Multivariable public-key encryption/decryption system and method based on hypersphere

A multi-variable public key, hypersphere technology, applied in the field of information security

Active Publication Date: 2014-05-07
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is a double-edged sword, because the structure of K makes decryption easy, but such a structure is also easily exploited by attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multivariable public-key encryption/decryption system and method based on hypersphere
  • Multivariable public-key encryption/decryption system and method based on hypersphere
  • Multivariable public-key encryption/decryption system and method based on hypersphere

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Such as figure 1 , a hypersphere-based multivariate public-key encryption / decryption system, comprising:

[0054] A, the selector, which is connected with the scheduler in the processor, when the selector is in the open state, the encryption module of the system works, and when the selector is in the closed state, the decryption module of the system works;

[0055] B, encryption module, is used for encrypting the plaintext to be encrypted, forms ciphertext, completes encryption, and it comprises processor, public key transformation part, and the plaintext to be encrypted is transmitted to processor, and wherein processor comprises scheduler, Hash Detector, memory, Hash detector calculates the hash value of the plaintext, obtains the hash redundant data of the plaintext, and stores the plaintext and its hash redundant data of the plaintext in the memory, and then transmits the plaintext data to the public key transformation component, public The key transformation compo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multivariable public-key encryption / decryption system based on a hypersphere. The system includes an encryption module and a decryption module, wherein the encryption module includes a processor and a public-key conversion part which converting plaintext into ciphertext; and the decryption module includes a processor, an affine transformation inversion part I, a trap door part and an affine transformation inversion part II. The trap door part includes a linear equation set construction part and a linear equation set solution part and different parts execute corresponding operations. At last, a group of data is obtained and the group of data is stored and output as decrypted plaintext. If no data is generated by the decryption module, the processor outputs alarm information of decryption error to a user. The system and the method do not use a large-domain technology, and designed center mapping includes N groups of sphere centers used as private keys so as to realize center hiding and at the same time, operation speed is significantly high and a decryption process only requires solution of a linear equation set.

Description

technical field [0001] The invention relates to the field of information security, in particular to a hypersphere-based multivariable public key encryption / decryption system and method. Background technique [0002] Cryptography technology is the core and foundation of information security, and it is widely used in network communication, e-commerce, banking, national defense and military and other fields. Cryptographic techniques include symmetric cryptography and asymmetric cryptography, and asymmetric cryptography is also called public key cryptography. [0003] At present, the security of public key cryptography mainly depends on difficult problems such as large integer decomposition and discrete logarithm solution, such as RSA, ECC and so on. However, since the method of decomposing large integers and solving discrete logarithms on quantum computers was proposed, this type of traditional public-key cryptography has been greatly threatened, affecting various industries. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L9/3093H04L9/0852H04L9/3066
Inventor 唐韶华陈家辉
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products