{"id":"https://openalex.org/W1482474062","doi":"https://doi.org/10.1109/icton.2015.7193389","title":"Classical optical cryptography","display_name":"Classical optical cryptography","publication_year":2015,"publication_date":"2015-07-01","ids":{"openalex":"https://openalex.org/W1482474062","doi":"https://doi.org/10.1109/icton.2015.7193389","mag":"1482474062"},"language":"en","primary_location":{"id":"doi:10.1109/icton.2015.7193389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icton.2015.7193389","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 17th International Conference on Transparent Optical Networks (ICTON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113569271","display_name":"Vincent W. S. Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vincent W.S. Chan","raw_affiliation_strings":["Claude E. Shannon Communication and Network Group, Massachusetts Institute of Technology","Claude E. Shannon Communication and Network Group, Research Laboratory of Electronics, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Claude E. Shannon Communication and Network Group, Massachusetts Institute of Technology","institution_ids":["https://openalex.org/I63966007"]},{"raw_affiliation_string":"Claude E. Shannon Communication and Network Group, Research Laboratory of Electronics, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5113569271"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.01963116,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10232","display_name":"Optical Network Technologies","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6892894506454468},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5914665460586548},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5286246538162231},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.5264875888824463},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5231695771217346},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4978656768798828},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.49190616607666016},{"id":"https://openalex.org/keywords/optical-communication","display_name":"Optical communication","score":0.44653406739234924},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.43210339546203613},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3734647035598755},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3476504385471344},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2976268231868744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17201286554336548},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13927581906318665}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6892894506454468},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5914665460586548},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5286246538162231},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.5264875888824463},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5231695771217346},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4978656768798828},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.49190616607666016},{"id":"https://openalex.org/C129404179","wikidata":"https://www.wikidata.org/wiki/Q1469765","display_name":"Optical communication","level":2,"score":0.44653406739234924},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.43210339546203613},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3734647035598755},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3476504385471344},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2976268231868744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17201286554336548},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13927581906318665},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icton.2015.7193389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icton.2015.7193389","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 17th International Conference on Transparent Optical Networks (ICTON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2041674158","https://openalex.org/W2041846439","https://openalex.org/W2075046953","https://openalex.org/W2079671637","https://openalex.org/W2081713353","https://openalex.org/W2109394932","https://openalex.org/W2147760197"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2903451324","https://openalex.org/W2893407266","https://openalex.org/W1558632226","https://openalex.org/W2953105195","https://openalex.org/W4380875308"],"abstract_inverted_index":{"This":[0],"paper":[1],"describes":[2],"a":[3],"cryptographic":[4],"technique":[5],"based":[6,82],"on":[7,83],"coherent":[8],"optical":[9,25],"communication":[10],"for":[11],"fiber":[12],"or":[13],"free":[14],"space":[15],"networks.":[16],"A":[17],"pseudo-random":[18],"cipher-stream":[19],"is":[20,88,99],"used":[21,89],"to":[22,38,71,90,101],"band-spread":[23,51],"an":[24],"carrier":[26],"with":[27,66],"coded":[28],"data.":[29],"The":[30],"legitimate":[31],"receiver":[32],"uses":[33],"the":[34,44,50,59,63,77,92,95],"agreed":[35],"upon":[36],"key":[37,60],"modulate":[39],"its":[40],"local":[41],"oscillator":[42],"and":[43],"resulting":[45],"beat":[46],"signal":[47,65],"will":[48,61],"uncover":[49],"signal.":[52],"An":[53],"eavesdropper":[54],"who":[55],"does":[56],"not":[57],"have":[58],"find":[62],"spread":[64],"too":[67],"low":[68],"signal-to-noise":[69],"ratio":[70],"perform":[72],"any":[73],"useful":[74],"determination":[75],"of":[76,86,94],"message":[78],"sequence.":[79],"Theoretical":[80],"bounds":[81],"Shannon's":[84],"Theory":[85],"Secrecy":[87],"show":[91],"strength":[93],"encoding":[96],"scheme":[97],"which":[98],"expected":[100],"be":[102],"superior.":[103]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
