Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

被引:0
|
作者
Xiangyu Chang
Wei Li
Aimin Yan
Peter Wai Ming Tsang
Ting-Chung Poon
机构
[1] Shanghai Normal University,College of Mathematics and Science
[2] City University of Hong Kong,Department of Electronic Engineering Hong Kong
[3] Virginia Tech,Bradley Department of Electrical and Computer Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, which is sender’s private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the encrypted holograms can be decrypted by receiver’s biometric private key which is different from the sender’s private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than the conventional OSC. The feasibility of the proposed method has been convincingly verified by numerical and experiment results.
引用
收藏
相关论文
共 50 条
  • [41] A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
    Kumar, Sanjay
    Sharma, Deepmala
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (04)
  • [42] The Key Exchange Research of Chaotic Encryption Chip based on Elliptic Curve Cryptography Algorithm
    Zhou, Ping
    Ding, Qun
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 689 - 693
  • [43] AN IMPLEMENTATION OF FAST ALGORITHM FOR ELLIPTIC CURVE CRYPTOSYSTEM OVER GF(p)
    Lu Chen Chen Yanpu Bian ZhengzhongLife Science Institute Xian Jiaotong University Xian Computer Center Xian Communication Colledge Xian
    Journal of Electronics, 2004, (04) : 346 - 352
  • [44] An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-key Cryptography
    Zhang, Chang N.
    Liu, Xiao Wei
    DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 28 - 33
  • [45] AN IMPLEMENTATION OF FAST ALGORITHM FOR ELLIPTIC CURVE CRYPTOSYSTEM OVER GF(p)
    Lu Chen Chen Yanpu Bian Zhengzhong(Life Science Institute
    Journal of Electronics(China), 2004, (04) : 346 - 352
  • [46] Research and improvement of the performance of embedded system-based elliptic curve cryptography algorithm
    Yi, Xiao-Lin
    Yang, Feng
    Lu, Peng-Cheng
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (12): : 1722 - 1728
  • [47] A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
    Sanjay Kumar
    Deepmala Sharma
    Artificial Intelligence Review, 57
  • [48] Study of side-channel attacks for elliptic curve cryptosystem algorithm
    Liu, Shuanggen
    Hu, Yupu
    Xu, Wensheng
    Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering), 2007, 31 (03): : 491 - 493
  • [49] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [50] Elliptic Curve Cryptography on PocketPCs
    Edoh, Kossi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33