A Novel Public Key Encryption Scheme For Large Image

被引:0
|
作者
Chen, Lingjiao [1 ]
Chen, Xinji [2 ]
Peng, Zhigang [1 ]
机构
[1] Southeast Univ, Chien Shiung Wu Honors Coll, Nanjing, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Elect Engn, Nanjing, Jiangsu, Peoples R China
关键词
Image encryption; Cryptography; Public key; Elliptic curve; IMPROVED HYPERCHAOTIC SEQUENCES; CHAOTIC MAP; ALGORITHM; GENERATOR;
D O I
10.1109/TrustCom.2014.126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel public key encryption scheme for large image is presented based on elliptic curve. As a public key encryption scheme, it does not need to exchange and distribute secret keys. Based on elliptic curve discrete logarithm problem (ECDLP), the scheme has high security. The simulation results show that the presented scheme is computationally less complex than ECC(Elliptic Curve Cryptography) and suitable for large image encryption.
引用
收藏
页码:955 / 960
页数:6
相关论文
共 50 条
  • [41] A public key encryption scheme based on factoring and discrete logarithm
    Poulakis, Dimitrios
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06): : 745 - 752
  • [42] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [43] A Certificateless Searchable Public Key Encryption Scheme for Multiple Receivers
    Gu, Xiaozhuo
    Wang, Ziliang
    Fu, Maomao
    Ren, Peixin
    2021 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2021, 2021, : 635 - 641
  • [44] Sender-Side Public Key Deniable Encryption Scheme
    Howlader, Jaydeep
    Basu, Saikat
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 9 - 13
  • [45] AN M3 PUBLIC-KEY ENCRYPTION SCHEME
    WILLIAMS, HC
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 358 - 368
  • [46] Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices
    Rasslan, Mohamed
    Youssef, Amr
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 853 - 854
  • [47] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    Journal of Cryptology, 2007, 20 : 265 - 294
  • [48] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [49] CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key
    Duong, Dung Hoang
    Petzoldt, Albrecht
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12): : 2691 - 2698
  • [50] Searchable Public Key Encryption Scheme with Data Integrity Checking
    JunYang
    Li, Shujuan
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 363 - 370