Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

被引:0
|
作者
Xiangyu Chang
Wei Li
Aimin Yan
Peter Wai Ming Tsang
Ting-Chung Poon
机构
[1] Shanghai Normal University,College of Mathematics and Science
[2] City University of Hong Kong,Department of Electronic Engineering Hong Kong
[3] Virginia Tech,Bradley Department of Electrical and Computer Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, which is sender’s private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the encrypted holograms can be decrypted by receiver’s biometric private key which is different from the sender’s private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than the conventional OSC. The feasibility of the proposed method has been convincingly verified by numerical and experiment results.
引用
收藏
相关论文
共 50 条
  • [31] User authentication scheme based on elliptic curve cryptosystem
    Zhang, L.J.
    Zhao, L.
    Shen, J.Y.
    Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
  • [32] Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem
    张龙军
    韩玮
    陈克非
    Journal of Shanghai Jiaotong University(Science), 2007, (05) : 645 - 650
  • [33] Design and Implementation of A Elliptic Curve Cryptosystem Based on SoC
    Li, Zheng
    Zheng, Bin
    Wang, Ruijiao
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 731 - 733
  • [34] Secure authentication of WLAN based on elliptic curve cryptosystem
    Zhang, Long-Jun
    Han, Wei
    Chen, Ke-Fei
    Journal of Shanghai Jiaotong University (Science), 2007, 12 E (05) : 645 - 650
  • [35] A threshold signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1119 - 1134
  • [36] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [37] A GPU implementation of the Montgomery multiplication algorithm for elliptic curve cryptography
    Leboeuf, Karl
    Muscedere, Roberto
    Alunadi, Majid
    2013 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2013, : 2593 - 2596
  • [38] DES Algorithm Security Fortification Using Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwa
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
  • [39] Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography
    Usha, S.
    Kuppuswami, S.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 147 - 158
  • [40] Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography
    Thomas, Aswathi
    Manuel, Ebin M.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 911 - 917