Cargando…

Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, w...

Descripción completa

Detalles Bibliográficos
Autores principales: Chang, Xiangyu, Li, Wei, Yan, Aimin, Tsang, Peter Wai Ming, Poon, Ting-Chung
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9095651/
https://www.ncbi.nlm.nih.gov/pubmed/35545658
http://dx.doi.org/10.1038/s41598-022-11861-x
_version_ 1784705803198922752
author Chang, Xiangyu
Li, Wei
Yan, Aimin
Tsang, Peter Wai Ming
Poon, Ting-Chung
author_facet Chang, Xiangyu
Li, Wei
Yan, Aimin
Tsang, Peter Wai Ming
Poon, Ting-Chung
author_sort Chang, Xiangyu
collection PubMed
description We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, which is sender’s private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the encrypted holograms can be decrypted by receiver’s biometric private key which is different from the sender’s private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than the conventional OSC. The feasibility of the proposed method has been convincingly verified by numerical and experiment results.
format Online
Article
Text
id pubmed-9095651
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-90956512022-05-13 Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm Chang, Xiangyu Li, Wei Yan, Aimin Tsang, Peter Wai Ming Poon, Ting-Chung Sci Rep Article We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, which is sender’s private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the encrypted holograms can be decrypted by receiver’s biometric private key which is different from the sender’s private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than the conventional OSC. The feasibility of the proposed method has been convincingly verified by numerical and experiment results. Nature Publishing Group UK 2022-05-11 /pmc/articles/PMC9095651/ /pubmed/35545658 http://dx.doi.org/10.1038/s41598-022-11861-x Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Chang, Xiangyu
Li, Wei
Yan, Aimin
Tsang, Peter Wai Ming
Poon, Ting-Chung
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
title Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
title_full Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
title_fullStr Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
title_full_unstemmed Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
title_short Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
title_sort asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9095651/
https://www.ncbi.nlm.nih.gov/pubmed/35545658
http://dx.doi.org/10.1038/s41598-022-11861-x
work_keys_str_mv AT changxiangyu asymmetriccryptosystembasedonopticalscanningcryptographyandellipticcurvealgorithm
AT liwei asymmetriccryptosystembasedonopticalscanningcryptographyandellipticcurvealgorithm
AT yanaimin asymmetriccryptosystembasedonopticalscanningcryptographyandellipticcurvealgorithm
AT tsangpeterwaiming asymmetriccryptosystembasedonopticalscanningcryptographyandellipticcurvealgorithm
AT poontingchung asymmetriccryptosystembasedonopticalscanningcryptographyandellipticcurvealgorithm