Skip to main content
Log in

A Framework for Real-Valued Cipher Systems

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 1976, 22(6): 644–654.

    Article  Google Scholar 

  2. F. Dachselt and W. Schwarz, Chaos and cryptography, IEEE Transactions on Circuits and Systems-1, 2001, 48(12): 1498–1509.

    Article  Google Scholar 

  3. O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge University Press, Cambridge, 2001.

    Google Scholar 

  4. L. Blum, F. Cucker, M. Shub, and S. Smale, Complexity and Real Computation, Springer-Verlag, New York, 1998.

    Google Scholar 

  5. L. Blum, Computing over the reals: where Turing meets Newton, Notices of the AMS, 2004, 51(9): 1024–1034.

    Google Scholar 

  6. M. Gotz and et al., Discrete-time chaotic coders for information encryption - Part 1: statistical design approach, IEEE Transactions on Circuits and Systems-1, 1997, 44(10): 963–970.

    Google Scholar 

  7. R. C. Merkle and M. E. Hellman, Hiding information and signatures in trapdoor knapsacks, IEEE Transactions on Information Theory, 1978, 24(5): 525–530.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaozhi Zhang.

Additional information

The research is supported by the National Natural Science Foundation of China under Grant No. 90304012 and No. 10331030.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Z., Jiang, N. A Framework for Real-Valued Cipher Systems. Jrl Syst Sci & Complex 20, 486–491 (2007). https://doi.org/10.1007/s11424-007-9045-y

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-007-9045-y

Keywords

Navigation