Chinese Optics Letters, Volume. 22, Issue 4, 040602(2024)
High-security multi-constellation shaping modulation with asymmetric encryption
Fig. 3. Constellation diagram of (a) user_1, (b) user_2, (c) user_3, (d) user_4, and (e) multi-constellation combination. (f) Top view of (e).
Fig. 5. The BER varies with received optical power after back-to-back and multicore fiber transmission.
Fig. 6. The BER varies with received optical power after seven-core fiber transmission.
Fig. 7. (a) BER curves versus received optical power, and (b)–(e) constellation graphs of users_1–4.
Fig. 9. Images: (a) before encryption, (b) after illegal reception, (c) after legal reception. Histograms: (d) before encryption, (e) after illegal reception, (f) after legal reception.
|
Get Citation
Copy Citation Text
Lei Jiang, Bo Liu, Jianxin Ren, Xiangyu Wu, Rahat Ullah, Yaya Mao, Shuaidong Chen, Yilan Ma, Lilong Zhao, Feng Tian, "High-security multi-constellation shaping modulation with asymmetric encryption," Chin. Opt. Lett. 22, 040602 (2024)
Category: Fiber Optics and Optical Communications
Received: Oct. 10, 2023
Accepted: Jan. 6, 2024
Published Online: Apr. 28, 2024
The Author Email: Bo Liu (bo@nuist.edu.cn)