A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of...A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of this communication system is significantly improved compared to that of the either method. At the same time, a new method of chaotic synchronization is proposed. With a small mixed discrete chaotic signal, it is quickly to synchronize the communication and a good security performance is ensured.展开更多
In wireless body sensor network(WBSN),the set of electrocardiogram(ECG)data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient.While tra...In wireless body sensor network(WBSN),the set of electrocardiogram(ECG)data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient.While transmit-ting these collected data some adversaries may capture and misuse it due to the compromise of security.So,the major aim of this work is to enhance secure trans-mission of ECG signal in WBSN.To attain this goal,we present Pity Beetle Swarm Optimization Algorithm(PBOA)based Elliptic Galois Cryptography(EGC)with Chaotic Neural Network.To optimize the key generation process in Elliptic Curve Cryptography(ECC)over Galoisfield or EGC,private key is chosen optimally using PBOA algorithm.Then the encryption process is enhanced by presenting chaotic neural network which is used to generate chaotic sequences or cipher data.Results of this work show that the proposed cryptogra-phy algorithm attains better encryption time,decryption time,throughput and SNR than the conventional cryptography algorithms.展开更多
Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite ...Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite field Ze, Algehawi and Samsudin presented recently an Identity Based Encryption (IBE) scheme. In this paper, we showed their proposal is not as secure as they chimed. More specifically, we presented a concrete attack on the scheme of Algehawi and Samsudin, which indicated the scheme cannot be consolidated as a real altemative of IBE schemes since one can exploit the semi group property (bilinearity) of extended Chebyshev polynomials over Zp to implement the attack without any difficulty.展开更多
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp...A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.展开更多
The idea of using a one-time-one-key design has been widely applied in conventional cryptography. With the security theory of conventional cryptology, encryption algorithms are made public while all the secrets are en...The idea of using a one-time-one-key design has been widely applied in conventional cryptography. With the security theory of conventional cryptology, encryption algorithms are made public while all the secrets are encoded only in the keys. This paper applies chaos theory to conventional cryptography to develop a one-time-one-algorithm design. A general theory is given to generate the clock key, substitution box, permutation box and operational sign functions for a one-time-one-algorithm scheme. This scheme is then implemented in a system to manage the tradeoff between speed and the security of the encryption algorithm.展开更多
文摘A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of this communication system is significantly improved compared to that of the either method. At the same time, a new method of chaotic synchronization is proposed. With a small mixed discrete chaotic signal, it is quickly to synchronize the communication and a good security performance is ensured.
文摘In wireless body sensor network(WBSN),the set of electrocardiogram(ECG)data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient.While transmit-ting these collected data some adversaries may capture and misuse it due to the compromise of security.So,the major aim of this work is to enhance secure trans-mission of ECG signal in WBSN.To attain this goal,we present Pity Beetle Swarm Optimization Algorithm(PBOA)based Elliptic Galois Cryptography(EGC)with Chaotic Neural Network.To optimize the key generation process in Elliptic Curve Cryptography(ECC)over Galoisfield or EGC,private key is chosen optimally using PBOA algorithm.Then the encryption process is enhanced by presenting chaotic neural network which is used to generate chaotic sequences or cipher data.Results of this work show that the proposed cryptogra-phy algorithm attains better encryption time,decryption time,throughput and SNR than the conventional cryptography algorithms.
基金Acknowledgements The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was partically supported by National Natural Science Foundation of China under Crants No. 61172085, No. 61103221, No. 61133014, No. 11061130539 and No. 61021004.
文摘Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite field Ze, Algehawi and Samsudin presented recently an Identity Based Encryption (IBE) scheme. In this paper, we showed their proposal is not as secure as they chimed. More specifically, we presented a concrete attack on the scheme of Algehawi and Samsudin, which indicated the scheme cannot be consolidated as a real altemative of IBE schemes since one can exploit the semi group property (bilinearity) of extended Chebyshev polynomials over Zp to implement the attack without any difficulty.
基金Project(61379057)supported by the National Natural Science Foundation of ChinaProject supported by the Construct Program of the Key Discipline in Hunan University of Arts and Science,China+1 种基金Project(2012BS01)supported by Science Technology Research and Development Projects of Changde,ChinaProject supported by Science and the MEST2012-002521,NRF,Korea
文摘A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.
基金Supported by the National Natural Science Foundation of China(No. 60773120)the Natural Science Foundation of Beijing (No.4092040)the SRG Grant from the City University of Hong Kong (No. 7001702)
文摘The idea of using a one-time-one-key design has been widely applied in conventional cryptography. With the security theory of conventional cryptology, encryption algorithms are made public while all the secrets are encoded only in the keys. This paper applies chaos theory to conventional cryptography to develop a one-time-one-algorithm design. A general theory is given to generate the clock key, substitution box, permutation box and operational sign functions for a one-time-one-algorithm scheme. This scheme is then implemented in a system to manage the tradeoff between speed and the security of the encryption algorithm.