One-way hash functions based on iterated chaotic systems

被引:0
|
作者
Peng, Fei [1 ]
Qiu, Shui-Sheng [2 ]
机构
[1] Hunan Univ, Coll Comp & Commun, Changsha, Hunan Province, Peoples R China
[2] South China Univ Technol, Coll Elect Informat, Guangzhou, Guangdong, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Constructions of one-way hash functions based on chaotic systems are studied where the compression function is designed with iterated chaotic systems. A general model is presented and two kinds of schemes are introduced according to different post-processing procedure. Based on the general model, we present two examples. Analysis shows that they behave fairly well. The general approach opens a novel way to design one-way hash functions.
引用
收藏
页码:1070 / +
页数:2
相关论文
共 50 条
  • [31] Hierarchical key establishment protocols based on secure keyed one-way hash functions
    Ku, WC
    Wang, SD
    TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
  • [32] An improved signature scheme without using one-way Hash functions
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 905 - 908
  • [33] How to construct universal one-way hash functions of order r
    Hong, D
    Sung, J
    Hong, S
    Lee, S
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 63 - 76
  • [34] Construction of universal one-way hash functions: Tree hashing revisited
    Sarkar, Palash
    DISCRETE APPLIED MATHEMATICS, 2007, 155 (16) : 2174 - 2180
  • [35] Authenticated key agreement without using one-way hash functions
    Harn, L
    Lin, HY
    ELECTRONICS LETTERS, 2001, 37 (10) : 629 - 630
  • [36] One-way Hash function construction based on two-dimensional hyper-chaotic mappings
    Peng, F
    Qiu, SS
    Long, M
    ACTA PHYSICA SINICA, 2005, 54 (10) : 4562 - 4568
  • [37] A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02): : 197 - 201
  • [38] A token-based software license protection framework using one-way hash functions
    Wang, LZ
    Bauer, M
    Perry, M
    EEE '05: Proceedings of the 2005 International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, 2005, : 134 - 139
  • [39] Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    Simon, DR
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 334 - 345
  • [40] ON ONE-WAY FUNCTIONS
    WATANABE, O
    COMBINATORICS, COMPUTING AND COMPLEXITY, 1989, : 98 - 131