Two-way authority key agreement method and system based on lattice password
A technology of key negotiation and two-way authentication, applied in the field of two-way authentication key negotiation based on lattice cipher, which can solve the problems of huge system parameters, difficult implementation, and difficult engineering implementation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] The present invention will be further described below in conjunction with the accompanying drawings.
[0060] Symbol Description:
[0061] Matrix: Bold capital letters
[0062] Vector: bold lowercase letters
[0063] For any vector v, its The norm is ||v|| p , where ||v|| p =(∑ i |v i | p ) 1 / p . For convenience, when p=2, ||v|| 2 is the Euclidean norm, directly recorded as ||v||.
[0064] The whole process of the scheme of the present invention is as follows:
[0065] (1) Initialization of the digital certificates of Alice and Bob involved in key negotiation, cert={ID, A, lifetime, s CA}, this step is as follows:
[0066] (1A) Alice (Bob) sends her information and public key to the CA;
[0067] (1B) CA generates some necessary information in the certificate for Alice (Bob), such as version number, serial number and validity period, etc.;
[0068] (1C) The CA signs the above information. This step is as follows:
[0069] (a) Input the message μ to be s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


