图即信息:一个非常规密码函数的设计与分析

S. Akl
{"title":"图即信息:一个非常规密码函数的设计与分析","authors":"S. Akl","doi":"10.1201/9781315167084-20","DOIUrl":null,"url":null,"abstract":"An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, \\the graph is the message\": its vertices, its edges, and its edge weights are the information to be concealed. The encryption algorithm is based on an unconventional mapping, conjectured to be a trapdoor one-way function, designed for graphs. This function requires the sender and the receiver to use a secret one-time encryption/decryption key. It is claimed that a malicious eavesdropper with no knowledge of the key will be faced with a computational task requiring exponential time in the size of the input graph in order to extract the original plaintext from the ciphertext carried by the encrypted graph. A number of variants to the main algorithm are also proposed.","PeriodicalId":436938,"journal":{"name":"From Parallel to Emergent Computing","volume":"497 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"The Graph Is the Message: Design and Analysis of an Unconventional Cryptographic Function\",\"authors\":\"S. Akl\",\"doi\":\"10.1201/9781315167084-20\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, \\\\the graph is the message\\\": its vertices, its edges, and its edge weights are the information to be concealed. The encryption algorithm is based on an unconventional mapping, conjectured to be a trapdoor one-way function, designed for graphs. This function requires the sender and the receiver to use a secret one-time encryption/decryption key. It is claimed that a malicious eavesdropper with no knowledge of the key will be faced with a computational task requiring exponential time in the size of the input graph in order to extract the original plaintext from the ciphertext carried by the encrypted graph. A number of variants to the main algorithm are also proposed.\",\"PeriodicalId\":436938,\"journal\":{\"name\":\"From Parallel to Emergent Computing\",\"volume\":\"497 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"From Parallel to Emergent Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/9781315167084-20\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"From Parallel to Emergent Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781315167084-20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

描述了一种算法,用于对要从发送方安全地传输到接收方的图形进行加密。在通信术语中,“图就是消息”:它的顶点、它的边和它的边权是要隐藏的信息。加密算法基于一种非常规的映射,被推测为一种为图形设计的活板门单向函数。这个函数要求发送方和接收方使用一个秘密的一次性加密/解密密钥。据称,不知道密钥的恶意窃听者将面临输入图大小的指数级计算任务,以便从加密图所携带的密文中提取原始明文。本文还提出了一些主要算法的变体。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Graph Is the Message: Design and Analysis of an Unconventional Cryptographic Function
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, \the graph is the message": its vertices, its edges, and its edge weights are the information to be concealed. The encryption algorithm is based on an unconventional mapping, conjectured to be a trapdoor one-way function, designed for graphs. This function requires the sender and the receiver to use a secret one-time encryption/decryption key. It is claimed that a malicious eavesdropper with no knowledge of the key will be faced with a computational task requiring exponential time in the size of the input graph in order to extract the original plaintext from the ciphertext carried by the encrypted graph. A number of variants to the main algorithm are also proposed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Graph Is the Message: Design and Analysis of an Unconventional Cryptographic Function Algorithmic Information Dynamics of Emergent, Persistent, and Colliding Particles in the Game of Life Analytical Modeling and Optimization of an Elastic Cloud Server System Constructing Iterated Exponentials in Tilings of the Euclidean and of the Hyperbolic Plane Towards an Opportunistic Software-Defined Networking Solution
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1