Stateless, Ephemeral Identity-Based Encryption via Chaotic Mutual Derivation

Saved in:
Bibliographic Details
Title: Stateless, Ephemeral Identity-Based Encryption via Chaotic Mutual Derivation
Authors: COŞAR, CAN BERK
Publisher Information: Zenodo
Publication Year: 2025
Collection: Zenodo
Subject Terms: Computer Science, Cryptography and Security, Stateless encryption, Chaotic cryptography, Identity-based encryption, Ephemeral key derivation, Forward secrecy, Information Theory
Description: This study introduces a novel cryptographic framework that facilitates end-to-end encryption without the reliance on pre-established secrets, long-term key storage, or third-party trust anchors. Security is achieved solely through the mutual possession of ephemeral identifiers and per-message entropy. Each message is independently encrypted using a deterministic yet chaotic key derivation process, seeded by the concatenation of two device identities and a transient random value. The proposed method is entirely stateless, ephemeral, and symmetric in decryption capability. It provides strong resistance to session-based attacks, enforces forward secrecy by design, and lays the groundwork for private, decentralized, and transient communication protocols. This approach provides a viable alternative to traditional key exchange systems through its identity-driven architecture, and introduces an encryption model particularly suitable for mobile and embedded applications due to its minimal resource requirements.
Document Type: text
Language: English
Relation: https://zenodo.org/records/15382729; oai:zenodo.org:15382729; https://doi.org/10.5281/zenodo.15382729
DOI: 10.5281/zenodo.15382729
Availability: https://doi.org/10.5281/zenodo.15382729
https://zenodo.org/records/15382729
Rights: Creative Commons Attribution Non Commercial 4.0 International ; cc-by-nc-4.0 ; https://creativecommons.org/licenses/by-nc/4.0/legalcode ; © 2025 Can Berk Coşar. Licensed under CC BY-NC 4.0.
Accession Number: edsbas.55AC9DB4
Database: BASE
Description
Abstract:This study introduces a novel cryptographic framework that facilitates end-to-end encryption without the reliance on pre-established secrets, long-term key storage, or third-party trust anchors. Security is achieved solely through the mutual possession of ephemeral identifiers and per-message entropy. Each message is independently encrypted using a deterministic yet chaotic key derivation process, seeded by the concatenation of two device identities and a transient random value. The proposed method is entirely stateless, ephemeral, and symmetric in decryption capability. It provides strong resistance to session-based attacks, enforces forward secrecy by design, and lays the groundwork for private, decentralized, and transient communication protocols. This approach provides a viable alternative to traditional key exchange systems through its identity-driven architecture, and introduces an encryption model particularly suitable for mobile and embedded applications due to its minimal resource requirements.
DOI:10.5281/zenodo.15382729