Unlock instant, AI-driven research and patent intelligence for your innovation.

A Public Key Encryption Method Based on Mutual Prime Sequence and Leverage Function

A mutual prime sequence and public key encryption technology, which is applied in the field of public key encryption based on mutual prime sequence and leverage function, can solve the problems of public key system

Active Publication Date: 2018-01-19
苏盛辉 +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the same time, due to various reasons, the FAPKC3 and REESSE1 public key systems are not really used in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Public Key Encryption Method Based on Mutual Prime Sequence and Leverage Function
  • A Public Key Encryption Method Based on Mutual Prime Sequence and Leverage Function
  • A Public Key Encryption Method Based on Mutual Prime Sequence and Leverage Function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] The characteristic of the public key encryption method based on mutual prime sequence and leverage function is that it allows each user to obtain two keys, one key can be made public and used for encryption, and one key can only be privately owned and used for decryption. In this way, there is no need to worry about the secret key being leaked during the transmission process on the Internet. When agreeing that the communicator transmits information on the Internet, the sender encrypts the file or message with the receiver's public key, and the receiver decrypts it with his own private key after receiving the ciphertext.

[0114] Each user can go to the designated CA digital certificate center to obtain the corresponding key certificate. The CA center is an institution that registers and manages users, and generates, distributes and controls keys. It uses the key generation method to output the user's pair of public key and private key.

[0115] This encryption method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A public key encryption method based on mutual prime sequence and leverage function, which belongs to the field of cryptography and computer technology; it includes three parts: key generation, encryption and decryption; the receiver user has two keys, one can only be private, It is called a private key, one can be made public, it is called a public key, it is obtained from Ci≡(AiWl(i))δ(%M), and the private key ({Ai}, W, δ) cannot be deduced from it; the sender Use the recipient's public key to convert plaintext into ciphertext (encryption), and the recipient uses its own private key to restore the ciphertext to plaintext (decryption); this method has the advantages of small modulus, high security, fast calculation speed, The key is easy to use and the technology can be disclosed. It can be used for the confidential storage and transmission of any files and data in computers and communication networks.

Description

(1) Technical field [0001] Public key encryption method (referred to as public key encryption method or public key encryption scheme) belongs to the field of cryptography and computer technology, and is the core technology of electronic financial security, e-commerce security, e-government security, information security, identity authentication and trusted computing one. (2) Background technology [0002] The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1976, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. At present, the commonly used public key cryptography has schemes such as RSA and ElGamal (see "Applied Cryptography", written by Bruce Schneier in the United States, translated by Wu Shizhong, Zhu Shixiong, etc., Mechanical Industry Press, January 2000, pages 334-342). In order to shorten the par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 苏盛辉吕述望蔡吉人
Owner 苏盛辉