23
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A signature algorithm based on chaotic maps and factoring problems

, , , &
Pages 2783-2794 | Received 01 Sep 2021, Published online: 12 Sep 2022

References

  • Hwang, S., Yang C., & Tzeng, F. (2002). Improved digital signature scheme based on factoring and discrete logarithms, Journal of Discrete Mathematical Sciences and Cryptography, 5(2), 151-155. doi: 10.1080/09720529.2002.10697946
  • Pon, F. Lu, H., & Jeng, B. (2005). Meta-He digital signature schemes based on factoring and discrete logarithms, Applied Mathematics and Computation, 65(1), 171–176. doi: 10.1016/j.amc.2004.04.082
  • Shao, Z.(2002). Digital signature schemes based on factoring and discrete logarithms, Electronics Letters, 38(24),1518-1519. doi: 10.1049/el:20021093
  • He, H. (2001). Digital signature schemes based on factoring and discrete logarithms, Electronics Letters, 37(4), 220-222. doi: 10.1049/el:20010149
  • Hung, S. (2001). Cryptanalysis of a digital signature scheme based on factoring and discrete logarithms. Proceedings of the National Computer Symposium, Taipei, Taiwan, F043-F045.
  • Qian, H., Cao, F. & Bao, H. (2005). Cryptanalysis of LiTzeng Hwang improved signature schemes based on factoring and discrete logarithms, Applied Mathematics and Computation, 166(3), 501-505. doi: 10.1016/j.amc.2004.06.054
  • Wang, C., Lin, H., & Chang, C. (2003). Signature scheme based on two hard problems simultaneously, Proceedings of the 17th International Conference on Advanced Information Networking and Application (AINA), Xian, China, 557–560.
  • Ismail, E. Tahat, N., & Ahmad, R. (2008).A New Digital Signature Scheme Based on Factoring and Discrete Logarithms, Journal of Mathematics and Statistics, 14(4),222-225.
  • Chain, K., & Kuo C. (2013). A new digital signature scheme based on chaotic maps. Nonlinear Dynamics, 24(4), 1003-1012. doi: 10.1007/s11071-013-1018-1
  • Chiou, S. (2016). Novel digital signature schemes based on factoring and discrete logarithms, International Journal of Security and Its Applications, 10(3), 295-310. doi: 10.14257/ijsia.2016.10.3.26
  • Al-Hazaimeh, O.M. (2020).Anewdynamicspeechencryptionalgorithm based on Lorenz chaotic map over internet protocol. International Journal of Electrical and Computer Engineering, 10(5), 4824.
  • Ismail, E., & Tahat, N. (2011). A New signature scheme based on multiple hard number theoretic problems, International Scholarly Research Notices, Vol.2011, Article ID 231649, 3 pages.
  • Matthews, R. (1989). On the derivation of a chaotic encryption algorithm, Cryptologia, 13(1), 29-41. doi: 10.1080/0161-118991863745
  • Li, X., & Zhao, D. (2010). Optical color image encryption with redefined fractional Hartley transform, International Journal for Light and Electron Optics,121(7), 673–677. doi: 10.1016/j.ijleo.2008.10.008
  • Tay, J. Quan C., Chen, W., & Fu, Y. (2010). Color image encryption based on interference and virtual optics, Optics and Laser Technology, 142(2), 409-415. doi: 10.1016/j.optlastec.2009.08.016
  • Yoon, J., & Jeon, S. (2011). An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map, Journal of Communications in Nonlinear Science and Numerical Simulation, 16(6), 2383–2389. doi: 10.1016/j.cnsns.2010.09.021
  • Al-Hazaimeh, O. M., Abu-Ein, A. A., Nahar, K. M., & Al-Qasrawi, I. S. (2022). Chaotic elliptic map for speech encryption. Indonesian Journal of Electrical Engineering and Computer Science, 25(2), 1103-1114. doi: 10.11591/ijeecs.v25.i2.pp1103-1114
  • Bakrawy, L., Ghali, N. (2011) A. Hassanien and Th. Kim, A fast and secure one-way hash function, Compututer and Information Science, Vol.259, 85-93
  • Shakiba, A. (2019) Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks, Journal of Information and Optimization Sciences, 40(3), 725–750, DOI: 10.1080/02522667.2018.1470752.
  • Al-hazaimeh, O. M. (2021). A new speech encryption algorithm based on dual shuffling Hénon chaotic map. International Journal of Electrical and Computer Engineering (IJECE), 11(3), 2203-2210. doi: 10.11591/ijece.v11i3.pp2203-2210
  • Mohammad, A. K., Himadri P. M., & Syeda D. J. (2020) Anti-synchronization phenomenon of discrete chaotic maps using linear transformations, Journal of Information and Optimization Sciences, 41(8), 1757-1769, DOI: 10.1080/02522667.2017.1321766
  • Xiong, L., Jianwei, N., Saru K., Sk, H., Fan, W., Muhammad, K. & Ashok, K. (2016) .A novel chaotic maps-based user authentication and key agreement protocol for multisever environments with provable security, Wireless Pers Communication, 89(2) ,569-597. doi: 10.1007/s11277-016-3293-x
  • Tahat, N., Alomari, A.K., Al-Hazaimeh, O.M. and Al-Jamal, M.F., (2020). An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem. Journal of Discrete Mathematical Sciences and Cryptography, 23(4), pp.935-948. doi: 10.1080/09720529.2020.1734293
  • Zhang, L. (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems, Chaos Solitons Fractals, 37(3), pp.669-674. doi: 10.1016/j.chaos.2006.09.047
  • Tahat, N. (2016). Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem, Int. J. Computer Applications in Technology, 54(3), 229-235. doi: 10.1504/IJCAT.2016.079872
  • Tahat, N., Alomari, A. K., Al–Freedi, A., Al-Hazaimeh, O. M., & Al–Jamal, M. F. (2019). An Efficient Identity-Based Cryptographic Model for Chebyhev Chaotic Map and Integer Factoring Based Cryptosystem. Journal of Applied Security Research, 14(3), 257-269. doi: 10.1080/19361610.2019.1621513
  • Ghassan, S., (2012).Certificate Revocation Management in VANET, International Journal of Cyber-Security and Digita, 1(2),115-121.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.