Optimization of intensity-modulation/direct-detection optical key
distribution under passive eavesdropping
- URL: http://arxiv.org/abs/2109.12335v2
- Date: Thu, 16 Dec 2021 10:21:34 GMT
- Title: Optimization of intensity-modulation/direct-detection optical key
distribution under passive eavesdropping
- Authors: Konrad Banaszek and Michal Jachura and Piotr Kolenderski and Mikolaj
Lasota
- Abstract summary: We analyze theoretically optimal operation of an optical key distribution link based on fine intensity modulation of an optical signal transmitted over an attenuating channel to a direct detection receiver.
With suitable digital postprocessing, the users may generate a secret key that will be unknown to an unauthorized party collecting passively a fraction of the signal that escapes detection by the legitimate recipient.
The security is ensured by the presence of the shot noise that inevitably accompanies eavesdropper's attempt to detect the collected signal.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We analyze theoretically optimal operation of an optical key distribution
(OKD) link based on fine intensity modulation of an optical signal transmitted
over an attenuating channel to a direct detection receiver. With suitable
digital postprocessing, the users may generate a secret key that will be
unknown to an unauthorized party collecting passively a fraction of the signal
that escapes detection by the legitimate recipient. The security is ensured by
the presence of the shot noise that inevitably accompanies eavesdropper's
attempt to detect the collected signal. It is shown that the key amount depends
on a ratio that compares legitimate recipient's and eavesdropper's capabilities
to detect the signal, including noise contributed by their respective
detectors. A simple proportionality relation is derived in the strong
eavesdropping regime and closed expressions for the optimal depth of binary
intensity modulation as well as the discrimination thresholds for hard-decoded
direct detection are given. The presented results substantially simplify design
of practical OKD systems operating under changing external conditions, e.g.
variable atmospheric absorption in the case of free-space optical links.
Related papers
- Learning to Separate RF Signals Under Uncertainty: Detect-Then-Separate vs. Unified Joint Models [53.79667447811139]
We show that a single deep neural architecture learns to jointly detect and separate when applied directly to the received signal.<n>These findings highlight UJM as a scalable and practical alternative to DTS, while opening new directions for unified separation under broader estimation.
arXiv Detail & Related papers (2026-02-04T15:25:02Z) - AmbShield: Enhancing Physical Layer Security with Ambient Backscatter Devices against Eavesdroppers [69.56534335936534]
AmbShield is an AmBD-assisted PLS scheme that leverages naturally distributed AmBDs to simultaneously strengthen the legitimate channel and degrade eavesdroppers'<n>In AmbShield, AmBDs are exploited as friendly jammers that randomly backscatter to create interference at eavesdroppers, and as passive relays that backscatter the desired signal to enhance the capacity of legitimate devices.
arXiv Detail & Related papers (2026-01-14T20:56:50Z) - PASS-Enabled Covert Communications With Distributed Cooperative Wardens [3.27018081424353]
This paper investigates PASS-enabled downlink covert communication in the presence of distributed surveillance.<n>We consider a dual-waveguide architecture that simultaneously delivers covert information and randomized jamming to hide transmission.
arXiv Detail & Related papers (2026-01-12T02:38:19Z) - Physical Layer Deception based on Semantic Distortion [58.38604209714828]
Physical layer deception (PLD) is a framework that integrates physical layer security (PLS) with deception techniques.<n>We extend this framework to a semantic communication model and conduct a theoretical analysis using semantic distortion as the performance metric.
arXiv Detail & Related papers (2025-10-16T18:23:35Z) - Online Reliable Anomaly Detection via Neuromorphic Sensing and Communications [58.796149594878585]
This paper proposes a low-power online anomaly detection framework based on neuromorphic wireless sensor networks.<n>In the considered system, a central reader node actively queries a subset of neuromorphic sensor nodes (neuro-SNs) at each time frame.<n>The neuromorphic sensors are event-driven, producing spikes in correspondence to relevant changes in the monitored system.
arXiv Detail & Related papers (2025-10-16T13:56:54Z) - Quantum Pulse Gate Attack on IM/DD Optical Key Distribution Exploiting Symbol Shape Distortion [0.0]
Intensity modulation/direct detection (IM/DD) optical key distribution (OKD) is a method to generate a secret key.
Here the effects of intensity-dependent symbol shape distortion on the IM/DD OKD security are investigated.
arXiv Detail & Related papers (2025-03-18T10:19:35Z) - Generalizable Non-Line-of-Sight Imaging with Learnable Physical Priors [52.195637608631955]
Non-line-of-sight (NLOS) imaging has attracted increasing attention due to its potential applications.
Existing NLOS reconstruction approaches are constrained by the reliance on empirical physical priors.
We introduce a novel learning-based solution, comprising two key designs: Learnable Path Compensation (LPC) and Adaptive Phasor Field (APF)
arXiv Detail & Related papers (2024-09-21T04:39:45Z) - Quantifying Noise of Dynamic Vision Sensor [49.665407116447454]
Dynamic visual sensors (DVS) are characterised by a large amount of background activity (BA) noise.
It is difficult to distinguish between noise and the cleaned sensor signals using standard image processing techniques.
A new technique is presented to characterise BA noise derived from the Detrended Fluctuation Analysis (DFA)
arXiv Detail & Related papers (2024-04-02T13:43:08Z) - Practical No-Switching Continuous-Variable Quantum Key Distribution with
Biased Quadrature Detection [4.559900583044687]
The security of an ideal No-Switching protocol has been proved against general attacks in finite-size regime and composable security framework.
We propose a modified No-Switching protocol with biased quadrature detection, where the asymmetry of the heterodyne detection is modeled to match the practical systems.
An optimization strategy is proposed to achieve the optimal secret key rate by adjusting the transmittance of the beam splitter.
arXiv Detail & Related papers (2024-02-01T02:02:56Z) - Verifiable homodyne measurement for detecting non-local properies of
light [4.396860522241306]
homodyne detection is one of the most basic tools for identifying the quantum state of light.
It has been used to detect useful non-local properties, such as entanglement for the quantum teleportation.
We present an alternative scheme that works as the homodyne detection to detect the non-local properties of light in a verifiable manner.
arXiv Detail & Related papers (2022-12-21T11:58:01Z) - Adaptive Low-Pass Filtering using Sliding Window Gaussian Processes [71.23286211775084]
We propose an adaptive low-pass filter based on Gaussian process regression.
We show that the estimation error of the proposed method is uniformly bounded.
arXiv Detail & Related papers (2021-11-05T17:06:59Z) - Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance [7.87972015113057]
We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
arXiv Detail & Related papers (2021-04-22T16:10:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Optimally Displaced Threshold Detection for Discriminating Binary
Coherent States Using Imperfect Devices [50.09039506170243]
We analytically study the performance of the generalized Kennedy receiver having optimally displaced threshold detection (ODTD) in a realistic situation with noises and imperfect devices.
We show that the proposed greedy search algorithm can obtain a lower and smoother error probability than the existing works.
arXiv Detail & Related papers (2020-07-21T21:52:29Z) - RDP-GAN: A R\'enyi-Differential Privacy based Generative Adversarial
Network [75.81653258081435]
Generative adversarial network (GAN) has attracted increasing attention recently owing to its impressive ability to generate realistic samples with high privacy protection.
However, when GANs are applied on sensitive or private training examples, such as medical or financial records, it is still probable to divulge individuals' sensitive and private information.
We propose a R'enyi-differentially private-GAN (RDP-GAN), which achieves differential privacy (DP) in a GAN by carefully adding random noises on the value of the loss function during training.
arXiv Detail & Related papers (2020-07-04T09:51:02Z) - Trusted detector noise analysis for discrete modulation schemes of
continuous-variable quantum key distribution [4.977851927269835]
Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment.
We calculate key rates against collective attacks in the trusted detector noise scenario.
Our results show that we can thus cut out most of the effect of detector noise and obtain key rates similar to those had we access to ideal detectors.
arXiv Detail & Related papers (2020-06-11T03:11:36Z) - Optimal control for quantum detectors [0.0]
We find the optimal quantum control to detect an external signal in the presence of background noise using a quantum sensor.
For white background noise, the optimal solution is the simple and well-known spin-locking control scheme.
Results show that an optimal detection scheme can be easily implemented in near-term quantum sensors without the need for complicated pulse shaping.
arXiv Detail & Related papers (2020-05-12T18:15:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.