Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Public key encryption method based on cells

A public key encryption and public key technology, applied in key distribution, can solve problems such as mathematical difficulties

Active Publication Date: 2019-08-16
北京信息科学技术研究院
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the RLWE problem uses a special ring structure, and this ring structure may be exploited by the adversary to solve the corresponding mathematically difficult problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key encryption method based on cells
  • Public key encryption method based on cells
  • Public key encryption method based on cells

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to further illustrate the technical solution of the present invention, the public key encryption method of the present invention will be further described in detail below in conjunction with specific examples.

[0061] The present invention at first provides the definition of some basic symbols as follows:

[0062] 1) represents a collection of integers, that is, Represents the set of residual classes modulo q, namely where q is a positive integer; for any positive integer n, means n direct product of

[0063] 2) Represents a set of real numbers; Represents the set composed of positive real numbers; Represents a set of positive integers, that is,

[0064] 3) order is a positive integer, R q is defined in The degree of polynomial ring on is n-1; when n=1, define for any positive integer means k R q direct product of for any positive integer expressed in R q A set of k×k matrices composed of elements in ;

[0065] 4) For ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a public key encryption method based on cells. The invention firstly proposes a class of asymmetric modular band error learning (AMLWE) mathematics difficulty problems, and also provides variations and generalized definitions of the class of mathematics difficulty problems. Based on the AMLWE mathematical difficulty problem, the invention provides a public key encryption method for selecting plaintext security on a grid. Based on the encryption method, the invention also provides a key encapsulation mechanism for selecting ciphertext security and a public key encryptionmethod for selecting ciphertext security. The public key encryption method and the key packaging mechanism designed by the invention have the characteristics and advantages of proving security, resisting quantum computer attacks, being short in public key and ciphertext length, high in calculation efficiency, flexible in parameter selection and the like. By utilizing a universal conversion method, the invention also provides (authenticated) a key exchange protocol.

Description

technical field [0001] The invention belongs to the field of public key encryption in cryptography, relates to the use of related technologies in lattice cryptography, and is embodied as a lattice-based public key encryption method, which can resist quantum computer attacks. Background technique [0002] Public key cryptography has been widely deployed in many practical applications. According to Shor's algorithm, when quantum computers appear, the deployed public-key encryption methods based on RSA or elliptic curves will no longer be secure. The rapid development of quantum computers has prompted us to design quantum-resistant public-key encryption methods. At present, the mainstream anti-quantum security public key encryption method is based on the mathematical difficulty of lattice or encoding. From the comprehensive point of view of efficiency and security, the lattice-based public key encryption method is one of the promising candidate methods, and has been extensive...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0863H04L9/0869H04L63/0428H04L63/0442H04L63/061
Inventor 张江郁昱范淑琴张振峰杨糠
Owner 北京信息科学技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products