Using Chaotic Maps to Construct Anonymous Multi-receiver Scheme Based on BAN Logic
نویسندگان
چکیده
Multi-receiver public key encryption is an essential cryptography paradigm, which enables flexible, on-demand, and low computing to transmit one message securely among the users by the to form over an insecure network. In this paper, we propose a novel Chaotic Maps-based Multi-Receiver scheme, named CMMR, aiming to require one ciphertext with non-interactive process for achieve authentication and the message transmission secretly. Compared with Multi-receiver Identity-Based Encryption (MRIBE), our proposed scheme mainly owns three merits: (1) One is to eliminate the private key generators (PKG) in one domain or multi-domain, in other words, our scheme will be highly decentralized and aim to capture distributed. Our goals are to minimize the hazards of single-point of security, single-point of efficiency and single-point of failure about the PKG. (2) The other is that our scheme is based on chaotic maps, which is a high efficient cryptosystem and is firstly used to construct multi-receiver public key encryption. (3) The last merit is the most important: Unlike bilinear pairs cryptosystem that need many redundant algorithms to get anonymity, while our scheme can acquire privacy protection easily. Next, a novel idea of our CMMR scheme is to adopt chaotic maps for mutual authentication and privacy protection, not to encrypt/decrypt messages transferred between the sender and the receivers, which can make our proposed scheme much more efficient. Finally, we give the formal security proof about our scheme in the standard model and efficiency comparison with recently related works.
منابع مشابه
A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection
Multi-receiver encryption is an essential cryptography paradigm, which can transmit one message securely among the users by the to form over an insecure network. In this paper, we propose a novel Multi-Receiver scheme using Chaotic Maps, named MRCM, aiming to require one ciphertext with non-interactive process for achieve authentication and the message transmission secretly. Our scheme eliminat...
متن کاملLatency Compensation in Multi Chaotic Systems Using the Extended OGY Control Method
The problem discussed in this paper is the effect of latency time on the OGY chaos control methodology in multi chaotic systems. The Smith predictor, rhythmic and memory strategies are embedded in the OGY chaos control method to encounter loop latency. A comparison study is provided and the advantages of the Smith predictor approach are clearly evident from the closed loop responses. The comple...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملAn Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. release...
متن کاملProvably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography
Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount. So, the paper will wipe out the symmetric cryptography, and only use chaotic maps, a secure one-way hash function to construct a provable privacy-protection system (PPS) which can achieve two kinds of privacyprotection a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016