메뉴 건너뛰기




Volumn 6, Issue , 2017, Pages 711-722

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service

Author keywords

Chaos; clouds; cryptography; encryption; hardware; Internet of Things; message authentication; security

Indexed keywords

AUTHENTICATION; CHAOS THEORY; CHAOTIC SYSTEMS; CLOUD COMPUTING; CLOUDS; COMPUTER HARDWARE; CORRELATION METHODS; CRYSTAL LATTICES; DISTRIBUTED DATABASE SYSTEMS; HARDWARE; INTERNET OF THINGS; RAILROAD TRANSPORTATION; RAILROADS; RAILS; SECURITY OF DATA; TRANSPORTATION;

EID: 85035763217     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2775038     Document Type: Article
Times cited : (78)

References (26)
  • 1
    • 85010422698 scopus 로고    scopus 로고
    • A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
    • M. S. Farash et al., "A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security, '' Int. J. Commun. Syst., vol. 30, no. 4, p. e3019, 2017, doi: 10.1002/dac.3019.
    • (2017) Int. J. Commun. Syst , vol.30 , Issue.4 , pp. e3019
    • Farash, M.S.1
  • 2
    • 84995810068 scopus 로고    scopus 로고
    • A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
    • May
    • G. Hu, D. Xiao, T. Xiang, S. Bai, and Y. Zhang, "A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud, '' Inf. Sci., vol. 387, pp. 132-145, May 2017.
    • (2017) Inf. Sci , vol.387 , pp. 132-145
    • Hu, G.1    Xiao, D.2    Xiang, T.3    Bai, S.4    Zhang, Y.5
  • 4
    • 85018496108 scopus 로고    scopus 로고
    • Bi-level semantic representation analysis for multimedia event detection
    • May
    • X. Chang, Z. Ma, Y. Yang, Z. Zeng, and A. G. Hauptmann, "Bi-level semantic representation analysis for multimedia event detection, '' IEEE Trans. Cybern., vol. 47, no. 5, pp. 1180-1197, May 2017.
    • (2017) IEEE Trans. Cybern , vol.47 , Issue.5 , pp. 1180-1197
    • Chang, X.1    Ma, Z.2    Yang, Y.3    Zeng, Z.4    Hauptmann, A.G.5
  • 5
    • 84961880610 scopus 로고    scopus 로고
    • An open-switch fault diagnosis method for single-phase PWM rectifier using a model-based approach in high-speed railway electrical traction drive system
    • May
    • B. Gou, X. Ge, S. Wang, X. Feng, J. B. Kuo, and T. G. Habetler, "An open-switch fault diagnosis method for single-phase PWM rectifier using a model-based approach in high-speed railway electrical traction drive system, '' IEEE Trans. Power Electron., vol. 31, no. 5, pp. 3816-3826, May 2016.
    • (2016) IEEE Trans. Power Electron , vol.31 , Issue.5 , pp. 3816-3826
    • Gou, B.1    Ge, X.2    Wang, S.3    Feng, X.4    Kuo, J.B.5    Habetler, T.G.6
  • 6
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, '' J. Cryptol., vol. 21, no. 4, pp. 469-491, 2008.
    • (2008) J. Cryptol , vol.21 , Issue.4 , pp. 469-491
    • Bellare, M.1    Namprempre, C.2
  • 7
    • 84979815252 scopus 로고    scopus 로고
    • Cloud-Assisted IoT-based SCADA systems security: A review of the state of the art and future challenges
    • A. Sajid, H. Abbas, and K. Saleem, "Cloud-Assisted IoT-based SCADA systems security: A review of the state of the art and future challenges, '' IEEE Access, vol. 4, pp. 1375-1384, 2016.
    • (2016) IEEE Access , vol.4 , pp. 1375-1384
    • Sajid, A.1    Abbas, H.2    Saleem, K.3
  • 8
    • 33750542126 scopus 로고    scopus 로고
    • Some basic cryptographic requirements for chaos-based cryptosystems
    • G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems, '' Int. J. Bifurcation Chaos, vol. 16, no. 8, pp. 2129-2151, 2006.
    • (2006) Int. J. Bifurcation Chaos , vol.16 , Issue.8 , pp. 2129-2151
    • Alvarez, G.1    Li, S.2
  • 9
    • 84897087054 scopus 로고    scopus 로고
    • Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata
    • Sep
    • K. M. Faraoun, "Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata, '' Commun. Nonlin-ear Sci. Numer. Simul., vol. 19, no. 9, pp. 3136-3148, Sep. 2014.
    • (2014) Commun. Nonlin-ear Sci. Numer. Simul , vol.19 , Issue.9 , pp. 3136-3148
    • Faraoun, K.M.1
  • 10
    • 33846348219 scopus 로고    scopus 로고
    • Chaotic keyed hash function based on feedforwardfifeedback nonlinear digital filter
    • J. Zhang, X. Wang, and W. Zhang, "Chaotic keyed hash function based on feedforwardfifeedback nonlinear digital filter, '' Phys. Lett. A, vol. 362, no. 5, pp. 439-448, 2007.
    • (2007) Phys. Lett. A , vol.362 , Issue.5 , pp. 439-448
    • Zhang, J.1    Wang, X.2    Zhang, W.3
  • 11
    • 85028013504 scopus 로고    scopus 로고
    • Anovel color image encryption scheme using rectangular transform-enhanced chaotic tent maps
    • X. Wu, B. Zhu, Y. Hu, andY. Ran, "Anovel color image encryption scheme using rectangular transform-enhanced chaotic tent maps, '' IEEE Access, vol. 5, pp. 6429-6436, 2017.
    • (2017) IEEE Access , vol.5 , pp. 6429-6436
    • Wu, X.1    Zhu, B.2    Hu Andy Ran, Y.3
  • 12
    • 85013777098 scopus 로고    scopus 로고
    • Sliding mode control design for synchronization of fractional order chaotic systems and its application to a new cryptosystem
    • Mar
    • P. Muthukumar, P. Balasubramaniam, and K. Ratnavelu, "Sliding mode control design for synchronization of fractional order chaotic systems and its application to a new cryptosystem, '' Int. J. Dyn. Control, vol. 5, no. 1, pp. 115-123, Mar. 2017.
    • (2017) Int. J. Dyn. Control , vol.5 , Issue.1 , pp. 115-123
    • Muthukumar, P.1    Balasubramaniam, P.2    Ratnavelu, K.3
  • 13
    • 85006716769 scopus 로고    scopus 로고
    • A colour byte scrambling technique for efficient image encryption based on combined chaotic map: Image encryption using combined chaotic map
    • Mar
    • M. Y. M. Parvees, J. A. Samath, I. K. Raj, and B. P. Bose, "A colour byte scrambling technique for efficient image encryption based on combined chaotic map: Image encryption using combined chaotic map, '' in Proc. Int. Conf. Elect., Electron., Optim. Technol. (ICEEOT), Mar. 2016, pp. 1067-1072.
    • (2016) Proc. Int. Conf. Elect. Electron. Optim. Technol. (ICEEOT , pp. 1067-1072
    • Parvees, M.Y.M.1    Samath, J.A.2    Raj, I.K.3    Bose, B.P.4
  • 14
    • 84950900200 scopus 로고
    • On the derivation of a 'chaotic' encryption algorithm
    • Jan
    • R. Matthews, "On the derivation of a 'chaotic' encryption algorithm, '' Cryptologia, vol. 13, no. 1, pp. 29-42, Jan. 1989.
    • (1989) Cryptologia , vol.13 , Issue.1 , pp. 29-42
    • Matthews, R.1
  • 15
    • 84871976249 scopus 로고    scopus 로고
    • An efficient approach for the construction of LFT S-boxes using chaotic logistic map
    • Oct
    • I. Hussain, T. Shah, M. A. Gondal, and H. Mahmood, "An efficient approach for the construction of LFT S-boxes using chaotic logistic map, '' Nonlinear Dyn., vol. 71, nos. 1-2, pp. 133-140, Oct. 2012.
    • (2012) Nonlinear Dyn. , vol.71 , Issue.1-2 , pp. 133-140
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3    Mahmood, H.4
  • 16
    • 84865615382 scopus 로고    scopus 로고
    • A fast and efficient chaos-based keyed hash function
    • A. Kanso and M. Ghebleh, "A fast and efficient chaos-based keyed hash function, '' Commun. Nonlinear Sci. Numer. Simul., vol. 18, no. 1, pp. 109-123, 2013.
    • (2013) Commun. Nonlinear Sci. Numer. Simul. , vol.18 , Issue.1 , pp. 109-123
    • Kanso, A.1    Ghebleh, M.2
  • 17
    • 84944037777 scopus 로고    scopus 로고
    • An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice
    • Jan
    • R. Liang, X. Tan, H. Zhou, and S. Wang, "An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice, '' Pramana, vol. 85, no. 4, pp. 617-627, Jan. 2015.
    • (2015) Pramana , vol.85 , Issue.4 , pp. 617-627
    • Liang, R.1    Tan, X.2    Zhou, H.3    Wang, S.4
  • 18
    • 84884206938 scopus 로고    scopus 로고
    • Secure chaotic system with application to chaotic ciphers
    • Feb
    • X. Wang, W. Zhang, W. Guo, and J. Zhang, "Secure chaotic system with application to chaotic ciphers, '' Inf. Sci., vol. 221, pp. 555-570, Feb. 2013.
    • (2013) Inf. Sci , vol.221 , pp. 555-570
    • Wang, X.1    Zhang, W.2    Guo, W.3    Zhang, J.4
  • 21
    • 34248393950 scopus 로고    scopus 로고
    • Theory and practice of chaotic cryptography
    • Jun
    • J. M. Amigó, L. Kocarev, and J. Szczepanski, "Theory and practice of chaotic cryptography, '' Phys. Lett. A, vol. 366, no. 3, pp. 211-216, Jun. 2007.
    • (2007) Phys. Lett. A , vol.366 , Issue.3 , pp. 211-216
    • Amigó, J.M.1    Kocarev, L.2    Szczepanski, J.3
  • 22
    • 84949230440 scopus 로고    scopus 로고
    • A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis
    • S. Tavares and H. Meijer, Eds. Berlin, Germany Springer Aug
    • M. Kanda, Y. Takashima, T. Matsumoto, K. Aoki, and K. Ohta, "A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis, '' in Selected Areas in Cryptogra-phy (Lecture Notes in Computer Science), vol. 1556, S. Tavares and H. Meijer, Eds. Berlin, Germany: Springer, Aug. 1998, pp. 264-279. [Online]. Available: https://link.springer.com/book/10.1007/3-540-48892-8#page=274
    • (1998) Selected Areas in Cryptogra-phy (Lecture Notes in Computer Science) , vol.1556 , pp. 264-279
    • Kanda, M.1    Takashima, Y.2    Matsumoto, T.3    Aoki, K.4    Ohta, K.5
  • 23
    • 0032665874 scopus 로고    scopus 로고
    • On the security of iterated message authentication codes
    • Jan
    • B. Preneel and P. C. Van Oorschot, "On the security of iterated message authentication codes, '' IEEE Trans. Inf. Theory, vol. 45, no. 1, pp. 188-199, Jan. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.1 , pp. 188-199
    • Preneel, B.1    Van Oorschot, P.C.2
  • 26
    • 0242571721 scopus 로고    scopus 로고
    • Helix: Fast encryption and authentication in a single cryptographic primitive
    • T. Johansson, Ed. Berlin, Germany Springer
    • N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno, "Helix: Fast encryption and authentication in a single cryptographic primitive, '' in Fast Softw. Encryption (Lecture Notes in Computer Science), vol. 2887, T. Johansson, Ed. Berlin, Germany: Springer, 2003, pp. 330-346. [Online]. Available: https://link.springer.com/book/10.1007/b93938#page=340
    • (2003) Fast Softw. Encryption (Lecture Notes in Computer Science) , vol.2887 , pp. 330-346
    • Ferguson, N.1    Whiting, D.2    Schneier, B.3    Kelsey, J.4    Lucks, S.5    Kohno, T.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.