OSA's Digital Library

Optics Letters

Optics Letters

| RAPID, SHORT PUBLICATIONS ON THE LATEST IN OPTICAL DISCOVERIES

  • Editor: Alan E. Willner
  • Vol. 38, Iss. 20 — Oct. 15, 2013
  • pp: 4044–4044

Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment

Wenqi He, Xiangfeng Meng, and Xiang Peng  »View Author Affiliations


Optics Letters, Vol. 38, Issue 20, pp. 4044-4044 (2013)
http://dx.doi.org/10.1364/OL.38.004044


View Full Text Article

Enhanced HTML    Acrobat PDF (52 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We comment on the recent Letter, by Liu et al. [Opt. Lett. 38, 1651 (2013)] in which a method to improve the security strength of the asymmetric cryptosystem (ACS) by Qin and Peng [Opt. Lett. 35, 118 (2010)] was proposed. However, in accordance with Liu’s methodology, we could easily find other more efficient ways to achieve their purpose. More importantly, we think it is vitally necessary to point out that there exists a widespread, fundamental misunderstanding on the concept of ACS, which has also been studied in a series of related works.

© 2013 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fiber Optics and Optical Communications

History
Original Manuscript: August 6, 2013
Revised Manuscript: August 22, 2013
Manuscript Accepted: August 22, 2013
Published: October 4, 2013

Citation
Wenqi He, Xiangfeng Meng, and Xiang Peng, "Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment," Opt. Lett. 38, 4044-4044 (2013)
http://www.opticsinfobase.org/ol/abstract.cfm?URI=ol-38-20-4044


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. W. Liu, Z. J. Liu, and S. T. Liu, Opt. Lett. 38, 1651 (2013). [CrossRef]
  2. W. Qin and X. Peng, Opt. Lett. 35, 118 (2010). [CrossRef]
  3. X. Wang and D. Zhao, Opt. Commun. 285, 1078 (2012). [CrossRef]
  4. X. Ding, X. Deng, K. Song, and G. Chen, Appl. Opt. 52, 467 (2013). [CrossRef]
  5. S. K. Rajput and N. K. Nishchal, Appl. Opt. 51, 5377 (2012). [CrossRef]
  6. X. Deng and D. Zhao, Opt. Laser Technol. 44, 136 (2012). [CrossRef]
  7. W. Chen and X. D. Chen, J. Opt. 13, 075404 (2011). [CrossRef]
  8. X. Wang and D. Zhao, Appl. Opt. 50, 6645 (2011). [CrossRef]
  9. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1996).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited