[go: up one dir, main page]

Yu et al., 2025 - Google Patents

Parallel dynamic optical encryption based on light diffraction

Yu et al., 2025

Document ID
14254335953633107100
Author
Yu H
Li P
Feng T
Publication year
Publication venue
Optics Communications

External Links

Snippet

Increasing the efficiency of information encryption is becoming more and more important in optical encryption applications. While the current implementation of multiple information encryption is mainly based on adding modulation freedoms for optical fields and developing …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Nishchal Optical cryptosystems
Zhou et al. Optical image encryption based on two-channel detection and deep learning
Kumar et al. Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm
Liu et al. Multiple-image encryption based on optical asymmetric key cryptosystem
CN106972921B (en) Asymmetric optical information security system based on wave-front sensing and double optical keys
Kong et al. Image encryption based on interleaved computer-generated holograms
Wang et al. Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain
Jaramillo et al. Fractional optical cryptographic protocol for data containers in a noise-free multiuser environment
Anshula et al. Cryptanalysis for double-image encryption using the DTLM in frequency plane with QR decomposition and gyrator transform
Faragallah Optical double color image encryption scheme in the Fresnel-based Hartley domain using Arnold transform and chaotic logistic adjusted sine phase masks
Rao et al. Optical asymmetric image encryption using vectorial light field encoding
Chen et al. Topological charge number multiplexing for JTC multiple-image encryption
Wang et al. Computational imaging encryption with a steganographic and holographic authentication strategy
Qin et al. Interference-based multiple-image encryption by phase-only mask multiplexing with high quality retrieved images
Mastriani Simplified entanglement swapping protocol for the quantum Internet
Anshula et al. Ensuring security of cryptosystems with DVFM-, modified equal modulus decomposition in the domain of gyrator wavelet transform
Lin et al. Design of reconfigurable and structured spiral phase mask for optical security system
Chen et al. Highly-secure scattering-media-based key storage
Lee et al. Visual cryptography based on an interferometric encryption technique
Chen et al. Experimental research on JTC encryption system based on spiral phase mask and its characteristics
Rao et al. Optical asymmetric image encryption using DNA through vortex beam encoding
Piao et al. Robust multidepth object encryption based on a computer-generated hologram with a cascaded structure
Vanitha et al. Augmenting data security: physical unclonable functions for linear canonical transform based cryptography
Luan et al. Silhouette-free multiple image encryption using coherent superposition and Fresnel transform
Yu et al. Parallel dynamic optical encryption based on light diffraction