An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map

被引:0
|
作者
Tan, Tao [1 ,2 ,3 ]
Zhang, Liming [1 ,2 ,3 ]
Liu, Shuaikang [1 ,2 ,3 ]
Wang, Lei [1 ,2 ,3 ]
机构
[1] Lanzhou Jiaotong Univ, Fac Geomat, Lanzhou, Peoples R China
[2] Natl Local Joint Engn Res Ctr Technol & Applicat N, Lanzhou, Peoples R China
[3] Key Lab Sci & Technol Surveying & Mapping, Lanzhou, Peoples R China
来源
SECURITY AND PRIVACY | 2025年 / 8卷 / 01期
基金
中国国家自然科学基金;
关键词
asymmetric encryption; lossless; RSA; SHA-512; vector map; CHAOTIC SYSTEM; IMAGE; COMPRESSION;
D O I
10.1002/spy2.458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the foundation of information security, encryption technology employs encryption algorithms and keys to transform the vector map into an unrecognizable ciphertext state. Existing encryption algorithms for vector maps rely on symmetric encryption, which poses risks in key management and distribution. Secondly, most existing vector map encryption algorithms cannot encrypt point data. To address these issues, we designed a lossless asymmetric, encryption algorithm for vector maps based on the RSA public key system. Firstly, the integer part of the coordinate value in the vector map is dynamically selected to improve encryption efficiency, and RSA is used to perform asymmetric encryption on this part. Secondly, to achieve the encryption effect of one map and one ciphertext, the information from the vector map itself is used to generate the key for a two-dimensional chaotic system through the SHA-512 hash algorithm. Subsequently, a random sequence is generated through the iterative process of the chaotic system to scramble and reorganize the X and Y coordinates of the vector map. The experimental results demonstrate that the asymmetric encryption algorithm is applicable to all types of vector map data and can achieve lossless encryption and decryption. In addition, the algorithm can be applied to various types of geospatial data, such as 3D point clouds and oblique photography 3D models.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Lattice-based public-key cryptosystems and security analysis
    Huang, Qiong
    Zhao, Yiming
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (10): : 60 - 62
  • [32] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [33] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [34] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    New Generation Computing, 2005, 23 : 259 - 275
  • [35] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [36] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [37] Human Public-Key Encryption
    Ferradi, Houda
    Geraud, Remi
    Naccache, David
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 494 - 505
  • [38] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [39] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    CHAOS, 2004, 14 (04) : 1078 - 1082
  • [40] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &