• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于光学扫描密码学和椭圆曲线算法的非对称密码系统。

Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm.

作者信息

Chang Xiangyu, Li Wei, Yan Aimin, Tsang Peter Wai Ming, Poon Ting-Chung

机构信息

College of Mathematics and Science, Shanghai Normal University, Shanghai, 200234, China.

Department of Electronic Engineering Hong Kong, City University of Hong Kong, Kowloon Tong, Hong Kong SAR, China.

出版信息

Sci Rep. 2022 May 11;12(1):7722. doi: 10.1038/s41598-022-11861-x.

DOI:10.1038/s41598-022-11861-x
PMID:35545658
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9095651/
Abstract

We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender's biometric image, which is sender's private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the encrypted holograms can be decrypted by receiver's biometric private key which is different from the sender's private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than the conventional OSC. The feasibility of the proposed method has been convincingly verified by numerical and experiment results.

摘要

我们提出了一种基于光学扫描密码术(OSC)和椭圆曲线密码术(ECC)算法的非对称密码系统。在OSC的加密阶段,一个物体通过由发送者生物特征图像经ECC算法计算得到的两个光瞳函数被加密为余弦和正弦全息图,该生物特征图像即发送者的私钥。利用ECC算法,这些全息图被加密为密文并发送给接收者。在解密阶段,加密的全息图可由与发送者私钥不同的接收者生物特征私钥进行解密。该方法是一种非对称密码系统,解决了OSC中密钥的管理和分发问题,并且比传统OSC具有更高的安全强度。所提方法的可行性已通过数值和实验结果得到令人信服的验证。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/0f9ecba0c707/41598_2022_11861_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/56ff13793395/41598_2022_11861_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/16ad94e725e7/41598_2022_11861_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/df1a65b6779d/41598_2022_11861_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/00950822f135/41598_2022_11861_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/e9ab84d9264f/41598_2022_11861_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/a5216119605c/41598_2022_11861_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/d931b3e0dcaa/41598_2022_11861_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/577135a4265d/41598_2022_11861_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/73afb4468b8c/41598_2022_11861_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/a759d4f51d90/41598_2022_11861_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/0f9ecba0c707/41598_2022_11861_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/56ff13793395/41598_2022_11861_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/16ad94e725e7/41598_2022_11861_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/df1a65b6779d/41598_2022_11861_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/00950822f135/41598_2022_11861_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/e9ab84d9264f/41598_2022_11861_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/a5216119605c/41598_2022_11861_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/d931b3e0dcaa/41598_2022_11861_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/577135a4265d/41598_2022_11861_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/73afb4468b8c/41598_2022_11861_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/a759d4f51d90/41598_2022_11861_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fb3d/9095651/0f9ecba0c707/41598_2022_11861_Fig11_HTML.jpg

相似文献

1
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm.基于光学扫描密码学和椭圆曲线算法的非对称密码系统。
Sci Rep. 2022 May 11;12(1):7722. doi: 10.1038/s41598-022-11861-x.
2
Analytical Study of Hybrid Techniques for Image Encryption and Decryption.图像加密与解密混合技术的分析研究
Sensors (Basel). 2020 Sep 10;20(18):5162. doi: 10.3390/s20185162.
3
Optical image encryption based on biometric keys and singular value decomposition.基于生物特征密钥和奇异值分解的光学图像加密
Appl Opt. 2020 Mar 10;59(8):2422-2430. doi: 10.1364/AO.385652.
4
Optical cryptography with biometrics for multi-depth objects.用于多深度物体的生物特征光学密码术。
Sci Rep. 2017 Oct 11;7(1):12933. doi: 10.1038/s41598-017-12946-8.
5
Optical scanning cryptography for secure wireless transmission.用于安全无线传输的光学扫描密码术。
Appl Opt. 2003 Nov 10;42(32):6496-503. doi: 10.1364/ao.42.006496.
6
Asymmetric optical cryptosystem for multiple images based on devil's spiral Fresnel lens phase and random spiral transform in gyrator domain.基于魔鬼螺旋菲涅耳透镜相位和回转器域中随机螺旋变换的多图像非对称光学密码系统。
Sci Rep. 2021 Oct 21;11(1):20846. doi: 10.1038/s41598-021-00276-9.
7
Optical asymmetric JTC cryptosystem based on binary phase modulation and image superposition-subtraction operation.基于二进制相位调制和图像叠加-减法运算的光学非对称联合变换相关器密码系统。
Appl Opt. 2022 Oct 10;61(29):8711-8729. doi: 10.1364/AO.466386.
8
Asymmetric multiparameter encryption of hyperspectral images based on hybrid chaotic mapping and an equal modulus decomposition tree.基于混合混沌映射和等模分解树的高光谱图像非对称多参数加密。
Appl Opt. 2021 Aug 1;60(22):6511-6519. doi: 10.1364/AO.425776.
9
Cryptosystem for plaintext messages utilizing optical properties of gratings.利用光栅光学特性的明文消息密码系统。
Appl Opt. 2010 Apr 10;49(11):2041-6. doi: 10.1364/AO.49.002041.
10
Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask.使用偏振选择性衍射光学元件和结构化相位掩膜的非对称彩色密码系统。
Appl Opt. 2012 Aug 1;51(22):5377-86. doi: 10.1364/AO.51.005377.

本文引用的文献

1
Learning from simulation: An end-to-end deep-learning approach for computational ghost imaging.从模拟中学习:一种用于计算鬼成像的端到端深度学习方法。
Opt Express. 2019 Sep 2;27(18):25560-25572. doi: 10.1364/OE.27.025560.
2
Optical voice encryption based on digital holography.基于数字全息术的光学语音加密
Opt Lett. 2017 Nov 15;42(22):4619-4622. doi: 10.1364/OL.42.004619.
3
Optical cryptography with biometrics for multi-depth objects.用于多深度物体的生物特征光学密码术。
Sci Rep. 2017 Oct 11;7(1):12933. doi: 10.1038/s41598-017-12946-8.
4
Cyphertext-only attack on the double random-phase encryption: Experimental demonstration.对双随机相位加密的唯密文攻击:实验演示。
Opt Express. 2017 Apr 17;25(8):8690-8697. doi: 10.1364/OE.25.008690.
5
Three-dimensional joint transform correlator cryptosystem.三维联合变换相关器密码系统。
Opt Lett. 2016 Feb 1;41(3):599-602. doi: 10.1364/OL.41.000599.
6
Novel optical scanning cryptography using Fresnel telescope imaging.使用菲涅耳望远镜成像的新型光学扫描密码术。
Opt Express. 2015 Jul 13;23(14):18428-34. doi: 10.1364/OE.23.018428.
7
Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain.基于分数阶傅里叶变换域相位掩模复用的多图像加密。
Opt Lett. 2013 Jun 1;38(11):1996-8. doi: 10.1364/OL.38.001996.
8
Optical encryption based on computational ghost imaging.基于计算鬼成像的光学加密。
Opt Lett. 2010 Jul 15;35(14):2391-3. doi: 10.1364/OL.35.002391.
9
Asymmetric cryptosystem based on phase-truncated Fourier transforms.基于相位截断傅里叶变换的非对称密码系统。
Opt Lett. 2010 Jan 15;35(2):118-20. doi: 10.1364/OL.35.000118.
10
Optical image encryption based on input plane and Fourier plane random encoding.基于输入平面和傅里叶平面随机编码的光学图像加密。
Opt Lett. 1995 Apr 1;20(7):767-9. doi: 10.1364/ol.20.000767.