Abstract
We present a protocol for the amplification and distribution of a one-time-pad cryptographic key over a point-to-multipoint optical network based on computational ghost imaging (GI) and compressed sensing (CS). It is shown experimentally that CS imaging can perform faster authentication and increase the key generation rate by an order of magnitude compared with the scheme using computational GI alone. The protocol is applicable for any number of legitimate user, thus, the scheme could be used in real intercity networks where high speed and high security are crucial.
© 2013 Optical Society of America
Full Article | PDF ArticleMore Like This
Wen-Kai Yu
Appl. Opt. 58(19) 5294-5300 (2019)
Shen Li, Xu-Ri Yao, Wen-Kai Yu, Ling-An Wu, and Guang-Jie Zhai
Opt. Lett. 38(12) 2144-2146 (2013)
Boris Korzh, Nino Walenta, Raphael Houlmann, and Hugo Zbinden
Opt. Express 21(17) 19579-19592 (2013)