scholarly journals Generalized forgery attack to optical encryption systems

2021 ◽  
Author(s):  
Feng Jun ◽  
Wei Huang ◽  
Shuming Jiao ◽  
Xiaopeng Wang
2020 ◽  
Vol 45 (14) ◽  
pp. 3917
Author(s):  
Sheng Yuan ◽  
Lanjie Wang ◽  
Xuemei Liu ◽  
Xin Zhou

2020 ◽  
Vol 63 (8) ◽  
pp. 1216-1230 ◽  
Author(s):  
Wei Guo ◽  
Sujuan Qin ◽  
Jun Lu ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.


PhotoniX ◽  
2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Deming Peng ◽  
Zhaofeng Huang ◽  
Yonglei Liu ◽  
Yahong Chen ◽  
Fei Wang ◽  
...  

AbstractInformation encryption with optical technologies has become increasingly important due to remarkable multidimensional capabilities of light fields. However, the optical encryption protocols proposed to date have been primarily based on the first-order field characteristics, which are strongly affected by interference effects and make the systems become quite unstable during light–matter interaction. Here, we introduce an alternative optical encryption protocol whereby the information is encoded into the second-order spatial coherence distribution of a structured random light beam via a generalized van Cittert–Zernike theorem. We show that the proposed approach has two key advantages over its conventional counterparts. First, the complexity of measuring the spatial coherence distribution of light enhances the encryption protocol security. Second, the relative insensitivity of the second-order statistical characteristics of light to environmental noise makes the protocol robust against the environmental fluctuations, e.g, the atmospheric turbulence. We carry out experiments to demonstrate the feasibility of the coherence-based encryption method with the aid of a fractional Fourier transform. Our results open up a promising avenue for further research into optical encryption in complex environments.


Polymers ◽  
2021 ◽  
Vol 13 (9) ◽  
pp. 1358
Author(s):  
Taihui Wu ◽  
Jianshe Ma ◽  
Chengchen Wang ◽  
Haibei Wang ◽  
Liangcai Cao ◽  
...  

An optical encryption method based on computer generated holograms printing of photopolymer is presented. Fraunhofer diffraction is performed based on the Gerchberg-Saxton algorithm, and a hologram of the Advanced Encryption Standard encrypted Quick Response code is generated to record the ciphertext. The holograms of the key and the three-dimensional image are generated by the angular spectrum diffraction algorithm. The experimental results show that large-size encrypted Quick Response (QR) code and miniature keys can be printed in photopolymers, which has good application prospects in optical encryption. This method has the advantages of high-density storage, high speed, large fault tolerance, and anti-peeping.


2000 ◽  
Vol 173 (1-6) ◽  
pp. 177-183 ◽  
Author(s):  
Paul C Mogensen ◽  
Jesper Glückstad
Keyword(s):  

Optik ◽  
2021 ◽  
pp. 167654
Author(s):  
Qi Chen ◽  
Xueju Shen ◽  
Yue Cheng ◽  
Chao Lin ◽  
Yunfeng Liu ◽  
...  

Author(s):  
Xin Zheng ◽  
Yangbin Zhu ◽  
Yang Liu ◽  
Linpeng Zhou ◽  
Zhongwei Xu ◽  
...  

2011 ◽  
Vol 130-134 ◽  
pp. 291-294
Author(s):  
Guang Liang Liu ◽  
Sheng Xian Xie ◽  
Wei Fu

On the elliptic curve cryptosystem proposed a new multi-proxy signature scheme - (t, k, n) threshold blind proxy signature scheme.In new program blind proxy signature and (t,k,n) threshold secret sharing scheme will be combined, and will not over-concentration of the rights of the blind proxy signer .Computation of the program is small, security is high, the achieve efficiency and the utility is better .can prevent a malicious user's forgery attack and have the security properties of proxy signature.


Sign in / Sign up

Export Citation Format

Share Document