Downloads provided by UsageCounts
doi: 10.1038/lsa.2015.49
handle: 10261/134877
AbstractWe propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser. This new concept is supported by experimental results showing how the radiofrequency spectrum of the laser can be exploited as a carrier to exchange information. The test bench for our proof of principle is a 50-km-long fiber laser linking two users, Alice and Bob, where each user can randomly add an extra 1-km-long segment of fiber. The choice of laser length is driven by two independent random binary values, which makes such length become itself a random variable. The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and, hence, to the same free spectral range.
Fiber lasers, [PHYS.PHYS.PHYS-OPTICS]Physics [physics]/Physics [physics]/Optics [physics.optics], optical security and encryption, Optical security and encryption, fiber optics communications, Fiber optics communications, fiber lasers
Fiber lasers, [PHYS.PHYS.PHYS-OPTICS]Physics [physics]/Physics [physics]/Optics [physics.optics], optical security and encryption, Optical security and encryption, fiber optics communications, Fiber optics communications, fiber lasers
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 12 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
| views | 75 | |
| downloads | 63 |

Views provided by UsageCounts
Downloads provided by UsageCounts