Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for generating multiplication triad based on elliptic curve, equipment and medium

An elliptic curve and triplet technology, which is used in secure communication devices, electrical components, public keys for secure communication, etc., can solve a wide range of value space waste, high cost, and large triplet value space, etc. problems, to achieve the effect of avoiding resource waste, low structural coupling, and reducing renovation and trust costs

Active Publication Date: 2021-05-07
富算科技(上海)有限公司 +1
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The triplet generation method based on Paillier homomorphic encryption is based on the composite residual assumption and the calculation method is mainly a modular exponential operation. If the security of the Paillier homomorphic encryption scheme needs to be maintained, the plaintext space needs to be similar in length to the key space, so that The value space of the generated triplet is also large. When the object data range of secure multi-party computation is small, this large-scale value space will be a waste
In addition, as a part of the user's information system, the secure multi-party computing system needs to be based on the existing system and cryptographic system. In some special fields and industries, the demand side already has a relatively mature elliptic curve cryptographic system and replaces this system. higher cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating multiplication triad based on elliptic curve, equipment and medium
  • Method and device for generating multiplication triad based on elliptic curve, equipment and medium
  • Method and device for generating multiplication triad based on elliptic curve, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] This embodiment provides a method for generating multiplication triples based on elliptic curves, such as figure 1 As shown, the method specifically includes the following steps:

[0067] S1011, participating node P1 selects the first random number r (1) , and the first random non-negative integer x whose bit length is less than or equal to the preset length threshold (1) and a second random non-negative integer y (1) .

[0068] S1012, the participating node P2 selects the second random number r (2) , and a third random non-negative integer x whose bit length is less than or equal to the preset length threshold (2) and a fourth random non-negative integer y (2) .

[0069] For example, the preset length threshold can be set to 8, and x (1) 、y (1) 、x (2) 、y (2) are smaller than the public modulus p. In this embodiment, the public modulus p is a prime number of appropriate length selected jointly by the two participating nodes P1 and P2.

[0070] S102, particip...

Embodiment 2

[0087] This embodiment provides a method for generating multiplication triples based on elliptic curves, such as figure 2 and 3 As shown, the method includes the following steps:

[0088] S2011, the participating node P1 selects a first random non-negative integer x with a bit length greater than a preset length threshold (1) and a second random non-negative integer y (1) , figure 2 x selected from (1) 、y (1) The bit length is shown as 256 bits.

[0089] S2012, the participating node P2 selects a third random non-negative integer x whose bit length is greater than the preset length threshold (2) and a fourth random non-negative integer y (2) , figure 2 x selected from (2) 、y (2) The bit length is shown as 256 bits.

[0090] For example, the preset length threshold can be set to 8, and the selected x (1) 、y (1) 、x (2) 、y (2) are less than N public modulus p i Product(i=1,...,N). In this embodiment, the public modulus p i A set of prime numbers with appropri...

Embodiment 3

[0114] This embodiment provides a multiplication triplet generation device based on elliptic curves, which is suitable for the first participating node, such as Figure 4 As shown, the device includes:

[0115] A selection module 11, configured to select a first random non-negative integer x whose bit length is less than or equal to a preset length threshold (1) and a second random non-negative integer y (1) ;

[0116] The homomorphic encryption module 12 is used to encrypt the first random non-negative integer x (1) Perform homomorphic encryption processing based on elliptic curves to obtain the first ciphertext, and send the first ciphertext to the second participating node, and the second participating node pre-selects a bit length less than or equal to the preset length threshold The third random non-negative integer x of (2) and a fourth random non-negative integer y (2) , so that after the second participating node receives the first ciphertext, the fourth random no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for generating multiplication triad based on an elliptic curve, equipment and a medium, the method is suitable for a first participation node, and comprises the steps: selecting random non-negative integers x (1) and y (1), carrying out the homomorphic encryption processing of x (1) based on an elliptic curve, and obtaining a first ciphertext, sending the first ciphertext to another pre-selected participating node with random non-negative integers x(2) and y(2), so that the other participating node performs homomorphic number multiplication operation on the y(2) and the first ciphertext and then adds the product with a pre-selected second random number r(2) to obtain a first randomization result, and returning the first randomization result to the first participating node; and performing homomorphic decryption processing based on an elliptic curve on the first randomization result to obtain a first decryption result, then calculating a first product z (1) according to the first decryption result, and generating a first triad (x (1), y (1) and z (1)) according to the first product. According to the method, the multiplication triad can be generated on the elliptic curve cryptosystem, and the value space of the multiplication triad cannot be wasted.

Description

technical field [0001] The present invention relates to the field of encryption technology, in particular to a method, device, equipment and medium for generating multiplication triplets based on elliptic curves. Background technique [0002] In some business scenarios, each business platform collects its own business data. For example, the browser platform collects the user's web browsing data, and the online shopping platform collects the user's online shopping data. These business data are very valuable and are usually kept as private information of the business platform. Each business platform does not expect to share business data in raw form with other business platforms. However, in some requirements, multiple business platforms expect to perform collaborative computing without disclosing the business data of all parties to improve business processing capabilities. For example, browser platforms and online shopping platforms expect to use web search data and online...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/30
CPCH04L9/008H04L9/3066
Inventor 孙小超谢谨卞阳
Owner 富算科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products