Secret sharing is an advanced encryption method that distributes the secret information into multiple participants and only the predesigned subsets of authorized participants can recover the secret by gathering their independent subinformation. Herein, the security level of secret sharing using electromagnetic manners is further expanded and a simple platform for the realization and direct observation of secret sharing encryption using metasurface hologram is presented. As a proof of concept, a polarization‐assisted secret sharing phase encoding method by integrating visual secret sharing scheme with phase encoding technology using orthogonally polarization‐multiplexing metasurface is experimentally presented. The method achieves its encryp...
Visual cryptography was introduced by Naor and Shamir as a way to allow fast visual sharing of grap...
Metasurface provides subwavelength structures for manipulating wavefronts of light. The benefits of ...
We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypt...
Multi-channel information encryption technology has been implemented by optical metasurfaces owing t...
Multi-channel information encryption technology has been implemented by optical metasurfaces owing t...
Metasurface-driven optical encryption devices have attracted much attention. Here, we propose a dual...
The outstanding ability of optical metasurfaces to tailor light's amplitude, phase, and polarization...
Image Information, Restoration and Encryption (FTuT, Frontiers in Optics (FiO), Tucson, Arizona, Oct...
International audienceWe propose and analyze a dual encryption/decryption scheme, motivated by recen...
International audienceWe propose and analyze a dual encryption/decryption scheme, motivated by recen...
International audienceWe propose and analyze a dual encryption/decryption scheme, motivated by recen...
As one of the cutting-edge technologies in advanced information science, wave-based cryptography is ...
Information encryption and security is a prerequisite for information technology, which can be reali...
Information encryption and security is a prerequisite for information technology, which can be reali...
As a high-degree-of-freedom approach to manipulate the electromagnetic wave, metasurfaces are widely...
Visual cryptography was introduced by Naor and Shamir as a way to allow fast visual sharing of grap...
Metasurface provides subwavelength structures for manipulating wavefronts of light. The benefits of ...
We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypt...
Multi-channel information encryption technology has been implemented by optical metasurfaces owing t...
Multi-channel information encryption technology has been implemented by optical metasurfaces owing t...
Metasurface-driven optical encryption devices have attracted much attention. Here, we propose a dual...
The outstanding ability of optical metasurfaces to tailor light's amplitude, phase, and polarization...
Image Information, Restoration and Encryption (FTuT, Frontiers in Optics (FiO), Tucson, Arizona, Oct...
International audienceWe propose and analyze a dual encryption/decryption scheme, motivated by recen...
International audienceWe propose and analyze a dual encryption/decryption scheme, motivated by recen...
International audienceWe propose and analyze a dual encryption/decryption scheme, motivated by recen...
As one of the cutting-edge technologies in advanced information science, wave-based cryptography is ...
Information encryption and security is a prerequisite for information technology, which can be reali...
Information encryption and security is a prerequisite for information technology, which can be reali...
As a high-degree-of-freedom approach to manipulate the electromagnetic wave, metasurfaces are widely...
Visual cryptography was introduced by Naor and Shamir as a way to allow fast visual sharing of grap...
Metasurface provides subwavelength structures for manipulating wavefronts of light. The benefits of ...
We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypt...