A Method of Building Anti-Attack Public Key Cryptography
A public key cryptography, anti-attack technology, applied in the field of information security, can solve the problems of public key cryptography identity verification data security hidden dangers and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0060] The following describes in further detail a public key cryptographic protocol that is resistant to quantum computing attacks according to the present invention with reference to embodiments.
[0061] 1. Establish a platform for public key cryptographic protocol
[0062] The platform for establishing all public key cryptographic protocols is an infinite non-abelian group G and two subgroups A and B of G, so that for any a∈A and any b∈B, the equation ab=ba holds. In addition, due to the needs of encoding and key generation, G must also meet the following conditions:
[0063] 1) The characters representing the elements of G on the generator set of G have a calculable normal form;
[0064] 2) G is at least exponential growth (exponential growth), that is, the number of elements in G whose word length is a positive integer n is bounded by an exponential function about n;
[0065] 3) The product operation and inversion operation based on the normal form of the group are feasible and c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 