Abstract

We comment on the recent Letter, by Liu et al. [Opt. Lett.38, 1651 (2013)] in which a method to improve the security strength of the asymmetric cryptosystem (ACS) by Qin and Peng [Opt. Lett.35, 118 (2010)] was proposed. However, in accordance with Liu’s methodology, we could easily find other more efficient ways to achieve their purpose. More importantly, we think it is vitally necessary to point out that there exists a widespread, fundamental misunderstanding on the concept of ACS, which has also been studied in a series of related works.

© 2013 Optical Society of America

PDF Article

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription