Generalized Scheme For Fractal Based Digital Signature (GFDS)

Summary This paper describes a new development in the cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. Recently it has been shown that it is possible to have digital signature scheme based on fractal due to the strong connection between the Mandelbrot and Julia fractal sets. The link between the two fractal sets is used for the conversion of the private key to a public key. However in the previous work the verification can be done only by a specific party. In this paper we introduce a new variation of the fractal publickey digital scheme (GFDS), whereby the verification of the digital signature can be done by any member of the public.

[1]  A. Samsudin,et al.  New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets , 2007 .

[2]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[3]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[4]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[5]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[6]  Azman Samsudin,et al.  A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets , 2007 .

[7]  Benoit B. Mandelbrot,et al.  Fractal Geometry of Nature , 1984 .

[8]  Dirk Fox,et al.  Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.

[9]  Anna Lysyanskaya,et al.  Signature schemes and applications to cryptographic protocol design , 2002 .

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Kaoru Kurosawa,et al.  Efficient Rabin-type Digital Signature Scheme , 1999, Des. Codes Cryptogr..

[12]  B. Mandelbrot Fractal Geometry of Nature , 1984 .

[13]  Amir Akhavan,et al.  Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.

[14]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  April M. Barton Electronic Signatures in Global and National Commerce Act , 2001 .

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.