{"title":"基于单次曝光压缩鬼成像的联合认证公共网络加密密钥分配协议","authors":"Wen-Kai Yu, Shuo-Fei Wang, Ke-Qian Shang","doi":"10.1088/0256-307x/41/2/024201","DOIUrl":null,"url":null,"abstract":"\n In the existing ghost-imaging-based cryptographic key distribution (GCKD) protocols, the cryptographic keys need to be encoded by using many modulated patterns, which undoubtedly incurs long measurement time and huge memory consumption. Given this, based on snapshot compressive ghost imaging, a public network cryptographic key distribution protocol is proposed, where the cryptographic keys and joint authentication information are encrypted into several color block diagrams to guarantee security. It transforms the previous single-pixel sequential multiple measurements into multi-pixel single exposure measurements, significantly reducing sampling time and memory storage. Both simulation and experimental results have demonstrated the feasibility of this protocol and its ability to detect illegal attacks. Therefore, it takes GCKD a big step closer to practical applications.","PeriodicalId":505209,"journal":{"name":"Chinese Physics Letters","volume":" 15","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Joint authentication public network cryptographic key distribution protocol based on single exposure compressive ghost imaging\",\"authors\":\"Wen-Kai Yu, Shuo-Fei Wang, Ke-Qian Shang\",\"doi\":\"10.1088/0256-307x/41/2/024201\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n In the existing ghost-imaging-based cryptographic key distribution (GCKD) protocols, the cryptographic keys need to be encoded by using many modulated patterns, which undoubtedly incurs long measurement time and huge memory consumption. Given this, based on snapshot compressive ghost imaging, a public network cryptographic key distribution protocol is proposed, where the cryptographic keys and joint authentication information are encrypted into several color block diagrams to guarantee security. It transforms the previous single-pixel sequential multiple measurements into multi-pixel single exposure measurements, significantly reducing sampling time and memory storage. Both simulation and experimental results have demonstrated the feasibility of this protocol and its ability to detect illegal attacks. Therefore, it takes GCKD a big step closer to practical applications.\",\"PeriodicalId\":505209,\"journal\":{\"name\":\"Chinese Physics Letters\",\"volume\":\" 15\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Chinese Physics Letters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1088/0256-307x/41/2/024201\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Chinese Physics Letters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/0256-307x/41/2/024201","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Joint authentication public network cryptographic key distribution protocol based on single exposure compressive ghost imaging
In the existing ghost-imaging-based cryptographic key distribution (GCKD) protocols, the cryptographic keys need to be encoded by using many modulated patterns, which undoubtedly incurs long measurement time and huge memory consumption. Given this, based on snapshot compressive ghost imaging, a public network cryptographic key distribution protocol is proposed, where the cryptographic keys and joint authentication information are encrypted into several color block diagrams to guarantee security. It transforms the previous single-pixel sequential multiple measurements into multi-pixel single exposure measurements, significantly reducing sampling time and memory storage. Both simulation and experimental results have demonstrated the feasibility of this protocol and its ability to detect illegal attacks. Therefore, it takes GCKD a big step closer to practical applications.