Asymmetric cryptosystem based on optical scanning cryptography and elliptic cur ve algorithm [1]https://share.newsbreak.com/1jyqtw88 * Open Access * [2]Published: 11 May 2022 Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm * [3]Xiangyu Chang, * [4]Wei Li, * … * [5]Ting-Chung Poon (BUTTON) Show authors [6]Scientific Reports volume 12, Article number: 7722 (2022) [7]Cite this article * 359 Accesses * [8]Metricsdetails Abstract We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, which is sender’s private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the encrypted holograms can be decrypted by receiver’s biometric private key which is different from the sender’s private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than the conventional OSC. The feasibility of the proposed method has been convincingly verified by numerical and experiment results. Introduction Optical image encryption has attracted much attention in recent years because of its inherent capability of high parallelism and multidimensional freedoms (amplitude, phase and polarization). Since Refrégiér and Javidi first proposed the double random phase encoding (DRPE) technique[9]1, researchers have introduced many extended optical encryption methods such as a series of optical transforms[10]2,[11]3,[12]4,[13]5, digital holography[14]6,[15]7,[16]8, joint transform correlator[17]9,[18]10,[19]11 and ghost imaging[20]12,[21]13,[22]14, etc. Furthermore, optical scanning cryptography (OSC)[23]15,[24]16,[25]17,[26]18,[27]19 envisioned by Poon has become a prospective technology. Different from that of other CCD-based hologram acquisition systems, it can capture the hologram of a physical object with a fast scanning mechanism along with single-pixel recording. Indeed, some encryption systems have been proposed based on OSC. Yan et al. obtained experimental results of encryption using fingerprint keys[28]18. Furthermore, they first demonstrated optical cryptography of 3-D object images in an incoherent optical system with biometric keys[29]19 References 1. https://share.newsbreak.com/1jyqtw88 2. https://www.nature.com/articles/s41598-022-11861-x#article-info 3. https://www.nature.com/articles/s41598-022-11861-x#auth-Xiangyu-Chang 4. https://www.nature.com/articles/s41598-022-11861-x#auth-Wei-Li 5. https://www.nature.com/articles/s41598-022-11861-x#auth-Ting_Chung-Poon 6. https://www.nature.com/srep 7. https://www.nature.com/articles/s41598-022-11861-x#citeas 8. https://www.nature.com/articles/s41598-022-11861-x/metrics 9. https://www.nature.com/articles/s41598-022-11861-x#ref-CR1 10. https://www.nature.com/articles/s41598-022-11861-x#ref-CR2 11. https://www.nature.com/articles/s41598-022-11861-x#ref-CR3 12. https://www.nature.com/articles/s41598-022-11861-x#ref-CR4 13. https://www.nature.com/articles/s41598-022-11861-x#ref-CR5 14. https://www.nature.com/articles/s41598-022-11861-x#ref-CR6 15. https://www.nature.com/articles/s41598-022-11861-x#ref-CR7 16. https://www.nature.com/articles/s41598-022-11861-x#ref-CR8 17. https://www.nature.com/articles/s41598-022-11861-x#ref-CR9 18. https://www.nature.com/articles/s41598-022-11861-x#ref-CR10 19. https://www.nature.com/articles/s41598-022-11861-x#ref-CR11 20. https://www.nature.com/articles/s41598-022-11861-x#ref-CR12 21. https://www.nature.com/articles/s41598-022-11861-x#ref-CR13 22. https://www.nature.com/articles/s41598-022-11861-x#ref-CR14 23. https://www.nature.com/articles/s41598-022-11861-x#ref-CR15 24. https://www.nature.com/articles/s41598-022-11861-x#ref-CR16 25. https://www.nature.com/articles/s41598-022-11861-x#ref-CR17 26. https://www.nature.com/articles/s41598-022-11861-x#ref-CR18 27. https://www.nature.com/articles/s41598-022-11861-x#ref-CR19 28. https://www.nature.com/articles/s41598-022-11861-x#ref-CR18 29. https://www.nature.com/articles/s41598-022-11861-x#ref-CR19