Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

被引:0
|
作者
Xiangyu Chang
Wei Li
Aimin Yan
Peter Wai Ming Tsang
Ting-Chung Poon
机构
[1] Shanghai Normal University,College of Mathematics and Science
[2] City University of Hong Kong,Department of Electronic Engineering Hong Kong
[3] Virginia Tech,Bradley Department of Electrical and Computer Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, which is sender’s private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the encrypted holograms can be decrypted by receiver’s biometric private key which is different from the sender’s private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than the conventional OSC. The feasibility of the proposed method has been convincingly verified by numerical and experiment results.
引用
收藏
相关论文
共 50 条
  • [21] Blind authentication based on the elliptic curve cryptosystem
    Zhang, Longjun
    Shen, Junyi
    Zhao, Lin
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2001, 35 (08): : 804 - 807
  • [22] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm
    Kong, Qingyan
    INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
  • [23] Algorithm and implementation of elliptic curve public key cryptography
    Gong, Shu
    Liu, Wenjiang
    Rong, Mengtian
    Gaojishu Tongxin/High Technology Letters, 2004, 14 (03):
  • [24] An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5
    Chauhan, Manorama
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 562 - 567
  • [25] A new algorithm for a public key cryptosystem using elliptic curve
    Mehibel, Nissa
    Hamadouche, M'hamed
    2017 EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS), 2017, : 17 - 22
  • [26] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [27] Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
    田婧希
    金松昌
    张晓强
    杨绍武
    史殿习
    Chinese Physics B, 2024, 33 (05) : 306 - 318
  • [28] A FAST ELLIPTIC CURVE CRYPTOSYSTEM
    AGNEW, GB
    MULLIN, RC
    VANSTONE, SA
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 706 - 708
  • [29] FPGA Based Implementation of Elliptic Curve Cryptography
    Nawari, Mustafa
    Ahmed, Hazim
    Hamid, Aisha
    Elkhidir, Mohamed
    2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS), 2015,
  • [30] Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
    Tian, Jing-Xi
    Jin, Song-Chang
    Zhang, Xiao-Qiang
    Yang, Shao-Wu
    Shi, Dian-Xi
    CHINESE PHYSICS B, 2024, 33 (05)