A New Public Key Encryption Scheme based on Layered Cellular Automata

被引:5
作者
Zhang, Xing [1 ,2 ]
Lu, Rongxing [2 ]
Zhang, Hong [1 ]
Xu, Chungen [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] Nanjing Univ Sci & Technol, Sch Sci, Nanjing, Jiangsu, Peoples R China
关键词
Public key encryption; reversible cellular automata; layered cellular automata; T-shaped neighborhood; provable security; CRYPTOSYSTEM;
D O I
10.3837/tiis.2014.10.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of previously reported researches focus on the symmetric key encryption schemes. Up to now, few CA based public key encryption scheme has been proposed. To fill the gap, in this paper, we propose a new public key encryption scheme based on layered cellular automata (LCA). Specifically, in the proposed scheme, based on the T-shaped neighborhood structure, we combine four one-dimensional reversible CAs (set as the private key) to form the transition rules of a two-dimension CA, where the two-dimension CA is set as the corresponding public key. Based on the hardness assumption of the Decisional Dependent CA problem in LCA, we formally prove the proposed scheme is indistinguishably secure against the chosen-plaintext attack (IND-CPA). In addition, we also use a numeric example to demonstrate its feasibility. Finally, analysis of key space and time efficiency are also carried out along with RSA-1024, and the simulation results demonstrate that our proposed scheme is more efficient.
引用
收藏
页码:3572 / 3590
页数:19
相关论文
共 29 条
[21]  
Seredynski M, 2004, LECT NOTES COMPUT SC, V3305, P785
[22]  
Somswara Rao C, 2011, INT J ENG SCI TECH, V3, P5786
[23]   On the generation of high-quality random numbers by two-dimensional cellular automata [J].
Tomassini, M ;
Sipper, M ;
Perrenoud, M .
IEEE TRANSACTIONS ON COMPUTERS, 2000, 49 (10) :1146-1151
[24]  
Wang X., 2013, COMMUN NONLINEAR SCI
[25]  
Wolfram S., 1986, ADV APPL MATH
[26]  
Wu Y., 2009, J COMMUNICATION, V30
[27]  
Xia Xuewen, 2009, Proceedings of the 2009 International Conference on Computational Intelligence and Security (CIS 2009), P192, DOI 10.1109/CIS.2009.55
[28]  
Zheng Y., 1998, LECT NOTES COMPUTER
[29]  
Zhu B., 2007, J NANJING U SCI TECH