More efficient post-quantum signatures

A digital signature and vector technology, applied in the direction of public key of secure communication, digital transmission system, user identity/authority verification, etc., can solve the problems of expensive calculation, difficult message signature and verification message

Active Publication Date: 2021-09-21
VISA INT SERVICE ASSOC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, computing cryptographic keys for lattice-based cryptosystems can be computationally expensive and can result in large keys that also make it difficult to sign and verify messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • More efficient post-quantum signatures
  • More efficient post-quantum signatures
  • More efficient post-quantum signatures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Based password, a problem-based password can provide a cryptographic solution, in particular with the development of quantum computing, the development of the quantum calculation may reduce the effect of more traditional cryptographic systems. The problem includes, for example, a non-uniform short-term solution (ISIS) problem involving finding the shortest vector in the N-dimensional grid of the point. Non-quasi-short integer solution (ISIS) problem requires a vector X that meets the relationship A · X = Y (Mod Q). In this example, the vector Y can be a hash of a message or message, and the vector X may be a signature associated with the message. The problem may be difficult to calculate - even with quantum calculations, this makes them very suitable for password applications. The use of the trap matrix may make it easier to solve the problem, which may be a matrix that makes a problem (e.g., ISIS problem) simply or becomes calculated within a reasonable time. In an example...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Techniques of generating a lattice-based verification matrix and signature vector are disclosed. The method enables a generating device to sample a gadget matrix and then generate a reduced gadget matrix. The generating device may then sample a trapdoor matrix and use the trapdoor matrix and the reduced gadget matrix to generate a verification matrix. A sending device may receive the trapdoor matrix and the verification matrix from the generating device, in addition to receiving a message. The sending device may then use the trapdoor matrix and the verification matrix to generate a signature vector for the message. A verification device can receive the verification matrix, the message, and the signature vector. The verification device may use the verification matrix and the signature vector to verify the message.

Description

[0001] Related application cross-reference [0002] The present application is an international application of US temporary applications, filed on February 8, 2019, and the US temporary application is incorporated herein by reference. Background technique [0003] Many password systems today - such as RSA encryption - based on rigid decomposition or model of model. These issues are difficult to solve for routine computers, but it may not be difficult to solve for quantum computers. Therefore, new progress in quantum calculations may not be unsafe of the password system based on these problems. A new cryptographic system that needs to be solved based on traditional computers and quantum computers. [0004] The grid-based problem can be used as the basis for the cryptographic system. An instance of the problem can be a short integer solution that involves looking for the shortest vector in the N-dimensional grid. The problem may be difficult to solve for both conventional computers a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/30
CPCH04L9/3247H04L9/3093
Inventor P·穆克赫吉Y·陈N·杰尼塞
Owner VISA INT SERVICE ASSOC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products