Optical secret sharing with cascaded metasurface holography

10/07/2021
by   Philip Georgi, et al.
0

Secret sharing is a well-established cryptographic primitive for storing highly sensitive information like encryption keys for encoded data. It describes the problem of splitting a secret into different shares, without revealing any information about the secret to its shareholders. Here, we demonstrate an all-optical solution for secret sharing based on metasurface holography. In our concept, metasurface holograms are used as spatially separable shares that carry an encrypted message in form of a holographic image. Two of these shares can be recombined by bringing them close together. Light passing through this stack of metasurfaces accumulates the phase shift of both holograms and can optically reconstruct the secret with high fidelity. On the other hand, the holograms generated by the single metasurfaces can be used for identifying each shareholder. Furthermore, we demonstrate that the inherent translational alignment sensitivity between the two stacked metasurface holograms can be used for spatial multiplexing, which can be further extended to realize optical rulers.

READ FULL TEXT

page 4

page 12

page 13

page 14

page 15

page 18

page 22

page 23

research
10/26/2017

High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key

The rising need of secret image sharing with high security has led to mu...
research
01/11/2018

Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver

The secret sharing schemes are the important tools in cryptography that ...
research
06/21/2023

A new color image secret sharing protocol

Visual cryptography aims to protect images against their possible illegi...
research
01/22/2021

Short Secret Sharing Using Repeatable Random Sequence Generators

We present a new secret sharing algorithm that provides the storage effi...
research
01/26/2022

Speckle-based optical cryptosystem and its application for human face recognition via deep learning

Face recognition has recently become ubiquitous in many scenes for authe...
research
09/29/2018

A Randomized Kernel-Based Secret Image Sharing Scheme

This paper proposes a (k,n)-threshold secret image sharing scheme that o...
research
07/19/2023

Reduction of the secret key length in the perfect cipher by data compression and randomisation

Perfect ciphers have been a very attractive cryptographic tool ever sinc...

Please sign up or login with your details

Forgot password? Click here to reset