82

Public key cryptosystems based on Iterated Functions Systems

Abstract

Let f=(f0,f1,,fν1)f=(f_0,f_1,\dots, f_{\nu-1}) be a collection of one-to-one functions from some space~XX into itself such that the sets fj(X)f_j(X) are disjoint. If w=w1w2wkw=w_1w_2\cdots w_k is a word on the alphabet {0,1,,ν1}\{0,1,\dots,\nu-1\}, let Φf,w=fw1fw2fwk\Phi_{f,w} = f_{w_1}\circ f_{w_2}\circ\cdots\circ f_{w_k}. Given a function~FF of which we know that it can be written as Φf,w\Phi_{f,w}, it is easy to recover~ww. We give some examples of this situation where everything can be scrambled up by using some private key to get a new system g=(g1,g2,,gν1)g=(g_1,g_2,\dots,g_{\nu-1}) on another set~YY in such a way that the images of the gjg_j are no longer disjoint. We define a cryptosystem whose public key is~gg. The message to be encrypted is a word~ww and the associated cryptogram is Φg,w\Phi_{g,w}. The private key allows to recover Φf,w\Phi_{f,w} from Φg,w\Phi_{g,w}.

View on arXiv
Comments on this paper