Multi-party interactive cryptographic key distribution protocol over a public network based on computational ghost imaging

In existing ghost-imaging-based cryptographic key distribution (CKD) protocols, the lack of joint identity authentication leads to potential security risks. Here, under a computational ghost imaging framework, we propose a multi-party interactive CKD protocol over a public network, which sets an int...

Full description

Bibliographic Details
Main Authors: Li, Y.-X (Author), Wang, S.-F (Author), Wei, N. (Author), Yang, Y. (Author), Yu, W.-K (Author)
Format: Article
Language:English
Published: Elsevier Ltd 2022
Subjects:
Online Access:View Fulltext in Publisher
LEADER 02137nam a2200421Ia 4500
001 10.1016-j.optlaseng.2022.107067
008 220425s2022 CNT 000 0 und d
020 |a 01438166 (ISSN) 
245 1 0 |a Multi-party interactive cryptographic key distribution protocol over a public network based on computational ghost imaging 
260 0 |b Elsevier Ltd  |c 2022 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1016/j.optlaseng.2022.107067 
520 3 |a In existing ghost-imaging-based cryptographic key distribution (CKD) protocols, the lack of joint identity authentication leads to potential security risks. Here, under a computational ghost imaging framework, we propose a multi-party interactive CKD protocol over a public network, which sets an intermediary to perform fragment-synthesis-based joint identity authentication. The fragment images can be acquired with high quality via a binarization process. Both simulation and experiments have demonstrated that this proposed protocol can greatly improve the security of communication. Thus, this protocol paves a new way for authentication in multi-party CKD. © 2022 Elsevier Ltd 
650 0 4 |a Authentication 
650 0 4 |a Binarization processing 
650 0 4 |a Binarization processing 
650 0 4 |a Computational ghost imaging 
650 0 4 |a Cryptographic key 
650 0 4 |a Cryptographic key distribution 
650 0 4 |a Cryptographic key distribution 
650 0 4 |a Identity authentication 
650 0 4 |a Image processing 
650 0 4 |a Interactive joint authentication 
650 0 4 |a Interactive joint authentication 
650 0 4 |a Internet protocols 
650 0 4 |a Key distribution 
650 0 4 |a Key-distribution protocols 
650 0 4 |a Multi-party optical communication 
650 0 4 |a Multi-party optical communication 
650 0 4 |a Network security 
650 0 4 |a Network-based 
650 0 4 |a Optical communication 
650 0 4 |a Public networks 
700 1 |a Li, Y.-X.  |e author 
700 1 |a Wang, S.-F.  |e author 
700 1 |a Wei, N.  |e author 
700 1 |a Yang, Y.  |e author 
700 1 |a Yu, W.-K.  |e author 
773 |t Optics and Lasers in Engineering