Cheng et al., 2022 - Google Patents
Novel One‐Dimensional Chaotic System and Its Application in Image EncryptionCheng et al., 2022
View HTML- Document ID
- 564753777218830753
- Author
- Cheng Z
- Wang W
- Dai Y
- Li L
- Publication year
- Publication venue
- Complexity
External Links
Snippet
Designing a chaotic system with a simple structure and complex dynamic behavior is one of the main tasks of chaotic cryptography. This paper designs a new 1D chaotic system called 1D two‐parameters‐sin‐cos (1D‐TPSC). Compared with high‐dimensional chaotic systems …
- 230000000739 chaotic 0 title abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zheng et al. | Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map | |
Tang et al. | Image encryption with double spiral scans and chaotic maps | |
Kumar et al. | A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm | |
Herbadji et al. | Colour image encryption scheme based on enhanced quadratic chaotic map | |
Norouzi et al. | A fast color image encryption algorithm based on hyper-chaotic systems | |
Ye et al. | An effective framework for chaotic image encryption based on 3D logistic map | |
Lone et al. | A novel image encryption using random matrix affine cipher and the chaotic maps | |
Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
Koppu et al. | A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform | |
Kengnou Telem et al. | A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network | |
Li et al. | A new image encryption algorithm based on optimized Lorenz chaotic system | |
Attaullah et al. | Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption | |
Nkandeu et al. | Image encryption algorithm based on synchronized parallel diffusion and new combinations of 1D discrete maps | |
Fang et al. | A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding | |
Cheng et al. | Novel One‐Dimensional Chaotic System and Its Application in Image Encryption | |
Zheng et al. | An image encryption algorithm based on multichaotic system and DNA coding | |
Signing et al. | Dynamic phenomena of a financial hyperchaotic system and DNA sequences for image encryption | |
Jia | Image encryption with cross colour field algorithm and improved cascade chaos systems | |
Abdul-Kareem et al. | An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain | |
Raghuvanshi et al. | A data encryption model based on intertwining logistic map | |
Gao et al. | An Image Encryption Algorithm Based on the Improved Sine‐Tent Map | |
Gao et al. | New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem | |
Cheng et al. | A High‐Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy | |
Zhang et al. | An efficient image encryption algorithm based on S-box and DNA code | |
Murillo-Escobar et al. | A chaotic encryption algorithm for image privacy based on two pseudorandomly enhanced logistic maps |