Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Secret Handshake Method Based on Lattice Cipher

A technology of secret handshake and lattice cipher, which is applied in the field of communication, can solve problems such as no solution, and achieve the effect of meeting security and confidentiality requirements

Active Publication Date: 2018-11-02
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Secret handshake schemes are still important in the post-quantum era, but no such scheme has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secret Handshake Method Based on Lattice Cipher
  • A Secret Handshake Method Based on Lattice Cipher
  • A Secret Handshake Method Based on Lattice Cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0043] Symbol Description:

[0044] Matrix: Bold capital letters, such as M

[0045] Vector: lowercase letters plus arrows, such as

[0046] The i-th element in the vector: the vector is subscripted, such as

[0047] For convenience, a vector is sometimes also treated as a string.

[0048] String length in bits: |t|

[0049] Connection between strings: s||t

[0050] XOR of strings: s⊕t

[0051] String from left to right l bit: |s| l

[0052] String from right to left l bit: |s| l

[0053] Orthogonal vector matrix: By the vector {s ​​in the matrix S 1 ,s 2 ,...,s k}Obtained by Gram-Schmidt orthogonalization

[0054] Gram-Schmidt specification: The maximum two-dimensional distance of vectors in matrix S, ie max 1≤i≤k ||s i ||

[0055] Such as Figure 1-5 Shown, the whole process of the scheme of the present invention is as follo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secret handshake method based on a lattice code. The method comprises the following steps of (1), group initialization is performed; (2), when a group member E is going to conduct secret handshake with a group member F, supposing that the group member E has an unused fake name A (defined in the specification) and the group member F has an unused fake name B (defined in the specification), the group member E sends a message to the group member F; (3), the group member subjects the message sent by the group member E to corresponding calculation authentication and then sends a message to the group member E; (4), the group member E subjects the message sent by the group member F to corresponding calculation authentication and then sends another message to the group member F; and (5), the group member F verifies the another message, thereby finishing a handshake process. After authentication is finished, users of the same group can know whether the opposite side belongs to the same organization or not, and users of different groups cannot obtain any privacy information for verifying the opposite side. The scheme provided by the invention can meet requirements for security, namely, integrity, pretending attack resistance, dependence detection and unlinkability.

Description

technical field [0001] The invention specifically relates to a secret handshake method based on lattice cipher, which belongs to the communication field. Background technique [0002] The secret handshake scheme is a privacy-protected anonymous two-way authentication scheme. Its basic function is to allow different members belonging to different organizations to secretly authenticate and communicate with each other. At present, many two-party secret handshake schemes based on different cryptography techniques have been proposed. Zhao Chunming and others proposed an inadvertent electronic envelope based on digital signatures, Zhou Lan and others proposed a three-party secret handshake scheme based on elliptic curves and DSA, Wen Yamin and others proposed a scheme based on k+1 square root and discrete logarithm New authoritative secret two-way authentication protocol, etc. Most of the existing solutions are based on factorization problems, discrete logarithm problems, ellipt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 赵兴文李晖朱辉赵高飞林佳萍毛小乐
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products