Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum digital signature and quantum digital signcryption method

A quantum digital signature and digital signature technology, applied in the field of quantum security, can solve the problems of high resource consumption, security threats of classical digital signcryption protocols, security threats, etc., to avoid security risks, high efficiency and unconditional security, The effect of ensuring safety

Active Publication Date: 2021-12-10
NANJING UNIV +1
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Purpose of the invention: The purpose of the invention is to provide a quantum digital signature and quantum digital signcryption method, which solves the threat to the security of the classical digital signcryption protocol at this stage. Many early hash functions and public key algorithms have been Being broken, and the emergence of quantum computers in the future will pose a fatal threat to the algorithm security of the current digital signcryption protocol; at the same time, it solves the problem that the leakage of fixed irreducible polynomials in the efficient quantum digital signature scheme will lead to security risks; it also solves the problem of The current digital signature or signcryption protocol is inefficient, consumes more resources, and generates a signature that consumes a lot of communication resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum digital signature and quantum digital signcryption method
  • Quantum digital signature and quantum digital signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The quantum digital signature method of the present invention has the following three steps: the phase of preparing a key, the phase of generating a signature and the phase of verifying a signature.

[0044] (1) Prepare keys: the signer, the receiver and the verifier hold their own two sets of random keys, and the six strings of keys are divided into two groups, which are denoted as X group and Y group. The two strings of random number key strings held by the signer are denoted as X 1 and Y 1 , similarly the receiver holds X 2 and Y 2 , the verifier holds X 3 and Y 3 , and the keys among the signer, receiver and verifier form a secret sharing; the way to realize the secret sharing is preferably quantum secret sharing;

[0045] Secret sharing relationship: holding both X 2 and X 3 to infer X 1 , while holding Y 2 and Y 3 to infer Y 1 , which satisfies the condition:

[0046] X 1 ⊕ X 2 ⊕ X 3 =0, Y 1 ⊕ Y 2 ⊕ Y 3 =0,

[0047] In the form...

Embodiment 2

[0066] The present invention includes a quantum digital signcryption method, the participants are the signcryption party Alice, the receiver Bob and the verifier Charlie, including the following steps:

[0067] a Encryption: the signcryption party Alice uses a secret key for the plaintext message Encrypt to obtain ciphertext; preferred encryption adopts XOR operation;

[0068] b. Digitally sign the ciphertext through the above-mentioned quantum digital signature method. In the process of digitally signing the ciphertext, the ciphertext is used as a message to be signed and the signcryption party will also keep the secret key It is sent to the receiver in an unconditional and safe way, and the unconditional and safe way is realized by using quantum key distribution technology or secure distribution of quantum random numbers; the specific process is as follows:

[0069] 1) Prepare keys: the signcrypter Alice, the receiver Bob, and the verifier Charlie hold their own two sets ...

Embodiment 3

[0089] The present invention includes a quantum digital signcryption method, the participants are the signcryption party Alice, the receiver Bob and the verifier Charlie, and the method includes the following steps:

[0090] S1 encryption: the signcryption party Alice uses a secret key for the plaintext message Encrypt to get the ciphertext; the signcryption party Alice sends the ciphertext to the receiver Bob, and the receiver Bob sends the ciphertext to the verifier Charlie after receiving it; at the same time, the signcryption party Alice also keeps the secret key It is sent to the receiver Bob and the verifier Charlie in an unconditional and safe way, which is realized by quantum key distribution technology or secure distribution of quantum random numbers in an unconditional and safe way;

[0091] S2 digitally signs the plaintext message through the same quantum digital signature method as in Embodiment 1. In the process of digitally signing the plaintext message, the pl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum digital signature and a quantum digital signcryption method. The quantum digital signature comprises the following steps: generating a secret key; generating a digital signature; and verifying the digital signature. The security of the hash function used in the signcryption or signature process is ensured by the irreducible polynomial and the hash function key serving as the input random number, and the irreducible polynomial depends on the local random number and cannot be known by a receiver and a signature verification party in advance before the signcryption or signature process; in other words, the unconditionally secure hash function is used so that the security of the whole signcryption or signature process is ensured, and the security risk caused by leakage of a fixed irreducible polynomial in other signatures is directly avoided; and moreover, the length of the message is not limited when the hash value is generated, the message with any length can be signed or signcrypted in each round of signature or signcryption, and the signature or signcryption efficiency is very high.

Description

technical field [0001] The invention relates to the technical field of quantum security, in particular to a quantum digital signature and a quantum digital signcryption method. Background technique [0002] Encryption and digital signatures are two basic cryptographic tools for ensuring confidentiality, integrity, authenticity, and non-repudiation. In the asymmetric key system, the traditional method is to digitally sign the message first, and then encrypt the output (sign-then-encryption), which may have two problems: the low efficiency of this superposition scheme and the cost High, and there are situations where neither scheme can guarantee security. Signcryption can complete digital signature and encryption functions in one logical step. Compared with traditional sign-then-encryption, it can effectively reduce computing power consumption and communication loss, and provide digital signature in a more efficient way and properties of encryption schemes. [0003] However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60G06F21/45G06N10/00
CPCG06F21/64G06F21/602G06F21/45G06N10/00
Inventor 尹华磊翁晨洵富尧陈增兵
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products