This article presents a novel eight-ary modulation technique with improved signal-to-noise ratio (SNR) compared to conventional pulse amplitude modulation 8 (PAM-8). The proposed SNR-enhanced 8-ary (SNRE-8) scheme modulates pulse width, position, and amplitude to improve the SNR. The proposed SNRE-8 modulation leverages the wireline channel loss to perform the modulation. Digital decoding of mutually exclusive eyes generated by the proposed SNRE-8 modulation further improves the eye margin at the receiver. A 27-Gb/s transceiver is implemented in a 65-nm CMOS process employing the proposed modulation. A PAM-8 transmitter is implemented on the same chip for comparison purposes. Compared to the PAM-8 modulation, the proposed SNRE-8 modulation shows an average SNR improvement of 10.6 dB at the near-end eye at the cost of 6.6% eye width reduction. With the aid of a time-domain feed-forward equalizer (FFE) and a continuous-time linear equalizer (CTLE), the proposed SNRE-8 transceiver achieves a bit error rate (BER) of 10−8 on a 9-dB loss channel with an energy efficiency of 5.39 pJ/bit.
more »
« less
This content will become publicly available on July 1, 2026
An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This work presents an effective continuous-variable quantum key distribution method with parameter optimization utilizing the Elitist Elk Herd Random Immigrants Optimizer (2E-HRIO) technique. At the outset of transmission, the quantum device undergoes initialization and authentication via Compressed Hash-based Message Authentication Code with Encoded Post-Quantum Hash (CHMAC-EPQH). The settings are subsequently optimized from the authenticated device via 2E-HRIO, which mitigates the effects of decoherence by adaptively tuning system parameters. Subsequently, quantum bits are produced from the verified device, and pilot insertion is executed within the quantum bits. The pilot-inserted signal is thereafter subjected to pulse shaping using a Gaussian filter. The pulse-shaped signal undergoes modulation. Authenticated post-modulation, the prediction of link failure is conducted through an authenticated channel using Radial Density-Based Spatial Clustering of Applications with Noise. Subsequently, transmission occurs via a non-failure connection. The receiver performs channel equalization on the received signal with Recursive Regularized Least Mean Squares. Subsequently, a dataset for side-channel attack authentication is gathered and preprocessed, followed by feature extraction and classification using Adaptive Depthwise Separable Convolutional Neural Networks (ADS-CNNs), which enhances security against side-channel attacks. The quantum state is evaluated based on the signal received, and raw data are collected. Thereafter, a connection is established between the transmitter and receiver. Both the transmitter and receiver perform the scanning process. Thereafter, the calculation and correction of the error rate are performed based on the sifting results. Ultimately, privacy amplification and key authentication are performed using the repaired key via B-CHMAC-EPQH. The proposed system demonstrated improved resistance to decoherence and side-channel attacks, while achieving a reconciliation efficiency above 90% and increased key generation rate.
more »
« less
- Award ID(s):
- 1946442
- PAR ID:
- 10654370
- Publisher / Repository:
- Future Internet, MDPI
- Date Published:
- Journal Name:
- Future Internet
- Volume:
- 17
- Issue:
- 7
- ISSN:
- 1999-5903
- Page Range / eLocation ID:
- 307
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
This article presents a novel network protocol that incorporates a quantum photonic channel for symmetric key distribution, a Dilithium signature to replace factor-based public key cryptography for enhanced authentication, security, and privacy. The protocol uses strong hash functions to hash original messages and verify heightened data integrity at the destination. This Quantum good authentication protocol (QGP) provides high-level security provided by the theory of quantum mechanics. QGP also has the advantage of quantum-resistant data protection that prevents current digital computer and future quantum computer attacks. QGP transforms the transmission control protocol/internet protocol (TCP/IP) by adding a quantum layer at the bottom of the Open Systems Interconnection (OSI) model (layer 0) and modifying the top layer (layer 7) with Dilithium signatures, thus improving the security of the original OSI model. In addition, QGP incorporates strong encryption, hardware-based quantum channels, post-quantum signatures, and secure hash algorithms over a platform of decryptors, switches, routers, and network controllers to form a testbed of the next-generation, secure quantum internet. The experiments presented here show that QGP provides secure authentication and improved security and privacy and can be adopted as a new protocol for the next-generation quantum internet.more » « less
-
This paper applies probabilistic amplitude shaping (PAS) to a cyclic redundancy check (CRC) aided trellis coded modulation (TCM) to achieve the short-blocklength random coding union (RCU) bound. In the transmitter, the equally likely message bits are first encoded by distribution matcher to generate amplitude symbols with the desired distribution. The binary representations of the distribution matcher outputs are then encoded by a CRC. Finally, the CRC-encoded bits are encoded and modulated by Ungerboeck's TCM scheme, which consists of a k/(k+1) systematic tail-biting convolutional code and a mapping function that maps coded bits to channel signals with capacity-achieving distribution. This paper proves that, for the proposed transmitter, the CRC bits have uniform distribution and that the channel signals have symmetric distribution. In the receiver, the serial list Viterbi decoding (S-LVD) is used to estimate the information bits. Simulation results show that, for the proposed CRC-TCM-PAS system with 87 input bits and 65-67 8-AM coded output symbols, the decoding performance under additive white Gaussian noise channel achieves the RCU bound with properly designed CRC and convolutional codes.more » « less
-
null (Ed.)Adaptive communication for Internet of Things (IoT) and Wireless Body Area Network (WBAN) technologies is becoming increasingly popular due to the large power-performance trade-offs and highly dynamic channel conditions. Path loss, low signal to noise ratio (SNR) in the channel and network congestion adversely affect the data communication, each of which can be taken care of using different strategies such as reducing the data rate (for reducing congestion), increasing the output power (for increased path loss) and application of error correction coding (ECC, for low SNR). In this paper, we present a digital-friendly Transceiver SoC consisting of an RF-DAC based transmitter with orthogonally tunable output power, data rate and ECC that enables optimum system level bit error rate (BER) and energy for over 3-orders of energy-performance scalability, along with an ultra-low-power OOK receiver that receives the transmitter's control bits from a nearby base station for closed-loop control. The data rate and ECC control is achieved through a digital baseband, while a tapped capacitor matching network controls the output power. The energy efficiency of the transmitter is 27.6pJ/b at 10MSps and at 0.8V supply (~9X improvement over state-of-the-art), while the entire SoC (Transmitter+OOK receiver for controller feedback) consumes only 41.5pJ/b.more » « less
-
Liva, Gianluigi (Ed.)Unsourced random access emerged as a novel wireless paradigm enabling massive device connectivity on the uplink. We consider quasi-static Rayleigh fading wherein the access point has multiple receive antennas and every mobile device a single transmit antenna. The objective is to construct a coding scheme that minimizes the energy-per-bit subject to a maximum probability of error given a fixed message length and a prescribed number of channel uses. Every message is partitioned into two parts: the first determines pilot values and spreading sequences; the remaining bits are encoded using a polar code. The transmitted signal contains two distinct sections. The first features pilots and the second is composed of spread modulated symbols. The receiver has three modules: an energy detector, tasked with recovering the set of active pilot sequences; a bank of Minimum Mean Square Error (MMSE) estimators acting on measurements at the receiver; and a polar list-decoder, which seeks to retrieve the coded information bits. A successive cancellation step is applied to subtract recovered codewords, before the residual signal is fed back to the decoder. Empirical evidence suggests that an appropriate combination of these ideas can outperform state-of-the-art coding techniques when the number of active users exceeds one hundred.more » « less
An official website of the United States government
