Double random phase encoding schemes with perfect forward secrecy for robust image cryptography

被引:2
作者
Moon, Inkyu [1 ]
Kim, Youhyun [1 ]
Gholami, Samaneh [2 ]
Jeong, Ongee [1 ]
机构
[1] DGIST, Dept Robot Engn, Daegu 42988, South Korea
[2] Chosun Univ, Dept Comp Engn, 309 Pilmun Daero, Gwangju 61452, South Korea
基金
新加坡国家研究基金会;
关键词
OPTICAL ENCRYPTION; KEY AGREEMENT; FOURIER; TRANSFORM; SECURE; AUTHENTICATION; CRYPTOSYSTEM; INFORMATION; ALGORITHM; PROTOCOLS;
D O I
10.1364/OSAC.426537
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Digital cryptosystems can provide perfect forward secrecy (PFS) for key exchange protocols based on the Diffie-Hellman (DH) scheme. However, key exchange algorithms are optimally designed only to encode small datasets, such as text and voice sets, which makes rapidly processing large-scale datasets difficult. In this paper, we propose new schemes that can efficiently and securely provide PFS in double random phase encoding (DRPE) schemes for robust image cryptography. We demonstrate that the proposed complex sinusoidal waveform versions of the DH algorithm with fusion of a random phase mask (RPM) and ephemeral secret exponents can guarantee PFS. Different experimental results reveal that the proposed schemes can enhance the security of DRPE-based image cryptosystems using a one-time RPM and PFS. We also propose a ring-type PFS scheme in which an unlimited number of users can securely share a temporary session key, which is an extension of PFS for only two users. We provide formal proof for the schemes and prove feasibility through numerical simulations. (C) 2021 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
引用
收藏
页码:2245 / 2259
页数:15
相关论文
共 33 条
[1]   Key agreement in ad hoc networks [J].
Asokan, N ;
Ginzboorg, P .
COMPUTER COMMUNICATIONS, 2000, 23 (17) :1627-1637
[2]   Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads [J].
Boakye-Boateng, Kwasi ;
Kuada, Eric ;
Antwi-Boasiako, Emmanuel ;
Djaba, Emmanuel .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :3925-3933
[3]   Advances in optical security systems [J].
Chen, Wen ;
Javidi, Bahram ;
Chen, Xudong .
ADVANCES IN OPTICS AND PHOTONICS, 2014, 6 (02) :120-155
[4]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[7]  
GUNTHER CG, 1990, LECT NOTES COMPUT SC, V434, P29
[8]  
Halevi Shai., 1999, ACM T INFORM SYST SE, P230, DOI DOI 10.1145/322510.322514
[9]   Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain [J].
Hwang, Hone-Ene ;
Chang, Hsuan T. ;
Lie, Wen-Nung .
OPTICS LETTERS, 2009, 34 (24) :3917-3919
[10]   Securing information by use of digital holography [J].
Javidi, B ;
Nomura, T .
OPTICS LETTERS, 2000, 25 (01) :28-30