Check patentability & draft patents in minutes with Patsnap Eureka AI!

Multivariate Public Key Generation, Encryption and Decryption Methods

A multi-variable public key and encryption method technology, applied in the field of encryption and decryption, can solve problems such as attacks, reduce energy consumption, and overcome linear equation attacks.

Active Publication Date: 2019-02-05
SOUTHEAST UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the implicit k-linearity makes it vulnerable to the linearization equation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multivariate Public Key Generation, Encryption and Decryption Methods
  • Multivariate Public Key Generation, Encryption and Decryption Methods
  • Multivariate Public Key Generation, Encryption and Decryption Methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The method for generating a multivariate public key in this embodiment introduces a transformation method similar to RSA to generate a public key polynomial on the basis of a multivariate public key cryptographic structure, including the following steps:

[0027] S1. Select prime numbers u and v, and a finite field GF(q) with order q=uv.

[0028] S2. Select n sets of e and d values ​​according to the prime numbers u and v, denoted as {e i |1≤i≤n} and {d i |1≤i≤n}; where, e i and d i denote the i-th e-value and d-value respectively, and e i d i =φ(q)=(u-1)(v-1).

[0029] S3. Using finite field GF(q) to generate two reversible affine transformations S 1 , S 2 , and calculate the corresponding inverse S 1 -1 , S 2 -1 .

[0030] This step specifically includes:

[0031] S31. Using finite field GF(q) to generate reversible affine transformation S 1 For: S 1 (x):=A1 n×n x+V1 n×1 , S 2 For: S 2 (x):=A2 n×n x+V2 n×1 ; where matrices A1, A2, vectors V1, V2 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multivariate public key generation method, an encryption method based on the multivariate public key generation method and a decryption method corresponding to the encryption method. The multivariate public key generation method is suitable for a public key encryption scheme in a wireless sensor network in a form of centralized control of a base station and are based on operation in a finite domain; the multivariate public key generation method introduces a method similar to RSA change to generate public key polynomials under a multivariate public key password framework and overcomes a problem that a multivariate public key password scheme based on the extension field change is easily attacked by a linear equation, and the private key computation efficiency is far higher than an RSA algorithm, and the energy consumption of common nodes in the wireless sensor network can be reduced.

Description

technical field [0001] The invention relates to an encryption and decryption method, in particular to a multivariable public key generation, encryption and decryption method. Background technique [0002] Sensor nodes are usually limited in hardware resources and volume, resulting in limited computing power and storage capacity, and limited power endurance; sensor nodes are usually numerous in number, widely distributed, and usually have no protection measures, so they are easy to be captured and maliciously attacked. Therefore, it is usually necessary to encrypt and authenticate the node data in the network. [0003] The most commonly used public key cryptographic algorithm used in the authentication process is the RSA algorithm, but the RSA algorithm involves large number calculations, and the amount of calculation is large, so it is not suitable for sensor networks. Multivariate cryptographic algorithms have high computational efficiency, but most of them are vulnerable ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
CPCH04L9/3026H04L9/3033
Inventor 黄杰李凡卫锦许金乐倪广源朱仟曹山山闵溪青万弃寒张云龙
Owner SOUTHEAST UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More