2016
DOI: 10.1007/s11082-016-0786-5
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric cryptosystem using coherent superposition and equal modulus decomposition of fractional Fourier spectrum

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…However, the relationship between the ciphertext and private key leads the PTFT-based encryption algorithm to be vulnerable to special iterative attacks [58]. To improve the security of this method, hybrid opto-digital optical cryptosystems have been developed based on mathematical decompositions, such as equal modulus decomposition, random modulus decomposition, unequal modulus decomposition, polar decomposition, QZ decomposition, elliptic curves and many other operators [59][60][61][62][63][64][65][66][67]. This integration of mathematical decomposition with optical techniques is very effective in designing the sophisticated optical cryptosystems which are robust to various attacks.…”
Section: Asymmetric Encryption Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the relationship between the ciphertext and private key leads the PTFT-based encryption algorithm to be vulnerable to special iterative attacks [58]. To improve the security of this method, hybrid opto-digital optical cryptosystems have been developed based on mathematical decompositions, such as equal modulus decomposition, random modulus decomposition, unequal modulus decomposition, polar decomposition, QZ decomposition, elliptic curves and many other operators [59][60][61][62][63][64][65][66][67]. This integration of mathematical decomposition with optical techniques is very effective in designing the sophisticated optical cryptosystems which are robust to various attacks.…”
Section: Asymmetric Encryption Algorithmmentioning
confidence: 99%
“…The two decryption keys that are dependent on the plaintext and are different from the public keys are generated using the phase truncation approach. PTFT is further extended in other transform domains as well [60]. The complete PTFT operation can be performed as follows:…”
Section: Phase Truncation and Phase Reservation In Fourier Transformmentioning
confidence: 99%
“…To verify the sensitivity of the proposed approach to diffraction distances and the illuminating wavelength, the correlation coefficient (CC) [29] was used to calculate the difference between the original and the decrypted images: where I i and I o are the original image and the decrypted image, respectively. The relationships between the value of CC and the diffraction distance (d 1 or d 2 ) are shown in Figs.…”
Section: Numerical Simulation and Analysismentioning
confidence: 99%
“…However, Deng (Deng, 2015) investigated and proved the vulnerability of EMD based schemes to special attacks and its variants. In order to enhance the security of cryptosystems based on EMD, many schemes were later proposed (Fatima, Mehra and Nishchal, 2016;Barfungpa and Abuturab, 2016;Chen et al, 2017). Wang et al (Wang, Quan and Tay, 2016) proposed an alternative scheme to EMD cryptosystem popularly known as random decomposition where two random masks of different moduli were produced, it was done to limit the available constraint conditions for executing iterative transform based attacks.…”
Section: Introductionmentioning
confidence: 99%