Stateless, Ephemeral Identity-Based Encryption via Chaotic Mutual Derivation
Saved in:
| Title: | Stateless, Ephemeral Identity-Based Encryption via Chaotic Mutual Derivation |
|---|---|
| Authors: | COŞAR, CAN BERK |
| Publisher Information: | Zenodo |
| Publication Year: | 2025 |
| Collection: | Zenodo |
| Subject Terms: | Computer Science, Cryptography and Security, Stateless encryption, Chaotic cryptography, Identity-based encryption, Ephemeral key derivation, Forward secrecy, Information Theory |
| Description: | This study introduces a novel cryptographic framework that facilitates end-to-end encryption without the reliance on pre-established secrets, long-term key storage, or third-party trust anchors. Security is achieved solely through the mutual possession of ephemeral identifiers and per-message entropy. Each message is independently encrypted using a deterministic yet chaotic key derivation process, seeded by the concatenation of two device identities and a transient random value. The proposed method is entirely stateless, ephemeral, and symmetric in decryption capability. It provides strong resistance to session-based attacks, enforces forward secrecy by design, and lays the groundwork for private, decentralized, and transient communication protocols. This approach provides a viable alternative to traditional key exchange systems through its identity-driven architecture, and introduces an encryption model particularly suitable for mobile and embedded applications due to its minimal resource requirements. |
| Document Type: | text |
| Language: | English |
| Relation: | https://zenodo.org/records/15382729; oai:zenodo.org:15382729; https://doi.org/10.5281/zenodo.15382729 |
| DOI: | 10.5281/zenodo.15382729 |
| Availability: | https://doi.org/10.5281/zenodo.15382729 https://zenodo.org/records/15382729 |
| Rights: | Creative Commons Attribution Non Commercial 4.0 International ; cc-by-nc-4.0 ; https://creativecommons.org/licenses/by-nc/4.0/legalcode ; © 2025 Can Berk Coşar. Licensed under CC BY-NC 4.0. |
| Accession Number: | edsbas.55AC9DB4 |
| Database: | BASE |
| Abstract: | This study introduces a novel cryptographic framework that facilitates end-to-end encryption without the reliance on pre-established secrets, long-term key storage, or third-party trust anchors. Security is achieved solely through the mutual possession of ephemeral identifiers and per-message entropy. Each message is independently encrypted using a deterministic yet chaotic key derivation process, seeded by the concatenation of two device identities and a transient random value. The proposed method is entirely stateless, ephemeral, and symmetric in decryption capability. It provides strong resistance to session-based attacks, enforces forward secrecy by design, and lays the groundwork for private, decentralized, and transient communication protocols. This approach provides a viable alternative to traditional key exchange systems through its identity-driven architecture, and introduces an encryption model particularly suitable for mobile and embedded applications due to its minimal resource requirements. |
|---|---|
| DOI: | 10.5281/zenodo.15382729 |
Nájsť tento článok vo Web of Science