Fast quantum secure asymmetrical encryption method

An asymmetric encryption and quantum technology, which is applied to public keys for secure communications, secure communications devices, and key distribution, can solve problems such as slow computing speed

Active Publication Date: 2017-12-15
数字兵符(福州)科技有限公司
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Whether the FAPKC1 system is resistant to quantum computing attacks has not been analyzed, and JUOAN is analyzed to be resistant to quantum computing attacks, but its operation speed is relatively slow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fast quantum secure asymmetrical encryption method
  • Fast quantum secure asymmetrical encryption method
  • Fast quantum secure asymmetrical encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] The characteristic of the fast quantum-safe asymmetric encryption method is that it allows each user to have two keys, one key can be made public for encryption, and one key can only be kept private for decryption. In this way, there is no need to worry about the secret key being leaked during the transmission process on the Internet. When the two parties agree to transmit information on the Internet, the sender uses the receiver's public key to encrypt the file or message, and the receiver uses its own private key to decrypt the ciphertext after receiving it.

[0102] Each user can obtain two keys from the designated CA center. The CA center is an institution that registers and registers users, and generates, distributes and manages keys. It utilizes the key generation component to generate a pair of public key and private key of the user.

[0103] This encryption method can be realized with logic circuit chip or programming language, and it comprises three parts: (1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fast quantum secure asymmetrical encryption method, and belongs to the technical field of passwords and computers. The method comprises three steps of secret key generation, encryption and decryption; a user owns two secret keys, one is owned only privately and called a private key, the other can be made public and is called a public key, the public key is obtained from the private key, and the private key cannot be inferred from the public key; the public key is used for translating plain text into cipher text in group (encryption), and the private key is used for recovering the plain text from the cipher text (decryption); by means of an additive multivariable permutation problem (AMPP) and an anomalous subset product problem (ASPP), the safety of the private key and the plain text is guaranteed. The method has the advantages of quantum computation resistance, high safety, small modulus, high computation speed, public technology and the like, and the method can be used in confidential storage and transmission of any files and data blocks in mobile phones, computers and relative communication networks.

Description

(1) Technical field [0001] Asymmetric encryption method (also known as public key encryption method) belongs to the field of cryptography and computer technology, and is one of the core technologies of information security and network security. (2) Background technology [0002] The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1976, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. At present, the commonly used asymmetric encryption techniques include the RSA system and the ElGamal system (see "Applied Cryptography", written by Bruce Schneier in the United States, translated by Wu Shizhong, Zhu Shixiong, etc., Mechanical Industry Press, January 2000, pages 334-342 ). In order to improve security and computing speed, the ElGamal system is often implemented on the elliptic curve. At this time, it is cal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0852H04L9/0861H04L9/30
Inventor 苏盛辉郑建华吕述望
Owner 数字兵符(福州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products