A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations

dc.contributor.authorJaafar, Abdullah Mohammed Abdo Ali
dc.date.accessioned2018-08-02T02:44:51Z
dc.date.available2018-08-02T02:44:51Z
dc.date.issued2011
dc.description.abstractMany public-key cryptosystems are used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations. The basic design of visual cryptography exploits the human visual system, to recover secret images. Moreover, the visual inspection process could be carried out very easily by humans, but hard for the computer to imitate. Indirectly, such scheme adds extra protection to the visual scheme against brute-force search on the visual secret key. However, visual cryptography currently exists only for secret-key cryptography. Therefore, in the current study, alternative public-key primitives are proposed, based on non-expansion visual cryptography and Boolean operations. The proposed visual cryptosystem include: visual key exchange protocol, visual digital signature protocol and visual zero-knowledge proof of identity protocol. The security of the proposed visual public-key protocols is assured by the K-SAT NP-hard problem and non-solvable of the non-invertible matrix problem. Security analyses showed that the proposed visual public-key cryptosystem is secure, especially when used with large sizes of shadow images (visual shares). The time required to brute-force the secret values (visual secret keys) increased exponentially with the increase in the size of shadow images. The wide potential use, specific niche on visual applications, simplicity and ease of implementation of shadow images, therefore makes the proposed visual public-key cryptosystem a suitable alternative to the classical public-key cryptosystems that are currently in use today.en_US
dc.identifier.urihttp://hdl.handle.net/123456789/6126
dc.language.isoenen_US
dc.publisherUniversiti Sains Malaysiaen_US
dc.subjectA new visual public-key cryptosystemen_US
dc.subjectbased on non-expansion techniqueen_US
dc.titleA New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operationsen_US
dc.typeThesisen_US
Files
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: