{"id":"https://openalex.org/W4319341810","doi":"https://doi.org/10.1109/tcsi.2023.3241350","title":"A Novel Method for Authentication Using Chaotic Behaviour of Chua\u2019s Oscillator in (n,k) Secret Shared Data Scheme for Secure Communication","display_name":"A Novel Method for Authentication Using Chaotic Behaviour of Chua\u2019s Oscillator in (n,k) Secret Shared Data Scheme for Secure Communication","publication_year":2023,"publication_date":"2023-02-07","ids":{"openalex":"https://openalex.org/W4319341810","doi":"https://doi.org/10.1109/tcsi.2023.3241350"},"language":"en","primary_location":{"id":"doi:10.1109/tcsi.2023.3241350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2023.3241350","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102941824","display_name":"Navneet Sharma","orcid":"https://orcid.org/0009-0008-8785-0783"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Navneet Sharma","raw_affiliation_strings":["Thapar Institute of Engineering and Technology (TIET), Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Thapar Institute of Engineering and Technology (TIET), Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002441808","display_name":"Pravindra Kumar","orcid":"https://orcid.org/0000-0003-4273-1082"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pravindra Kumar","raw_affiliation_strings":["Thapar Institute of Engineering and Technology (TIET), Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Thapar Institute of Engineering and Technology (TIET), Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014511229","display_name":"Shireesh Kumar","orcid":"https://orcid.org/0000-0001-7230-0166"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shireesh Kumar Rai","raw_affiliation_strings":["Thapar Institute of Engineering and Technology (TIET), Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Thapar Institute of Engineering and Technology (TIET), Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102941824"],"corresponding_institution_ids":["https://openalex.org/I162030827"],"apc_list":null,"apc_paid":null,"fwci":2.5319,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91128895,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"70","issue":"5","first_page":"2098","last_page":"2105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12946","display_name":"Fractal and DNA sequence analysis","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6518348455429077},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6453859806060791},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5398188829421997},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5356729626655579},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5224111080169678},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5025413036346436},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5016579627990723},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5006332397460938},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4633396863937378},{"id":"https://openalex.org/keywords/communications-security","display_name":"Communications security","score":0.4324685335159302},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4258131980895996},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34695005416870117},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2778438329696655},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2744797468185425},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2462434470653534},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24495995044708252},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11558407545089722},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10298535227775574}],"concepts":[{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6518348455429077},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6453859806060791},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5398188829421997},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5356729626655579},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5224111080169678},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5025413036346436},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5016579627990723},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5006332397460938},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4633396863937378},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.4324685335159302},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4258131980895996},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34695005416870117},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2778438329696655},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2744797468185425},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2462434470653534},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24495995044708252},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11558407545089722},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10298535227775574},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsi.2023.3241350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2023.3241350","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1525451859","https://openalex.org/W1882297107","https://openalex.org/W1899712432","https://openalex.org/W1970442252","https://openalex.org/W1980707418","https://openalex.org/W1986392769","https://openalex.org/W1987292828","https://openalex.org/W1988065796","https://openalex.org/W1998830143","https://openalex.org/W2005906667","https://openalex.org/W2009292729","https://openalex.org/W2012038630","https://openalex.org/W2024331447","https://openalex.org/W2025266594","https://openalex.org/W2030308994","https://openalex.org/W2037447281","https://openalex.org/W2038177045","https://openalex.org/W2043964945","https://openalex.org/W2049249892","https://openalex.org/W2061695646","https://openalex.org/W2062342873","https://openalex.org/W2066931334","https://openalex.org/W2070526619","https://openalex.org/W2108834246","https://openalex.org/W2128995499","https://openalex.org/W2129332069","https://openalex.org/W2140514366","https://openalex.org/W2141420453","https://openalex.org/W2166780626","https://openalex.org/W2167989228","https://openalex.org/W2998325782","https://openalex.org/W3104632232","https://openalex.org/W4205949069","https://openalex.org/W4232836212","https://openalex.org/W4282919009","https://openalex.org/W4285266728","https://openalex.org/W4293168393","https://openalex.org/W6631309226","https://openalex.org/W6891848087"],"related_works":["https://openalex.org/W3210438939","https://openalex.org/W2157901542","https://openalex.org/W2280933377","https://openalex.org/W2783731972","https://openalex.org/W4312776354","https://openalex.org/W4248541521","https://openalex.org/W1582906022","https://openalex.org/W1550771246","https://openalex.org/W9162323","https://openalex.org/W2132034299"],"abstract_inverted_index":{"In":[0,90],"the":[1,4,63,66,85,93,101,177],"current":[2],"scenario,":[3],"utilization,":[5],"and":[6,115,141],"advancement":[7],"of":[8,19,51,62,107,122,181,189],"security":[9,53,67,108,117,133],"algorithms":[10,23,68],"in":[11,37,84,167],"communication":[12,34,39,88],"models":[13],"have":[14],"been":[15,127],"increased.":[16],"The":[17,48,103,119,135,156],"use":[18],"chaotic":[20,94,120],"circuit-based":[21],"secure":[22,33,87],"can":[24,41],"give":[25],"a":[26,31,77,186],"new":[27],"direction":[28],"to":[29,56,99,129,139],"develop":[30],"highly":[32],"model.":[35,89],"Security":[36],"any":[38,52],"model":[40],"be":[42],"provided":[43],"by":[44],"various":[45],"available":[46],"methods.":[47],"main":[49,105],"feature":[50],"method":[54],"is":[55,97,138,165,174],"introduce":[57],"randomness":[58],"at":[59],"every":[60],"step":[61],"algorithm.":[64],"Generally,":[65],"deal":[69],"with":[70,81,185],"random":[71,78],"numbers":[72],"that":[73],"are":[74,110],"generated":[75],"using":[76,153],"number":[79],"generator":[80],"predefined":[82],"logic":[83],"conventional":[86],"this":[91,168],"article,":[92],"behavioral":[95],"circuit":[96,125],"used":[98,128],"handle":[100],"randomness.":[102],"three":[104,132],"classifications":[106],"control":[109],"management":[111],"security,":[112,114],"operational":[113],"physical":[116],"controls.":[118,134],"behavior":[121],"high-dimensional":[123],"Chua\u2019s":[124,154,163],"has":[126],"implement":[130],"these":[131],"challenging":[136],"task":[137],"design":[140],"deploy":[142],"<inline-formula":[143],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[144],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[145],"<tex-math":[146],"notation=\"LaTeX\">$(n,k$":[147],"</tex-math></inline-formula>":[148],")":[149],"secret":[150],"sharing":[151],"scheme":[152],"oscillator.":[155],"novel":[157],"authenticator":[158,171],"code":[159,172],"function":[160,173],"based":[161],"on":[162],"oscillator":[164],"proposed":[166],"paper.":[169],"This":[170],"having":[175],"almost":[176],"same":[178],"characteristics":[179],"as":[180],"hash":[182],"code,":[183],"but":[184],"higher":[187],"degree":[188],"security.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
