Chinese Optics Letters, Volume. 22, Issue 4, 040602(2024)

High-security multi-constellation shaping modulation with asymmetric encryption

Lei Jiang1, Bo Liu2、*, Jianxin Ren2, Xiangyu Wu2, Rahat Ullah2, Yaya Mao2, Shuaidong Chen2, Yilan Ma2, Lilong Zhao2, and Feng Tian1
Author Affiliations
  • 1Beijing University of Posts and Telecommunications, Beijing 100876, China
  • 2Nanjing University of Information Science & Technology, Nanjing 210044, China
  • show less
    Figures & Tables(10)
    Schematic diagram of the proposed scheme.
    Principle of asymmetric encryption.
    Constellation diagram of (a) user_1, (b) user_2, (c) user_3, (d) user_4, and (e) multi-constellation combination. (f) Top view of (e).
    Experimental setup.
    The BER varies with received optical power after back-to-back and multicore fiber transmission.
    The BER varies with received optical power after seven-core fiber transmission.
    (a) BER curves versus received optical power, and (b)–(e) constellation graphs of users_1–4.
    BER curve of the wrong private key.
    Images: (a) before encryption, (b) after illegal reception, (c) after legal reception. Histograms: (d) before encryption, (e) after illegal reception, (f) after legal reception.
    • Table 1. Mapping Relationship between Binary Symbols and Each Users’ Constellation Points Coordinates

      View table
      View in Article

      Table 1. Mapping Relationship between Binary Symbols and Each Users’ Constellation Points Coordinates

      Binary DataConstellation Coordinates (p = 2.22, q = 1.41, u = 1.57, v = 2.42)
      User_1User_2User_3User_4
      0000(1, −1, −1)(q, 0, q)(q, 0, −1)(0, v, 0)
      0001(1, 1, −1)(q, 0, −q)(0, q, −1)(0, −v, 0)
      0010(−1, 1, −1)(−q, 0, −q)(−q, 0, −1)(−p, p, 0)
      0100(−1, −1, −1)(q, 0, q)(0, −q, −1)(−v, 0, 0)
      1000(1, −1, 1)(0, q, q)(q, 0, 1)(p, 0, p)
      1100(1, 1, 1)(0, q, −q)(0, q, 1)(p, 0, −p)
      1010(−1, 1, 1)(0, −q, −q)(−q, 0, 1)(0, −p, −p)
      1001(−1, −1, 1)(0, −q, q)(0, −q, 1)(−p, 0, p)
      0110(p, 0, p)(q, q, 0)(u, u, p)(−p, p, 0)
      0101(p, 0, −p)(q, −q, 0)(u, u, −p)(v, 0, 0)
      0011(−p, 0, p)(−q, −q, 0)(−u, −u, −p)(p, p, 0)
      1110(−p, 0, p)(−q, q, 0)(−u, −u, p)(0, p, p)
      1011(0, p, p)(q, q, q)(−u, u, p)(0, −p, p)
      1101(0, p, −p)(q, −q, −q)(−u, u, −p)(−p, 0, −p)
      0111(0, −p, −p)(−q, −q, q)(u, −u, −p)(p, −p, 0)
      1111(0, −p, p)(−q, q, −q)(u, −u, p)(0, p, −p)
    Tools

    Get Citation

    Copy Citation Text

    Lei Jiang, Bo Liu, Jianxin Ren, Xiangyu Wu, Rahat Ullah, Yaya Mao, Shuaidong Chen, Yilan Ma, Lilong Zhao, Feng Tian, "High-security multi-constellation shaping modulation with asymmetric encryption," Chin. Opt. Lett. 22, 040602 (2024)

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Fiber Optics and Optical Communications

    Received: Oct. 10, 2023

    Accepted: Jan. 6, 2024

    Published Online: Apr. 28, 2024

    The Author Email: Bo Liu (bo@nuist.edu.cn)

    DOI:10.3788/COL202422.040602

    CSTR:32184.14.COL202422.040602

    Topics