Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/AMS/Regular/Main.js
Public-key encryption based on Chebyshev maps | IEEE Conference Publication | IEEE Xplore

Public-key encryption based on Chebyshev maps


Abstract:

We propose a public-key encryption algorithm based on Chebyshev maps, which is secure, practical, and can be used for both encryption and digital signature. Software impl...Show More

Abstract:

We propose a public-key encryption algorithm based on Chebyshev maps, which is secure, practical, and can be used for both encryption and digital signature. Software implementation and properties of the algorithm are discussed in detail.
Date of Conference: 25-28 May 2003
Date Added to IEEE Xplore: 20 June 2003
Print ISBN:0-7803-7761-3
Conference Location: Bangkok, Thailand
Citations are not available for this document.

1. INTRODUCTION

Over the past decade, there has been tremendous interest in studying the behavior of chaotic systems. They are characterized by sensitive dependence on initial conditions, similarity to random behavior, and continuous broad-band power spectrum. Chaos has potential applications in several functional blocks of a digital communication system: compression, encryption and modulation. The possibility for self-synchronization of chaotic oscillations [1] has sparkled an avalanche of works on application of chaos in cryptography. An attempt only to mention all related papers on chaos and cryptography in this short communication, will result in prohibitively long list, and therefore, we refer the reader to some recent work [2].

Cites in Papers - |

Cites in Papers - IEEE (55)

Select All
1.
Chengqing Li, Xiaoxiong Lu, Kai Tan, Guanrong Chen, "Graph Structure of Chebyshev Permutation Polynomials Over Ring ℤpk", IEEE Transactions on Information Theory, vol.71, no.2, pp.1419-1433, 2025.
2.
Aijuan Wang, Xue Ding, "Distributed Robust Privacy Preservation ICC-based Algorithm for Economic Dispatch in Smart Grids with Communication Delay via Using Chebyshev Polynomial", 2024 6th International Conference on Electronic Engineering and Informatics (EEI), pp.1843-1848, 2024.
3.
Zhao Zhang, Chunxiang Xu, Changsong Jiang, Kefei Chen, "TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy", IEEE Transactions on Dependable and Secure Computing, vol.21, no.4, pp.1515-1527, 2024.
4.
Tian-Fu Lee, Yi-Chien Huang, "Efficient Extended Chaotic Map-Based IBE for Industrial Environment", IEEE Access, vol.10, pp.71278-71283, 2022.
5.
Jiaqing Mo, Zhongwang Hu, Wei Shen, "A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network", IEEE Access, vol.10, pp.12137-12152, 2022.
6.
Shuming Qiu, Ding Wang, Guoai Xu, Saru Kumari, "Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices", IEEE Transactions on Dependable and Secure Computing, vol.19, no.2, pp.1338-1351, 2022.
7.
Xiaoxiong Lu, Chengqing Li, Kai Tan, "Network Analysis of Chebyshev Polynomial in a Fixed-precision Digital Domain", 2021 40th Chinese Control Conference (CCC), pp.8634-8638, 2021.
8.
Liping Zhang, Yue Zhu, Wei Ren, Yinghan Wang, Kim-Kwang Raymond Choo, Neal N. Xiong, "An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments", IEEE Internet of Things Journal, vol.8, no.23, pp.17120-17130, 2021.
9.
Meriske Chen, Tian-Fu Lee, "Anonymous Group-Oriented Time-Bound Key Agreement for Internet of Medical Things in Telemonitoring Using Chaotic Maps", IEEE Internet of Things Journal, vol.8, no.18, pp.13939-13949, 2021.
10.
Daisaburo Yoshioka, "Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over \mathbb Z/p^{k}\mathbb Z ", IEEE Transactions on Circuits and Systems II: Express Briefs, vol.67, no.10, pp.2204-2208, 2020.
11.
Juliano B. Lima, Ricardo M. Campello de Souza, "Tangent Function and Chebyshev-Like Rational Maps Over Finite Fields", IEEE Transactions on Circuits and Systems II: Express Briefs, vol.67, no.4, pp.775-779, 2020.
12.
Wenting Li, Ping Wang, "Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing", 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp.157-162, 2019.
13.
Daisaburo Yoshioka, "Security of Public-Key Cryptosystems Based on Chebyshev Polynomials over the Residue Ring Z/pkZ", 2018 IEEE Global Communications Conference (GLOBECOM), pp.1-4, 2018.
14.
Daisaburo Yoshioka, "Properties of Chebyshev Polynomials Modulo p^k", IEEE Transactions on Circuits and Systems II: Express Briefs, vol.65, no.3, pp.386-390, 2018.
15.
Tian-Fu Lee, "Provably Secure Anonymous Single-Sign-On Authentication Mechanisms Using Extended Chebyshev Chaotic Maps for Distributed Computer Networks", IEEE Systems Journal, vol.12, no.2, pp.1499-1505, 2018.
16.
Yi Gu, Shengqiang Li, "Security improvement on a biometrics-based authentication protocol for multi-server environment", 2017 IEEE 17th International Conference on Communication Technology (ICCT), pp.1322-1327, 2017.
17.
Sandip Roy, Santanu Chatterjee, Samiran Chattopadhyay, Amit Kumar Gupta, "A biometrics-based robust and secure user authentication protocol for e-healthcare service", 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.638-644, 2016.
18.
Daisaburo Yoshioka, Kento Kawano, "Periodic Properties of Chebyshev Polynomial Sequences Over the Residue Ring \mathbb{Z}/2^{k}\mathbb{Z}", IEEE Transactions on Circuits and Systems II: Express Briefs, vol.63, no.8, pp.778-782, 2016.
19.
Daisaburo Yoshioka, Yuta Dainobu, "Some properties of sequences generated by Chebyshev polynomials modulo 2k", 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pp.846-849, 2015.
20.
Zhang Shao-po, Chen Ying-ya, Zhao Geng, Guo Kui, "A new elliptic curve cryptosystem algorithm based on the system of chebyshev polynomial", 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, pp.350-353, 2014.
21.
Ping Zhen, Geng Zhao, Lequan Min, Xiaodong Li, "A Survey of Chaos-Based Cryptography", 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.237-244, 2014.
22.
Xianfeng Guo, Xiaomin Wang, "Cryptanalysis and improvement of a chaotic key agreement scheme", 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp.133-136, 2014.
23.
Ming-Lai Liu, Guang-Zheng Wei, Geng Zhao, Shao-Po Zhang, "Research on Elliptic Curve Cryptographic Algorithms Based on Chaotic System", 2013 International Conference on Computer Sciences and Applications, pp.77-81, 2013.
24.
Jiyun Yang, Rui Zhang, Di Xiao, "Analysis and Improvement of an Efficient and Secure Key Agreement Protocol", 2013 Ninth International Conference on Computational Intelligence and Security, pp.528-532, 2013.
25.
Guang-Zheng Wei, Geng Zhao, Ming-Lai Liu, Shao-Po Zhang, "New Research on Elliptic Curve Cryptosystem Algorithm Based on System of Chebyshev Polynomial", 2013 International Conference on Computer Sciences and Applications, pp.82-85, 2013.
26.
Wei Jun, Zheng Xu, Yu Jing, Shuai Yong, "A novel authentication scheme based on chaos", 2013 8th International Conference on Computer Science & Education, pp.879-882, 2013.
27.
Jun Wei, Yong Shuai, Jing Yu, "Cryptography with two discretized chaotic maps", 2013 8th International Conference on Computer Science & Education, pp.977-981, 2013.
28.
Chien-Lung Hsu, Tzu-Wei Lin, "Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map", 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.90-95, 2013.
29.
Jun Wei, Xu Zheng, Jing Yu, Yong Shuai, "Selection of chaotic states in cryptosystem based on chaos with differential analysis", 2012 7th International Conference on Computer Science & Education (ICCSE), pp.325-330, 2012.
30.
P. Jhansi Rani, S. Durga Bhavani, "Symmetric encryption using logistic map", 2012 1st International Conference on Recent Advances in Information Technology (RAIT), pp.1-5, 2012.

Cites in Papers - Other Publishers (33)

1.
Chunfu Zhang, Yanchun Liang, Adriano Tavares, Lidong Wang, Tiago Gomes, Sandro Pinto, "An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA", Symmetry, vol.16, no.3, pp.263, 2024.
2.
Qi Xie, Yuanyuan Zhao, "Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures", Mathematics, vol.12, no.1, pp.79, 2023.
3.
Gaurav Narula, Bhanuj Gandhi, Hitakshi Sharma, Shreya Gupta, Dharmender Saini, Preeti Nagrath, "A Novel Review on Healthcare Data Encryption Techniques", International Conference on Innovative Computing and Communications, vol.492, pp.489, 2023.
4.
Cong Wang, Xiaohang Li, Maode Ma, Tong Zhou, Guangquan Xu, Naixue Xiong, Yiying Zhang, "PSAK : A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments", Transactions on Emerging Telecommunications Technologies, 2023.
5.
Uday Kumar Banerjee, Anup Kumar Das, Rajdeep Ray, Chandan Koner, "Secure Cryptography Using Chaotic Algorithm", Novel Research and Development Approaches in Heterogeneous Systems and Algorithms, pp.191, 2023.
6.
jagpreet kaur, Ramkumar K.R., , 2022.
7.
Marcin Lawnik, Lazaros Moysis, Christos Volos, "Chaos-Based Cryptography: Text Encryption Using Image Algorithms", Electronics, vol.11, no.19, pp.3156, 2022.
8.
Zhengjun Cao, Lihua Liu, "A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials", International Journal of Bifurcation and Chaos, vol.32, no.03, 2022.
9.
Yanrong Lu, Dawei Zhao, "A Chaotic-Map-Based Password-Authenticated Key Exchange Protocol for Telecare Medicine Information Systems", Security and Communication Networks, vol.2021, pp.1, 2021.
10.
Hang Yu, Yu Zhang, Pengxing Cai, Junyan Yi, Sheng Li, Shi Wang, "Stochastic Multiple Chaotic Local Search-Incorporated Gradient-Based Optimizer", Discrete Dynamics in Nature and Society, vol.2021, pp.1, 2021.
11.
Ali Shakiba, "A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm", Multimedia Tools and Applications, vol.79, no.43-44, pp.32575, 2020.
12.
Liangsheng Hou, Jiaqi Zou, Changjiang Du, Jundong Zhang, "A fault diagnosis model of marine diesel engine cylinder based on modified genetic algorithm and multilayer perceptron", Soft Computing, 2019.
13.
Liping Zhang, He Luo, Lanchao Zhao, Yixin Zhang, "Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement", Journal of Medical Systems, vol.42, no.12, 2018.
14.
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li, "An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem", Soft Computing, 2018.
15.
Anouar Farah, Akram Belazi, "A novel chaotic Jaya algorithm for unconstrained numerical optimization", Nonlinear Dynamics, 2018.
16.
Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Muhammad Khurram Khan, Qi Jiang, S. K. Hafizul Islam, "A provably secure biometrics-based authenticated key agreement scheme for multi-server environments", Multimedia Tools and Applications, 2017.
17.
Kun Zhan, Dong Wei, Jinhui Shi, Jun Yu, "Cross-utilizing hyperchaotic and DNA sequences for image encryption", Journal of Electronic Imaging, vol.26, no.1, pp.013021, 2017.
18.
Fan Wu, Lili Xu, "A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing", Cloud Computing and Security, vol.10603, pp.189, 2017.
19.
Tian-Fu Lee, Chia-Hung Hsiao, Shi-Han Hwang, Tsung-Hung Lin, "Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps", PLOS ONE, vol.12, no.7, pp.e0181744, 2017.
20.
Chien-Ming Chen, Weicheng Fang, King-Hang Wang, Tsu-Yang Wu, "Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”", Nonlinear Dynamics, 2016.
21.
Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Hamed Arshad, Muhammad Khurram Khan, "A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps", Future Generation Computer Systems, vol.63, pp.56, 2016.
22.
Tian-Fu Lee, "Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie–Hellman assumption", Nonlinear Dynamics, vol.81, no.4, pp.2071, 2015.
23.
Shijie Yan, Ping Zhen, Lequan Min, "Provably Secure Public Key Cryptosystem Based on Chebyshev Polynomials", Journal of Communications, 2015.
24.
Tian-Fu Lee, Ching-Ying Lin, Chun-Li Lin, Tzonelih Hwang, "Provably secure extended chaotic map-based three-party key agreement protocols using password authentication", Nonlinear Dynamics, vol.82, no.1-2, pp.29, 2015.
25.
Je Sen Teh, Azman Samsudin, Mishal Al-Mazrooie, Amir Akhavan, "GPUs and chaos: a new true random number generator", Nonlinear Dynamics, vol.82, no.4, pp.1913, 2015.
26.
Ping Zhen, Geng Zhao, Lequan Min, Xiaodong Li, "Optimized Key Agreement Protocol Based on Chaotic Maps", Journal of Communications, pp.398, 2014.
27.
Igor Mishkovski, Ljupco Kocarev, Chaos-Based Cryptography, vol.354, pp.27, 2011.
28.
Lin Hua Zhang, Xiu Li Mao, Wan Yu Duan, "On Public-Key Encryption Scheme Based on Chebyshev Maps", Advanced Materials Research, vol.268-270, pp.1110, 2011.
29.
Jerzy Pejaś, Adrian Skrobek, Handbook of Information and Communication Security, pp.91, 2010.
30.
G. Alvarez, Shujun Li, "Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption", Communications in Nonlinear Science and Numerical Simulation, vol.14, no.11, pp.3743, 2009.
Contact IEEE to Subscribe

References

References is not available for this document.