Abstract

We comment on the recent Letter, by Liu et al. [Opt. Lett. 38, 1651 (2013)] in which a method to improve the security strength of the asymmetric cryptosystem (ACS) by Qin and Peng [Opt. Lett. 35, 118 (2010)] was proposed. However, in accordance with Liu’s methodology, we could easily find other more efficient ways to achieve their purpose. More importantly, we think it is vitally necessary to point out that there exists a widespread, fundamental misunderstanding on the concept of ACS, which has also been studied in a series of related works.

© 2013 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. W. Liu, Z. J. Liu, and S. T. Liu, Opt. Lett. 38, 1651 (2013).
    [CrossRef]
  2. W. Qin and X. Peng, Opt. Lett. 35, 118 (2010).
    [CrossRef]
  3. X. Wang and D. Zhao, Opt. Commun. 285, 1078 (2012).
    [CrossRef]
  4. X. Ding, X. Deng, K. Song, and G. Chen, Appl. Opt. 52, 467 (2013).
    [CrossRef]
  5. S. K. Rajput and N. K. Nishchal, Appl. Opt. 51, 5377 (2012).
    [CrossRef]
  6. X. Deng and D. Zhao, Opt. Laser Technol. 44, 136 (2012).
    [CrossRef]
  7. W. Chen and X. D. Chen, J. Opt. 13, 075404 (2011).
    [CrossRef]
  8. X. Wang and D. Zhao, Appl. Opt. 50, 6645 (2011).
    [CrossRef]
  9. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1996).

2013 (2)

2012 (3)

S. K. Rajput and N. K. Nishchal, Appl. Opt. 51, 5377 (2012).
[CrossRef]

X. Wang and D. Zhao, Opt. Commun. 285, 1078 (2012).
[CrossRef]

X. Deng and D. Zhao, Opt. Laser Technol. 44, 136 (2012).
[CrossRef]

2011 (2)

W. Chen and X. D. Chen, J. Opt. 13, 075404 (2011).
[CrossRef]

X. Wang and D. Zhao, Appl. Opt. 50, 6645 (2011).
[CrossRef]

2010 (1)

Chen, G.

Chen, W.

W. Chen and X. D. Chen, J. Opt. 13, 075404 (2011).
[CrossRef]

Chen, X. D.

W. Chen and X. D. Chen, J. Opt. 13, 075404 (2011).
[CrossRef]

Deng, X.

X. Ding, X. Deng, K. Song, and G. Chen, Appl. Opt. 52, 467 (2013).
[CrossRef]

X. Deng and D. Zhao, Opt. Laser Technol. 44, 136 (2012).
[CrossRef]

Ding, X.

Liu, S. T.

Liu, W.

Liu, Z. J.

Nishchal, N. K.

Peng, X.

Qin, W.

Rajput, S. K.

Schneier, B.

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1996).

Song, K.

Wang, X.

X. Wang and D. Zhao, Opt. Commun. 285, 1078 (2012).
[CrossRef]

X. Wang and D. Zhao, Appl. Opt. 50, 6645 (2011).
[CrossRef]

Zhao, D.

X. Wang and D. Zhao, Opt. Commun. 285, 1078 (2012).
[CrossRef]

X. Deng and D. Zhao, Opt. Laser Technol. 44, 136 (2012).
[CrossRef]

X. Wang and D. Zhao, Appl. Opt. 50, 6645 (2011).
[CrossRef]

Appl. Opt. (3)

J. Opt. (1)

W. Chen and X. D. Chen, J. Opt. 13, 075404 (2011).
[CrossRef]

Opt. Commun. (1)

X. Wang and D. Zhao, Opt. Commun. 285, 1078 (2012).
[CrossRef]

Opt. Laser Technol. (1)

X. Deng and D. Zhao, Opt. Laser Technol. 44, 136 (2012).
[CrossRef]

Opt. Lett. (2)

Other (1)

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1996).

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Equations (1)

Equations on this page are rendered with MathJax. Learn more.

C=|FT{|FT{Iexp(iϕ1)}|exp(iϕ2)}||FT{|gP1|exp(iϕ2)}|=|FT{gexp(iπγ1)exp(iϕ2)}||CP2|=Cexp(iπγ2).

Metrics