Post-quantum signature scheme using biometrics or other fuzzy data

A technology for obfuscating data and digital signatures, applied in the field of cryptographic methods and systems

Inactive Publication Date: 2021-11-12
OXFORD UNIV INNOVATION LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, recent work has shown that many well-known public-key cryptosystems can be broken by sufficiently powerful quantum computers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Post-quantum signature scheme using biometrics or other fuzzy data
  • Post-quantum signature scheme using biometrics or other fuzzy data
  • Post-quantum signature scheme using biometrics or other fuzzy data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Certain examples described herein provide cryptographic methods and systems that are secure against attacks by quantum computers, ie, provide so-called post-quantum solutions. Some examples provide this security by generating digital signatures using lattice instantiations, such as instances of lattice-based cryptography. These examples further overcome problems that arise when implementing lattice-based cryptography using obfuscated data sources. To this end, a fuzzy signature scheme is proposed that uses linear sketches compatible with lattice instantiation. The fuzzy signature scheme can be used to implement electronic equipment for signing and verifying digital messages. Obfuscated signature schemes can also be used to implement devices that ensure data integrity and / or user authenticity. These electronic devices can then be used to authenticate users based on obscure data (eg, biometric measurements) associated with the users. Accordingly, certain example system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Cryptographic methods and systems are described. An example cryptographic system may include a signature engine to digitally sign a message using fuzzy data associated with a signee. The signature engine is configured to generate a digital signature using a lattice instantiation and a linear sketch. The linear sketch is configured based on the lattice instantiation. The digital signature is a function of the fuzzy data and the message and uses a signature-time signing key residing within a signing key space. The signing key space is a space defined by the lattice instantiation. An example of a verification engine is also described. The verification engine is configured to receive the message and the digital signature and to verify the message as signed by the signee. The verification engine is configured to obtain key data for the signee comprising at least an initialisation-time verification key, to compute a distance metric based on the key data and the received digital signature, the distance metric indicating a measure of difference for the signature-time verification key, and to indicate a verification failure responsive to the distance metric being greater than a predefined homomorphic threshold. The methods and systems may be used as an authentication mechanism.

Description

technical field [0001] The present invention relates to cryptographic methods and systems. In particular, the invention relates to the configuration of digital signatures based on obfuscated data inputs. The methods and systems can be used to authenticate users and enable secure communications between two computing devices. Background technique [0002] Public key cryptography plays an important role in enabling secure communications between digital devices. For example, public-key cryptography is the basis for modern electronic commerce, secure messaging, online banking, and access to remote computing systems. In many cryptographic schemes, a user is provided with a private key and a public key. The private key is kept secret and can be used to sign digital messages. The public key can be distributed widely and then used to verify that a message was signed with that private key. In this way, the pair of keys is able to authenticate the user by verifying the message as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/30H04L9/32
CPCH04L9/008H04L9/3093H04L9/3231H04L9/3247H04L2209/34G06F21/64H04L9/14
Inventor A·埃尔卡法拉尼胜又修一
Owner OXFORD UNIV INNOVATION LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products