Neural Cryptography Based on Complex-Valued Neural Network

被引:107
作者
Dong, Tao [1 ,2 ,3 ]
Huang, Tingwen [4 ]
机构
[1] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] Chongqing Changan Automobile Co Ltd, Informat Ctr, Chongqing 401220, Peoples R China
[3] Southwest Univ, Chongqing Key Lab Nonlinear Circuits & Intelligen, Chongqing 400715, Peoples R China
[4] Texas A&M Univ Qatar, Coll Elect & Informat Engn, Doha 23874, Qatar
关键词
Cryptography; Synchronization; Biological neural networks; Neurons; Signal processing algorithms; Complex valued; neural cryptography; neural synchronization; tree parity machine (TPM); SYNCHRONIZATION; INFORMATION; EXCHANGE;
D O I
10.1109/TNNLS.2019.2955165
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Neural cryptography is a public key exchange algorithm based on the principle of neural network synchronization. By using the learning algorithm of a neural network, the two neural networks update their own weight through exchanging output from each other. Once the synchronization is completed, the weights of the two neural networks are the same. The weights of the neural network can be used for the secret key. However, all the existing works are based on the real-valued neural network model. There are seldom works studying the neural cryptography based on a complex-valued neural network model. In this technical note, a neural cryptography based on the complex-valued tree parity machine network (CVTPM) is proposed. The input, output, and weights of CVTPM are a complex value, which can be considered as an extension of TPM. There are two advantages of the CVTPM: 1) the security of CVTPM is higher than that of TPM with the same hidden units, input neurons, and synaptic depths and 2) the two parties with the CVTPM can exchange two group keys in one neural synchronization process. A series of numerical simulation experiments is provided to verify our results.
引用
收藏
页码:4999 / 5004
页数:6
相关论文
共 32 条
[1]   On the Improvement of Neural Cryptography Using Erroneous Transmitted Information With Error Prediction [J].
Allam, Ahmed M. ;
Abbas, Hazem M. .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2010, 21 (12) :1915-1924
[2]  
[Anonymous], 2014, J EGYPTIAN MATH SOC, DOI DOI 10.1016/J.JOEMS.2013.10.003
[3]   Cluster Synchronization for Neutral Stochastic Delay Networks via Intermittent Adaptive Control [J].
Chen, Huabin ;
Shi, Peng ;
Lim, Cheng-Chew .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (11) :3246-3259
[4]   Exponential Synchronization for Markovian Stochastic Coupled Neural Networks of Neutral-Type via Adaptive Feedback Control [J].
Chen, Huabin ;
Shi, Peng ;
Lim, Cheng-Chew .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (07) :1618-1632
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   Event-triggered synchronization for reaction-diffusion complex networks via random sampling [J].
Dong, Tao ;
Wang, Aijuan ;
Zhu, Huiyun ;
Liao, Xiaofeng .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 495 :454-462
[7]   Stability and Hopf bifurcation of a complex-valued neural network with two time delays [J].
Dong, Tao ;
Liao, Xiaofeng ;
Wang, Aijuan .
NONLINEAR DYNAMICS, 2015, 82 (1-2) :173-184
[8]   A Diffie-Hellman key exchange protocol using matrices over noncommutative rings [J].
Eftekhari, Mohammad .
GROUPS COMPLEXITY CRYPTOLOGY, 2012, 4 (01) :167-176
[9]   Secure exchange of information by synchronization of neural networks [J].
Kanter, I ;
Kinzel, W ;
Kanter, E .
EUROPHYSICS LETTERS, 2002, 57 (01) :141-147
[10]   Dynamics of interacting neural networks [J].
Kinzel, W ;
Metzler, R ;
Kanter, I .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2000, 33 (14) :L141-L147