Encryption/decryption and signature method and system

A decryption algorithm and encryption algorithm technology, applied in the field of e-commerce applications, can solve problems such as insecurity, large amount of key calculation, and slow operation speed of non-knapsack cryptosystem

Inactive Publication Date: 2011-04-13
SHANGHAI JIAOTONG UNIV +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the insecurity of the one-time knapsack cryptosystem existing in the prior art, the large calculation amount of the key of the secondary knapsack cryptosystem, the slow operation speed of the non-knapsack cryptosystem and the deficiency of no secondary knapsack signature method, and provides A Safe and Fast Calculation Cryptosystem Based on Quadratic Knapsack Problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption/decryption and signature method and system
  • Encryption/decryption and signature method and system
  • Encryption/decryption and signature method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] Referring to Fig. 1, the present invention provides a kind of encryption / decryption method, described method step is as follows:

[0087] Set system parameters and generate public key and private keys W, m, M, where is an n-order matrix; the specific execution steps are as follows:

[0088] Step 101: Set up the system matrix, let Z and N be sets of integers and positive integers respectively, and M(Z) and M(N) respectively represent the matrix classes whose elements belong to Z and N. Randomly select two matrices B and C of order n×n, satisfying B∈M(Z), C∈M(N).

[0089] Wherein, the larger the dimension of the matrix is, the higher the security is. Generally, when n>100, sufficient security is guaranteed. In this embodiment, the dimension n=128 of the matrix can be determined;

[0090] Select B as a matrix in which each element is an integer whose absolute value is less than 8;

[0091] Select C as a matrix in which each element is a positive integer...

Embodiment 2

[0149] Referring to Fig. 2, the present invention also provides an encryption / decryption system, the system includes a system parameter setting module, an encryption module and a decryption module;

[0150] The module for setting system parameters generates a public key by setting system parameters and private keys W, m, M, where is an n-order matrix;

[0151] The encryption module is used to use the public key To encrypt the plaintext x, the encryption algorithm uses the quadratic knapsack algorithm: , generate ciphertext y;

[0152] The decryption module is used to decrypt the ciphertext y with the private key W, m, M, and the decryption algorithm is:

[0153] calculate M =y 1 , and then calculate z=-1 the y 1 > m , then by z = Σ i = 1 n x i · 2 i - ...

Embodiment 3

[0165] Referring to Fig. 3, the present invention also provides a kind of signature method, described method comprises the following steps:

[0166] Set system parameters and generate public key , m, M and private key W, where is an n-order matrix, and the specific steps are as follows:

[0167] Step 201: Set the system matrix.

[0168] Step 202: Select and calculate the system public key , m, M and private key W.

[0169] The specific parameter setting process in step 201 to step 202 is the same as step 101 to step 102 in embodiment 1, and will not be repeated here, wherein, there is no limit to the selection of each element in B and C. When signing, select the absolute value of the element The value should be increased accordingly to avoid cracking the private key through exhaustive methods.

[0170] Step 203: Sign the message with the public key and private key, and the signature algorithm is as follows:

[0171] For any message y, calculate the Ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The provided enciphering / deciphering and signature method comprise: setting system parameter, enciphering plaintext, and deciphering; wherein, it can also sign the information, and validates the signature. The system comprises opposite different modules.

Description

technical field [0001] The invention relates to the field of e-commerce applications, in particular to a method and system for encrypting / decrypting and signing by using the quadratic knapsack problem. Background technique [0002] Public key cryptography is a fundamental tool used in modern secure communications. The biggest feature of this system is to use two keys to separate encryption and decryption: one is public as the encryption key, and the other is dedicated to the user as the decryption key. Both communicating parties can carry out confidential communication without exchanging keys in advance. It is computationally infeasible to analyze the plaintext or private key from the public key or ciphertext. If the public key is used as the encryption key and the private key is used as the decryption key, the message encrypted by multiple users can only be read by one user; otherwise, the private key is used as the encryption key and the public key is used as the decrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q30/00H04L9/30H04L9/32
Inventor 董晓蕾曹珍富郑志彬位继伟
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products