Full Length Research Paper
Abstract
In this paper, an attempt is made to develop a functional encryption scheme by exploiting the strength and redefining the operational limits of two related existing schemes. Various parameters used for comparative assessment show that the proposed scheme is better than the existing ones in terms of functionality, strength and suitability for applications in securing messages on networks and work files on stand-alone databases.
Key words: Chaos, cryptography, logistic map.
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0