...
首页> 外文期刊>International journal of communication systems >A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing
【24h】

A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing

机译:云计算环境下基于混沌树的密码系统基于子树的转换模型,用于模糊用户数据共享

获取原文
获取原文并翻译 | 示例
           

摘要

Cloud computing technologies have been prospering in recent years and have opened an avenue for a wide variety of forms of adaptable data sharing. Taking advantage of these state-of-the-art innovations, the cloud storage data owner must, however, use a suitable identity-based cryptographic mechanism to ensure the safety prerequisites while sharing data to large numbers of cloud data users with fuzzy identities. As a successful way to guarantee secure fuzzy sharing of cloud data, the identity-based cryptographic technology still faces an effectiveness problem under multireceiver configurations. The chaos theory is considered a reasonable strategy for reducing computational complexity while meeting the cryptographic protocol's security needs. In an identity-based cryptographic protocol, public keys for individual clients are distributed, allowing the clients to separately select their own network identities or names as their public keys. In fact, in a public-key cryptographic protocol, it is for the best that the confirmation of the public key is done in a safe, private manner, because this way the load of storage on the server's side can be considerably relieved. The objective of this paper is to outline and examine a conversion process that can transfer cryptosystems using Chebyshev's chaotic maps over the Galois field to a subtree-based protocol in the cloud computing setting for fuzzy user data sharing, as opposed to reconcocting a different structure. Furthermore, in the design of our conversion process, no adjustment of the original cryptosystem based on chaotic maps is needed.
机译:近年来,云计算技术一直在蓬勃发展,并为多种形式的自适应数据共享开辟了道路。但是,利用这些最新的创新,云存储数据所有者必须使用合适的基于身份的加密机制来确保安全先决条件,同时将数据共享给具有模糊身份的大量云数据用户。作为确保云数据安全模糊共享的成功方法,基于身份的密码技术在多接收器配置下仍然面临有效性问题。混沌理论被认为是在满足密码协议安全需求的同时降低计算复杂性的合理策略。在基于身份的加密协议中,分发了各个客户端的公共密钥,从而允许客户端分别选择其自己的网络身份或名称作为其公共密钥。实际上,在公共密钥密码协议中,最好以安全,私密的方式对公共密钥进行确认,因为这样可以大大减轻服务器端的存储负担。本文的目的是概述和研究一种转换过程,该过程可以使用Chebyshev在Galois字段上的混沌映射将密码系统转移到云计算环境中用于模糊用户数据共享的基于子树的协议,而不是重新构造不同的结构。此外,在我们的转换过程的设计中,不需要基于混沌映射的原始密码系统的调整。

著录项

  • 来源
    《International journal of communication systems》 |2020年第7期|e4307.1-e4307.15|共15页
  • 作者

  • 作者单位

    Ton Duc Thang Univ Dept Management Sci & Technol Dev Ho Chi Minh City Vietnam|Ton Duc Thang Univ Fac Math & Stat Ho Chi Minh City Vietnam;

    Fu Jen Catholic Univ Dept Lib & Informat Sci New Taipei Taiwan|Asia Univ Dept Photon & Commun Engn Taichung Taiwan;

    Guru Ghasidas Univ Dept Pure & Appl Math Bilaspur India;

    Tainan Univ Technol Dept Informat Management Tainan Taiwan;

    Rani Durgavati Univ Dept Math & Comp Sci Jabalpur India;

    Indian Inst Informat Technol Dept Comp Sci & Engn Nagpur Maharashtra India;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    chaotic hash function; Chebyshev chaotic maps; fuzzy user; public key cryptography; subtree;

    机译:混沌哈希函数切比雪夫(Chebyshev)混沌地图;模糊用户;公钥加密;子树;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号