OSA's Digital Library

Optics Letters

Optics Letters


  • Editor: Alan E. Willner
  • Vol. 35, Iss. 2 — Jan. 15, 2010
  • pp: 118–120

Asymmetric cryptosystem based on phase-truncated Fourier transforms

Wan Qin and Xiang Peng  »View Author Affiliations

Optics Letters, Vol. 35, Issue 2, pp. 118-120 (2010)

View Full Text Article

Enhanced HTML    Acrobat PDF (432 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We propose an asymmetric cryptosystem based on a phase-truncated Fourier transform. With phase truncation in Fourier transform, one is able to produce an asymmetric ciphertext as real-valued and stationary white noise by using two random phase keys as public keys, while a legal user can retrieve the plaintext using another two different private phase keys in the decryption process. Owing to the nonlinear operation of phase truncation, high robustness against existing attacks could be achieved. A set of simulation results shows the validity of proposed asymmetric cryptosystem.

© 2010 Optical Society of America

OCIS Codes
(070.4560) Fourier optics and signal processing : Data processing by optical means
(070.2025) Fourier optics and signal processing : Discrete optical signal processing
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

Original Manuscript: September 30, 2009
Revised Manuscript: November 13, 2009
Manuscript Accepted: December 1, 2009
Published: January 11, 2010

Wan Qin and Xiang Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi, Phys. Today 50, 27 (1997). [CrossRef]
  2. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995). [CrossRef] [PubMed]
  3. H. T. Chang, W. C. Lu, and C. J. Kuo, Appl. Opt. 41, 4825 (2002). [CrossRef] [PubMed]
  4. P. K. Wang, L. A. Watson, and C. Chatwin, Opt. Eng. (Bellingham) 35, 2464 (1996). [CrossRef]
  5. Y. Li, K. Kreske, and J. Rosen, Appl. Opt. 39, 5295 (2000). [CrossRef]
  6. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice Hall, 1999).
  7. G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, Opt. Eng. 42, 2331 (2003). [CrossRef]
  8. X. Peng, H. Wei, and P. Zhang, Opt. Lett. 31, 3579 (2006). [CrossRef] [PubMed]
  9. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005). [CrossRef] [PubMed]
  10. X. Peng, P. Zhang, H. Wei, and B. Yu, Opt. Lett. 31, 3261 (2006). [CrossRef] [PubMed]
  11. X. Peng, H. Q. Tang, and J. D. Tian, Acta Phys. Sin. 56, 2629 (2007).
  12. G. Situ and J. Zhang, Opt. Lett. 29, 1584 (2004). [CrossRef] [PubMed]
  13. G. Unnikrishnan and K. Singh, Opt. Eng. 39, 2853 (2000). [CrossRef]
  14. X. Peng, H. Wei, and P. Zhang, Opt. Lett. 31, 1044 (2006). [CrossRef] [PubMed]
  15. W. Qin and X. Peng, J. Opt. A 11, 075402 (2009). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1 Fig. 2 Fig. 3
Fig. 4

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited