• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm.

作者信息

Fan Desheng, Meng Xiangfeng, Wang Yurong, Yang Xiulun, Peng Xiang, He Wenqi, Dong Guoyan, Chen Hongyi

机构信息

Department of Optics, School of Information Science and Engineering and Shandong Provincial Key Laboratory of Laser Technology and Application, Shandong University, Jinan, China.

出版信息

Appl Opt. 2013 Aug 10;52(23):5645-52. doi: 10.1364/AO.52.005645.

DOI:10.1364/AO.52.005645
PMID:23938413
Abstract

An optical identity authentication scheme based on the elliptic curve digital signature algorithm (ECDSA) and phase retrieval algorithm (PRA) is proposed. In this scheme, a user's certification image and the quick response code of the user identity's keyed-hash message authentication code (HMAC) with added noise, serving as the amplitude and phase restriction, respectively, are digitally encoded into two phase keys using a PRA in the Fresnel domain. During the authentication process, when the two phase keys are presented to the system and illuminated by a plane wave of correct wavelength, an output image is generated in the output plane. By identifying whether there is a match between the amplitude of the output image and all the certification images pre-stored in the database, the system can thus accomplish a first-level verification. After the confirmation of first-level verification, the ECDSA signature is decoded from the phase part of the output image and verified to allege whether the user's identity is legal or not. Moreover, the introduction of HMAC makes it almost impossible to forge the signature and hence the phase keys thanks to the HMAC's irreversible property. Theoretical analysis and numerical simulations both validate the feasibility of our proposed scheme.

摘要

相似文献

1
Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm.
Appl Opt. 2013 Aug 10;52(23):5645-52. doi: 10.1364/AO.52.005645.
2
Optical hierarchical authentication based on interference and hash function.基于干涉和哈希函数的光学分层认证
Appl Opt. 2012 Nov 10;51(32):7750-7. doi: 10.1364/AO.51.007750.
3
Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.使用压缩双随机相位编码图像和二维码的光学信息认证
Opt Express. 2015 Mar 9;23(5):6239-53. doi: 10.1364/OE.23.006239.
4
An optical encryption and authentication scheme using asymmetric keys.一种使用非对称密钥的光学加密与认证方案。
J Opt Soc Am A Opt Image Sci Vis. 2014 Jun 1;31(6):1233-8. doi: 10.1364/JOSAA.31.001233.
5
Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing.基于幅度场随机采样和相位信息复用的级联多级架构的多图像认证
Appl Opt. 2015 Apr 10;54(11):3204-15. doi: 10.1364/AO.54.003204.
6
Information authentication system using interference of two beams in gyrator transform domain.基于旋转变换域中两束光干涉的信息认证系统。
Appl Opt. 2013 Jul 20;52(21):5133-42. doi: 10.1364/AO.52.005133.
7
Lensless multiple-image optical encryption based on improved phase retrieval algorithm.基于改进相位恢复算法的无透镜多图像光学加密
Appl Opt. 2012 May 1;51(13):2388-94. doi: 10.1364/AO.51.002388.
8
Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain.基于旋光器域中涡旋光束照射下的混沌结构相位掩模的光学多重图像加密。
Opt Express. 2016 Jan 11;24(1):499-515. doi: 10.1364/OE.24.000499.
9
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.一种基于椭圆曲线密码学的无线自组织网络用户认证方案。
Sensors (Basel). 2015 Jul 14;15(7):17057-75. doi: 10.3390/s150717057.
10
Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation.基于相位截断菲涅耳变换和基本向量运算的三重图像加密
Appl Opt. 2015 Oct 1;54(28):8485-93. doi: 10.1364/AO.54.008485.