Improved digital signature protocol using iterated function systems

被引:4
作者
Al-Saidi, Nadia M. G. [1 ]
Said, Mohamad Rushdan Md [1 ]
机构
[1] Univ Putra Malaysia, Inst Math Res INSPEM, Serdang 43400, Selangor, Malaysia
关键词
fractal; iterated function systems (IFS); attractor; digital signature; Hutchinson operator W;
D O I
10.1080/00207160.2011.627438
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, a novel digital signature protocol is proposed. It is based on the iterated function system attractor, which is regarded as an emerging method. The idea behind our proposed method is based on selecting a known fractal set and then finding the attractor of the affine transformation functions. The attractor is then used in the encryption and decryption of a hash function to ensure the protection of the document from eavesdropping and integrity during the transmission. The properties and software implementation of the proposed protocol are discussed in detail. A comparison is made with the Rivest, Shamir, and Adleman cryptosystems, which shows that it performs better.
引用
收藏
页码:3613 / 3625
页数:13
相关论文
共 18 条
[1]  
Al-Saidi Nadia M. G., 2009, Journal of Mathematics and Statistics, V5, P183, DOI 10.3844/jmssp.2009.183.189
[2]   Security problems with a chaos-based deniable authentication scheme [J].
Alvarez, G .
CHAOS SOLITONS & FRACTALS, 2005, 26 (01) :7-11
[3]  
Barnsley M., 1993, FRACTALS EVERYWHERE
[4]   ITERATED FUNCTION SYSTEMS AND THE GLOBAL CONSTRUCTION OF FRACTALS [J].
BARNSLEY, MF ;
DEMKO, S .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1985, 399 (1817) :243-275
[5]  
Becker K.-H., 1989, Dynamical Systems and Fractals: Computer Graphics Experiments with Pascal
[6]  
Burton S., 1993, OVERVIEW PKCS STANDA
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]   Image coding based on a fractal theory of iterated contractive image transfort-nations [J].
Jacquin, Amaud E. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1992, 1 (01) :18-30
[9]   Public-key encryption with chaos [J].
Kocarev, L ;
Sterjev, M ;
Fekete, A ;
Vattay, G .
CHAOS, 2004, 14 (04) :1078-1082
[10]  
Kumar S., 2006, P MILCOM 2006 2006 I, P1