On Public-key Encryption Scheme Based on Chebyshev Maps

被引:0
|
作者
Zhang, Linhua [1 ]
Mao, Xiuli [1 ]
Duan, Wanyu [1 ]
机构
[1] Chongqing Normal Univ, Coll Math, Chongqing 400047, Peoples R China
来源
关键词
Chaos; Public-key cryptosystem; Chebyshev polynomials;
D O I
10.4028/www.scientific.net/AMR.268-270.1110
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Due to the exceptionally desirable properties, Chebyshev polynomials have been recently proposed for designing public key cryptosystems. However, some proposed schemes were pointed out to be insecure and unpractical. In this paper, we analyze their defects, discretize the Chebyshev maps, generalize properties of Chebyshev polynomials and design an improved scheme. Theoretical analysis shows that it possesses higher security than RSA and experimental results shows it can be implemented easily.
引用
收藏
页码:1110 / 1114
页数:5
相关论文
共 50 条
  • [31] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [32] Human Public-Key Encryption
    Ferradi, Houda
    Geraud, Remi
    Naccache, David
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 494 - 505
  • [33] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [34] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    [J]. CHAOS, 2004, 14 (04) : 1078 - 1082
  • [35] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    [J]. DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [36] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [37] A new ID-based multi-recipient public-key encryption scheme
    [J]. Pang, L. (ljpang@mail.xidian.edu.cn), 1600, Chinese Institute of Electronics (22):
  • [38] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    [J]. Int. Conf. Comput. Intell. Secur. ICCIAS, 2006, (1327-1330):
  • [39] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 443 - +
  • [40] A New ID-based Multi-Recipient Public-key Encryption Scheme
    Pang Liaojun
    Gao Lu
    Pei Qingqi
    Gui Jingjing
    Wang Yumin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01) : 89 - 92