Title | ||
---|---|---|
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem |
Abstract | ||
---|---|---|
Recently, the chaos theory has been dealt with as a decent approach to reducing the computational complexity of a cryptographic technique while fulfilling the security necessities. In an ID-based cryptographic system where public keys are distributed to individual users, the application of chaotic maps allows users to set their network addresses or names as their individual public keys. This makes the public key cryptographic technique very user-friendly in that the public key confirmation process can be very informal and direct. In such a design, no huge public key database is required, and therefore, those security issues arising as a result of the existence of a public key database can be avoided. The aim of this article is to go deep into the possibility of transforming a chaotic-map-based cryptosystem into an ID-based technique without having to build a new framework from scratch or to do adjustment to the chaotic maps.
|
Year | DOI | Venue |
---|---|---|
2019 | 10.1007/s00500-018-3332-5 | soft computing |
Keywords | Field | DocType |
Chaotic maps, Public key cryptography, ID-based cryptography, IND-CCA, IND-sID-CCA, Random oracle model | Computer science,Cryptography,Random oracle,Theoretical computer science,Cryptosystem,ID-based cryptography,Chaotic,Public-key cryptography,Chaos theory,Computational complexity theory | Journal |
Volume | Issue | ISSN |
23 | 16 | 1433-7479 |
Citations | PageRank | References |
7 | 0.42 | 23 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chandrashekhar Meshram | 1 | 56 | 7.23 |
Chandrashekhar Meshram | 2 | 56 | 7.23 |
Cheng-Chi Lee | 3 | 121 | 5.49 |
Cheng-Chi Lee | 4 | 121 | 5.49 |
Sarita Gajbhiye Meshram | 5 | 35 | 5.50 |
Chun-Ta Li | 6 | 807 | 41.09 |