An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map

被引:0
|
作者
Tan, Tao [1 ,2 ,3 ]
Zhang, Liming [1 ,2 ,3 ]
Liu, Shuaikang [1 ,2 ,3 ]
Wang, Lei [1 ,2 ,3 ]
机构
[1] Lanzhou Jiaotong Univ, Fac Geomat, Lanzhou, Peoples R China
[2] Natl Local Joint Engn Res Ctr Technol & Applicat N, Lanzhou, Peoples R China
[3] Key Lab Sci & Technol Surveying & Mapping, Lanzhou, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
asymmetric encryption; lossless; RSA; SHA-512; vector map; CHAOTIC SYSTEM; IMAGE; COMPRESSION;
D O I
10.1002/spy2.458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the foundation of information security, encryption technology employs encryption algorithms and keys to transform the vector map into an unrecognizable ciphertext state. Existing encryption algorithms for vector maps rely on symmetric encryption, which poses risks in key management and distribution. Secondly, most existing vector map encryption algorithms cannot encrypt point data. To address these issues, we designed a lossless asymmetric, encryption algorithm for vector maps based on the RSA public key system. Firstly, the integer part of the coordinate value in the vector map is dynamically selected to improve encryption efficiency, and RSA is used to perform asymmetric encryption on this part. Secondly, to achieve the encryption effect of one map and one ciphertext, the information from the vector map itself is used to generate the key for a two-dimensional chaotic system through the SHA-512 hash algorithm. Subsequently, a random sequence is generated through the iterative process of the chaotic system to scramble and reorganize the X and Y coordinates of the vector map. The experimental results demonstrate that the asymmetric encryption algorithm is applicable to all types of vector map data and can achieve lossless encryption and decryption. In addition, the algorithm can be applied to various types of geospatial data, such as 3D point clouds and oblique photography 3D models.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] An efficient Montgomery exponentiation algorithm for public-key cryptosystems
    Wu, Chia-Long
    Lou, Der-Chyuan
    Chang, Te-Jen
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 284 - +
  • [2] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM
    李大兴
    张泽增
    Science Bulletin, 1991, (10) : 873 - 876
  • [3] Public-key cryptosystems based on cubic curves
    Koyama, Kenji
    Kuwakado, Hidenori
    Tsuruoka, Yukio
    NTT R and D, 1995, 44 (10): : 91 - 98
  • [4] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM
    LI, DX
    ZHANG, ZZ
    CHINESE SCIENCE BULLETIN, 1991, 36 (10): : 873 - 876
  • [5] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [6] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [7] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [8] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [9] Public-key encryption based on generalized synchronization of coupled map lattices
    Wang, XG
    Gong, XF
    Zhan, M
    Lai, CH
    CHAOS, 2005, 15 (02)
  • [10] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55