Enhanced secret-key generation from atmospheric optical channels with the use of random modulation

Opt Express. 2022 Dec 5;30(25):45862-45882. doi: 10.1364/OE.476856.

Abstract

Secret-key extraction from atmospheric optical channels can generate common keys used by two communicating parties to encrypt their transmitted confidential information. The correlation time of turbulence-induced optical fluctuations imposes a restriction on the number of extracted uncorrelated key bits per second. To break this restriction, we propose a novel randomness sharing scheme between two communicating parties using an atmospheric optical channel equipped with random modulation and develop mathematical models for the common randomness source created by such a randomness-sharing scheme. Our randomness-sharing scheme provides the legitimate parties with the ability to decrease the temporal autocorrelation of the said common randomness source, which is called controllable common randomness source with memory (CCRSM), thereby enabling an enhanced secret-key extraction that can break the aforementioned restriction. Both the autocorrelation of the legitimate parties' observations of the CCRSM and the cross-correlation of the two legitimate parties' observations of the CCRSM are formulated and examined theoretically. It is found that the performing random modulation can decorrelate consecutive observations of the CCRSM obtained by the legitimate parties using a sampling interval smaller than the correlation time of turbulence-induced optical fluctuations. The cross-correlation coefficient of the eavesdropper's and legitimate parties' observations of the CCRSM is dealt with theoretically and the eavesdropping risk in the CCRSM-based key extraction is inspected for the fully-disclosed-single-modulation worst eavesdropping (FDSM-WE) scenario, partially-disclosed-single-modulation worst eavesdropping (PDSM-WE) scenario and double-modulation worst eavesdropping (DM-WE) scenario. It is shown that the FDSM-WE scenario has the highest degree of eavesdropping risk. Finally, the lowest limit of the secret-key capacity in consideration of using the CCRSM is theoretically formulated. The effects of random modulation on such the lowest limit are quantitatively analyzed from an information-theoretic perspective. It is manifested that random modulation does not harm the potential of extracting secret keys from the CCRSM's randomness component stemming from turbulence-induced optical fluctuations.