TY - JOUR
T1 - Cascade cryptographic key-distribution protocol over a public network based on snapshot compressive ghost imaging
AU - Yu, Wen Kai
AU - Wang, Shuo Fei
AU - Shang, Ke Qian
N1 - Publisher Copyright:
© 2024 American Physical Society.
PY - 2024/7
Y1 - 2024/7
N2 - Computational ghost imaging is widely used in classical cryptographic key distribution (CKD) because its measurement and reconstruction are equivalent to the encoding and decoding of signals. Although the measurement efficiency and key-generation rate can be improved by using snapshot compressive ghost-imaging technique, it is still hard to deal with the risk of private key leakage. In this paper, we propose a cascade snapshot CKD protocol over a public network. In each round of communication, multiframe binary block diagrams embedded with cryptographic keys, Arnold transform parameters (derived from the checksum data of recovered images in the previous communication), and users' authentication information are superimposed into one image frame that is measured within a single exposure of an array detector, here the Arnold transformation is applied to randomly disrupt the previously used modulation patterns according to the above parameters, which greatly enhances the nonstealability of private keys and makes the temporary intrusion of a fake identity nowhere to hide. Both simulation and experimental results have demonstrated the feasibility of this protocol and its ability to detect illegal attacks. We believe that the introduction of the cascade idea will accelerate the practicalization process of snapshot CKD.
AB - Computational ghost imaging is widely used in classical cryptographic key distribution (CKD) because its measurement and reconstruction are equivalent to the encoding and decoding of signals. Although the measurement efficiency and key-generation rate can be improved by using snapshot compressive ghost-imaging technique, it is still hard to deal with the risk of private key leakage. In this paper, we propose a cascade snapshot CKD protocol over a public network. In each round of communication, multiframe binary block diagrams embedded with cryptographic keys, Arnold transform parameters (derived from the checksum data of recovered images in the previous communication), and users' authentication information are superimposed into one image frame that is measured within a single exposure of an array detector, here the Arnold transformation is applied to randomly disrupt the previously used modulation patterns according to the above parameters, which greatly enhances the nonstealability of private keys and makes the temporary intrusion of a fake identity nowhere to hide. Both simulation and experimental results have demonstrated the feasibility of this protocol and its ability to detect illegal attacks. We believe that the introduction of the cascade idea will accelerate the practicalization process of snapshot CKD.
UR - http://www.scopus.com/inward/record.url?scp=85198903724&partnerID=8YFLogxK
U2 - 10.1103/PhysRevApplied.22.014029
DO - 10.1103/PhysRevApplied.22.014029
M3 - Article
AN - SCOPUS:85198903724
SN - 2331-7019
VL - 22
JO - Physical Review Applied
JF - Physical Review Applied
IS - 1
M1 - 014029
ER -