Fuzzy-Word Based Cryptosystem

Authors

  • Ashutosh Pandey  Department of Mathematics, Kalinga University, Raipur, Chhattisgarh, India
  • Vikas Kumar Jain  Department of Mathematics, Kalinga University, Raipur, Chhattisgarh, India
  • Dharamveer Singh  Department of Mathematics, Kalinga University, Raipur, Chhattisgarh, India
  • Sunil Kumar Kashyap  Department of Mathematics, School of Advanced Sciences, Vellore Institute of Technology University, Vellore, Tamil Nadu, India

Keywords:

Factorization, Discrete Logarithm, RSA, ElGamal, Cryptosystem.

Abstract

A hard mathematical problem interacts with cryptosystem. As Factorization and Discrete Logarithm based cryptosystems are RSA and ElGamal respectively. This paper presents new hard problem as fuzzy-word computing and then its applies on cryptography.

References

  1. L. A. Zadeh, "Fuzzy Sets", Inform. and Control, vol. 8, (1965), pp. 338-353.
  2. L. A. Zadeh, "A theory of approximate reasoning", Machine Intelligence, vol. 9, (1979), pp. 149-194.
  3. L. A. Zazeh, "A computational approach to fuzzy quantifiers in Natural Languages", Computation and Mathematics, vol. 9, (1983), pp. 149-184.
  4. A. De Luca and S. Termini, "A definition of non probabilistic entropy in the settings of fuzzy set theory", Information and Control, vol. 20, (1972), pp. 301-312.
  5. H. K. Baruah, "Fuzzy Membership with respect to a Reference Function", Journal of the Assam Science Society, vol. 40, no. 3, (1999), pp. 65-73.
  6. H. K. Baruah, "Towards Forming a Field of Fuzzy Sets", International Journal of Energy Information and Communications, vol. 2, no. 1, (2011), pp. 16 - 20.
  7. H. K. Baruah, "Theory of Fuzzy sets Beliefs and Realities", International Journal of Energy, Information and Communications, vol. 2, no. 2, (2011), pp. 1-22.
  8. H. K. Baruah, "In Search of the Root of Fuzziness: The Measure Theoretic Meaning of Partial Presence", Annals of Fuzzy Mathematics and Informatics, vol. 2, no. 1, (2011), pp. 57 - 68.
  9. M. Dhar, "On Hwang and Yang’s definition of Entropy of Fuzzy sets", International Journal of Latest Trend Computing, vol. 2, no. 4, (2011), pp. 496-497.
  10. M. Dhar, "A Note on existing Definition of Fuzzy Entropy", International Journal of Energy Information and Communications, vol. 3, no. 1, (2012), pp. 17-21.
  11. M. Dhar, "On Separation Index of Fuzzy Sets", International Journal of Mathematical Archives, vol. 3, no. 3, (2012), pp. 932-934.
  12. M. Dhar, "On Geometrical Representation of Fuzzy Numbers", International Journal of Energy Information and Communications, vol. 3, no. 2, (2012), pp. 29-34.
  13. M. Dhar, "On Fuzzy Measures of Symmetry Breaking of Conditions, Similarity and Comparisons: Non Statistical Information for the Single Patient", International Journal of Mathematical Archives, vol. 3, no. 7, (2012), pp. 2516-2519.
  14. M. Dhar, "A Note on Subsethood measure of fuzzy sets", International Journal of Energy, Information and Communications, vol. 3, no. 3, (2012), pp. 55-61.
  15. J. Casasnovas and J. Torrens, "Scalar cardinalities of finite fuzzy sets for t-norms and t-conorms", Int. J. Uncertain. Fuzziness Knowl. - Based System, vol. 11, no. 5, (2003), pp. 599-614.
  16. H. x. Li, "The cardinality of fuzzy sets and the continum hypothesis", Fuzy Sets and Systems, vol. 55, (1993), pp. 61-78.
  17. M. Wygralak, "An axiomatic approach to scalar cardinalities of fuzzy sets", Fuzzy sets and Systems, vol. 110, no. 2, (2000), pp. 175-179.
  18. D. Dubois and H. Prade, "Fuzzy cardinality and Modelling of impresice quantification", Fuzy sets and System, vol. 16, (1985), pp. 199-230.
  19. D. Dubois and H. Prade, "Scalar evaluation of Fuzzy sets", Appl. Math. Lett., vol. 3, no. 2, (1990), pp. 37-42.
  20. S. Gottwald, "A note on fuzzy cardinals", Kybernetika, vol. 16, (1980), pp. 156-158.
  21. D. Raselsu, "Cardinality, quantifiers and the aggregation of fuzzy criteria", Fuzzy Sets and Systems, vol. 69, (1995), pp. 355-365.
  22. Y. Bason, D. Neagu and M. J. Ridley, "Fuzzy Set Theoretic Approach for Comparing Objects with Fuzzy Attributes", 11th International Conference on Intelligent Systems, Design and Applications, (2011), pp. 754- 759.
  23. S. Janssens, B. de Baets and H. de Meyer, "Transitivity of Comparision Measures", Fuzzy Systems, (2002), pp. 1369-1372. International Journal of Energy, Information and Communications Vol. 4, Issue 1, February, 2013.
  24. Peter Stavroulakis, Mark Stamp: Handbook of Information and Communication Security. Springer 2010, ISBN 978-3-642-04116-7
  25. A. Juels, M. Wallenberg: A Fuzzy Commitment Scheme, Proc. 6th ACM Conference on Computer and Communications Security, Singapore (1999) pp. 28-36
  26. A. Juels, M. Sudan: A Fuzzy Vault Scheme, Proc. IEEE Int. Symposium on Information Theory, Lau-sanne (2002) p. 408
  27. Y. J. Chang, W. Zhang, T. Chen: Biometrics Based Cryptographic Key Generation, Proc. IEEE Conference on Multimedia and Expo, Taipei, Vol. 3 (2001) pp. 2203-2206
  28. C. Vielhauer, R. Stcinmctz, A. Maycrhofcr: Biomctric Hash Based on Statistical Features of Online Signatures, Proc. 16th Int. Conference on Pattern Recognition, Quebec, Vol. 1 (2002) pp. 123-126
  29. Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Technical Report 235, Cryptology ePrint Archive (February 2006)
  30. G Margarov, M Tolba, Biometrics based secret sharing using fuzzy vault. 7th IntConf on Computer Science and Information Technologies (CSIT'09) (2009), Singapore.
  31. M. Savvides, B.V.K. Vijaya Kumar, and P.K. Khosla, "Cancelable biometric filters for face recognition", ICPR, 23- 26 Aug. 2004, pp. 922-925 Vol.3.
  32. A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Filterbank-based Fingerprint Matching", IEEE Trans. Image Process., 2000, 846-859.
  33. U. Uludag, S. Pankanti, S. Prabhakar, and A.K Jain, "Biometric cryptosystems: issues and challenges", Proceedings of the IEEE, Volume 92, Issue 6, June 2004, pp. 948 - 960.
  34. C. H. Lin, and Y.-Y. Lai, "A flexible biometrics remote user authentication scheme", Computer Standards & Interfaces, Volume 27, no. 1, Nov. 2004, pp. 19-23.
  35. T. C. Clancy, N. Kiyavash, and D.J. Lin, "Secure smartcard-based fingerprint authentication", ACM Workshop on Biometrics: Methods and Applications, Nov. 2003, pp. 45-52.
  36. U. Uludag, A. Jain, "Fuzzy Fingerprint Vault", Proc. Workshop: Biometrics: Challenges Arising from Theory to Practice, pp.1316, Aug 2004.
  37. L. A. Zadeh, Fuzzy Logic = Computing with words, IEEE Transactions on Fuzzy Systems, 4(2), 1996.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Ashutosh Pandey, Vikas Kumar Jain, Dharamveer Singh, Sunil Kumar Kashyap, " Fuzzy-Word Based Cryptosystem, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.406-412, July-August-2017.