Abstract

A system of asymmetric cryptography based on wavefront sensing (ACWS) is proposed for the first time to our knowledge. One of the most significant features of the asymmetric cryptography is that a trapdoor one-way function is required and constructed by analogy to wavefront sensing, in which the public key may be derived from optical parameters, such as the wavelength or the focal length, while the private key may be obtained from a kind of regular point array. The ciphertext is generated by the encoded wavefront and represented with an irregular array. In such an ACWS system, the encryption key is not identical to the decryption key, which is another important feature of an asymmetric cryptographic system. The processes of asymmetric encryption and decryption are formulized mathematically and demonstrated with a set of numerical experiments.

© 2006 Optical Society of America

PDF Article

References

  • View by:
  • |
  • |
  • |

  1. B. Javidi, Phys. Today 50(3), 27 (1997).
  2. P. Réfrégier and B. Javidi, Opt. Lett. 20, 767 (1995).
  3. B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997).
  4. B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
    [CrossRef]
  5. S. Kishk and B. Javidi, Opt. Lett. 28, 167 (2003).
    [CrossRef]
  6. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice Hall, 1999).
  7. R. K. Tyson, Principles of Adaptive Optics, 2nd ed. (Academic, 1998).
  8. F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006).

2006

F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006).

2003

1999

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

1997

B. Javidi, Phys. Today 50(3), 27 (1997).

B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997).

1995

Bernard, L.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

Bunk, O.

F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006).

David, C.

F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006).

Javidi, B.

Kishk, S.

Li, J.

Pfeiffer, F.

F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006).

Réfrégier, P.

Stallings, W.

W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice Hall, 1999).

Towghi, N.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

Tyson, R. K.

R. K. Tyson, Principles of Adaptive Optics, 2nd ed. (Academic, 1998).

Weitkamp, T.

F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006).

Zhang, G.

Appl. Opt.

Nat. Phys.

F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006).

Opt. Eng.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

Opt. Lett.

Phys. Today

B. Javidi, Phys. Today 50(3), 27 (1997).

Other

W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice Hall, 1999).

R. K. Tyson, Principles of Adaptive Optics, 2nd ed. (Academic, 1998).

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Metrics