{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:42:55Z","timestamp":1740120175728,"version":"3.37.3"},"reference-count":36,"publisher":"World Scientific Pub Co Pte Ltd","issue":"13","funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572089","61702221"],"award-info":[{"award-number":["61572089","61702221"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["2018CDXYJSJ0026"],"award-info":[{"award-number":["2018CDXYJSJ0026"]}]},{"name":"the Youth Science and Technology Talent Project of Guizhou Provincial Education Department","award":["QianJiaoHe-KY-Zi[2017]210","QianJiaoHe-KY-Zi[2018]260"],"award-info":[{"award-number":["QianJiaoHe-KY-Zi[2017]210","QianJiaoHe-KY-Zi[2018]260"]}]},{"name":"the Science and Technology Foundation Project of Guizhou Province","award":["QianKeHeJiChu[2016]1115"],"award-info":[{"award-number":["QianKeHeJiChu[2016]1115"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Bifurcation Chaos"],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:p> The inherent random-like behavior and one-way property of iteration in chaotic systems provide a good basis for designing Hash function. In the era of big data, due to the increasing data capacity in applications, fast Hash functions with parallel mode are highly desirable when authenticating data integrity. We analyze the issue of how to parallelize Hash function with iterative structure. Some security requirements on parallel Hash function are presented. In addition, using chaotic map and block cipher, we construct a keyed parallel Hash function. The message blocks are firstly processed in parallel by a DM-like structure. Furthermore, a tree mode with chaotic map is utilized to combine the outputs of the hash round function in parallel. The proposed Hash function is analyzed by theory and tested by computer simulations. The test results show that the proposed scheme can resist the various common attacks against Hash functions. It satisfies the secure performance requirements of Hash function. Owing to the usage of the parallel mode to process messages, the proposed chaos-based Hash function possess high efficiency and has high potential in applications to guarantee data integrity on a parallel computing platform. <\/jats:p>","DOI":"10.1142\/s0218127420501886","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T01:22:12Z","timestamp":1604020932000},"page":"2050188","source":"Crossref","is-referenced-by-count":0,"title":["Design and Analysis on a Parallel Chaos-Based Hash Function"],"prefix":"10.1142","volume":"30","author":[{"given":"Zhuo","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China"},{"name":"School of Mathematics and Big Data, Guizhou Education University, Guiyang 550000, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5247-043X","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China"}]},{"given":"Gongkun","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China"}]},{"given":"Leo Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Victoria 3216, Australia"}]}],"member":"219","published-online":{"date-parts":[[2020,10,29]]},"reference":[{"key":"S0218127420501886BIB001","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s13319-017-0123-1","volume":"8","author":"Ahmad M.","year":"2017","journal-title":"3D Res."},{"key":"S0218127420501886BIB002","first-page":"1","volume":"1","author":"Ahmad M.","year":"2018","journal-title":"Int. J. Inform. Technol."},{"key":"S0218127420501886BIB004","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1109\/TDSC.2016.2616876","volume":"15","author":"Chatterjee S.","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"S0218127420501886BIB005","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"CRYPTO \u201989","volume":"435","author":"Damgard I.","year":"1989"},{"key":"S0218127420501886BIB006","first-page":"843","volume-title":"Int. Conf. Computer Communications","author":"Davis R. C.","year":"1984"},{"key":"S0218127420501886BIB007","doi-asserted-by":"crossref","first-page":"1338","DOI":"10.1016\/j.cnsns.2009.05.065","volume":"15","author":"Deng S.","year":"2010","journal-title":"Commun. Nonlin. Sci. Numer. Simulat."},{"key":"S0218127420501886BIB008","first-page":"99","volume":"1","author":"Feng J.","year":"2018","journal-title":"IEEE. Trans. Dependable Secur. Comput."},{"key":"S0218127420501886BIB009","doi-asserted-by":"crossref","first-page":"4869","DOI":"10.1073\/pnas.1721852115","volume":"115","author":"Gilpin W.","year":"2018","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"S0218127420501886BIB010","doi-asserted-by":"crossref","first-page":"4753","DOI":"10.1007\/s11042-015-2501-0","volume":"75","author":"Guesmi R.","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"S0218127420501886BIB011","doi-asserted-by":"crossref","first-page":"17701","DOI":"10.1007\/s11042-018-7084-0","volume":"78","author":"Gul E.","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"S0218127420501886BIB012","doi-asserted-by":"crossref","first-page":"3201","DOI":"10.1016\/j.physleta.2009.07.016","volume":"373","author":"Guo W.","year":"2009","journal-title":"Phys. Lett. A"},{"key":"S0218127420501886BIB013","doi-asserted-by":"crossref","first-page":"3670","DOI":"10.1109\/TII.2019.2901011","volume":"15","author":"Huang K.","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"S0218127420501886BIB014","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.cnsns.2012.06.019","volume":"20","author":"Kanso A.","year":"2013","journal-title":"Commun. Nonlin. Sci. Numer. Simulat."},{"key":"S0218127420501886BIB015","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11071-015-1970-z","volume":"81","author":"Kanso A.","year":"2015","journal-title":"Nonlin. Dyn."},{"key":"S0218127420501886BIB016","first-page":"55","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques","author":"Lai X.","year":"1992"},{"key":"S0218127420501886BIB017","doi-asserted-by":"crossref","first-page":"2071","DOI":"10.1007\/s11071-015-2126-x","volume":"81","author":"Lee T.-F.","year":"2015","journal-title":"Nonlin. Dyn."},{"key":"S0218127420501886BIB018","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00521-010-0432-2","volume":"20","author":"Li Y.-T.","year":"2011","journal-title":"Neural Comput. Appl."},{"key":"S0218127420501886BIB019","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.chaos.2016.08.014","volume":"91","author":"Li Y.-T.","year":"2016","journal-title":"Chaos Solit. Fract."},{"key":"S0218127420501886BIB020","first-page":"102361","volume":"48","author":"Li C.-Q.","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"S0218127420501886BIB022","first-page":"1750106-1","volume":"27","author":"Lin Z.-S.","year":"2017","journal-title":"Int. J. Bifurcation and Chaos"},{"key":"S0218127420501886BIB023","doi-asserted-by":"crossref","first-page":"37211","DOI":"10.1109\/ACCESS.2019.2896661","volume":"1","author":"Liu H.-J.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218127420501886BIB024","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127419501189"},{"key":"S0218127420501886BIB025","first-page":"5658","volume":"10","author":"Matyas S.","year":"1985","journal-title":"IBM Tech. Disc. Bull."},{"key":"S0218127420501886BIB026","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1587\/transinf.2015ICP0028","volume":"99","author":"Mazumder R.","year":"2016","journal-title":"IEICE Trans. Inf. Syst."},{"key":"S0218127420501886BIB027","unstructured":"Menezes, A. J.,  Van Oorschot, P. C. &  Vanstone, S. A.  [1996]  Handbook of Applied Cryptography,  Chapter 9  (CRC Press,  NY),  pp. 321\u2013385."},{"key":"S0218127420501886BIB028","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"CRYPTO \u201989","volume":"435","author":"Merkle R. C.","year":"1989"},{"key":"S0218127420501886BIB029","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"CRYPTO \u201989","volume":"435","author":"Merkle R. C.","year":"1989"},{"key":"S0218127420501886BIB030","first-page":"150","volume-title":"COMPEURO Proc. VLSI and Computer Peripherals. IEEE Computer Society","author":"Meyer C. H.","year":"1989"},{"key":"S0218127420501886BIB031","doi-asserted-by":"crossref","first-page":"2834","DOI":"10.1109\/TIFS.2019.2907459","volume":"14","author":"Rua E. A.","year":"2019","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"S0218127420501886BIB032","doi-asserted-by":"crossref","first-page":"069903","DOI":"10.1103\/PhysRevE.99.069903","volume":"99","author":"Senyange B.","year":"2019","journal-title":"Phys. Rev. E"},{"key":"S0218127420501886BIB033","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1007\/s11071-015-2049-6","volume":"81","author":"Teh J. S.","year":"2015","journal-title":"Nonlin. Dyn."},{"key":"S0218127420501886BIB034","first-page":"557","volume":"67","author":"Todorova M.","year":"2019","journal-title":"Bull. Pol. Acad. Sci.-Chem."},{"key":"S0218127420501886BIB036","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11426639_1","volume-title":"Eurocrypt 2005","volume":"3494","author":"Wang X.","year":"2005"},{"key":"S0218127420501886BIB037","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/S0375-9601(02)01770-X","volume":"307","author":"Wong K.-W.","year":"2003","journal-title":"Phys. Lett. A"},{"key":"S0218127420501886BIB038","doi-asserted-by":"crossref","first-page":"4682","DOI":"10.1016\/j.physleta.2008.04.060","volume":"372","author":"Xiao D.","year":"2008","journal-title":"Phys. Lett. A"},{"key":"S0218127420501886BIB039","doi-asserted-by":"crossref","first-page":"4346","DOI":"10.1016\/j.physleta.2009.09.059","volume":"373","author":"Xiao D.","year":"2009","journal-title":"Phys. Lett. A"}],"container-title":["International Journal of Bifurcation and Chaos"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218127420501886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T01:23:36Z","timestamp":1604021016000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218127420501886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":36,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["10.1142\/S0218127420501886"],"URL":"https:\/\/doi.org\/10.1142\/s0218127420501886","relation":{},"ISSN":["0218-1274","1793-6551"],"issn-type":[{"type":"print","value":"0218-1274"},{"type":"electronic","value":"1793-6551"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}