Generation method of bimatrix combined public key

A technology of combining public keys and matrices, applied to the public key and key distribution of secure communication, it can solve the problems of collusion attack, difficulty in proof, inability to realize digital signature, etc., and achieve the effect of reducing storage amount and increasing variation amount.

Inactive Publication Date: 2011-04-20
北京联合智华微电子科技有限公司
View PDF6 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In 1984, Shamir proposed the IBC algorithm, which belongs to a centrally defined single-factor mechanism, which is generated by the key management center and realizes the digital signature key based on the identity, so that the development of the public key has advanced to the second stage of development. Enables identity-based key exchange
[0006] In 2001, Dan Boneh and Matthew Franklin of th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method of bimatrix combined public key
  • Generation method of bimatrix combined public key
  • Generation method of bimatrix combined public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The public key system is a technical means to realize digital signature and key exchange. In the identification system, identification identification is the core of identification. The specific implementation of the identification authentication system according to the present invention will be further described in detail from the aspects of system, protocol, etc. below. It should be noted that the specific implementation of the double-matrix combined public key technology and identification authentication system according to the present invention is only an example, but the present invention is not limited to this specific implementation.

[0038] The following is a detailed description of the double-matrix combined public key system:

[0039] The dual-matrix combined public key is implemented on the basis of the combined public key (CPK). For details, please refer to the applicant's prior application 200510002156.4 "Key Generation Method Based on Identification".

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security and discloses a generation method of a bimatrix combined public key on the basis of a combined public key (CPK) system based on identification, which is capable of resisting collusion attack and improving the security of a public key system. The generation method is as follows: a private key management center defines and generates a public key combined matrix I and a public key combined matrix II, the public key combined matrix I generates identified private keys, the public key combined matrix II generates segmented private keys, and the identified private keys and the segmented private keys are combined to generate the combined private key and are mutually encrypted, the liner combination relation among the private keys is hidden, the collusion possibility is eliminated and the safety is proved. A main private key of the combined public key constructed by two matrixes includes two matrixes, and has stronger capability of resisting quantum computing attack than other systems for protecting the system security by one main private key.

Description

technical field [0001] The invention relates to a public key system, more specifically to a method for generating a public key, and belongs to the technical field of information security. Background technique [0002] Information security mainly involves authentication techniques and data confidentiality. Authentication technology mainly relies on authentication protocols and digital signatures. Data confidentiality relies on key exchange protocols. In the PKI authentication system based on trust logic, the signature key is required to be defined by an individual to ensure the privacy and exclusiveness of the signature key. No one else, including the key management center, should have the same signature key. In the CPK authentication system based on trusted logic, all keys are required to be uniformly defined by the key management center. At the same time, in the case of an individual defining a key, identity authentication and key exchange cannot be realized. Therefore, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08
Inventor 南相浩
Owner 北京联合智华微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products