Unlock instant, AI-driven research and patent intelligence for your innovation.

Multivariate public key encryption method

A multi-variable public key and encryption method technology, applied in the field of multi-variable public key encryption, can solve problems of varying degrees

Inactive Publication Date: 2013-07-10
WUHAN UNIV
View PDF2 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Secondly, there are certain defects and bottlenecks in the structure of the traditional multivariable public key trapdoor structure. At present, most multivariable public key cryptographic schemes have been broken. With the emergence of various effective attack methods, almost all multivariable public key schemes All have been attacked to varying degrees, so people began to question the current one-way trapdoor structure based on IP issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multivariate public key encryption method
  • Multivariate public key encryption method
  • Multivariate public key encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The multivariate public key encryption method proposed by the present invention will be described below in conjunction with specific embodiments.

[0031] A kind of multi-variable public key encryption method of the present invention, concrete realization mode is as follows:

[0032] (I) Establish a system:

[0033] Choose the finite field GF(2 16 ), randomly select GF(2 16 ) on the 10-dimensional square matrix T 0 and the 12-dimensional square matrix U 0 , and a nonlinear transformation F composed of 12 variables and 10 quadratic polynomials, F can be expressed as:

[0034] F ( x 1 , . . . x 12 ) = ( f 1 ( x 1 , . ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information safety, in particular to a multivariate public key encryption method. The method comprises the specific steps: building a system, encrypting through a public key and decrypting through a secret key. The multivariate public key encryption method is provided through a problem of polynomial homomorphism, and the method has the advantages of being high in implement efficiency, needing no cryptographic algorithm coprocessor, having high safety, being capable of resisting attack of a quantum computer, and the like. Compared with a traditional key exchange protocol such as RSA and ECC, the multivariate public key encryption method has superiority in the fields of safety of an intelligent card, a wireless sensor network and the like. The method can be widely applied to the field of information safety systems such as network safety, electronic commerce, bills and identity authentication.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a multivariable public key encryption method. Background technique [0002] The development of quantum computers poses a great threat to traditional public key cryptosystems such as RSA. For this reason, public key cryptography with resistance to quantum computer attacks has received extensive attention. The public key cryptography proposed to resist Shor quantum algorithm attacks mainly includes NTRU, OTU2000, and multivariate quadratic polynomial (MQ) public key cryptography. types of systems. NTRU has registered patents in many countries, among which it was authorized by the China Intellectual Property Office in 2004. During the Tenth Five-Year Period, my country also carried out theoretical research on NTRU, but did not produce basic research results with independent intellectual property rights; OTU2000 The process of key generation needs to calculate discrete ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
Inventor 王后珍张焕国
Owner WUHAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More