Optical secret sharing with cascaded metasurface holography

10/07/2021
by   Philip Georgi, et al.
0

Secret sharing is a well-established cryptographic primitive for storing highly sensitive information like encryption keys for encoded data. It describes the problem of splitting a secret into different shares, without revealing any information about the secret to its shareholders. Here, we demonstrate an all-optical solution for secret sharing based on metasurface holography. In our concept, metasurface holograms are used as spatially separable shares that carry an encrypted message in form of a holographic image. Two of these shares can be recombined by bringing them close together. Light passing through this stack of metasurfaces accumulates the phase shift of both holograms and can optically reconstruct the secret with high fidelity. On the other hand, the holograms generated by the single metasurfaces can be used for identifying each shareholder. Furthermore, we demonstrate that the inherent translational alignment sensitivity between the two stacked metasurface holograms can be used for spatial multiplexing, which can be further extended to realize optical rulers.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 4

page 12

page 13

page 14

page 15

page 18

page 22

page 23

10/26/2017

High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key

The rising need of secret image sharing with high security has led to mu...
01/22/2021

Short Secret Sharing Using Repeatable Random Sequence Generators

We present a new secret sharing algorithm that provides the storage effi...
01/09/2019

Overview of Blakley's Secret Sharing Scheme

In this report, I explained the problem of Secret Sharing Scheme. Then b...
09/25/2020

A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem

Reversible data hiding in encrypted domain (RDH-ED) schemes based on sym...
01/26/2022

Speckle-based optical cryptosystem and its application for human face recognition via deep learning

Face recognition has recently become ubiquitous in many scenes for authe...
12/29/2017

Secret Sharing for Cloud Data Security

Cloud computing helps reduce costs, increase business agility and deploy...
11/03/2020

A novel group based cryptosystem based on electromagnetic rotor machine

In this paper, an algorithm is aimed to make a cryptosystem for gray lev...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.