• Chinese Optics Letters
  • Vol. 22, Issue 4, 040602 (2024)
Lei Jiang1, Bo Liu2,*, Jianxin Ren2, Xiangyu Wu2..., Rahat Ullah2, Yaya Mao2, Shuaidong Chen2, Yilan Ma2, Lilong Zhao2 and Feng Tian1|Show fewer author(s)
Author Affiliations
  • 1Beijing University of Posts and Telecommunications, Beijing 100876, China
  • 2Nanjing University of Information Science & Technology, Nanjing 210044, China
  • show less
    DOI: 10.3788/COL202422.040602 Cite this Article Set citation alerts
    Lei Jiang, Bo Liu, Jianxin Ren, Xiangyu Wu, Rahat Ullah, Yaya Mao, Shuaidong Chen, Yilan Ma, Lilong Zhao, Feng Tian, "High-security multi-constellation shaping modulation with asymmetric encryption," Chin. Opt. Lett. 22, 040602 (2024) Copy Citation Text show less
    Schematic diagram of the proposed scheme.
    Fig. 1. Schematic diagram of the proposed scheme.
    Principle of asymmetric encryption.
    Fig. 2. Principle of asymmetric encryption.
    Constellation diagram of (a) user_1, (b) user_2, (c) user_3, (d) user_4, and (e) multi-constellation combination. (f) Top view of (e).
    Fig. 3. Constellation diagram of (a) user_1, (b) user_2, (c) user_3, (d) user_4, and (e) multi-constellation combination. (f) Top view of (e).
    Experimental setup.
    Fig. 4. Experimental setup.
    The BER varies with received optical power after back-to-back and multicore fiber transmission.
    Fig. 5. The BER varies with received optical power after back-to-back and multicore fiber transmission.
    The BER varies with received optical power after seven-core fiber transmission.
    Fig. 6. The BER varies with received optical power after seven-core fiber transmission.
    (a) BER curves versus received optical power, and (b)–(e) constellation graphs of users_1–4.
    Fig. 7. (a) BER curves versus received optical power, and (b)–(e) constellation graphs of users_1–4.
    BER curve of the wrong private key.
    Fig. 8. BER curve of the wrong private key.
    Images: (a) before encryption, (b) after illegal reception, (c) after legal reception. Histograms: (d) before encryption, (e) after illegal reception, (f) after legal reception.
    Fig. 9. Images: (a) before encryption, (b) after illegal reception, (c) after legal reception. Histograms: (d) before encryption, (e) after illegal reception, (f) after legal reception.
    Binary DataConstellation Coordinates (p = 2.22, q = 1.41, u = 1.57, v = 2.42)
    User_1User_2User_3User_4
    0000(1, −1, −1)(q, 0, q)(q, 0, −1)(0, v, 0)
    0001(1, 1, −1)(q, 0, −q)(0, q, −1)(0, −v, 0)
    0010(−1, 1, −1)(−q, 0, −q)(−q, 0, −1)(−p, p, 0)
    0100(−1, −1, −1)(q, 0, q)(0, −q, −1)(−v, 0, 0)
    1000(1, −1, 1)(0, q, q)(q, 0, 1)(p, 0, p)
    1100(1, 1, 1)(0, q, −q)(0, q, 1)(p, 0, −p)
    1010(−1, 1, 1)(0, −q, −q)(−q, 0, 1)(0, −p, −p)
    1001(−1, −1, 1)(0, −q, q)(0, −q, 1)(−p, 0, p)
    0110(p, 0, p)(q, q, 0)(u, u, p)(−p, p, 0)
    0101(p, 0, −p)(q, −q, 0)(u, u, −p)(v, 0, 0)
    0011(−p, 0, p)(−q, −q, 0)(−u, −u, −p)(p, p, 0)
    1110(−p, 0, p)(−q, q, 0)(−u, −u, p)(0, p, p)
    1011(0, p, p)(q, q, q)(−u, u, p)(0, −p, p)
    1101(0, p, −p)(q, −q, −q)(−u, u, −p)(−p, 0, −p)
    0111(0, −p, −p)(−q, −q, q)(u, −u, −p)(p, −p, 0)
    1111(0, −p, p)(−q, q, −q)(u, −u, p)(0, p, −p)
    Table 1. Mapping Relationship between Binary Symbols and Each Users’ Constellation Points Coordinates
    Lei Jiang, Bo Liu, Jianxin Ren, Xiangyu Wu, Rahat Ullah, Yaya Mao, Shuaidong Chen, Yilan Ma, Lilong Zhao, Feng Tian, "High-security multi-constellation shaping modulation with asymmetric encryption," Chin. Opt. Lett. 22, 040602 (2024)
    Download Citation