A New Public Key Encryption Scheme based on Layered Cellular Automata

被引:5
|
作者
Zhang, Xing [1 ,2 ]
Lu, Rongxing [2 ]
Zhang, Hong [1 ]
Xu, Chungen [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] Nanjing Univ Sci & Technol, Sch Sci, Nanjing, Jiangsu, Peoples R China
关键词
Public key encryption; reversible cellular automata; layered cellular automata; T-shaped neighborhood; provable security; CRYPTOSYSTEM;
D O I
10.3837/tiis.2014.10.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of previously reported researches focus on the symmetric key encryption schemes. Up to now, few CA based public key encryption scheme has been proposed. To fill the gap, in this paper, we propose a new public key encryption scheme based on layered cellular automata (LCA). Specifically, in the proposed scheme, based on the T-shaped neighborhood structure, we combine four one-dimensional reversible CAs (set as the private key) to form the transition rules of a two-dimension CA, where the two-dimension CA is set as the corresponding public key. Based on the hardness assumption of the Decisional Dependent CA problem in LCA, we formally prove the proposed scheme is indistinguishably secure against the chosen-plaintext attack (IND-CPA). In addition, we also use a numeric example to demonstrate its feasibility. Finally, analysis of key space and time efficiency are also carried out along with RSA-1024, and the simulation results demonstrate that our proposed scheme is more efficient.
引用
收藏
页码:3572 / 3590
页数:19
相关论文
共 50 条
  • [21] A New Self-Generated-Certificate Public Key Encryption Scheme with Flexible Public Key
    Zhao Yanhui
    Xu Maozhi
    Shen Xunxun
    CHINA COMMUNICATIONS, 2011, 8 (02) : 12 - 20
  • [22] Multiplier for public-key cryptosystem based on cellular automata
    Kim, HS
    Hwang, SH
    COMPUTER NETWORK SECURITY, 2003, 2776 : 436 - 439
  • [23] Cellular automata based multiplier for public-key cryptosystem
    Kim, HS
    Yoo, KY
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 227 - 236
  • [24] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [25] Security on public key encryption scheme based on ergodic matrices
    School of Computer Engineering, Jiangsu University of Technology, Changzhou
    Jiangsu
    213001, China
    不详
    Anhui
    230027, China
    不详
    Jiangsu
    210003, China
    Tien Tzu Hsueh Pao, 10 (2081-2085):
  • [26] A public key encryption scheme based on the polynomial reconstruction problem
    Augot, D
    Finiasz, M
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 229 - 240
  • [27] A public key encryption scheme based on factoring and discrete logarithm
    Poulakis, Dimitrios
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06): : 745 - 752
  • [28] LCASE: Lightweight cellular automata-based symmetric-key encryption
    Tripathy, Somanath
    Nandi, Sukumar
    International Journal of Network Security, 2009, 8 (03) : 243 - 252
  • [29] Image Encryption Scheme Based on Balanced Two-Dimensional Cellular Automata
    Zhang, Xiaoyan
    Wang, Chao
    Zhong, Sheng
    Yao, Qian
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [30] Reversible cellular automata based encryption
    Seredynski, M
    Pienkosz, K
    Bouvry, P
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2004, 3222 : 411 - 418