Unlock instant, AI-driven research and patent intelligence for your innovation.

Public key encryption method based on relatively prime sequence and lever function

A technology of coprime sequence and public key encryption, which is applied in the field of public key encryption based on coprime sequence and lever function, and can solve the problems of public key system

Active Publication Date: 2012-02-08
苏盛辉 +2
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the same time, due to various reasons, the FAPKC3 and REESSE1 public key systems are not really used in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key encryption method based on relatively prime sequence and lever function
  • Public key encryption method based on relatively prime sequence and lever function
  • Public key encryption method based on relatively prime sequence and lever function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] The characteristic of the public key encryption method based on mutual prime sequence and leverage function is that it allows each user to obtain two keys, one key can be made public and used for encryption, and one key can only be privately owned and used for decryption. In this way, there is no need to worry about the secret key being leaked during the transmission process on the Internet. When agreeing that the communicator transmits information on the Internet, the sender encrypts the file or message with the receiver's public key, and the receiver decrypts it with his own private key after receiving the ciphertext.

[0114] Each user can go to the designated CA digital certificate center to obtain the corresponding key certificate. The CA center is an institution that registers and manages users, and generates, distributes and controls keys. It uses the key generation method to output the user's pair of public key and private key.

[0115] This encryption method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a public key encryption method based on a relatively prime sequence and a lever function, and belongs to the field of password technology and computer technology. The method comprises three parts, namely key generation, encryption and decryption, wherein a user of a receiving side has two keys, one key is only private, called as private key, and the other key can be public, called public key obtained according the formula Ci=(AiWl(i)) delta (percent of M), and a private key ({Ai}, W, delta) cannot be deduced from the public key; a transmitting side converts plaintext into a ciphertext (encrypted) by using the public key of the receiving side; and the receiving side reduces the ciphertext into the plaintext (decrypted) by using the private key of the receiving side. The method has the characteristics of short modular length, high safety, high calculation speed, use convenience of the private key, and the like, can be publicized and can be used for private storage and transmission of any file and data in a computer and a communication network.

Description

(1) Technical field [0001] Public key encryption method (referred to as public key encryption method or public key encryption scheme) belongs to the field of cryptography and computer technology, and is the core technology of electronic financial security, e-commerce security, e-government security, information security, identity authentication and trusted computing one. (2) Background technology [0002] The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1976, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. At present, the commonly used public key cryptography technologies include schemes such as RSA and ElGamal (see "Applied Cryptography", written by Bruce Schneier in the United States, translated by Wu Shizhong, Zhu Shixiong, etc., Mechanical Industry Press, January 2000, pages 334-342) . In order...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 苏盛辉吕述望蔡吉人
Owner 苏盛辉