Public key cryptosystems based on Iterated Functions Systems
Abstract
Let be a collection of one-to-one functions from some space~ into itself such that the sets are disjoint. If is a word on the alphabet , let . Given a function~ of which we know that it can be written as , it is easy to recover~. We give some examples of this situation where everything can be scrambled up by using some private key to get a new system on another set~ in such a way that the images of the are no longer disjoint. We define a cryptosystem whose public key is~. The message to be encrypted is a word~ and the associated cryptogram is . The private key allows to recover from .
View on arXivComments on this paper
