2013
DOI: 10.1117/1.oe.52.2.028202
|View full text |Cite
|
Sign up to set email alerts
|

Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 40 publications
(17 citation statements)
references
References 33 publications
0
17
0
Order By: Relevance
“…If a ciphertext or phase mask key is not used in the decryption process, any information on the original image should not be revealed. However, in some existing PTFT-based cryptosystems an unintended information disclosure problem has been encountered [18][19][20][21][22][27][28][29][30][31][32]. One of the decryption keys used is the phase of the spectrum.…”
Section: Information Disclosure Analysismentioning
confidence: 98%
“…If a ciphertext or phase mask key is not used in the decryption process, any information on the original image should not be revealed. However, in some existing PTFT-based cryptosystems an unintended information disclosure problem has been encountered [18][19][20][21][22][27][28][29][30][31][32]. One of the decryption keys used is the phase of the spectrum.…”
Section: Information Disclosure Analysismentioning
confidence: 98%
“…Recently, there have been several studies pointing out that the aforementioned encryption/ authentication systems are not resistant to collision [34][35][36][37][38]. Situ et al studied the collision resistance to a symmetric DRPE system and showed that Fourier and fractional Fourier domains are not resistant to collision [35,36].…”
Section: Introductionmentioning
confidence: 98%
“…Even if an opponent knew the encryption key and the corresponding ciphertext, it should still be hard to recover the input data. Thus, a central role that such asymmetric encryption system plays is an effective trapdoor oneway function [19].Employing different optical domains the security of asymmetric cryptosystem was further improved [20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 98%
“…Due to this reason, users are stuck with the basic key management functionality, which allows them to produce, delete and deliver the keys under the environment of network security. To solve this issue, an optical asymmetric cryptosystem has been proposed [19][20][21][22][23][24]. In an asymmetric cryptosystem, a pair of keys, an encryption key (public key) and a decryption key (private key) are entirely different functions.…”
Section: Introductionmentioning
confidence: 99%