A Novel Public Key Encryption Scheme For Large Image

被引:0
|
作者
Chen, Lingjiao [1 ]
Chen, Xinji [2 ]
Peng, Zhigang [1 ]
机构
[1] Southeast Univ, Chien Shiung Wu Honors Coll, Nanjing, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Elect Engn, Nanjing, Jiangsu, Peoples R China
关键词
Image encryption; Cryptography; Public key; Elliptic curve; IMPROVED HYPERCHAOTIC SEQUENCES; CHAOTIC MAP; ALGORITHM; GENERATOR;
D O I
10.1109/TrustCom.2014.126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel public key encryption scheme for large image is presented based on elliptic curve. As a public key encryption scheme, it does not need to exchange and distribute secret keys. Based on elliptic curve discrete logarithm problem (ECDLP), the scheme has high security. The simulation results show that the presented scheme is computationally less complex than ECC(Elliptic Curve Cryptography) and suitable for large image encryption.
引用
收藏
页码:955 / 960
页数:6
相关论文
共 50 条
  • [21] ZHFE, a New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 229 - 245
  • [22] Traceable Scheme of Public Key Encryption with Equality Test
    Zhu, Huijun
    Xue, Qingji
    Li, Tianfeng
    Xie, Dong
    ENTROPY, 2022, 24 (03)
  • [23] A Fully Homomorphic Encryption Scheme With a Smaller Public Key
    Zhang, Shaomin
    Li, Kaiqiang
    Wang, Baoyi
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 762 - 767
  • [24] A Multivariate Public Key Encryption Scheme With Equality Test
    Shen, Xiaoying
    Wang, Licheng
    Zhu, Huijun
    Liu, Yuan
    IEEE ACCESS, 2020, 8 : 75463 - 75472
  • [25] A Public Key Encryption Scheme Based on Idempotent Semirings
    Durcheva, Mariana
    Rachev, Martin
    41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690
  • [26] ZHFE, A New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 229 - 245
  • [27] Quantum Resistant Public Key Encryption Scheme HermitianRLCE
    Matthews, Gretchen L.
    Wang, Yongge
    CODE-BASED CRYPTOGRAPHY, CBC 2019, 2019, 11666 : 1 - 10
  • [28] A Public Key Encryption Scheme Based on Compressed Sensing
    Zhen, Liu
    2017 9TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT 2017), 2017, : 20 - 24
  • [29] An image encryption scheme employing key related skipping
    Oravec, Jakub
    Turan, Jan
    Ovsenik, L'ubos
    Huszanik, Tomas
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2018, 69 (02): : 93 - 105
  • [30] Author Correction: An image encryption scheme based on public key cryptosystem and quantum logistic map
    Guodong Ye
    Kaixin Jiao
    Xiaoling Huang
    Bok‑Min Goi
    Wun‑She Yap
    Scientific Reports, 11