Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message identification method and electronic device

An electronic device and message authentication technology, which is applied in the fields of information security and cryptography, can solve the problems of decreasing the accuracy of message authentication and affecting the security of encryption schemes, and achieve the effects of reducing computational complexity, improving efficiency, and ensuring accuracy.

Active Publication Date: 2015-12-30
HONOR DEVICE CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Bob needs to determine two issues: 1. Whether the message is sent by Alice, rather than malicious deception by the opponent Eve; 2. Whether the content of the message is really reliable, that is, whether it is sent by Alice, and not tampered by the opponent Eve during the sending
[0005] Both of the above two schemes construct pseudo-random functions based on the rounded learning problem. In the rounded learning problem, the modulus is required to be sub-exponent in order to ensure security. Such a large modulus will affect the security of the encryption scheme, and then lead to Decreased accuracy in identifying sexual messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message identification method and electronic device
  • Message identification method and electronic device
  • Message identification method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] The embodiment of the present invention provides a pseudo-random function construction method, such as figure 1 As shown, the method includes the following steps:

[0061] 101. The first electronic device receives the first message and the first verification message sent by the second electronic device, wherein the first verification message is the second electronic device according to the pseudo-random function cluster, the bit string and the first obtained from the message; the pseudo-machine function cluster is a function cluster constructed based on solving difficult problems with short integers, and the value domain is a finite commutative group.

[0062] Wherein, the second electronic device may obtain the pseudo-random function cluster from the first electronic device, obtain it from a preset server, or construct it by itself.

[0063] During the communication process, any attacking adversary may tamper with the message sent by the sender, so that the receiver c...

Embodiment 2

[0125] The embodiment of the present invention provides a method for message identification, which constructs a pseudo-random function based on solving difficult problems with short integers, such as figure 2 As shown, the method includes the following steps:

[0126] 201. The first electronic device receives a first message and a first verification message sent by a second electronic device.

[0127] Wherein, the first verification message is obtained by the second electronic device according to a pseudo-random function cluster, a bit string, and the first message; the pseudo-machine function cluster is a function cluster constructed based on short integers for solving difficult problems, and The range of values ​​is a finite commutative group.

[0128] During the communication process, any attacking adversary may tamper with the message sent by the sender, so that the receiver cannot receive the correct message. In addition, either the sender or the receiver can obtain an...

Embodiment 3

[0156] The embodiment of the present invention provides a method for constructing a pseudo-random function, which constructs a pseudo-random function based on solving difficult problems with short integers, such as image 3 As shown, the method includes the following steps:

[0157] 301. The first electronic device receives a first message and a first verification message sent by a second electronic device.

[0158] Wherein, the first verification message is obtained by the second electronic device according to a pseudo-random function cluster, a bit string, and the first message; the pseudo-machine function cluster is a function cluster constructed based on short integers for solving difficult problems, and The range of values ​​is a finite commutative group.

[0159] Wherein, the elements in the first random matrix all obey the χ (chi-square distribution) distribution, and the second random matrix is ​​a matrix with m rows and m columns.

[0160] In the pseudo-random funct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a message identification method and an electronic device and belongs to the information security and password. According to the method, pseudorandom functions are constructed based on a short integer difficulty-solving problem, so that computational complexity and modulus can be reduced, and security and the accuracy of message identification can be improved. The message identification method includes the following steps that: a first electronic device receives a first message and a first authentication message which are transmitted by a second electronic device, and the cluster value domain of the pseudorandom functions is a finite abelian group; the first electronic device obtains bit strings and a pseudorandom function cluster, wherein the bit strings are the indexes of functions in the pseudorandom function cluster; the first electronic device searches a function Fb from the pseudorandom function cluster, the index of the function Fb being the bit string; the first electronic device adopts the first message as a parameter, and obtains a second authentication message according to the function Fb; and when the first authentication message is matched with the second authentication message, the first message is determined as a credible message.

Description

technical field [0001] The invention relates to the fields of information security and encryption, in particular to a message identification method and electronic equipment. Background technique [0002] With the development of communication technology, more and more attention has been paid to the secure communication between communication parties in open channels. Secret communication can be achieved through encryption, but in many cases, it is equally important to ensure the integrity of the information (message authentication), that is, each party can ensure that the received message is indeed from the other party. And all encryption schemes cannot guarantee the integrity of the message. In actual communication, there is such a situation: Alice sends a message to Bob. Bob needs to determine two issues: 1. Whether the message is sent by Alice, rather than the malicious deception of the opponent Eve; 2. Whether the content of the message is really reliable, that is, wheth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/58
Inventor 陈和风马文平雷浩
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products