Abstract
We propose a method to achieve the purpose of hierarchical authentication on the basis of two beams’ interference and the one-way hash function. For this security protection system, only if the “phase key” and the password-controlled “phase lock” of a user are verified simultaneously can one obtain a permission to visit the confidential resources of the system. Moreover, this scheme can not only check the legality of the users but also verify their identity levels so as to grant them corresponding hierarchical access permissions. The authentication process is straightforward; the phase key and the password-controlled phase lock of one user are loading on two spatial light modulators in advance, by which two coherent beams are modulated and then interfere with each other at the output plane leading to an output image. By comparing the output image with all the standard certification images in the database, the system can thus verify the user’s identity. However, the system designing process involves an iterative modified phase retrieval algorithm. For an authorized user, a phase lock is first created based on a “digital fingerprint,” which is the result of a hash function on a preselected user password. The corresponding phase key can then be determined by use of the phase lock and a designated standard certification image. Theoretical analysis and computer simulations both validate the effectiveness of our method.
© 2012 Optical Society of America
Full Article | PDF ArticleMore Like This
Desheng Fan, Xiangfeng Meng, Yurong Wang, Xiulun Yang, Xiang Peng, Wenqi He, Guoyan Dong, and Hongyi Chen
Appl. Opt. 52(23) 5645-5652 (2013)
Hongji Lai, Wenqi He, and Xiang Peng
Appl. Opt. 52(25) 6213-6219 (2013)
Mingguang Shan, Jianchao Guo, Zhi Zhong, Bin Liu, Lei Yu, and Lei Liu
Appl. Opt. 61(23) 6931-6938 (2022)