An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map

被引:0
|
作者
Tan, Tao [1 ,2 ,3 ]
Zhang, Liming [1 ,2 ,3 ]
Liu, Shuaikang [1 ,2 ,3 ]
Wang, Lei [1 ,2 ,3 ]
机构
[1] Lanzhou Jiaotong Univ, Fac Geomat, Lanzhou, Peoples R China
[2] Natl Local Joint Engn Res Ctr Technol & Applicat N, Lanzhou, Peoples R China
[3] Key Lab Sci & Technol Surveying & Mapping, Lanzhou, Peoples R China
来源
SECURITY AND PRIVACY | 2025年 / 8卷 / 01期
基金
中国国家自然科学基金;
关键词
asymmetric encryption; lossless; RSA; SHA-512; vector map; CHAOTIC SYSTEM; IMAGE; COMPRESSION;
D O I
10.1002/spy2.458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the foundation of information security, encryption technology employs encryption algorithms and keys to transform the vector map into an unrecognizable ciphertext state. Existing encryption algorithms for vector maps rely on symmetric encryption, which poses risks in key management and distribution. Secondly, most existing vector map encryption algorithms cannot encrypt point data. To address these issues, we designed a lossless asymmetric, encryption algorithm for vector maps based on the RSA public key system. Firstly, the integer part of the coordinate value in the vector map is dynamically selected to improve encryption efficiency, and RSA is used to perform asymmetric encryption on this part. Secondly, to achieve the encryption effect of one map and one ciphertext, the information from the vector map itself is used to generate the key for a two-dimensional chaotic system through the SHA-512 hash algorithm. Subsequently, a random sequence is generated through the iterative process of the chaotic system to scramble and reorganize the X and Y coordinates of the vector map. The experimental results demonstrate that the asymmetric encryption algorithm is applicable to all types of vector map data and can achieve lossless encryption and decryption. In addition, the algorithm can be applied to various types of geospatial data, such as 3D point clouds and oblique photography 3D models.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [42] COMPLEXITY-MEASURES FOR PUBLIC-KEY CRYPTOSYSTEMS
    GROLLMANN, J
    SELMAN, AL
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 309 - 335
  • [44] Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems
    Jiang, Haodong
    Han, Jiang
    Zhang, Zhenfeng
    Ma, Zhi
    Wang, Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5069 - 5081
  • [45] PUBLIC-KEY ENCRYPTION ALGORITHM INCORPORATING ERROR-DETECTION
    HARN, L
    KIESLER, T
    ELECTRONICS LETTERS, 1989, 25 (06) : 389 - 390
  • [46] Public-Key Function-Private Hidden Vector Encryption (and More)
    Bartusek, James
    Carmer, Brent
    Jain, Abhishek
    Jin, Zhengzhong
    Lepoint, Tancrede
    Ma, Fermi
    Malkin, Tal
    Malozemoff, Alex J.
    Raykova, Mariana
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 489 - 519
  • [47] Content-based image watermarking via public-key cryptosystems
    Dai, H. K.
    Yeh, C. -T.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 937 - +
  • [48] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [49] Cryptanalysis of the public-key encryption based on braid groups
    Lee, E
    Park, JH
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 477 - 490
  • [50] Authenticated public-key encryption based on elliptic curve
    Han, YL
    Yang, XY
    Hu, YP
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 424 - 431