A New Public Key Encryption Scheme based on Layered Cellular Automata

被引:5
|
作者
Zhang, Xing [1 ,2 ]
Lu, Rongxing [2 ]
Zhang, Hong [1 ]
Xu, Chungen [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] Nanjing Univ Sci & Technol, Sch Sci, Nanjing, Jiangsu, Peoples R China
关键词
Public key encryption; reversible cellular automata; layered cellular automata; T-shaped neighborhood; provable security; CRYPTOSYSTEM;
D O I
10.3837/tiis.2014.10.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of previously reported researches focus on the symmetric key encryption schemes. Up to now, few CA based public key encryption scheme has been proposed. To fill the gap, in this paper, we propose a new public key encryption scheme based on layered cellular automata (LCA). Specifically, in the proposed scheme, based on the T-shaped neighborhood structure, we combine four one-dimensional reversible CAs (set as the private key) to form the transition rules of a two-dimension CA, where the two-dimension CA is set as the corresponding public key. Based on the hardness assumption of the Decisional Dependent CA problem in LCA, we formally prove the proposed scheme is indistinguishably secure against the chosen-plaintext attack (IND-CPA). In addition, we also use a numeric example to demonstrate its feasibility. Finally, analysis of key space and time efficiency are also carried out along with RSA-1024, and the simulation results demonstrate that our proposed scheme is more efficient.
引用
收藏
页码:3572 / 3590
页数:19
相关论文
共 50 条
  • [31] An authenticated image encryption scheme based on chaotic maps and memory cellular automata
    Bakhshandeh, Atieh
    Eslami, Ziba
    OPTICS AND LASERS IN ENGINEERING, 2013, 51 (06) : 665 - 673
  • [32] Encryption based on reversible cellular automata
    Zhang, CW
    Peng, QC
    Li, YB
    2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 1223 - 1226
  • [33] Encryption based on reversible cellular automata
    Ping, Ping
    Zhou, Yao
    Zhang, Hong
    Liu, Feng-Yu
    Tongxin Xuebao/Journal on Communications, 2008, 29 (05): : 26 - 33
  • [34] A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
    Hwang, Min-Shiang
    Hsu, Shih-Ting
    Lee, Cheng-Chi
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 277 - 288
  • [35] Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
    Albrecht, Martin R.
    Faugere, Jean-Charles
    Fitzpatrick, Robert
    Perret, Ludovic
    Todo, Yosuke
    Xagawa, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 446 - 464
  • [36] A new ID-based multi-recipient public-key encryption scheme
    Pang, L. (ljpang@mail.xidian.edu.cn), 1600, Chinese Institute of Electronics (22):
  • [37] A New ID-based Multi-Recipient Public-key Encryption Scheme
    Pang Liaojun
    Gao Lu
    Pei Qingqi
    Gui Jingjing
    Wang Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 89 - 92
  • [38] A Novel Symmetric Key Encryption Technique using Cellular Automata
    Parashar, Deepika
    Roy, Satyabrata
    Jain, Vipin
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 174 - 178
  • [39] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    Wuhan University Journal of Natural Sciences, 2012, 17 (03) : 223 - 228
  • [40] Evolution of the McEliece Public Key Encryption Scheme
    Bucerzan, Dominic
    Dragoi, Vlad
    Kalachi, Herve Tale
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 129 - 149