DOI QR코드

DOI QR Code

Proposal for Analog Signature Scheme Based on RSA Digital Signature Algorithm and Phase-shifting Digital Holography

  • Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
  • Received : 2020.09.14
  • Accepted : 2020.11.13
  • Published : 2020.12.25

Abstract

In this paper, a novel analog signature scheme is proposed by modifying an RSA-based digital signature scheme with optical phase-shifting digital holography. The purpose of the proposed method is generating an analog signature to provide data confidentiality and security during the data transfer, compared to the digital signature. The holographic encryption technique applied to a hash value reveals an analog-type of pseudo-random pattern in the analog signature scheme. The public key and secret key needed to verify the analog signature are computed from public key ciphers which are generated by the same holographic encryption. The proposed analog signature scheme contains a kind of double encryption in the process of generating signature and key, which enhances security level more than the digital signature. The results of performance simulations show the feasibility of the highly secure signature scheme, and security analysis shows high robustness against known-message attacks and chosen-message attacks. In addition, the proposed method can apply to one-time signature schemes which can be used to sign only one message and it can also apply to authentication, e-mails, electronic banking and electronic data interchange.

Keywords

Acknowledgement

This work was supported by the University of Suwon in 2018.

References

  1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  2. G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
  3. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004). https://doi.org/10.1364/OL.29.001584
  4. Z. Liu, L. Xu, C. Lin, and S. Liu, "Image encryption by encoding with a nonuniform optical beam in gyrator transform domains," Appl. Opt. 49, 5632-5637 (2010). https://doi.org/10.1364/AO.49.005632
  5. D. C. Weber and J. D. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999) https://doi.org/10.1117/1.602062
  6. Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000). https://doi.org/10.1364/AO.39.005295
  7. E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
  8. J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999). https://doi.org/10.1117/1.602060
  9. S. K. Gil, "Optical CBC block encryption method using free space parallel processing of XOR operations," Korea J. Opt. Photon. 24, 262-270 (2013). https://doi.org/10.3807/KJOP.2013.24.5.262
  10. B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
  11. O. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Opt. Lett. 27, 321-323 (2002). https://doi.org/10.1364/OL.27.000321
  12. E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
  13. L.-Z Cai, M.-Z He, Q. Liu, and X.-L Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). https://doi.org/10.1364/AO.43.003078
  14. X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
  15. X. Peng, H. Wei, and P. Zhang, "Asymmetric cryptography based on wave front sensing," Opt. Lett. 31, 3579-3581 (2006). https://doi.org/10.1364/OL.31.003579
  16. W. Liu, Z. Liu, and S. Liu, "Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm," Opt. Lett. 38, 1651-1653 (2013). https://doi.org/10.1364/OL.38.001651
  17. Y. Xiong, A. He, and C. Quan, "Security analysis of a double-image encryption technique based on an asymmetric algorithm," J. Opt. Soc. Am. A 35, 320-326 (2018). https://doi.org/10.1364/josaa.35.000320
  18. G. Luan, A. Li, D. Zhang, and D. Wang, "Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain," IEEE Photon. J. 11, 1-7 (2019).
  19. D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm," Opt. Commun. 309, 50-56 (2013). https://doi.org/10.1016/j.optcom.2013.06.044
  20. D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm," Appl. Opt. 52, 5645-5652 (2013). https://doi.org/10.1364/AO.52.005645
  21. S. K. Rajput and N. K. Nishchal, "An optical encryption and authentication scheme using asymmetric keys," J. Opt. Soc. Am. A 31, 1233-1238 (2014). https://doi.org/10.1364/JOSAA.31.001233
  22. X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006) https://doi.org/10.1364/OL.31.001044
  23. S. K. Rajput and N. K. Nishchal, "Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem," Opt. Commun. 309, 231-235 (2013). https://doi.org/10.1016/j.optcom.2013.06.036
  24. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, "A known-plaintext heuristic attack on the Fourier plane encryption algorithm," Opt. Express 14, 3181-3186 (2006). https://doi.org/10.1364/OE.14.003181
  25. K. Nakano, M. Takeda, H. Suzuki, and M. Yamaguchi, "Security analysis of phase-only DRPE based on knownplaintext attack using multiple known plaintext-ciphertext pairs," Appl. Opt. 53, 6435-6443 (2014). https://doi.org/10.1364/AO.53.006435
  26. A. Carnicer, M. Montres-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-ciphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). https://doi.org/10.1364/OL.30.001644
  27. X. Peng, H. Wei, and P. Zhang, "Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain," Opt. Lett. 31, 3261-3263 (2006). https://doi.org/10.1364/OL.31.003261
  28. L. Wang, Q. Wu, and G. Situ, "Chosen-plaintext attack on the double random polarization encryption," Opt. Express 27, 32158-32167 (2019). https://doi.org/10.1364/OE.27.032158
  29. Digital Signature Standard (DSS), Federal Information processing Standards Publication 186-4, National Institute of Standards and Technology, USA, July 2013.
  30. S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354