Binbin Yu 1†Jing Wen 1,4,*†Lei Chen 1Leihong Zhang 1[ ... ]Dawei Zhang 1,3,5,*
Author Affiliations
Abstract
1 Engineering Research Center of Optical Instrument and Systems, Ministry of Education and Shanghai Key Laboratory of Modern Optical System, University of Shanghai for Science and Technology, Shanghai 200093, China
2 Department of Materials Science and Engineering, City University of Hong Kong, Hong Kong, China
3 Shanghai Institute of Intelligent Science and Technology, Tongji University, Shanghai 200092, China
4 e-mail: jwen@usst.edu.cn
5 e-mail: dwzhang@usst.edu.cn
Airy optical beams have emerged to hold enormous theoretical and experimental research interest due to their outstanding characteristics. Conventional approaches suffer from bulky and costly systems, as well as poor phase discretization. The newly developed metasurface-based Airy beam generators have constraints of polarization dependence or limited generation efficiency. Here, we experimentally demonstrate a polarization-independent silicon dielectric metasurface for generation of high-efficiency Airy optical beams. In our implementation, rather than synchronous manipulation of the amplitude and phase by plasmonic or Huygens’ metasurfaces, we employ and impose a 3/2 phase-only manipulation to the dielectric metasurface, consisting of an array of silicon nanopillars with an optimized transmission efficiency as high as 97%. The resultant Airy optical beams possess extraordinarily large deflection angles and relatively narrow beam widths. Our validated scheme will open up a fascinating doorway to broaden the application scenarios of Airy optical beams on ultracompact photonic platforms.
Photonics Research
2020, 8(7): 07001148
Author Affiliations
Abstract
University of Shanghai for Science and Technology, Shanghai 200093, China
A method is presented for one-to-many information encryption transmission by using temporal ghost imaging and code division multiple access. In the encryption transmission process, code division multiple access technologies combine multiple information sources, and the chip sequence corresponding to each set of information is used as the first key. The transmission end loads the transmission information onto a series of temporal random patterns of temporal ghost imaging and transmits it to the receivers. A series of temporal random patterns is the second key. During the decryption, each receiver can get the same encrypted information and use the second key to obtain the transmitted information. Finally, each receiver uses the unique chip sequence to get corresponding information. This encryption transmission method realizes one-to-many information encryption transmission at the same time over the same channel. Double encryption ensures the security of information. Simulation and experiment results verify the effectiveness and security of the method. The method has strong antinoise ability and can effectively resist various attack modes. At the same time, this method solves the problem that the use of code division multiple access enlarges the signal bandwidth, and ensures that no cross talk occurs between various sources of information.
Photonics Research
2019, 7(12): 12001370

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!