Abstract

Optical communication has an increasing need for security in public transmission scenarios. Here, we present a protocol for cryptographic key distribution over a public network via a photon-counting compressive imaging system with watermarking, which utilizes a watermarking technique to distribute secure keys, and uses reconstructed images for simultaneous identity authentication and tampering identification. The watermark is embedded in the rearranged compressed measurements of the object, and then the signal is transmitted through a public network. At the receiving terminal, legitimate users can easily extract the watermark as the cryptographic key by using initial keys and the variance characteristic of random measurements. Artificial tampering and attacks can be detected by accurately retrieved images. The realization of this protocol is a step forward toward practical applications, and will be beneficial for the broader fields of optical security in many ways.

© 2019 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Protocol based on compressed sensing for high-speed authentication and cryptographic key distribution over a multiparty optical network

Wen-Kai Yu, Shen Li, Xu-Ri Yao, Xue-Feng Liu, Ling-An Wu, and Guang-Jie Zhai
Appl. Opt. 52(33) 7882-7888 (2013)

Field test of quantum key distribution in the Tokyo QKD Network

M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. F. Dynes, A. R. Dixon, A. W. Sharpe, Z. L. Yuan, A. J. Shields, S. Uchikoga, M. Legré, S. Robyr, P. Trinkler, L. Monat, J.-B. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Länger, M. Peev, and A. Zeilinger
Opt. Express 19(11) 10387-10409 (2011)

Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters

David Elkouss, Jesus Martinez-Mateo, Alex Ciurana, and Vicente Martin
J. Opt. Commun. Netw. 5(4) 316-328 (2013)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (7)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (5)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription