Corpus ID: 8371864

A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography

@article{Zhu2018AST,
  title={A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography},
  author={Hongfeng Zhu and Rui Wang},
  journal={Int. J. Netw. Secur.},
  year={2018},
  volume={20},
  pages={313-322}
}
  • Hongfeng Zhu, Rui Wang
  • Published 2018
  • Computer Science
  • Int. J. Netw. Secur.
Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function. The privacy of using chaos cryptography mostly relies on one of or the combination of three mechanisms: (1) Universal construction symmetric cryptography; (2) Efficient type multiplication in finite field; (3) Prudent operation XORed. This paper introduces four efficient generic methods based on three mechanisms for protecting… Expand
Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
Implementation, Performance and Security Analysis for CryptoBin Algorithm

References

SHOWING 1-10 OF 41 REFERENCES
A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection
An improved key agreement protocol based on chaos
Chaotic maps-based three-party password-authenticated key agreement scheme
Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps
Security of public-key cryptosystems based on Chebyshev polynomials
...
1
2
3
4
5
...