Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm

Not Accessible

Your library or personal account may give you access

Abstract

An optical identity authentication scheme based on the elliptic curve digital signature algorithm (ECDSA) and phase retrieval algorithm (PRA) is proposed. In this scheme, a user’s certification image and the quick response code of the user identity’s keyed-hash message authentication code (HMAC) with added noise, serving as the amplitude and phase restriction, respectively, are digitally encoded into two phase keys using a PRA in the Fresnel domain. During the authentication process, when the two phase keys are presented to the system and illuminated by a plane wave of correct wavelength, an output image is generated in the output plane. By identifying whether there is a match between the amplitude of the output image and all the certification images pre-stored in the database, the system can thus accomplish a first-level verification. After the confirmation of first-level verification, the ECDSA signature is decoded from the phase part of the output image and verified to allege whether the user’s identity is legal or not. Moreover, the introduction of HMAC makes it almost impossible to forge the signature and hence the phase keys thanks to the HMAC’s irreversible property. Theoretical analysis and numerical simulations both validate the feasibility of our proposed scheme.

© 2013 Optical Society of America

Full Article  |  PDF Article
More Like This
Optical hierarchical authentication based on interference and hash function

Wenqi He, Xiang Peng, Xiangfeng Meng, and Xiaoli Liu
Appl. Opt. 51(32) 7750-7757 (2012)

Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing

Desheng Fan, Xiangfeng Meng, Yurong Wang, Xiulun Yang, Xuemei Pan, Xiang Peng, Wenqi He, Guoyan Dong, and Hongyi Chen
Appl. Opt. 54(11) 3204-3215 (2015)

Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms

Inkyu Moon, Faliu Yi, Mingu Han, and Jieun Lee
Appl. Opt. 55(16) 4328-4335 (2016)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (9)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (2)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (6)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.