Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optical hierarchical authentication based on interference and hash function

Not Accessible

Your library or personal account may give you access

Abstract

We propose a method to achieve the purpose of hierarchical authentication on the basis of two beams’ interference and the one-way hash function. For this security protection system, only if the “phase key” and the password-controlled “phase lock” of a user are verified simultaneously can one obtain a permission to visit the confidential resources of the system. Moreover, this scheme can not only check the legality of the users but also verify their identity levels so as to grant them corresponding hierarchical access permissions. The authentication process is straightforward; the phase key and the password-controlled phase lock of one user are loading on two spatial light modulators in advance, by which two coherent beams are modulated and then interfere with each other at the output plane leading to an output image. By comparing the output image with all the standard certification images in the database, the system can thus verify the user’s identity. However, the system designing process involves an iterative modified phase retrieval algorithm. For an authorized user, a phase lock is first created based on a “digital fingerprint,” which is the result of a hash function on a preselected user password. The corresponding phase key can then be determined by use of the phase lock and a designated standard certification image. Theoretical analysis and computer simulations both validate the effectiveness of our method.

© 2012 Optical Society of America

Full Article  |  PDF Article
More Like This
Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm

Desheng Fan, Xiangfeng Meng, Yurong Wang, Xiulun Yang, Xiang Peng, Wenqi He, Guoyan Dong, and Hongyi Chen
Appl. Opt. 52(23) 5645-5652 (2013)

Optical Hash function based on two-beam interference

Hongji Lai, Wenqi He, and Xiang Peng
Appl. Opt. 52(25) 6213-6219 (2013)

Improved multiple-image authentication based on optical interference by wavelength multiplexing

Mingguang Shan, Jianchao Guo, Zhi Zhong, Bin Liu, Lei Yu, and Lei Liu
Appl. Opt. 61(23) 6931-6938 (2022)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (7)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (9)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved