OSA's Digital Library

Optics Letters

Optics Letters


  • Editor: Alan E. Willner
  • Vol. 38, Iss. 20 — Oct. 15, 2013
  • pp: 4044–4044

Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment

Wenqi He, Xiangfeng Meng, and Xiang Peng  »View Author Affiliations

Optics Letters, Vol. 38, Issue 20, pp. 4044-4044 (2013)

View Full Text Article

Enhanced HTML    Acrobat PDF (52 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We comment on the recent Letter, by Liu et al. [Opt. Lett. 38, 1651 (2013)] in which a method to improve the security strength of the asymmetric cryptosystem (ACS) by Qin and Peng [Opt. Lett. 35, 118 (2010)] was proposed. However, in accordance with Liu’s methodology, we could easily find other more efficient ways to achieve their purpose. More importantly, we think it is vitally necessary to point out that there exists a widespread, fundamental misunderstanding on the concept of ACS, which has also been studied in a series of related works.

© 2013 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fiber Optics and Optical Communications

Original Manuscript: August 6, 2013
Revised Manuscript: August 22, 2013
Manuscript Accepted: August 22, 2013
Published: October 4, 2013

Wenqi He, Xiangfeng Meng, and Xiang Peng, "Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment," Opt. Lett. 38, 4044-4044 (2013)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. W. Liu, Z. J. Liu, and S. T. Liu, Opt. Lett. 38, 1651 (2013). [CrossRef]
  2. W. Qin and X. Peng, Opt. Lett. 35, 118 (2010). [CrossRef]
  3. X. Wang and D. Zhao, Opt. Commun. 285, 1078 (2012). [CrossRef]
  4. X. Ding, X. Deng, K. Song, and G. Chen, Appl. Opt. 52, 467 (2013). [CrossRef]
  5. S. K. Rajput and N. K. Nishchal, Appl. Opt. 51, 5377 (2012). [CrossRef]
  6. X. Deng and D. Zhao, Opt. Laser Technol. 44, 136 (2012). [CrossRef]
  7. W. Chen and X. D. Chen, J. Opt. 13, 075404 (2011). [CrossRef]
  8. X. Wang and D. Zhao, Appl. Opt. 50, 6645 (2011). [CrossRef]
  9. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1996).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited