摘要:
Encoding element (100) at least selectively transparent to an infrared or ultraviolet light radiation, incident thereon on a first incidence surface (101), wherein—in the volume defined by said encoding element (100)—a plurality of areas (104) is provided, previously selected and arranged according to a predefined pattern wherein at least one polarisation characteristic of the optical radiation (200) that is incident thereon is varied, wherein the variation of said polarisation characteristic of said incident radiation is varied according to a localised alteration pattern biunivocally associated to a predefined ciphering key, and wherein said plurality of areas is arranged between said first incidence surface (101) on which said infrared or ultraviolet light radiation is incident in use, and a second output surface (102) of said infrared or ultraviolet light optical radiation.
摘要:
A method is provided for distributing quantum cryptographic keys. The method includes receiving a first quantum signal from an initial quantum key generating transmitter. Following correspondence with the initial quantum key generating transmitter, a first quantum key is generated. A second quantum signal is transmitted to a recipient quantum key generating transmitter. Following correspondence with the recipient quantum key generating receiver, a second quantum key is generated. The first quantum key is encoded using the second quantum key. The encoded first quantum key is transmitted to the recipient quantum key generating receiver using the second quantum key.
摘要:
A system for the secure and rapid acquisition of a transmitted acquisition composite code composed from acquisition component codes. The acquisition composite code may, for example, be composed in accordance with a Boolean majority voting rule. Reference component codes that correlate respectively with the acquisition component codes are combined to provide a verification composite code that correlates with the acquisition composite code only when all of the reference component codes in the verification code are each in alignment with the corresponding acquisition component codes in the acquisition composite code. The verification code may, for example, be composed in accordance with a modulo-2 addition rule. Initially, the reference component codes are individually brought into alignment with the transmitted signal during the acquisition thereof. The verification code is then cross-correlated against the acquired transmitted signal to verify the successful acquisition of the transmitted acquisition composite code.
摘要:
Quantum key distribution device includes a transmitter, including a light source, a first polarization controller, a phase modulator and an optical attenuator, all connected in series using a first optical fiber; a receiver, including a second polarization controller, a second phase modulator, a third polarization controller, a beamsplitter, and two single photon detectors, all connected in series using a second optical fiber; and a communication channel providing a light path from the transmitter to the receiver. The first and/or second optical fiber is a polarization maintaining fiber. The first and second phase modulators are actively controlled Pockels cell crystals, lithium niobate crystals or gallium arsenide crystals. The polarization controllers include a piezo-driven fiber compression device, a Pockels cell controller, a piezo-driven fiber twist device, or a non-linear optical crystal. The first and third polarization controllers use a λ/2 plate, or 45° fiber splice polarizer.
摘要:
A system and method of video stream encryption. A storage device stores a first quantization scale and a second quantization scale. An encryption application receives video data, a first quantization scale and a second quantization scale, generating quantized data by dividing the video into the first quantization scale, generating supplementary data by subtracting the quantized data multiplied by the first quantization scale from the video data, generating quantized supplementary data by dividing the supplementary data into the second quantization scale, and generating encrypted quantized supplementary data using variable length encoding and symmetrical/asymmetrical encryption algorithm.
摘要:
A technique of enciphering the graph-text document and its security transfer on a network. The sender of the graph-text document enciphers at least one graph-text document with digitizing algorithm provided by a control center and producing an enciphered and compressed cryptic document. Sender sends this enciphered cryptic document to a recipient, who prints out the enciphered graph-text document. The control center sends the positioning parameters of a reader sheet, the coordinates of the pole and the polar angle, to the recipient, who puts the reader sheet onto the document sheet at the right position and right orientation as indicated by the parameters received. The original document thus is revealed as a four dimensional (four parametric) document and is ready to be read.
摘要:
Provided is a polarization decomposition device. The polarization decomposition device includes a polarization beam splitter configured to split an optical signal into a first polarized light having a first polarization direction and a second polarized light having a second polarization direction different from the first polarized light, a phase shifter configured to delay a phase of the first polarized light, a polarization rotator configured to rotate the second polarized light so that the polarization direction of the second polarized light is changed, and an interference beam splitter configured to allow the first polarized light in which the phase is delayed and the second polarized light in which the polarization direction is rotated to interfere with each other and split them into a third polarized light and a fourth polarized light.
摘要:
A first communication device for use in a wireless communication system to communicate with a second communication device comprises circuitry configured to perform beamforming training with the second communication device to train a plurality of antenna beam combinations of antenna beams used by the first and second communication devices for transmitting and/or receiving signals, select one or more of the trained antenna beam combinations according to a security criterion that is directed to reducing the probability that a third communication device can eavesdrop on the communication between the first communication device and the second communication device, and communicate with the second communication device using the selected one or more antenna beam combinations.
摘要:
A communication apparatus includes a reference signal generating section, a transmitting section, a propagation estimating section, a first data acquiring section, and a decoding section. The reference signal generating section generates a first reference signal to enable a communicating party to estimate a propagation environment. The transmitting section transmits the first reference signal. The propagation estimating section estimates a first propagation estimation value of the propagation environment using a second reference signal transmitted from the communicating party. The first data acquiring section generates first data using the first propagation estimation value. The decoding section decodes a transmission signal encoded using a second propagation estimation value that is estimated by the communicating party using the first reference signal, to obtain second data using the first data.