Encryption method, decryption method and electronic equipment

A technology of electronic equipment and encryption method, which is applied in the field of information security and can solve the problems of insecure selected ciphertext attack and so on.

Active Publication Date: 2016-01-06
HONOR DEVICE CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing encryption schemes are insecure against chosen ciphertext attacks, theref...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, decryption method and electronic equipment
  • Encryption method, decryption method and electronic equipment
  • Encryption method, decryption method and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0090] figure 1 It is a flow chart of Embodiment 1 of the encryption method of the present invention. Such as figure 1 As shown, the method provided in this embodiment may include:

[0091] Step 101, the first electronic device obtains a public key, plaintext and a bit string of a first preset length, the public key includes a unique defect tra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide an encryption method, a decryption method and electronic equipment. The method comprises steps of acquiring a public key, a plaintext and a first bit string of a preset length through first electronic equipment, wherein the public key comprises the only defect trapdoor function; acquiring a key pair of a one-time signature scheme by the first electronic equipment, wherein the public pair comprises a verification secret key and a signature secret key corresponding to the verification secret key; acquiring a middle cryptograph set according to the only defect trapdoor function, the first bit string of the preset length, the plaintext and the verification secret key; signing the middle cryptograph set by the first electronic equipment according to the signature secret key, and acquiring a signature of the middle cryptograph set; and forming a final cryptograph by combing the verification secret key, the middle cryptograph set and the signature of the middle cryptograph set, and outputting the final cryptograph. Therefore, anti-selection cryptograph attack is achieved.

Description

technical field [0001] The embodiments of the present invention relate to information security technology, and in particular, to an encryption and decryption method and electronic equipment. Background technique [0002] Chosen ciphertext attack refers to an attack model. In this attack model, the content that the attacker needs to master includes: the encryption algorithm, the intercepted part of the ciphertext, the ciphertext message of his choice, and the corresponding decrypted plaintext. Chosen ciphertext attack requires the attacker to have access to the decryption language machine, so as to obtain the decryption result of the ciphertext constructed by the attacker himself. The attacker can arbitrarily collect a certain amount of ciphertext in advance. The ciphertext is encrypted by the target encryption algorithm. From this, the encryptor's private key or decomposition modulus can be calculated. Using this information, the attacker can recover all the plaintext. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 陈和风马文平雷浩
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products