Weak-leakage and high-efficiency exposing encryption method

An encryption method and encryption algorithm technology, applied in the field of encryption, can solve problems such as low efficiency

Active Publication Date: 2018-06-29
FUDAN UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Although the amount of information leaked by Cash et al.'s scheme is less than that of Chenette et al.'s scheme, its efficiency is relatively low due to the use of a large number of bilinear mapping operations in the comparison algorithm. The deciphering encryption scheme is more secure and satisfies higher efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak-leakage and high-efficiency exposing encryption method
  • Weak-leakage and high-efficiency exposing encryption method
  • Weak-leakage and high-efficiency exposing encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Taking the encryption and comparison of the integer data "1011" and "987" in the database as an example, the specific implementation of the algorithm will be described in detail below.

[0061] In view of the fact that there are many schemes for the key hash algorithm, pseudo-random function and trapdoor permutation function that can be used in practical applications, SHA256 is exemplarily used as the algorithm of the pseudo-random function and key hash function in the following description. The data is expressed in hexadecimal, the security parameter λ is 128, and the plaintext space is assumed to be 10 bits.

[0062] 1. Algorithm initialization phase

[0063] Randomly select a subkey k with a length of 128 bits as;

[0064] 2A8D8F6503CF1A36CC548712AB840D52.

[0065] Then, randomly select another subkey with a length of 128 bits as:

[0066] A6810D0C6EF46EF324CC513D28650005,

[0067] Combined with HMAC-SHA256 to generate ∈ (different data length requirements can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of cryptography, and specifically relates to a weak-leakage and high-efficiency exposing encryption method. The method comprises a triplet of initialization, encryption and comparison algorithm, which is expressed as (the formula is described in the specification); and for each exposing encryption scheme, a certain amount of plaintext information leakage is followed. The information leaked by the exposing encryption meeting the ideal security is a size relationship of a plaintext corresponding to a ciphertext. By adoption of the weak-leakage and high-efficiency exposing encryption method, on the basis of meeting high efficiency, the leakage information is reduced as much as possible, that is, only the plaintext size relationship, the plaintext highest different bit equal mode and the partial information of the highest different bits of the plaintext are leaked. In the construction of the scheme, only two efficient cryptographic primitives, namely a pseudo-random function and a hash function are used, so that the entire scheme is executed efficiently.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and in particular relates to a desequencing encryption method in private key encryption. Background technique [0002] Preliminary knowledge and symbols: [0003] The hash function H is a mapping from the definition domain to the value domain, that is, H: {0,1} m →{0,1} n . Among them, the definition domain can be a set of bit strings {0,1} of any length * , or a fixed-length bit string set {0,1} m , the value domain is often a set of fixed-length bit strings {0,1} n . Here, m is required to be larger than n, which reflects the compressibility of the hash function. For a hash function to be anti-collision, it is required to find two different values ​​x and x' from the definition domain, so that it is computationally infeasible to satisfy H(x)=H(x'). A hash function has one-way property (also known as anti-image attack), it is required that for any given y from the range of values, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0631H04L9/0643H04L9/0656
Inventor 黎源赵运磊朱扬勇
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products