Asymmetric cryptography based on wavefront sensing

被引:41
作者
Peng, Xiang [1 ]
Wei, Hengzheng
Zhang, Peng
机构
[1] Shenzhen Univ, Inst Optoelect, Shenzhen 518060, Peoples R China
[2] Tianjin Univ, State Key Lab Precis Measurement Technol & Instru, Tianjin 300072, Peoples R China
[3] China Construct Bank, Electron Banking Dept, Beijing 100032, Peoples R China
关键词
D O I
10.1364/OL.31.003579
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A system of asymmetric cryptography based on wavefront sensing (ACWS) is proposed for the first time to our knowledge. One of the most significant features of the asymmetric cryptography is that a trapdoor one-way function is required and constructed by analogy to wavefront sensing, in which the public key may be derived from optical parameters, such as the wavelength or the focal length, while the private key may be obtained from a kind of regular point array. The ciphertext is generated by the encoded wavefront and represented with an irregular array. In such an ACWS system, the encryption key is not identical to the decryption key, which is another important feature of an asymmetric cryptographic system. The processes of asymmetric encryption and decryption are formulized mathematically and demonstrated with a set of numerical experiments. (c) 2006 Optical Society of America.
引用
收藏
页码:3579 / 3581
页数:3
相关论文
共 8 条
[1]   Noise performance of double-phase encryption compared to XOR encryption [J].
Javidi, B ;
Bernard, L ;
Towghi, N .
OPTICAL ENGINEERING, 1999, 38 (01) :9-19
[2]   Encrypted optical memory using double-random phase encoding [J].
Javidi, B ;
Zhang, GS ;
Li, JA .
APPLIED OPTICS, 1997, 36 (05) :1054-1058
[3]   Securing information with optical technologies [J].
Javidi, B .
PHYSICS TODAY, 1997, 50 (03) :27-32
[4]   Watermarking of three-dimensional objects by digital holography [J].
Kishk, S ;
Javidi, B .
OPTICS LETTERS, 2003, 28 (03) :167-169
[5]   Phase retrieval and differential phase-contrast imaging with low-brilliance X-ray sources [J].
Pfeiffer, F ;
Weitkamp, T ;
Bunk, O ;
David, C .
NATURE PHYSICS, 2006, 2 (04) :258-261
[6]   OPTICAL-IMAGE ENCRYPTION BASED ON INPUT PLANE AND FOURIER PLANE RANDOM ENCODING [J].
REFREGIER, P ;
JAVIDI, B .
OPTICS LETTERS, 1995, 20 (07) :767-769
[7]  
Stallings William, 1999, Cryptography and network security: principles and practice
[8]  
Tyson R. K., 1998, PRINCIPLES ADAPTIVE