Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optical Hash function based on two-beam interference

Not Accessible

Your library or personal account may give you access

Abstract

An approach for constructing an optical Hash function, also known as a one-way cryptosystem, based on two-beam interference (OHF-TBI) is proposed. The purpose of this method is creating the “digital fingerprint” of any precoding message with arbitrary length. This approach consists of three steps, in which the main step is a one-way processing procedure with a compression mechanism. To achieve the function of one-way property and compressibility, we designed a cascaded process on the basis of the two-beam interference principle and phase-truncation operation. The performance of the mentioned OHF-TBI is verified by theoretical analysis and a set of numerical simulations.

© 2013 Optical Society of America

Full Article  |  PDF Article
More Like This
Optical hierarchical authentication based on interference and hash function

Wenqi He, Xiang Peng, Xiangfeng Meng, and Xiaoli Liu
Appl. Opt. 51(32) 7750-7757 (2012)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (11)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (2)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (12)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved