNGs) have promising application prospects thanks to their advantages such as high detection bandwidth, robustness of system, and integratability. In major CV-QRNGs, the generation of random numbers is based on homodyne detection and discretization of the quadrature fluctuations of the EM fields. Any defectiveness in physical realization may leak information correlated with the generated numbers and the maximal amount of randomness that can be extracted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 46 publications
0
1
0
Order By: Relevance
“…Photonic-layer secure communication safeguards against adversarial detection in the optical domain by employing a range of security technologies, including optical chaos [1][2][3][4][5], optical code division multiplexing [6][7][8], quantum noise randomized ciphers [9][10][11][12], optical frequency hopping [13][14][15], quantum key distribution [16,17], and optical covert communication (OCC) [18][19][20][21][22][23]. OCC requires a higher level of security than merely protecting the content from unauthorized access through encryption, and the security requirement is imperceptibility for optical covert communication.…”
Section: Introductionmentioning
confidence: 99%
“…Photonic-layer secure communication safeguards against adversarial detection in the optical domain by employing a range of security technologies, including optical chaos [1][2][3][4][5], optical code division multiplexing [6][7][8], quantum noise randomized ciphers [9][10][11][12], optical frequency hopping [13][14][15], quantum key distribution [16,17], and optical covert communication (OCC) [18][19][20][21][22][23]. OCC requires a higher level of security than merely protecting the content from unauthorized access through encryption, and the security requirement is imperceptibility for optical covert communication.…”
Section: Introductionmentioning
confidence: 99%