A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography
نویسندگان
چکیده
Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function. The privacy of using chaos cryptography mostly relies on one of or the combination of three mechanisms: (1) Universal construction symmetric cryptography; (2) Efficient type multiplication in finite field; (3) Prudent operation XORed. This paper introduces four efficient generic methods based on three mechanisms for protecting privacy. Our four methods firstly achieve encrypted messages with mutual authentication in one-way flow. In addition, we discuss some methods about using more than two of the methods to form hybrid cases. Finally, implementation analysis, formal proof and efficiency comparison are provided to show that these mechanisms are practical, secure, and privacy preserving.
منابع مشابه
Privacy-Preserving Distributed Data Mining Techniques: A Survey
In various distributed data mining settings, leakage of the real data is not adequate because of privacy issues. To overcome this problem, numerous privacy-preserving distributed data mining practices have been suggested such as protect privacy of their data by perturbing it with a randomization algorithm and using cryptographic techniques. In this paper, we review and provide extensive survey ...
متن کاملSecure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. Many chaotic maps based two-party/three-party password authenticated key agreement (2PAKA/3PAKA) schemes have been proposed. Howe...
متن کاملA Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID
An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic ...
متن کاملA Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present a privacy-preserving protocol for the Belgian healthcare system. The proposed protocol protects the patients’ privacy throughout the prescription handling process, while complying with most aspects of the current Belg...
متن کاملSecurity for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2018