当前位置: X-MOL 学术Opt. Laser Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Secure selective recovery protocol for multiple optically encrypted data
Optics and Lasers in Engineering ( IF 3.5 ) Pub Date : 2021-02-01 , DOI: 10.1016/j.optlaseng.2020.106383
Alexis Jaramillo-Osorio , Alejandro Velez-Zea , Alejandro Mira-Agudelo , John Fredy Barrera-Ramírez , Roberto Torroba

Abstract In this work we present a secure selective recovery protocol for multiple optically encrypted data based on sampling with orthogonal random binary masks. In this protocol, every single object is encrypted using a single arm free-space cryptosystem, filtered and multiplied by an orthogonal random binary mask, then all the encrypted, filtered and sampled objects are multiplexed. Under this protocol, an authorized user can access a single object from the multiplexed data using both the encryption key and the corresponding orthogonal random binary mask. Without knowledge of the orthogonal binary masks used in the process, neither authorized users nor attackers can recognize the amount of multiplexed data. As a demonstration of the usefulness of our proposal, we implement an optically encrypted keyboard in which each letter is recovered individually without crosstalk. We can securely deliver messages of arbitrary length by sending the encrypted keyboard, the encryption key, and the corresponding set of binary masks. We perform tests showing the resistance of the processed data to occlusion and random noise. Additionally, we discuss the potential resistance of our proposal to Dirac delta and chosen plaintext attacks. Finally, a holographic projection setup is implemented to perform a selective experimental reconstruction of the original objects. The experimental results demonstrate the viability and validity of our proposal.

中文翻译:

多个光学加密数据的安全选择性恢复协议

摘要 在这项工作中,我们提出了一种基于正交随机二进制掩码采样的多个光学加密数据的安全选择性恢复协议。在该协议中,每个对象都使用单臂自由空间密码系统加密,过滤并乘以正交随机二进制掩码,然后所有加密、过滤和采样的对象都被复用。在该协议下,授权用户可以使用加密密钥和相应的正交随机二进制掩码从多路复用数据中访问单个对象。如果不了解过程中使用的正交二进制掩码,授权用户和攻击者都无法识别多路复用数据的数量。为了证明我们的提议是有用的,我们实现了一个光学加密的键盘,其中每个字母都可以单独恢复而不会产生串扰。我们可以通过发送加密键盘、加密密钥和相应的二进制掩码集来安全地传递任意长度的消息。我们执行测试,显示处理后的数据对遮挡和随机噪声的抵抗力。此外,我们还讨论了我们的提案对 Dirac delta 和选定的明文攻击的潜在抵抗力。最后,实施全息投影设置以执行原始对象的选择性实验重建。实验结果证明了我们提议的可行性和有效性。我们执行测试,显示处理后的数据对遮挡和随机噪声的抵抗力。此外,我们还讨论了我们的提案对 Dirac delta 和选定的明文攻击的潜在抵抗力。最后,实施全息投影设置以执行原始对象的选择性实验重建。实验结果证明了我们提议的可行性和有效性。我们执行测试,显示处理后的数据对遮挡和随机噪声的抵抗力。此外,我们还讨论了我们的提案对 Dirac delta 和选定的明文攻击的潜在抵抗力。最后,实施全息投影设置以执行原始对象的选择性实验重建。实验结果证明了我们提议的可行性和有效性。
更新日期:2021-02-01
down
wechat
bug