Abstract

We appreciate the comment by He et al. [Opt. Lett. 38, 4044 (2013)] in the sense that it allows us to clarify our methodology of constructing an optical asymmetric cryptosystem, especially the relationship of the public encryption keys and private decryption keys. We also take this opportunity to provide a more detailed discussion to promote the research about the optical encryption schemes with asymmetric keys into a more correct direction.

© 2013 Optical Society of America

Full Article  |  PDF Article

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (1)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription