OSA's Digital Library

Optics Letters

Optics Letters


  • Editor: Anthony J. Campillo
  • Vol. 31, Iss. 24 — Dec. 15, 2006
  • pp: 3579–3581

Asymmetric cryptography based on wavefront sensing

Xiang Peng, Hengzheng Wei, and Peng Zhang  »View Author Affiliations

Optics Letters, Vol. 31, Issue 24, pp. 3579-3581 (2006)

View Full Text Article

Enhanced HTML    Acrobat PDF (279 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A system of asymmetric cryptography based on wavefront sensing (ACWS) is proposed for the first time to our knowledge. One of the most significant features of the asymmetric cryptography is that a trapdoor one-way function is required and constructed by analogy to wavefront sensing, in which the public key may be derived from optical parameters, such as the wavelength or the focal length, while the private key may be obtained from a kind of regular point array. The ciphertext is generated by the encoded wavefront and represented with an irregular array. In such an ACWS system, the encryption key is not identical to the decryption key, which is another important feature of an asymmetric cryptographic system. The processes of asymmetric encryption and decryption are formulized mathematically and demonstrated with a set of numerical experiments.

© 2006 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.0100) Image processing : Image processing
(200.0200) Optics in computing : Optics in computing

ToC Category:
Fourier Optics and Optical Signal Processing

Original Manuscript: July 12, 2006
Revised Manuscript: September 8, 2006
Manuscript Accepted: September 22, 2006
Published: November 22, 2006

Xiang Peng, Hengzheng Wei, and Peng Zhang, "Asymmetric cryptography based on wavefront sensing," Opt. Lett. 31, 3579-3581 (2006)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi, Phys. Today 50(3), 27 (1997). [CrossRef]
  2. P. Réfrégier and B. Javidi, Opt. Lett. 20, 767 (1995). [CrossRef] [PubMed]
  3. B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997). [CrossRef] [PubMed]
  4. B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999). [CrossRef]
  5. S. Kishk and B. Javidi, Opt. Lett. 28, 167 (2003). [CrossRef] [PubMed]
  6. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice Hall, 1999).
  7. R. K. Tyson, Principles of Adaptive Optics, 2nd ed. (Academic, 1998).
  8. F. Pfeiffer, T. Weitkamp, O. Bunk, and C. David, Nat. Phys. 2, 258 (2006). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1 Fig. 2 Fig. 3

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited