Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

被引:3
|
作者
Zhao, Tieyu [1 ]
Ran, Qiwen [1 ]
Yuan, Lin [1 ,2 ]
Chi, Yingying [3 ]
Ma, Jing [1 ]
机构
[1] Harbin Inst Technol, Inst Opt Elect, State Key Lab Tunable Laser Technol Res, Harbin 150001, Peoples R China
[2] Zhejiang Normal Univ, Coll Math Phys & Informat Engn, Jinhua 321004, Peoples R China
[3] NE Normal Univ, Sch Psychol, Changchun 130024, Peoples R China
关键词
DOUBLE-IMAGE ENCRYPTION; ASYMMETRIC CRYPTOSYSTEM; OPTICAL ENCRYPTION; FOURIER-TRANSFORMS; TRUNCATION; AMPLITUDE; PLANE;
D O I
10.1155/2015/732609
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The optical image encryption has attracted more and more researchers' attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc.) is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Cryptanalysis of a public-key cryptosystem using lattice basis reduction algorithm
    Department of Electrical Engineering, Aeronautical University of Since and Technology, Tehran, Iran
    [J]. Rastaghi, R., 1600, International Journal of Computer Science Issues (IJCSI) (09): : 5 - 1
  • [32] Modified RSA Public Key Algorithm
    Aswathy, B. G.
    Resmi, R.
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, : 252 - 255
  • [33] RSA public-key cipher algorithm and its applications in the information exchange
    [J]. 2000, China Educ Book Import Export Corp, China (24):
  • [34] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 17 - 31
  • [35] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 219 - 233
  • [36] Public-key cryptosystem based on cellular automata
    Zhu, Bao-Ping
    Zhou, Liang
    Liu, Feng-Yu
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (05): : 612 - 616
  • [37] A systolic RSA public key cryptosystem
    Chen, PS
    Hwang, SA
    Wu, CW
    [J]. ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 4, 1996, : 408 - 411
  • [38] Public-Key Based Efficient Key Distribution in Bluetooth
    Rahman, Saif
    He, Yiruo
    Wu, Huapeng
    [J]. PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 727 - 728
  • [39] Enhancing public-key cryptosystem using parallel Karatsuba algorithm with socket programming
    Meftah, S
    Razali, R
    Samsudin, A
    Budiator, R
    [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 706 - 710
  • [40] A compact and low-power implementation of the Montgomery algorithm for a public-key cryptosystem
    Rejeb, Jalel
    Madaboosi, Chakravarthi
    Le, Thuy T.
    [J]. Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2005, : 111 - 117