Unlock instant, AI-driven research and patent intelligence for your innovation.

LPN based public key encryption method

A technology of public key encryption and encryption algorithm, applied in the field of public key cryptography, can solve problems such as difficulty in solving problems, small length of public key and ciphertext, no effective quantum solution algorithm, etc., to achieve the effect of rapid increase in encryption and decryption time

Active Publication Date: 2017-03-22
江苏海邦信息技术有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are many ways to solve the LPN problem, there is no polynomial time solution method, and there is no effective quantum solution algorithm
[0005] LPN instance creation and computation are very simple, but problem solving is very difficult, making LPN problems very attractive for cryptographic applications
However, the decryption algorithm of the existing public key scheme based on LPN variants has a non-negligible bit error rate. In order to solve this problem, a new public key encryption scheme is designed. The advantages of this scheme are: first, it keeps the LPN instance fast Generation, encryption and decryption have the advantages of fast calculation speed and high efficiency; second, it solves the problem of non-negligible bit error rate in the decryption algorithm of the existing scheme; third, the length of the public key and ciphertext of the scheme is small, and the space occupied is small. High transmission efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • LPN based public key encryption method
  • LPN based public key encryption method
  • LPN based public key encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention is described in further detail now in conjunction with accompanying drawing. These drawings are all simplified schematic diagrams, which only illustrate the basic structure of the present invention in a schematic manner, so they only show the configurations related to the present invention.

[0034] The present invention designs a public key encryption scheme based on the LPN difficulty problem. The invention provides a practical LPN-based public key encryption algorithm, which uses NTL function library to realize the LPN-based public key encryption system, and evaluates the space complexity and execution time complexity of the algorithm. The system mainly operates on n-dimensional bit matrices and n-dimensional vectors, and most of the algorithm execution time is used for vector multiplication and addition. In addition, in the process of public key initialization, random selection of vectors and sampling on the Bernoulli distribution also take a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an LPN based public key encryption method. The LPN based public key encryption method comprises a step S1 of appointing symbols; and a step S2, realizing public key encryption through LPN. The LPN based public key encryption method not only can effectively protect security of each field such as information encryption and electronic payment, but also has the advantages that the calculation time of each algorithm is basically consistent with the theoretical analysis, the space required by public key and cipher-text storage is increased continuously along with the increase of the number of dimensions, and the encryption and decryption time is increased rapidly. Through balance of each aspect, the practical demand can be met only by selecting n=9000.

Description

technical field [0001] The invention belongs to the field of public key cryptography for information security, and relates to an encryption method, in particular to a practical LPN-based public key encryption method. Background technique [0002] Since Diffie and Hellman proposed the idea of ​​public key encryption in 1976, researchers have constructed a variety of public key schemes, which are widely used in various fields such as information encryption and electronic payment. The currently used public key schemes are mainly RSA, ELGamal, and elliptic curve schemes constructed based on the computational difficulty of problems in number theory. However, in 1994, Shor had already designed an effective quantum algorithm to calculate the factorization problem and the discrete logarithm problem, and the elliptic curve discrete logarithm problem, that is to say, the current public key scheme based on the computational difficulty of the problem in number theory is in the quantum c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
CPCH04L9/3006
Inventor 于志敏景征骏古春生
Owner 江苏海邦信息技术有限公司