CN104574259A - Image encryption method based on chaotic system and insertion-deletion model - Google Patents

Image encryption method based on chaotic system and insertion-deletion model Download PDF

Info

Publication number
CN104574259A
CN104574259A CN201510009578.8A CN201510009578A CN104574259A CN 104574259 A CN104574259 A CN 104574259A CN 201510009578 A CN201510009578 A CN 201510009578A CN 104574259 A CN104574259 A CN 104574259A
Authority
CN
China
Prior art keywords
dna
sequence
chaos
matrix
hamming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510009578.8A
Other languages
Chinese (zh)
Other versions
CN104574259B (en
Inventor
周昌军
牛红叶
王宾
张强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN201510009578.8A priority Critical patent/CN104574259B/en
Publication of CN104574259A publication Critical patent/CN104574259A/en
Application granted granted Critical
Publication of CN104574259B publication Critical patent/CN104574259B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The invention relates to the field of image encryption, and designs an image encryption method based on a chaotic system and an insertion-deletion model. According to the method, the Hamming distance, the Hamming inverse distance and the Hamming feeding distance are introduced into the generating process of initial values of the chaotic system; in addition, when the method is used for encrypting or decrypting an image, positions of image pixel values are scrambled through the insertion-deletion model; finally, XOR operation of a DNA sequence is applied to diffusing the image pixel values. It can be obtained from simulation results and safety analysis that the method has the good encryption effect and can resist various attacks of an intruder. According to the problem emphatically solved, the basic thought of the insertion-deletion model in DNA calculation is applied to image encryption.

Description

Based on the image encryption method of chaos system and insertion-case-deleted models
Technical field
The present invention relates to chaos system and insertion-case-deleted models, specifically be to original with chaos system and insertion-case-deleted models figurepicture is encrypted, and it belongs to figurepicture field of encryption.
Background technology
In recent years, numeral figurepicture is applied in Internet Transmission by people widely as a kind of information carrier.But due to the opening of network and the sharing of information, assailant is easy to intercept and capture these information, people take series of measures guarantee for this reason figurethe security of picture transmission, wherein figurepicture encryption is the most effective mode of one. figureas information because of its redundancy and data be two dimension etc. feature, traditional text encryption method is as right in DES, AES, IDEA etc. have not been suitable for figurethe encryption of picture.Therefore based on modern password system figurepicture encryption technology, based on matrixing figurepicture encryption technology, based on chaos figurepicture encryption technology, based on secret sharing figurepicture encryption technology and based on frequency domain figurein succession occur as encryption technology.But, along with parallel computer, the fast development of cloud computing and quantum computer, the security facing stern challenge of these methods.
Chaos system has initial value responsive, ergodicity, the characteristics such as movement locus is random, and has natural contacting with traditional cryptography, therefore based on chaos figureonce be subject to the favor of scholar as encryption technology, also create a large amount of Chaos Encryption Technologies simultaneously.But less key space, slower enciphering rate and lower security are still based on chaos figurethe bottleneck of picture encryption technology development.It is the technology that recent development is got up that DNA calculates in field of cryptography, and 1994, Adleman demonstrated a kind of Proof of Concept method DNA being applied to solution 7 Hamilton path problems.In addition, DNA calculates the computation capability and high storage density with height, just in time can make up based on chaos system figurethe shortcoming of picture encryption technology, therefore, chaos system calculates to combine with DNA and proposes many cryptographic algorithm by researchers.Although some improve to a certain extent based on above-mentioned encryption method figuresecurity in picture transmitting procedure, but the just DNA sequence dna paid close attention to of these algorithms add the basic series of operations such as computing, XOR, and do not consider the concrete model in biochemical reaction.DNA computation model in biochemical reaction comprises splice model, sticker model, DNA-EC, insertion-case-deleted models and minimum of computation model etc., and we can consider the basic thought of these models to be incorporated into figurein picture encryption, produce good cipher round results.
To insert herein-case-deleted models is incorporated into figurein the ciphering process of picture.The mechanism of insertion-case-deleted models is: in the DNA sequence dna of a strand, by biology enzyme and the biological operation technology such as heating and annealing, inserts the DNA fragmentation of section of DNA fragment or deletion one section of strand.Concrete operation step is as described below.
Deletion action: suppose that the value on array i-th-1, i, i+1 position is respectively subsequence u, y, v, for deleting the subsequence y on i-th position in this array, its method step is as follows:
1. this array is put into a test tube N, add single-stranded DNA sequence in test tube N it is the complementary series of x;
2. implement annealing operation to test tube N, then with u, be combined with v, and folded;
3. in test tube N, add DNA fragmentation and relevant polymerase, implement pcr amplification, complete double chain DNA molecule can be obtained;
4. implement and unwind, obtain two strands, wherein one is the DNA sequence dna after deleting subsequence y.
Update: suppose that the value on array i-th-1, i, i+1 position is respectively subsequence u, y, v, for intron sequences y on the position of i-th in this array, its method step is as follows:
1. this array is put into a test tube N, add single-stranded DNA sequence in test tube N
2. implement annealing operation to test tube N, then with u, be combined with v, and folded;
3. use and adjust inscribe restriction enzyme, the double-strand in test tube N is cut off;
4. in test tube N, add DNA fragmentation and relevant polymerase, implement pcr amplification, complete double chain DNA molecule can be obtained;
4. implement and unwind, obtain two strands, wherein one is the DNA sequence dna after intron sequences y.
Summary of the invention
The object of the invention is to propose a kind of based on chaos system and insertion-case-deleted models figurepicture encryption method, combine chaos system and insertion-case-deleted models scramble figurethe location of pixels of picture, makes cipher round results good, thus can the attack of the person of resisting an invasion.The technical solution adopted in the present invention is: based on the image encryption method of chaos system and insertion-case-deleted models, the insertion-case-deleted models in the chaos sequence of chaotic maps generation and biochemical reaction combines by it; It is first to original figurepicture carries out DNA encoding, then Lorenz is utilized to map the chaos sequence scramble of generation by the DNA sequence dna obtained of encoding, then with insertion-case-deleted models scramble DNA sequence dna again, finally utilize Lorenz to map the chaos sequence produced and dispersion operation is carried out to the DNA sequence dna matrix obtained, finally sequence matrix decoding is encrypted figurepicture; Its concrete steps are as follows:
S1, employing DNA encoding rule are to original figurepicture carries out coding and obtains DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Given arbitrary initial value x 0, y 0, z 0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming mend distance against Distance geometry Hamming, and are the decimal between 0-1 by its value, by the new Hamming distance obtained, Hamming against Distance geometry Hamming mend distance respectively with x 0, y 0, z 0be added, obtain new initial value x 1, y 1, z 1; Then coupling system parameter produces three chaos sequences (x, y, z);
The value of the DNA sequence dna matrix in S3, use chaos sequence (x, y) scramble step S1
Chaos sequence (x, y) is rounded downwards, by the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, with chaos sequence (x, z) and insertion-case-deleted models the value of the DNA sequence dna matrix again in scramble S3;
Detailed process is: two parts up and down identical sized by first being divided by the DNA sequence dna matrix in step S3; Then identical following operation is carried out to these two parts: using one of DNA sequence dna matrix row as a subsequence, obtain one and the equal-sized one-dimension array of sequence matrix columns; Lorenz chaotic maps is utilized to produce chaos sequence between one identical with array size 0 and 1; If the value of chaos sequence i-th position is less than 0.5, then uses deletion action that the element on array i-th position is deleted, and use update to be inserted into the end of residue array the element deleted; Otherwise do not carry out any operation; Finally two parts are merged into a sequence matrix, namely operation completes.
S5, use chaos sequence (y, z) and the value of XOR to the DNA sequence dna matrix that step S4 obtains carry out dispersion operation.
First matrix sequence is divided into the identical block of size, then chaos sequence (y, z) is rounded downwards, finally in conjunction with the value of XOR by block diffusion DNA sequence dna matrix;
S6, merged block identical for the size obtained in step S5 is obtained a DNA sequence dna matrix, can be encrypted its decoding figurepicture.
The present invention compared with prior art has the following advantages:
1, the basic thought of the insertion-deletion system in biochemical reaction is incorporated in encryption system, forms insertion-case-deleted models.Due to the one that insertion-deletion system is in DNA computation model, therefore insertion-deletion system has huge computation capability and high storage density, thus insertion-case-deleted models also has these characteristics above, uses this model realization figurethe encryption of picture has higher encryption efficiency.
2, the present invention not only considers chaotic maps to characteristics such as initial value sensitivities, but also will insert-case-deleted models is applied in ciphering process, and effect insertion-case-deleted models and the good characteristic of chaotic maps can make our cryptographic algorithm effectively not resist an invasion the attack of person; Ensure that numeral figurethe safety of picture when transmitting is high.
Accompanying drawing explanation
figure8 kinds of codings of 1DNA sequence, decoding mapping ruler;
figurethe xor operation of 2DNA sequence;
figure3 is original figurepicture;
figure4 encryptions figurepicture;
figure5 deciphering figurepicture;
figure6 is original figurethe intensity histogram of picture figure;
figure7 encryptions figurethe intensity histogram of picture figure;
figure8 is original figurethe correlativity of picture horizontal direction;
figure9 encryptions figurethe correlativity of picture horizontal direction;
figure10 structure letters of the present invention figure.
Embodiment
Below in conjunction with attached figurethe invention will be further described.
Detailed step is as follows:
Step 1: to original figurepicture is (see attached figure3) the 2nd kind of coding rule is used to carry out DNA encoding (see attached figure1);
Step 2: Hamming distance, the Hamming of the matrix sequence after calculation code are mended distance against Distance geometry Hamming, and the value obtained is become the decimal between 0-1; By the value that newly obtains respectively with x 0, y 0, z 0be added, obtain new initial value x 1, y 1, z 1; Under the condition of new initial value and systematic parameter, produce three chaos sequence x, y, z;
Step 3: round chaos sequence (x, y) downwards, by the value of the DNA sequence dna matrix in the new sequence scramble step S1 obtained;
Step 4: will insert-application of case-deleted models in ciphering process and chaos sequence (y, z) combine the value of the DNA sequence dna matrix of replacing in S3;
Step 5: the matrix sequence obtained in step 4 is divided into the block that size is 4 × 4; Round chaos sequence (x, z) downwards, with the XOR of the new sequence obtained and DNA sequence dna (see attached figure2) by the value of block diffusion DNA sequence dna matrix;
Step 6: the merged block obtained in step 5 is become the sequence matrix that is new, then regular (see attached with the 3rd DNA decoding figure1) this matrix sequence is decoded, can be encrypted figurepicture.
Embodiment 1
Embodiments of the invention are implemented under premised on technical solution of the present invention, give detailed embodiment and concrete operating process, but protection scope of the present invention are not limited to following embodiment.
Step 1: be the original gradation of (m, n) by size figurepicture changes into a binary matrix; The 2nd rule according to DNA sequence encoding is encoded to binary matrix, can obtain the DNA sequence dna matrix D A that a size is (m, n × 4);
Step 2: given arbitrary initial value x 0, y 0, z 0, then it is mended and obtains new initial value x with the Hamming distance of the decimal be converted between 0-1, the inverse distance of Hamming, Hamming apart from being added respectively 1, y 1, z 1, at x 1, y 1, z 1with under the condition of systematic parameter σ, ρ, β, Lorenz chaotic maps is utilized to produce three chaos sequence x=(x 1, x 2..., x 4n), y=(y 1, y 2..., y 4n), z=(z 1, z 2..., z 4n).
Step 3: do downward floor operation to chaos sequence (x, y), formula is as follows:
x ( i ) = floor ( m × x ( i ) ) , i = 1,2 , . . . , m y ( j ) = floor ( n × y ( j ) ) , j = 1,2 , . . . , n
Wherein x (i) is the value of i-th position in chaos sequence x, and y (j) is the value of a jth position in chaos sequence y, and m is the number of chaos sequence x intermediate value, and n is the number of chaos sequence y intermediate value; With above sequence (x, y) the scramble DA produced, obtain sequence matrix CA.Formula is as follows:
DA ( i , j ) ↔ DA ( x ( i ) , y ( j ) ) ; i = 1,2 , . . . , m , j = 1,2 , . . . , 4 n
Step 4: according to the application of insertion-case-deleted models in ciphering process and chaos sequence (x, z), operation is carried out to the matrix sequence CA obtained and obtain sequence matrix NA;
Step 5: sequence matrix NA is divided into equal block bR{i, j}, i=1,2 ..., m/4, j=1,2 ..., n, wherein the size of each piece is 4 × 4;
By the mode of step 3, sequence (y, z) is rounded downwards, obtain new sequence (y, z); In conjunction with DNA XOR, according to following formula, the block of correspondence is carried out xor operation.
bR(i,j)←bR(i,j)XORbR(y(i),z(j))i=1,2,…,m/4j=1,2,…,n
Step 6: recombinate these blocks bR{i, j} can obtain a DNA matrix sequence HA; Adopt the 3rd kind of coding rule to decode to HA, a binary matrix can be obtained, be encryption figurepicture.
Owing to working as σ=10, ρ=8/3, during β=28, chaos system enters chaos state and can produce three chaos sequences, therefore gets σ=10 herein, ρ=8/3, β=28.Get x simultaneously 0=2, y 0=3, z 0=4 and in conjunction with Hamming distance, Hamming is mended distance against Distance geometry Hamming and is produced new initial value x 1, y 1, z 1.Under these keys above, system emulation result is as attached figure4-is attached figureshown in 9.
Described in summary, this cryptographic algorithm utilizes chaos system to features such as initial value sensitivity and DNA computation model highly-parallel computing powers, is combined by chaos system realizes numeral with insertion-case-deleted models figurethe encryption of picture.This algorithm for encryption is respond well, and simultaneously experiment simulation and analog result show the method and can resist statistical attack, differential attack and exhaustive attack etc., are applicable to figureright in picture transmitting procedure figurethe protection of picture.
The above; be only the present invention's preferably embodiment; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; according to technical scheme of the present invention and design with equivalent replacement or change, all should be encompassed in protection scope of the present invention.

Claims (3)

1. based on the image encryption method of chaos system and insertion-case-deleted models, it is characterized in that: the insertion-case-deleted models in its chaos sequence chaotic maps produced and biochemical reaction combines; First it carry out DNA encoding to original image, then Lorenz is utilized to map the chaos sequence scramble of generation by the DNA sequence dna obtained of encoding, then with insertion-case-deleted models scramble DNA sequence dna again, finally utilize Lorenz to map the chaos sequence produced and dispersion operation is carried out to the DNA sequence dna matrix obtained, finally encrypted image is obtained to sequence matrix decoding.
2. the image encryption method based on chaos system and insertion-case-deleted models according to claim 1, is characterized in that: the concrete steps of described encryption method are as follows:
S1, employing DNA encoding rule are carried out coding to original image and are obtained DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Given arbitrary initial value x 0, y 0, z 0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming mend distance against Distance geometry Hamming, and are converted into the decimal between 0-1, by the new Hamming distance obtained, Hamming against Distance geometry Hamming mend distance respectively with x 0, y 0, z 0be added, obtain new initial value x 1, y 1, z 1; Then coupling system parameter produces three chaos sequences (x, y, z);
The value of the DNA sequence dna matrix in S3, use chaos sequence (x, y) scramble step S1;
Chaos sequence (x, y) is rounded downwards, by the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, value with chaos sequence (x, z) and insertion-case-deleted models scramble DNA sequence dna matrix again;
S5, use chaos sequence (y, z) and the value of XOR to the DNA sequence dna matrix that step S4 obtains carry out dispersion operation;
First matrix sequence is divided into the identical block of size, then chaos sequence (y, z) is rounded downwards, finally in conjunction with the value of XOR by block diffusion DNA sequence dna matrix;
S6, merged block identical for the size obtained in step S5 is obtained a DNA sequence dna matrix, can encrypted image be obtained to its decoding.
3. the image encryption method based on chaos system and insertion-case-deleted models according to claim 1, is characterized in that: the process of described step S4 is as follows: two parts up and down identical sized by first being divided by the DNA sequence dna matrix obtained in step S3; Then identical following operation is carried out to these two parts: using one of DNA sequence dna matrix row as a subsequence, obtain one and the equal-sized one-dimension array of sequence matrix columns; Lorenz chaotic maps is utilized to produce chaos sequence between one identical with array size 0 and 1; If the value of chaos sequence i-th position is less than 0.5, then uses deletion action that the element on array i-th position is deleted, and use update to be inserted into the end of residue array the element deleted; Otherwise do not carry out any operation; Finally two parts are merged into a sequence matrix, namely operation completes.
CN201510009578.8A 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models Expired - Fee Related CN104574259B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510009578.8A CN104574259B (en) 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510009578.8A CN104574259B (en) 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models

Publications (2)

Publication Number Publication Date
CN104574259A true CN104574259A (en) 2015-04-29
CN104574259B CN104574259B (en) 2017-07-11

Family

ID=53090247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510009578.8A Expired - Fee Related CN104574259B (en) 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models

Country Status (1)

Country Link
CN (1) CN104574259B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046636A (en) * 2015-07-13 2015-11-11 郑州轻工业学院 Digital image encryption method based on chaotic system and nucleotide sequence database
CN105119717A (en) * 2015-07-21 2015-12-02 郑州轻工业学院 DNA coding based encryption system and encryption method
CN105678677A (en) * 2016-01-06 2016-06-15 大连大学 Image encryption method based on Hash function and inserting-deleting model
CN106530197A (en) * 2016-10-12 2017-03-22 广东工业大学 Image encryption method based on Kent mapping and generalized Gray codes
CN106651735A (en) * 2016-09-08 2017-05-10 广东工业大学 Chaos theory-based digital image parallel encryption method
CN107437266A (en) * 2017-07-11 2017-12-05 大连大学 Image encryption method based on chaos system Yu DNA chain displacement model
CN107992948A (en) * 2017-10-30 2018-05-04 东北林业大学 Quantum resume image based on chaos system and DNA dynamic codings

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702240A (en) * 2009-11-26 2010-05-05 大连大学 Image encryption method based on DNA sub-sequence operation
CN101706947A (en) * 2009-11-26 2010-05-12 大连大学 Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702240A (en) * 2009-11-26 2010-05-05 大连大学 Image encryption method based on DNA sub-sequence operation
CN101706947A (en) * 2009-11-26 2010-05-12 大连大学 Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HUI-YAN JIANG 等: "An Image Encryption Scheme Based on Lorenz Chaos System", 《FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION》 *
QIANG ZHANG 等: "A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system", 《OPTIK》 *
许进 等: "DNA计算机原理、进展及难点(Ⅳ):论DNA计算机模型", 《计算机学报》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046636A (en) * 2015-07-13 2015-11-11 郑州轻工业学院 Digital image encryption method based on chaotic system and nucleotide sequence database
CN105119717A (en) * 2015-07-21 2015-12-02 郑州轻工业学院 DNA coding based encryption system and encryption method
CN105678677A (en) * 2016-01-06 2016-06-15 大连大学 Image encryption method based on Hash function and inserting-deleting model
CN105678677B (en) * 2016-01-06 2018-11-02 大连大学 Image encryption method based on hash function and insertion-case-deleted models
CN106651735A (en) * 2016-09-08 2017-05-10 广东工业大学 Chaos theory-based digital image parallel encryption method
CN106530197A (en) * 2016-10-12 2017-03-22 广东工业大学 Image encryption method based on Kent mapping and generalized Gray codes
CN107437266A (en) * 2017-07-11 2017-12-05 大连大学 Image encryption method based on chaos system Yu DNA chain displacement model
CN107992948A (en) * 2017-10-30 2018-05-04 东北林业大学 Quantum resume image based on chaos system and DNA dynamic codings
CN107992948B (en) * 2017-10-30 2021-10-19 东北林业大学 Quantum image encryption algorithm based on chaotic system and DNA dynamic coding

Also Published As

Publication number Publication date
CN104574259B (en) 2017-07-11

Similar Documents

Publication Publication Date Title
CN104574259A (en) Image encryption method based on chaotic system and insertion-deletion model
Niu et al. An image encryption approach based on chaotic maps and genetic operations
CN105046636B (en) Digital image encryption method based on chaotic system and nucleotide sequence database
CN108365947B (en) A kind of image encryption method based on Feistel network Yu dynamic DNA encoding
Kumar et al. Development of modified AES algorithm for data security
Liu et al. Color image encryption algorithm based on DNA coding and double chaos system
CN109376540B (en) Image encryption method based on Duffing mapping and genetic operation
Liu et al. Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations
CN101702240B (en) Image encryption method based on DNA sub-sequence operation
Yu et al. Double-image encryption based on spatiotemporal chaos and DNA operations
Xu et al. A novel image encryption algorithm based on self-orthogonal Latin squares
Azimi et al. Color image encryption based on DNA encoding and pair coupled chaotic maps
CN101719908A (en) Image encryption method based on chaos theory and DNA splice model
CN107437266A (en) Image encryption method based on chaos system Yu DNA chain displacement model
CN109194461A (en) Single-track link table ordered encryption decryption method based on dual key stream cipher
CN109756322A (en) Digital image encryption method based on DES structure and DNA encoding
CN109981249A (en) Encrypting and decrypting method and device based on zip mode dynamic hashing and NLFSR
CN107968705A (en) A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system
Roy et al. A dual layer image encryption using polymerase chain reaction amplification and dna encryption
CN101022331B (en) Chaos encrypting method based on carrier
Sermeno et al. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
CN103310157B (en) Based on the image encryption method of RT-DNA cellular automaton
Mezaal et al. OTP encryption enhancement based on logical operations
Godara et al. An improved algorithmic implementation of rail fence Cipher
EP4170959B1 (en) A method of constructing a semi-public key system in qap-based homomorphic encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170711

CF01 Termination of patent right due to non-payment of annual fee