Using the Logistic Coupled Map for Public Key Cryptography under a Distributed Dynamics Encryption Scheme
نویسندگان
چکیده
منابع مشابه
Using distributed nonlinear dynamics for public key encryption.
We introduce a new method for asymmetric (public key/private key) encryption exploiting properties of nonlinear dynamical systems. A high-dimensional dissipative nonlinear dynamical system is distributed between transmitter and receiver, so we call the method distributed dynamics encryption (DDE). The transmitter dynamics is public, and the receiver dynamics is hidden. A message is encoded by m...
متن کاملa cca2-secure incomparable public key encryption scheme
in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...
متن کاملA SAT-based Public Key Cryptography Scheme
A homomorphic public key cryptography scheme based on the Boolean Satisfiability Problem (SAT) is proposed. The public key is a SAT formula satisfied by the private key. The probabilistic encryption algorithm generates random Boolean functions, which are implied to be false by the public key. Adding the message bits to them yields the cipher functions. A variant of Blum’s Hamilton cycle zero-kn...
متن کاملThe REESSE2+ Public-key Encryption Scheme
This paper gives the definitions of an anomalous super -increasing sequence and an anomalous subset sum separately, proves the two properties of an anomalous super-increasing sequence, and proposes the REESSE2+ public-key encryption scheme which includes the three algorithms for key generation, encryption and decryption. The paper discusses the necessity and sufficiency of the lever function fo...
متن کاملAuthenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release cryptography, and show that, despite several differences in its formulation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information
سال: 2018
ISSN: 2078-2489
DOI: 10.3390/info9070160