Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

R-LWE-based public key encryption method

A public key encryption and public key technology, which is applied in the field of information security and can solve the problems of too large public key size, unpractical application and low efficiency.

Pending Publication Date: 2021-05-18
JIANGSU UNIV OF TECH
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, the public key scheme designed based on LWE uses a large matrix, resulting in too large public key size, high ciphertext expansion rate, and low efficiency. Even if it can resist quantum attacks, it cannot be practically applied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • R-LWE-based public key encryption method
  • R-LWE-based public key encryption method
  • R-LWE-based public key encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] The invention designs a public key encryption method based on the difficulty of the LWE problem on the integer coefficient polynomial ring, and proves the correctness and safety of the scheme.

[0019] In the present invention, the symbol convention is as follows:

[0020] By convention, all column vectors are named with bold lowercase letters (eg: u), u i Then it represents the i-th component of u. Matrices are named with bold capital letters (eg: U)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an R-LWE-based public key encryption method. The R-LWE-based public key encryption method comprises the following steps: randomly generating public parameters and private parameters required by participants, generating a key by each participant according to the public parameter and the private parameter, and designing a secure encryption scheme and a secure decryption scheme of the CCA according to the key. According to the method, the public key size and the ciphertext expansion rate can be effectively reduced, and public ciphertext integrity verification is supported.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an R-LWE-based public key encryption method, a non-transitory computer-readable storage medium and a computer device. Background technique [0002] With the rapid development of quantum computer research and development, traditional public key cryptography schemes are facing serious challenges. Shor's RSA and Proos / Zalka's ECDLP algorithms can solve discrete logarithm and large factorization problems in polynomial time in the quantum computing environment, thus shaking the foundation of traditional public key encryption schemes. Therefore, cryptographers around the world are devoting themselves to finding practical public-key cryptographic schemes that are resistant to quantum attacks. At present, multivariate public-key cryptosystems, lattice-based cryptographic algorithms, cryptographic algorithms based on coding problems, and hash-based cryptographic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6209G06F21/64G06F2221/2107
Inventor 于志敏古春生蔡秋茹景征骏罗烨
Owner JIANGSU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products