skip to main content


Title: Secret Key Distillation over Satellite-to-satellite Free-space Channel with Eavesdropper Dynamic Positioning
In this paper, the satellite-to-satellite secret-key-rate lower bounds are deter-mined for a realistic scenario where the eavesdropper has a limited size aperture. We also investigate eavesdropper’s optimal eavesdropping position with respect to Bob.  more » « less
Award ID(s):
1907918
NSF-PAR ID:
10249485
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
OSA Advanced Photonics Congress (AP) 2020 (IPR, NP, NOMA, Networks, PVLED, PSC, SPPCom, SOF)
Page Range / eLocation ID:
SpTu3I.4
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract. Seasonal transitions in Arctic sea ice, such as the melt onset, have been found to be useful metrics for evaluating sea ice in climate models against observations. However, comparisons of melt onset dates between climate models and satellite observations are indirect. Satellite data products of melt onset rely on observed brightness temperatures, while climate models do not currently simulate brightness temperatures, and must therefore define melt onset with other modeled variables. Here we adapt a passive microwave sea ice satellite simulator, the Arctic Ocean Observation Operator (ARC3O), to produce simulated brightness temperatures that can be used to diagnose the timing of the earliest snowmelt in climate models, as we show here using Community Earth System Model version 2 (CESM2) ocean-ice hindcasts. By producing simulated brightness temperatures and earliest snowmelt estimation dates using CESM2 and ARC3O, we facilitate new and previously impossible comparisons between the model and satellite observations by removing the uncertainty that arises due to definition differences. Direct comparisons between the model and satellite data allow us to identify an early bias across large areas of the Arctic at the beginning of the CESM2 ocean-ice hindcast melt season, as well as improve our understanding of the physical processes underlying seasonal changes in brightness temperatures. In particular, the ARC3O allows us to show that satellite algorithm-based melt onset dates likely occur after significant snowmelt has already taken place. 
    more » « less
  2. null (Ed.)
    Traditionally, the study of quantum key distribution (QKD) assumes an omnipotent eavesdropper that is only limited by the laws of physics. However, this is not the case for specific application scenarios such as the QKD over a free-space link. In this invited paper, we introduce the geometrical optics restricted eavesdropping model for secret key distillation security analysis and apply to a few scenarios common in satellite-to-satellite applications. 
    more » « less
  3. Conventionally, unconditional information security has been studied by quantum cryptography although the assumption of an omnipotent eavesdropper is too strict for some realistic implementations. In this paper, we study the realistic secret key distillation over a satellite-to-satellite free space optics channel where we assume a limited-sized aperture eavesdropper (Eve) in the same plane of the legitimate receiver (Bob) and determine the secret key rate (SKR) lower bounds correspondingly. We first study the input power dependency without assumptions on Bob’s detection scheme before optimizing the input power to determine lower bounds as functions of transmission distances, center frequency or Eve aperture radius. Then we calculate analytical expressions regarding the SKR lower bound and upper bound as transmission distance goes to infinity. We also incorporate specific discrete variable (DV) and continuous variable (CV) protocols for comparison. We demonstrate that significantly higher SKR lower bounds can be achieved compared to traditional unrestricted Eve scenario.

     
    more » « less
  4. Abstract

    We use a recent census of the Milky Way (MW) satellite galaxy population to constrain the lifetime of particle dark matter (DM). We consider two-body decaying dark matter (DDM) in which a heavy DM particle decays with lifetimeτcomparable to the age of the universe to a lighter DM particle (with mass splittingϵ) and to a dark radiation species. These decays impart a characteristic “kick velocity,”Vkick=ϵc, on the DM daughter particles, significantly depleting the DM content of low-mass subhalos and making them more susceptible to tidal disruption. We fit the suppression of the present-day DDM subhalo mass function (SHMF) as a function ofτandVkickusing a suite of high-resolution zoom-in simulations of MW-mass halos, and we validate this model on new DDM simulations of systems specifically chosen to resemble the MW. We implement our DDM SHMF predictions in a forward model that incorporates inhomogeneities in the spatial distribution and detectability of MW satellites and uncertainties in the mapping between galaxies and DM halos, the properties of the MW system, and the disruption of subhalos by the MW disk using an empirical model for the galaxy–halo connection. By comparing to the observed MW satellite population, we conservatively exclude DDM models withτ< 18 Gyr (29 Gyr) forVkick= 20 kms−1(40 kms−1) at 95% confidence. These constraints are among the most stringent and robust small-scale structure limits on the DM particle lifetime and strongly disfavor DDM models that have been proposed to alleviate the Hubble andS8tensions.

     
    more » « less
  5. Quantum cryptography is the study of unconditional information security against an all-powerful eavesdropper in secret key distillation. However, the assumption of an omnipotent eavesdropper is too strict for some realistic implementations. In this paper, we study the realistic application model of secret key distillation over a satellite-to-satellite free-space channel in which we impose a reasonable restriction on the eavesdropper by setting an exclusion zone around the legitimate receiver as a defense strategy. We first study the case where the eavesdropper’s aperture size is unlimited so their power is only restricted by the exclusion zone. Then, we limit Eve’s aperture to a finite size and study the straightforward case when her aperture is in the same plane of Bob’s, investigating how an exclusion zone can help improve security. Correspondingly, we determine the secret key rate lower bounds as well as upper bounds. Furthermore, we also apply our results on specific discrete variable (DV) and continuous variable (CV) protocols for comparison. We show that, by putting reasonable restrictions on the eavesdropper through the realistic assumptions of an inaccessible exclusion zone, we can significantly increase the key rate in comparison to those without and do so with relatively lower transmission frequency. We conclude that this model is suitable for extended analysis in many light-gathering scenarios and for different carrier wavelengths.

     
    more » « less