




已阅读5页,还剩8页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
精品论文大全partial generalized synchronization theorem of differential and discrete systems with applications in encryption scheme jianyi jing1,2 , lequan min1,2, , geng zhao31 applied science school, university of science and technology beijing, 100083,2 information and engineer school, university of science and technology beijing, 100083,3 beijing electric science and technology institute, beijing 100079jingjianyijaabstractthis paper presents two theorems for designing controller to make two independent (chaotic) differential equation systems or two inde- pendent (chaotic) discrete systems realize directional partial general- ized synchronization (pgs). two numerical simulation examples are given to illustrate the effectiveness of the proposed theorems. a non- symmetric encryption scheme is introduced based on the theorems. it can be expected that our theorems provide new tools for under- standing and studying pgs phenomena and information encryption.keywords: partial generalized synchronization; differential equa- tion systems, discrete systems, chaos-based encrytion scheme1 introductionsince the last decades, the research of chaos has got much attention (1- 12. one of the reasons for this is that synchronization can be found in many physical, biological and engineering systems.the idea of generalized synchronization (gs) was also gradually developed(13supported by the national nature science foundation of china (nos.70271068, 60674059), the opening re- search fund for the key lab of information security and secrecy at the beijing electronic science and technology institute (no.kykf200605). corresponding author- 1 -16), i.e., all state trajectories of the driven system synchronize with the driving system via a transformation.the researches on gs may provide new tools for constructing secure communication systems(15, 16-22).partial synchronization (ps) is defined as the situation where part of state tra- jectories of synchronized systems mutually asymptotically converge as time goes to infinity. recently, the researches on ps in network have received attention(11,12, 23,24).in this paper, firstly, a new theorem on pgs for differential equation systems is presented. secondly, a constructive theorem to pgs for two discrete systems is established. based on the two theorems, we can design controllers such that two indenpendent systems are in pgs with respect to a prescribed transformer. as a example, the duffing chaotic system can be in pgs with the lorenz chaotic system via designing a controller. as a second example, the discrete lorenz three- dimensional chaotic map can be in pgs with the discrete burgers map. thirdly, a chaos encryption scheme based on our theorems is introduced.2. pgs theorem of differential equation systemsgiven two independent chaotic systems, one is used as the driving system and an- other as the driven system. the goal of partial generalized synchronization is to design an appropriate controller u for the driven system, such that part state vari- ables of the controlled system can be in gs with the driving system.definition 1 (4, 13) consider two systems- 13 -x = f (x ), y= g(y, x ) (1.1)wherex rn , y rm , f (x ) = (f1(x ), f2(x ), , fn (x )t rn , g(y, x ) = (g1(y, x ), g2(y, x ), , gm(y, x ) rm.if there exists a transformation h : rn rm , and a subset b = bx by rn rmsuch that all trajectories of (1.1) with initial conditions in b satisfieslimt+kh (x ) y k = 0.then the systems in (1.1) are said to be in gs with respect to the transformationh .definition 2 consider two independent systemsx = f (x ) (1.2)精品论文大全y k gk (y )wherey =y mk=gmk(y )(1.3)x = (x1 , x2, . . . , xn )t rn , y = (y1, y2, . . . , ym)t rm, y k = (y1, y2, . . . , yk )t rk ,y mk = (yk+1, yk+2, . . . , ym)t rmk ,f (x ) = (f1(x ), f2 (x ), . . . , fn(x )t , gk (y ) = (g1(y ), g2(y ), . . . , gk (y )t ,gmk (y ) = (gk+1(y ), gk+2(y ), . . . , gm(y )t .if there exists a controller umk (x, y ) = (uk+1(x, y ),uk+2(x, y), . . . , um(x, y )t such that y k in the controlled systemy k gk (y )y =y mk=gmk(y ) + umk(1.4)and x in system (1.2) are in gs with respect to a transformation l : rn rk ,that is,limt+kl(x ) y k k = 0.then the systems (1.2) and (1.4) are said to be in pgs with respect to the trans- formation y k = l(x ).theorem 1 let two independent differential (chaotic) system be defined by eqution(1.2) and (1.3), and l : rn rk be a transformation given byl(x ) = (l1 (x ), l2(x ), , lk (x)t = y ksuppose that the function qi(xe , ye ), (i = 1, 2) ensures that the zero solution of the following error equation (1.5) is zero solution asymptotically stable with respect to e = ye xee = qi (xe , ye ) (1.5)if vector y mk can be solved from the equation li gk (y k , y mk ) xjf (x ) = q1 (l(x ), y k ) (1.6)knvia function y mk = m (x, y k ) = (m1(x, y k ),m2(x, y k ), . . . , mmk (x, y k )t . then we can design a controller umk viadm (x, y k )umk (x, y ) =dt+q2 (m (x, y k ), y mk )gmk (y ). (1.7)wheredm (x, y k ) =dt m1m1 m1m1 x1xny1yk mmkmkmkmkx1mn xmy1m k y f (x ) !,gk (y )such that (1.2) and (1.4) are in pgs with respect to y k = l(x ).proof: to be submitted elsewhere.3. pgs theorem of discrete systemsdefinition 3 letx (i + 1) = f (x (i), (1.8)y (i + 1) = yk (i + 1)ymk (i + 1)i = 1, 2, gk (y (i)=gmk (y (i)(1.9)be two discrete systems, wherex rn , y rm , yk rk , ymk rmk .if there exists a transform l : rn rk , k m, such thatlimi+kl(x (i) y k (i)k = 0.then the systems (1.8) and (1.9) are said to be in pgs with respect to the transformy k (i) = l(x (i)theorem 2 given two discrete systems defined by (1.8) and (1.9). let l : rn rkbe a transformation given byl(x ) = (l1 (x ), l2(x ), , lk (x)t = y ksuppose that the function qj (xe (i), ye (i), (j = 1, 2) ensures that the zero solution of the following error equation (1.10) is zero solution asymptotically stable with respect to e(i + 1) = ye (i + 1) xe (i + 1)e(i + 1) = qj (xe (i), ye (i), j = 1, 2. (1.10) if vector y mk (i) can be solved from the equationgk (y k (i), y mk (i) l(f (x (i) = q1 (l(x (i), y k (i) (1.11)via functiony mk (i) = m (x (i), y k (i)= (m1 (x (i), y k (i), m2(x (i), y k (i), . . . , mmk (x (i), y k (i)t .then we can design a controller umk (i) viaumk (i) = m (f (x (i), gk (y (i)+q2(y mk (i), m (x (i), y k (i)gmk (y (i)= (uk+1(i), uk+2(i), , um(i)tsuch that the systems (1.12) and (1.13)x (i + 1) = f (x (i), (1.12)y (i + 1) = yk (i + 1)ymk (i + 1) gk (y (i)=gmk (y (i) + umk (i)(1.13)are in pgs with respect to y k (i + 1) = l(x (i + 1).proof: to be submitted elsewhere.4. numerical simulation4.1 example for theorem 1let two differential chaotic systems be the lorenz system (as driving system)x 1 = x1 + x2x 2 = x1 x2 x1 x3x 3 = x1 x2 x3(1.14)精品论文大全where = 10, = 28, =8, and the duffing system3y1 = y4 y2 = y33 2y = y1 y4 = y4 + y1 y3 + y2(1.15)where = 0.25, = 0.2. if initial conditions of systems (1.14) and (1.15) is selected as (3.3432, 1.9873, 3.5872)t and (1.8641, 25.9282, 13.1516, 4.0240)t , then the systems (1.14) and (1.15) are chaotic. figure 1 shows their chaotic trajectories. we choose qi(xe , ye ) = xe ye (i = 1, 2), i,eq1 (l(x ), y k ) = l(x ) y kq2 (m (x, yk ), y mk ) = m (x, yk ) y mkwe want systems (1.14) and (1.15) be in pgs via the transformation:l(x ) = (l1(x ), l2 (x )wherel1(x ) = k11 x1 + k12x2 + k13 x3 + b1l2(x ) = arctan x2 .where k11 = 2, k12 = 3, k13 = 4, b1 = 5. then from the new theorem, we can getu42 (x, y ) = (u1(x, y ), u2(x, y ),whereu3=3x k1i (xi + 2x i + xi) + b1i=112y4 y1 (y4 + y1 y3 + y2)u4 = arctan x2 +2x 2 + x221 + x22x2 x 222(1 + x2 )22y3 y2 (y2).where x i, xi , (i = 1, 2, 3) can be obtained from system(1.14). the result of pgs of variables x and y 2 are shown in figure 2. the errors go to zero. the numerical simulation verify our theoretical analysis.4.2 example for theorem 2let two discrete chaotic systems be the burgers map system(as driving system)( x1 (i + 1) = ax1 (i) x2 (i)2x2 (i + 1) = bx2 (i) + x1(i)x2 (i)(1.16)where a = 0.75, b = 1.75, and the lorenz three-dimensional chaotic map system y1(i + 1) = y3(i)y2(i + 1) = y1(i)y3(i + 1) = y1(i)y3(i) y2(i)(1.17)if initial conditions of systems (1.16) and (1.17) are selected as (0.1, 0.1)t and (0.5, 1,0.5)t , then the systems (1.16) and (1.17) are chaotic. figure 3 shows their chaotic trajectories.2we choose qj (xe , ye ) = 1 (xe ye )(j = 1, 2), and want systems (1.16) and (1.17)to be in pgs via the transformation:l(x ) = l1 (x ) = k1x1 + k2x2 + b.where k1 = 2, k2 = 3, b = 4. then from the new theorem, we can getu31 (i) = (u2(i), u3(i)twhereu2(i) = 01u3(i) = l(f (f (x (i) l(f (x (i) + 4 l(x (i)1 4 y1(i) + y3(i) y1(i)y3(i) + y2(i).the result of pgs of variables x and y 1 are shown in figure 4. the error goes to zero. the numerical simulation verify our theoretical analysis.(a) lorenz(b) duffing5040x330204010 200 040 20y302040510020 100 10 x12020 40 x20y2 5 10 y1figure 1. chaotic tra jectories of (a) lorenz system and (b) duffing system.(a)40(b)520 002040y2 21 1 22 2 23 3 2k x k x k x b6080y atan(x )5321015201000 10 20 3040t250 10203040tfigure 2 partial generalized sychronization errors vs. time: (c) e1 = y1 - l1 (x) (d) e2 = y2 l2 (x).5. pgs based encryption schemebase on the pgs system, one can establishes non-symmetric encryption scheme. the purposes of the scheme are alice needs her subordinate bob to provide secrete information from public chan-nels. however alice does not hope bob to know her encryption and decryption systems. the scheme has datum authentication function. the scheme has one-pad function.assume that alice has the system (1.2) and knows bobs system (1.3) but bob does not know alices system (1.2).alice and bob share two invertible transforms t1 : rk rk and t2 : r rwhere t2 (0) = 0 for embedding and extracting signal m in chaos stream ciphers.alice designs a transform l : rn rk , functions q1 (x , y ) and a controllerumk (y ) via formulas (1.7).alice gives the controller umk (y ) to bob.now the secure communication scheme is described as follows.1. bob informs alice the length n of the secure message to be transmitted.2. alice uses, at each time, different initial condition x (0) to generate chaos streamsx = x (i) : i = 1, 2, . . . , n . and then transmit l(x (0) and sx to bob.(a)2(b)21 1x2y20 01 132 10202x1y12 2figure 3. chaotic tra jectories of (a) burgers map system and (b) lorenz three-dimensional chaotic map system.(a)64x , y212x ,1011 12 22050100050100ii416x 1015y k x k x b10505(b)figure 3 (a) tra jectories of the variables x1 (solid line), x2 (dashed line), and y1 (dotted line). (b) partial generalized sychronization errors vs. time: e = y1 k1 yx1 k2 x2 b.3. bob uses the initial conditiony (0) = (y k (0), y mk (0)= (l(x (0), m (x (0), l(x (0),the chaos stream sx and (1.4) to generate the chaos streamy k= (y1(i), y2(i), . . . , yk (i) : i = 1, 2, . . . , n.4. bob uses the transform t2 to embed his secure message plaintextm = m(i) : i = 1, 2, . . . , n in to y k by means ofyk= (y1(i) + t2 (m(i), y2(i) + t2 (m(i), y3(i),. . . , yk (i) : i = 1, 2, . . . , n 5. bob uses transform t1 to generate a ciphertext c .c = t1 (y k ).6. bob sends c to alice.7. alice firstly decrypts the ciphertext c byt 11 c l(x )= m 1 (i), m 2(i), . . . , m k (i) :i = 1, 2, . . . , n8. ifm 1 (i) m 2(i),m j (i) 0,j = 2, 3, . . . , k; i = 1, 2, . . . , n.then the ciphertext c is valid and the plaintext can be decrypted via2m= t 1(m 1(i) : i = 1, 2, . . . , n otherwise, at least one among l(x ), s and c has certainly altered by some intruder.remark. since each time alice uses different initial condition x (0) to generate chaos stream, the pseudo-randomness of chaos trajectories of systems (1.2), (1.3) can guarantee the pseudo-randomness of the key stream y k .since bob is difficult to conjecture, from the controller umk (see (1.7) , thetransform l and alices system (1.2), the security of the communication system is higher than that of identity synchronization or known each other encryption systems.step 8) makes alice be able to confirm the authentication of the data. intruders are difficult to figure out the alice and bobs system via the key streams x andy k .since bob usesy (0) = (y k (0), y mk (0)= (l(x (0), m (x (0), y mk (0),as the initial condition, eqs (1.2) and (1.3) guarantee thaty k l(x ) = 0.6. concluding remarksa new theorem to partial generalized synchronization of (chaotic) systems is set up. the stability theory is used to study the asymptotic stability of the synchronization error. this theorem provides a general method for designing controllers to obtain the partial generalized synchronization for a large classes of (chaotic) systems. as an example, controlling the duffing chaotic system to be in pgs with lorenz chaotic system are proposed to illustrate the effectiveness and feasibility of the theorem. thirdly, an non-symmetric encryption scheme based on this theorem is established. it can be expected that our method should have a wide spectrum of practical ap- plications to uncertain and complex synchronization.reference1 v.s.afraimovich, n. n. verichev, and m. i. rabinovich, “stochastically syn- chronized oscillation in dissipative systems,” izv. vyssh. uchebn. zaved. ra- diofiz, vol.29, 1986, pp.1050-1060.2 l.m.pecora and t.l.carroll, “synchronization in chaotic systems,” phys. rev.lett., vol.64(8), 1990, pp. 821-824.3 c.w.wu and l.o.chua, “transmission of digital signals by chaotic synchro- nization,” int. j. bifurcation and chaos, vol.3(6), 1993,pp.1619-1627.4 t. yang and l.o.chua, ”channe-independent chaotic secure communication,”int. j. bifurcation chaos, vol.6(12), 1996, pp.2653-2660 .5 i.i.blekman, a.i.fradkov, h.nijmeijer, and a.y.pogromsky, “on self-synchronization and controlled synchronization,” syst. control lett, vol.31, 1997, pp.299-305.6 g.chen and x.dong, from chaos to order: methodologies, perspectives, andapplications. singapore: world scientific, 1998.7 g.grassi and s.mascolo, “synchronization of highorder oscillators by observer design with application to hyperchaos-based cryptography,” int. j. circuit theory appl., vol.27, 1999, pp.543-553.8 h.n.agiza and m.t.yassen, “synchronization of rossler and chen chaotic dy- namiacal systems using active control,” phys.lett.a, vol.278, 2000 ,pp.191-197.9 g.santoboni, a.pogromsky, and h.nijmeijer, “an observer for phase synchro- nization of chaos,” phys. lett. a, vol.291, 2001, pp.265-273.10 m.itoh and l.o.chua, “reconstruction and synchronization of hyperchaotic circuit via one state variable,” int. j. bifurcation chaos, vol.12, 2002, pp.2069-2085.11 a.pogromsky, g.santoboni, and h.nijmeijer,“partial synchronization: from symmetry toward stability,” physica d, vol.172, 2002, pp.65-87.12 g.santoboni, a.pogromsky, and h.nijmeijer, “partial observer and partial syn- chronization,” int. j. bifurcation chaos, vol.13, 2003, pp.453-458.13 l.kocarev and u.parlitz, “generalized synchronization, predictability,and equiv- alence of unidirectionally coupled dynamical systems,” phys. rev. lett., vol.76,1996, pp.1816-1819.14 b.r.hunt, e.ott, and j.a.york, “differentiable generalized synchronization of chaos,” phys. rev., vol.e5
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 区块链推动办公用品供应链的智能化升级
- 区块链技术下的新型教育模式探索
- 医学科研论文写作中的数据分析技巧
- 教师疫情期间工作总结模版
- 人工智能的商业化应用及发展趋势
- 医疗AI的监管政策与数据保护实践
- 医疗数据共享的区块链解决方案及其效率优化
- 借款用途合同范例写
- 光伏签约合同范例
- 《SPSS Modeler数据挖掘方法及应用(第4版)》全套教学课件
- 【MOOC】数据结构与算法-北京大学 中国大学慕课MOOC答案
- 农村社区体育课件
- 员工培训流程图
- 《微观经济学》考试复习题库(含答案)
- 江苏省南通市2024-2025学年高一上学期11月期中英语试题(无答案)
- 2024年“头脑奥林匹克万人大挑战”题库
- 智研咨询发布:2025年中国金针菜(黄花菜)行业市场全景调查及投资前景预测报告
- 医院定岗定编方案
- 保健推拿操作技术规范 第3部分:小儿DB41-T 1782.3-2019
- 《害羞与社交焦虑症:CBT治疗与社交技能训练》随笔
- AIGC视域下非遗文创产品的数字化转型升级路径研究
评论
0/150
提交评论