In this paper,a novel dual-metric,the maximum and minimum Squared Euclidean Distance Increment (SEDI) brought by changing the hard decision symbol,is introduced to measure the reli-ability of the received M-ary Phase ...In this paper,a novel dual-metric,the maximum and minimum Squared Euclidean Distance Increment (SEDI) brought by changing the hard decision symbol,is introduced to measure the reli-ability of the received M-ary Phase Shift Keying (MPSK) symbols over a Rayleigh fading channel. Based on the dual-metric,a Chase-type soft decoding algorithm,which is called erased-Chase algorithm,is developed for Reed-Solomon (RS) coded MPSK schemes. The proposed algorithm treats the unre-liable symbols with small maximum SEDI as erasures,and tests the non-erased unreliable symbols with small minimum SEDI as the Chase-2 algorithm does. By introducing optimality test into the decoding procedure,much more reduction in the decoding complexity can be achieved. Simulation results of the RS(63,42,22)-coded 8-PSK scheme over a Rayleigh fading channel show that the proposed algorithm provides a very efficient tradeoff between the decoding complexity and the error performance. Finally,an adaptive scheme for the number of erasures is introduced into the decoding algorithm.展开更多
The nature of a wireless communication channel is very unpredictable. To design a good communication link, it is required to know the statistical model of the channel accurately. The average symbol error probability(A...The nature of a wireless communication channel is very unpredictable. To design a good communication link, it is required to know the statistical model of the channel accurately. The average symbol error probability(ASER) was analyzed for different modulation schemes. A unified analytical framework was presented to obtain closed-form solutions for calculating the ASER of M-ary differential phase-shift keying(M-DPSK), coherent M-ary phase-shift keying(M-PSK), and quadrature amplitude modulation(QAM) over single or multiple Nakagami-m fading channels. Moreover, the ASER was estimated and evaluated by using the maximal ratio-combining(MRC) diversity technique. Simulation results show that an error rate of the fading channel typically depends on Nakagami parameters(m), space diversity(N), and symbol rate(M). A comparison between M-PSK, M-DPSK, and M-QAM modulation schemes was shown, and the results prove that M-ary QAM(M-QAM) demonstrates better performance compared to M-DPSK and M-PSK under all fading and non-fading conditions.展开更多
Phase and amplitude regeneration are necessary for degraded differential phase-shift keying communication sys- tems. This paper proposes a regenerator based on semiconductor optical amplifier for differential phase-sh...Phase and amplitude regeneration are necessary for degraded differential phase-shift keying communication sys- tems. This paper proposes a regenerator based on semiconductor optical amplifier for differential phase-shift keying signals. The key regeneration mechanism is theoretically analysed. The effectiveness of semiconductor optical amplifier based regenerator is demonstrated by comparing the bit error rate and eye diagrams before and after regeneration for 40-Cbit/s differential phase-shift keying 1080-km transmission systems. The results show that regeneration effects are very well. Bit error rate is tess than 10-12 with the regenerator.展开更多
The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett-Brassard 1984, the Bennett Brassard Mermin 1992, an...The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett-Brassard 1984, the Bennett Brassard Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photonnumber splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates.展开更多
Some applications are constrained only to implement low cost receivers. In this case, designers are required to use less complex and non-expensive modulation techniques. Differential Quadrature Phase Shift Keying (DQP...Some applications are constrained only to implement low cost receivers. In this case, designers are required to use less complex and non-expensive modulation techniques. Differential Quadrature Phase Shift Keying (DQPSK) and Gaussian Frequency Shift Keying (GFSK) can be non-coherently demodulated with simple algorithms. However, these types of demodulation are not robust and suffer from poor performance. This paper proposes a new method to enhance the performance of DQPSK and GFSK using Interactive Kalman Filtering (IKF) technique, in which a one Unscented Kalman Filter (UKF) and two Kalman Filters (KF) are coupled to optimize the demodulated signals. This method consists of simple but very effective algorithms without adding complexity to the demodulators comparing to other very complex methods. UKF is used in this method due to its superiority in approximating and estimating nonlinear systems and its ability to handle non-Gaussian noise environments. The proposed method has been validated by creating a MATLAB/SIMULINK Bluetooth system model, in which the IKF is integrated into the receiver, which implement both DQPSK and GFSK, and run simulation in Gaussian and Non-Gaussian noise environments. Results have shown the effectiveness of this method in optimizing the received signals, and that the UKF outperforms the Extended Kalman Filter (EKF).展开更多
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) at...The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.展开更多
Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, t...Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, the differential phase shift quantum key distribution protocol has higher efficiency and simpler apparatus. Unfortunately, the uncondi- tional security of differential phase shift quantum key distribution has not been proved. Utilizing the sharp continuity of the von Neuman entropy and some basic inequalities, we estimate the upper bound for the eavesdropper Eve's infor- mation. We then prove the lower bound for the security of the differential phase shift quantum key distribution protocol against a one-pulse attack with Devatak-Winter's secret key rate formula.展开更多
In this paper, we proposed the scheme for a passive round-robin differential-phase-shift quantum key distribution(RRDPS-QKD) set-up based on the principle of Hong–Ou–Mandel interference. Our scheme requires two le...In this paper, we proposed the scheme for a passive round-robin differential-phase-shift quantum key distribution(RRDPS-QKD) set-up based on the principle of Hong–Ou–Mandel interference. Our scheme requires two legitimate parties to prepare their signal state with two different non-orthogonal bases instead of single in original protocol. Incorporating this characteristic, we establish the level of security of our protocol under the intercept-resend attack and demonstrate its detector-flaw-immune feature. Furthermore, we show that our scheme not only inherits the merit of better tolerance of bit errors and finite-sized-key effects but can be implemented using hardware similar to the measurement device independent QKD(MDI-QKD). This ensures good compatibility with the current commonly used quantum system.展开更多
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas...Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.展开更多
For differential phase shift keying (DPSK) and noncoherent frequency shift keying (NFSK) systems over fading channels, the post-detection combining method is a popular means for improving the bit error performance...For differential phase shift keying (DPSK) and noncoherent frequency shift keying (NFSK) systems over fading channels, the post-detection combining method is a popular means for improving the bit error performance. However, the bit error performance of such systems over Nakagami channels with an arbitrary covariance matrix and real distinct fading parameters has been seldom described in the literature. This paper studies the problem using a generic correlated Nakagami fading model and presents a closed form solution which is used to study the influence of the fading parameters and the signal-to-noise ratio (SNR) distribution ratios among all the branches on the bit error performance. Moreover, the average SNRs of each branch are not restricted to one value in the analysis. The closed form solution developed for the problem can be used to study the influence of the fading parameters and the SNR distribution ratios on the error performance.展开更多
OCC(Optical Camera Communication)has been proposed in recent years as a new technique for visible light communications.This paper introduces the implementation and experimental demonstration of an OCC system.Phase unc...OCC(Optical Camera Communication)has been proposed in recent years as a new technique for visible light communications.This paper introduces the implementation and experimental demonstration of an OCC system.Phase uncertainty and phase slipping caused by camera sampling are the two major challenges for OCC.In this paper,we propose a novel modulation scheme called undersampled differential phase shift on–off keying to encode binary data bits without exhibiting any flicker to human eyes.The phase difference between two consecutive samples conveys one-bit information,which can be decoded by a low-frame-rate camera receiver.Error detection techniques are introduced to enhance the reliability of the system.We present the hardware and software design of the proposed system,which is implemented with a Xilinx FPGA and a Logitech commercial camera.Experimental results demonstrate that a bit-error rate of 10−5 can be achieved with 7.15 mW received signal power over a link distance of 15 cm.展开更多
现有的多用户差分混沌移位键控(multiple-user differential chaos shift keying,MU-DCSK)算法存在用户间干扰、误码性能不理想等问题。为了提高误码性能,提出一种基于正交混沌载波的多用户差分混沌移位键控(MU-DCSK based on orthogona...现有的多用户差分混沌移位键控(multiple-user differential chaos shift keying,MU-DCSK)算法存在用户间干扰、误码性能不理想等问题。为了提高误码性能,提出一种基于正交混沌载波的多用户差分混沌移位键控(MU-DCSK based on orthogonal chaotic carrier,OMU-DCSK)通信系统。该系统通过设计一种正交混沌信号发生器,利用其转换特性和正交特性,有效降低平均比特能量和彻底消除多址干扰。推导出在瑞利信道中的比特误码率公式并进行仿真。理论分析和仿真结果表明,OMU-DCSK在较小牺牲系统复杂性的条件下,有效提高了系统的误码性能。展开更多
基金the National Natural Science Foundation of China (No.60272057).
文摘In this paper,a novel dual-metric,the maximum and minimum Squared Euclidean Distance Increment (SEDI) brought by changing the hard decision symbol,is introduced to measure the reli-ability of the received M-ary Phase Shift Keying (MPSK) symbols over a Rayleigh fading channel. Based on the dual-metric,a Chase-type soft decoding algorithm,which is called erased-Chase algorithm,is developed for Reed-Solomon (RS) coded MPSK schemes. The proposed algorithm treats the unre-liable symbols with small maximum SEDI as erasures,and tests the non-erased unreliable symbols with small minimum SEDI as the Chase-2 algorithm does. By introducing optimality test into the decoding procedure,much more reduction in the decoding complexity can be achieved. Simulation results of the RS(63,42,22)-coded 8-PSK scheme over a Rayleigh fading channel show that the proposed algorithm provides a very efficient tradeoff between the decoding complexity and the error performance. Finally,an adaptive scheme for the number of erasures is introduced into the decoding algorithm.
基金Project supported by Research Fund Chosun University 2014,Korea
文摘The nature of a wireless communication channel is very unpredictable. To design a good communication link, it is required to know the statistical model of the channel accurately. The average symbol error probability(ASER) was analyzed for different modulation schemes. A unified analytical framework was presented to obtain closed-form solutions for calculating the ASER of M-ary differential phase-shift keying(M-DPSK), coherent M-ary phase-shift keying(M-PSK), and quadrature amplitude modulation(QAM) over single or multiple Nakagami-m fading channels. Moreover, the ASER was estimated and evaluated by using the maximal ratio-combining(MRC) diversity technique. Simulation results show that an error rate of the fading channel typically depends on Nakagami parameters(m), space diversity(N), and symbol rate(M). A comparison between M-PSK, M-DPSK, and M-QAM modulation schemes was shown, and the results prove that M-ary QAM(M-QAM) demonstrates better performance compared to M-DPSK and M-PSK under all fading and non-fading conditions.
基金supported by the Scientific Fund for Chinese Universities (Grant No. BUPT 2009RC0413)the National "863" High Technology Projects (Grant No. 2009AA01Z224)
文摘Phase and amplitude regeneration are necessary for degraded differential phase-shift keying communication sys- tems. This paper proposes a regenerator based on semiconductor optical amplifier for differential phase-shift keying signals. The key regeneration mechanism is theoretically analysed. The effectiveness of semiconductor optical amplifier based regenerator is demonstrated by comparing the bit error rate and eye diagrams before and after regeneration for 40-Cbit/s differential phase-shift keying 1080-km transmission systems. The results show that regeneration effects are very well. Bit error rate is tess than 10-12 with the regenerator.
基金supported by the Natural Science Foundation of Beijing,China (Grant No XK100130837)
文摘The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett-Brassard 1984, the Bennett Brassard Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photonnumber splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates.
文摘Some applications are constrained only to implement low cost receivers. In this case, designers are required to use less complex and non-expensive modulation techniques. Differential Quadrature Phase Shift Keying (DQPSK) and Gaussian Frequency Shift Keying (GFSK) can be non-coherently demodulated with simple algorithms. However, these types of demodulation are not robust and suffer from poor performance. This paper proposes a new method to enhance the performance of DQPSK and GFSK using Interactive Kalman Filtering (IKF) technique, in which a one Unscented Kalman Filter (UKF) and two Kalman Filters (KF) are coupled to optimize the demodulated signals. This method consists of simple but very effective algorithms without adding complexity to the demodulators comparing to other very complex methods. UKF is used in this method due to its superiority in approximating and estimating nonlinear systems and its ability to handle non-Gaussian noise environments. The proposed method has been validated by creating a MATLAB/SIMULINK Bluetooth system model, in which the IKF is integrated into the receiver, which implement both DQPSK and GFSK, and run simulation in Gaussian and Non-Gaussian noise environments. Results have shown the effectiveness of this method in optimizing the received signals, and that the UKF outperforms the Extended Kalman Filter (EKF).
文摘The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.
基金supported by the National Fundamental Research Program of China (Grant No. 2006CB921900)National Natural Science Foundation of China (Grant Nos. 60537020 and 60621064)the Innovation Funds of the Chinese Academy of Sciences
文摘Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, the differential phase shift quantum key distribution protocol has higher efficiency and simpler apparatus. Unfortunately, the uncondi- tional security of differential phase shift quantum key distribution has not been proved. Utilizing the sharp continuity of the von Neuman entropy and some basic inequalities, we estimate the upper bound for the eavesdropper Eve's infor- mation. We then prove the lower bound for the security of the differential phase shift quantum key distribution protocol against a one-pulse attack with Devatak-Winter's secret key rate formula.
基金Project supported by the Fund from the State Key Laboratory of Information Photonics and Optical Communications(Beijing University of Posts and Telecommunications)(Grant No.IPOC2017ZT0)
文摘In this paper, we proposed the scheme for a passive round-robin differential-phase-shift quantum key distribution(RRDPS-QKD) set-up based on the principle of Hong–Ou–Mandel interference. Our scheme requires two legitimate parties to prepare their signal state with two different non-orthogonal bases instead of single in original protocol. Incorporating this characteristic, we establish the level of security of our protocol under the intercept-resend attack and demonstrate its detector-flaw-immune feature. Furthermore, we show that our scheme not only inherits the merit of better tolerance of bit errors and finite-sized-key effects but can be implemented using hardware similar to the measurement device independent QKD(MDI-QKD). This ensures good compatibility with the current commonly used quantum system.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61505261 and 11304397)the National Basic Research Program of China(Grant No.2013CB338002)
文摘Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.
文摘For differential phase shift keying (DPSK) and noncoherent frequency shift keying (NFSK) systems over fading channels, the post-detection combining method is a popular means for improving the bit error performance. However, the bit error performance of such systems over Nakagami channels with an arbitrary covariance matrix and real distinct fading parameters has been seldom described in the literature. This paper studies the problem using a generic correlated Nakagami fading model and presents a closed form solution which is used to study the influence of the fading parameters and the signal-to-noise ratio (SNR) distribution ratios among all the branches on the bit error performance. Moreover, the average SNRs of each branch are not restricted to one value in the analysis. The closed form solution developed for the problem can be used to study the influence of the fading parameters and the SNR distribution ratios on the error performance.
文摘OCC(Optical Camera Communication)has been proposed in recent years as a new technique for visible light communications.This paper introduces the implementation and experimental demonstration of an OCC system.Phase uncertainty and phase slipping caused by camera sampling are the two major challenges for OCC.In this paper,we propose a novel modulation scheme called undersampled differential phase shift on–off keying to encode binary data bits without exhibiting any flicker to human eyes.The phase difference between two consecutive samples conveys one-bit information,which can be decoded by a low-frame-rate camera receiver.Error detection techniques are introduced to enhance the reliability of the system.We present the hardware and software design of the proposed system,which is implemented with a Xilinx FPGA and a Logitech commercial camera.Experimental results demonstrate that a bit-error rate of 10−5 can be achieved with 7.15 mW received signal power over a link distance of 15 cm.
文摘现有的多用户差分混沌移位键控(multiple-user differential chaos shift keying,MU-DCSK)算法存在用户间干扰、误码性能不理想等问题。为了提高误码性能,提出一种基于正交混沌载波的多用户差分混沌移位键控(MU-DCSK based on orthogonal chaotic carrier,OMU-DCSK)通信系统。该系统通过设计一种正交混沌信号发生器,利用其转换特性和正交特性,有效降低平均比特能量和彻底消除多址干扰。推导出在瑞利信道中的比特误码率公式并进行仿真。理论分析和仿真结果表明,OMU-DCSK在较小牺牲系统复杂性的条件下,有效提高了系统的误码性能。