Multivariate Public Key Generation, Encryption and Decryption Methods
A multi-variable public key and encryption method technology, applied in the field of encryption and decryption, can solve problems such as attacks, reduce energy consumption, and overcome linear equation attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The method for generating a multivariate public key in this embodiment introduces a transformation method similar to RSA to generate a public key polynomial on the basis of a multivariate public key cryptographic structure, including the following steps:
[0027] S1. Select prime numbers u and v, and a finite field GF(q) with order q=uv.
[0028] S2. Select n sets of e and d values according to the prime numbers u and v, denoted as {e i |1≤i≤n} and {d i |1≤i≤n}; where, e i and d i denote the i-th e-value and d-value respectively, and e i d i =φ(q)=(u-1)(v-1).
[0029] S3. Using finite field GF(q) to generate two reversible affine transformations S 1 , S 2 , and calculate the corresponding inverse S 1 -1 , S 2 -1 .
[0030] This step specifically includes:
[0031] S31. Using finite field GF(q) to generate reversible affine transformation S 1 For: S 1 (x):=A1 n×n x+V1 n×1 , S 2 For: S 2 (x):=A2 n×n x+V2 n×1 ; where matrices A1, A2, vectors V1, V2 a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



