{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:22:32Z","timestamp":1760239352778,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>We proposed and experimentally demonstrated a secure key generation and distribution system that is compatible with optical amplifiers and standard wavelength-division multiplexing (WDM) transmission systems. The key is generated from the phase fluctuations induced by environmental instabilities. The key generation system is tested in a 240 km bidirectional fiber-pair link with multiple optical amplifiers. To demonstrate the compatibility with WDM systems, 38 WDM channels are transmitted together with the key distribution channel. The secret key is protected against eavesdropping and coherence detection attack by the wide-band property of the signal carrier and the fast-changing rate of the phase fluctuations.<\/jats:p>","DOI":"10.3390\/s20216296","type":"journal-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T09:04:34Z","timestamp":1604567074000},"page":"6296","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Optical-Amplifier-Compatible Long-Distance Secure Key Generation Based on Random Phase Fluctuations for WDM Systems"],"prefix":"10.3390","volume":"20","author":[{"given":"Ben","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rowan University, 201 Mullica Hill Rd., Glassboro, NJ 08028, USA"}]},{"given":"Yue-Kai","family":"Huang","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Inc., Princeton, NJ 08540, USA"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Stinson, D.R. (2019). Cryptography Theory and Practice, Chapman & Hall. [4th ed.].","DOI":"10.1201\/9781315282497"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Compt."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1088\/0034-4885\/61\/2\/002","article-title":"Quantum computing","volume":"61","author":"Steane","year":"1998","journal-title":"Rep. Prog. Phys."},{"key":"ref_5","first-page":"1","article-title":"The impact of quantum computing on present cryptography","volume":"9","author":"Mavroeidis","year":"2018","journal-title":"Int. J. Adv. Comp. Sci. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2018.3761723","article-title":"Cybersecurity in an era with quantum computers: Will we be ready?","volume":"16","author":"Mosca","year":"2018","journal-title":"IEEE Secur. Priv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCOM.2016.7537185","article-title":"Physical-layer security in evolving optical networks","volume":"54","author":"Kapov","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","first-page":"7907113","article-title":"Employing Bessel-Gaussian beams to improve physical-layer security in free-space optical communications","volume":"10","author":"Wand","year":"2018","journal-title":"IEEE Photonics J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"25357","DOI":"10.1364\/OE.27.025357","article-title":"Single-channel 48-Gbit\/s DP PSK Y-00 quantum stream cipher transmission over 400-and 800-km SSMF","volume":"27","author":"Tanizawa","year":"2019","journal-title":"Opt. Express"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1038\/nphoton.2014.149","article-title":"Secure quantum key distribution","volume":"8","author":"Lo","year":"2014","journal-title":"Nat. Photonics"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1038\/nature01289","article-title":"Quantum key distribution using gaussian-modulated coherent states","volume":"421","author":"Grosshans","year":"2003","journal-title":"Nature"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"23756","DOI":"10.1364\/OE.21.023756","article-title":"Physical layer secret key generation for fiber-optical networks","volume":"21","author":"Kravtsov","year":"2013","journal-title":"Opt. Express"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"5925","DOI":"10.1364\/OL.39.005925","article-title":"WDM optical steganography based on amplified spontaneous emission noise","volume":"39","author":"Wu","year":"2014","journal-title":"Opt. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.77.052325","article-title":"Phase-noise measurements in long-fiber interferometers for quantum-repeater applications","volume":"77","author":"Minar","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1049\/el:19920033","article-title":"Fundamental phase noise limit in optical fibers due to temperature fluctuations","volume":"28","author":"Wanser","year":"1992","journal-title":"Electron. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wu, B., Huang, Y.K., Zhang, S., Shastri, B.J., and Prucnal, P.R. (2016, January 5\u201310). Long range secure key distribution over multiple amplified fiber spans based on environmental instabilities. Proceedings of the CLEO Conference, OSA, San Jose, CA, USA.","DOI":"10.1364\/CLEO_SI.2016.SF1F.4"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.optcom.2016.12.036","article-title":"Spectral characteristics of the microfiber MZ interferometer with a knot resonator","volume":"389","author":"Liao","year":"2017","journal-title":"Opt. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"045104","DOI":"10.1088\/1555-6611\/aaa5ba","article-title":"Wavelength-switchable and stable-ring-cavity, erbium-doped fiber laser based on Mach\u2013Zehnder interferometer and tunable filter","volume":"28","author":"He","year":"2018","journal-title":"Laser Phys."},{"key":"ref_20","unstructured":"(2020, September 05). 100G CI-BCH-3 eFEC Technology. Available online: www.microsemi.com."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/JLT.2019.2895770","article-title":"Probabilistic shaping and forward error correction for fiber-optic communication systems","volume":"37","author":"Bocherer","year":"2019","journal-title":"J. Lightwave Technol."},{"key":"ref_22","unstructured":"Brassard, G., and Salvail, L. (1993, January 23\u201327). Secret-Key Reconciliation by Public Discussion. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT 1993, Lofthus, Norway."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1920","DOI":"10.1109\/LPT.2014.2341917","article-title":"System performance measurement and analysis of optical steganography based on noise","volume":"26","author":"Wu","year":"2014","journal-title":"IEEE Photonic Technol. Lett."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6296\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:29:37Z","timestamp":1760178577000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":23,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20216296"],"URL":"https:\/\/doi.org\/10.3390\/s20216296","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,11,5]]}}}