Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Pseudorandom permutation" patented technology

In cryptography, a pseudorandom permutation (PRP) is a function that cannot be distinguished from a random permutation (that is, a permutation selected at random with uniform probability, from the family of all permutations on the function's domain) with practical effort. An unpredictable permutation (UP) Fₖ is a permutation whose values cannot be predicted by a fast randomized algorithm. Unpredictable permutations may be used as a cryptographic primitive, a building block for cryptographic systems with more complex properties.

System for encrypting and decrypting a plaintext message with authentication

The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. The size of the state is dependent on the number of pseudorandom permutations and the size of the LFSR. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal the size of the state. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
Owner:SMITH ERIC MYRON +3

Cloud outsourcing privacy set comparison method and device

InactiveCN107196926AImprove securityImproving the efficiency of private collection comparisonsTransmissionCiphertextPseudorandom permutation
The invention discloses a cloud outsourcing privacy set comparison method and a cloud outsourcing privacy set comparison device, which relate to the field of communication technologies, and are used for solving the problems that security cannot be guaranteed, and the practicality and extendibility are not high existing in the existing outsourcing privacy set comparison protocol. The cloud outsourcing privacy set comparison method comprises the steps that: a first server receives a random number ri and a first ciphertext sent by a terminal, converts the first ciphertext into a second ciphertext and sends the second ciphertext and the random number ri to a second server; and the first server receives a second server random number r<S2> and a third ciphertext fed back by the second server, converts the third ciphertext into a fourth ciphertext and sends the fourth ciphertext and the second server random number r<S2> to the terminal, wherein the second server adopts a second server secret key K<S2> to obtain a pseudo-random permutation of a terminal set and calculates an intersection set of the pseudo-random permutation, the third ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of the second server secret key K<S2>, and the fourth ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of a terminal secret key Ki.
Owner:HENAN NORMAL UNIV

System and method for pseudorandom permutation for interleaving in wireless communications

A system and method for pseudorandom permutation for interleaving in wireless communication are disclosed. In one embodiment, the method comprises receiving a first ordered sequence of communication symbols having a first order, permuting the first ordered sequence of communication symbols to generate a second ordered sequence of communication symbols having a second order, and outputting the second ordered sequence of communication symbols, wherein the second order is based, at least in part, on a third order having a greater size than the second order, the third order being a pseudorandom permutation defined by the input-output relationship Y=mod((m*S*(S+1)) / 2,P),,wherein P is the smallest power of two not less than the number of elements in the first ordered sequence, S is an input order represented by a sequence of consecutive integers from zero to P-1 in increasing order, Y is an output order represented as a sequence of integers, and m is an integer.
Owner:SAMSUNG ELECTRONICS CO LTD

Integrity verification method based on active attack resistance in cloud storage

The invention discloses an integrity verification method with an active attack resistance, wherein the integrity verification method mainly settles a problem of incapability of resisting active attacks in prior art. The integrity verification method comprises the steps of 1, uniformly blocking a file by a user, generating a main label and an auxiliary label, selecting a cryptographic Hash function, a pseudo random function and a pseudo random substitution function; 2, transmitting file sub-blocks to a cloud service provider by the user, deleting a local file, generating inquiry information by the user and transmitting the inquiry information to the cloud service provider; 3, generating proving information by the cloud service provider, and resisting the active attack by the user through the proving information and unidirectionality of the Hash function; and 4, verifying the proving information by the user through locally generating verification information, wherein the proving information is transmitted by the cloud service provider, if verification passes, determining a fact that the user data are complete, and otherwise, determining a fact that the data are damaged. The integrity verification method has advantages of reducing communication traffic and improving active attack resistance. The integrity verification method can be used for data integrity verification under a precondition that a client which is supported in cloud storage loses a data ownership.
Owner:XIDIAN UNIV

Managing telemetry bandwidth and security

An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
Owner:DUPRE DURWARD D

Sequence cipher based search encryption method in cloud storage environment

The invention relates to a sequence cipher based search encryption method in a cloud storage environment. The sequence cipher based search encryption method in the cloud storage environment comprises the steps of realizing data security search by improving a key stream generation mode in sequence cipher encryption, and carrying out ECB encryption for a searched keyword to form a direct ciphertext; generating a random number by a pseudorandom generator, and generating a key stream by using the random number and the direct ciphertext through a pseudorandom replacement function; and finally carrying out XOR operation for the key stream and the direct ciphertext to obtain a concealed ciphertext, storing the concealed ciphertext at a server and accordingly building a query matching table; when a new search query occurs, firstly calculating a replacement key and then comparing data in the query matching table with the equality relationship among the concealed ciphertext of the current query session, and accordingly confirming the returned query result. The sequence cipher based search encryption method in the cloud storage environment can realize efficient data search of users, can increase the verification efficiency and can guarantee privacy security.
Owner:GUANGDONG UNIV OF TECH

Efficient searchable proxy privacy set intersection method and device

The invention discloses an efficient searchable agent privacy set intersection method and device, and the method comprises the steps: grouping user data sets according to keywords, generating an index for each sub-set after grouping based on a pseudo-random function, encrypting the sub-set corresponding to each keyword, and generating an encrypted sub-set; the encrypted subset and the index are replaced and then uploaded to a cloud server; sending the to-be-searched keyword of the user initiating intersection calculation and the pseudo-random permutation key to other users, so that the other users find index values of the same keyword subsets of the two users through calculation, and generating an index-to-index mapping to be sent to a cloud server, and finding subsets corresponding to the keywords to be searched in the data of different users according to the mapping, carrying out intersection on the subsets corresponding to the keywords to be searched, and returning an intersection result to the user initiating intersection calculation. According to the embodiment of the invention, a searchable function is added in agent privacy set intersection, and meanwhile, the security and the efficiency are ensured.
Owner:BEIHANG UNIV

File processing method, electronic equipment and storage medium

The embodiment of the invention discloses a file processing method, electronic equipment and a storage medium, and the file processing method comprises the steps: determining a first identification vector of a file according to the position of the file in a file set; generating a first storage position for storing a first identification vector according to the hash function and the feature vector of the file; determining a second identification vector according to a hash table corresponding to the hash function and the first identification vector; and storing the second identification vector into a second storage position obtained by performing pseudo-random permutation on the first storage position; wherein the second storage position is used for indicating the first storage position corresponding to the feature vector for searching the to-be-searched file according to the first identification vector of the to-be-searched file when the file is searched. Therefore, according to the second storage position, the corresponding file can be searched based on the position of the to-be-searched file in the file set, and a user does not need to provide an accurate keyword for searching, so that the file searching efficiency is improved.
Owner:卓尔智联(武汉)研究院有限公司

A cloud outsourcing privacy set comparison method and device

InactiveCN107196926BImprove securityImproving the efficiency of private collection comparisonsTransmissionCiphertextEngineering
The invention discloses a cloud outsourcing privacy set comparison method and a cloud outsourcing privacy set comparison device, which relate to the field of communication technologies, and are used for solving the problems that security cannot be guaranteed, and the practicality and extendibility are not high existing in the existing outsourcing privacy set comparison protocol. The cloud outsourcing privacy set comparison method comprises the steps that: a first server receives a random number ri and a first ciphertext sent by a terminal, converts the first ciphertext into a second ciphertext and sends the second ciphertext and the random number ri to a second server; and the first server receives a second server random number r<S2> and a third ciphertext fed back by the second server, converts the third ciphertext into a fourth ciphertext and sends the fourth ciphertext and the second server random number r<S2> to the terminal, wherein the second server adopts a second server secret key K<S2> to obtain a pseudo-random permutation of a terminal set and calculates an intersection set of the pseudo-random permutation, the third ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of the second server secret key K<S2>, and the fourth ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of a terminal secret key Ki.
Owner:HENAN NORMAL UNIV

Message identification method and electronic device

The embodiment of the invention provides a message identification method and an electronic device and belongs to the information security and password. According to the method, pseudorandom functions are constructed based on a short integer difficulty-solving problem, so that computational complexity and modulus can be reduced, and security and the accuracy of message identification can be improved. The message identification method includes the following steps that: a first electronic device receives a first message and a first authentication message which are transmitted by a second electronic device, and the cluster value domain of the pseudorandom functions is a finite abelian group; the first electronic device obtains bit strings and a pseudorandom function cluster, wherein the bit strings are the indexes of functions in the pseudorandom function cluster; the first electronic device searches a function Fb from the pseudorandom function cluster, the index of the function Fb being the bit string; the first electronic device adopts the first message as a parameter, and obtains a second authentication message according to the function Fb; and when the first authentication message is matched with the second authentication message, the first message is determined as a credible message.
Owner:HONOR DEVICE CO LTD

A search encryption method based on sequence cipher in cloud storage environment

The invention relates to a sequence cipher based search encryption method in a cloud storage environment. The sequence cipher based search encryption method in the cloud storage environment comprises the steps of realizing data security search by improving a key stream generation mode in sequence cipher encryption, and carrying out ECB encryption for a searched keyword to form a direct ciphertext; generating a random number by a pseudorandom generator, and generating a key stream by using the random number and the direct ciphertext through a pseudorandom replacement function; and finally carrying out XOR operation for the key stream and the direct ciphertext to obtain a concealed ciphertext, storing the concealed ciphertext at a server and accordingly building a query matching table; when a new search query occurs, firstly calculating a replacement key and then comparing data in the query matching table with the equality relationship among the concealed ciphertext of the current query session, and accordingly confirming the returned query result. The sequence cipher based search encryption method in the cloud storage environment can realize efficient data search of users, can increase the verification efficiency and can guarantee privacy security.
Owner:GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products