Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-way authority key agreement method and system based on lattice password

A technology of key negotiation and two-way authentication, applied in the field of two-way authentication key negotiation based on lattice cipher, which can solve the problems of huge system parameters, difficult implementation, and difficult engineering implementation.

Inactive Publication Date: 2018-06-29
BEIJING ELECTRONICS SCI & TECH INST
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The entire interaction process of the scheme is too complicated to realize
And the huge system parameters and complex and cumbersome interaction process in the existing key agreement scheme based on lattice cipher, it is difficult to carry out engineering realization of these

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way authority key agreement method and system based on lattice password
  • Two-way authority key agreement method and system based on lattice password
  • Two-way authority key agreement method and system based on lattice password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described below in conjunction with the accompanying drawings.

[0060] Symbol Description:

[0061] Matrix: Bold capital letters

[0062] Vector: bold lowercase letters

[0063] For any vector v, its The norm is ||v|| p , where ||v|| p =(∑ i |v i | p ) 1 / p . For convenience, when p=2, ||v|| 2 is the Euclidean norm, directly recorded as ||v||.

[0064] The whole process of the scheme of the present invention is as follows:

[0065] (1) Initialization of the digital certificates of Alice and Bob involved in key negotiation, cert={ID, A, lifetime, s CA}, this step is as follows:

[0066] (1A) Alice (Bob) sends her information and public key to the CA;

[0067] (1B) CA generates some necessary information in the certificate for Alice (Bob), such as version number, serial number and validity period, etc.;

[0068] (1C) The CA signs the above information. This step is as follows:

[0069] (a) Input the message μ to be s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-way authority key agreement method and system based on a lattice password. The method is implemented according to the following steps: firstly, designing a digital certificate based on a lattice password; secondly, initializing lattice certificates and parameters of both parties participating in a key agreement; then exchanging each other's certificates and authenticating each other, and if the authentication fails, exiting directly without proceeding; and if the authentication succeed, exchanging each other's parameters, and calculating a session key according toown parameters and the parameters of the other party. According to the method, not only is a lattice certificate designed, but also the lattice certificate is allowed to participate in the authentication process. More importantly, a key agreement method based on a lattice password is designed, and the method and the system are more efficient, safer and more practical.

Description

technical field [0001] The invention relates to the field of lattice ciphers, in particular to a lattice cipher-based two-way authentication key agreement method and system. Background technique [0002] Public key cryptography based on lattice theory is considered to be the most promising public key cryptosystem against quantum computer attacks. At present, research on lattice public key cryptography mainly focuses on the design of lattice-based public key cryptographic schemes and the difficulty of lattice problems. The solution algorithm and lattice reduction algorithm attack on other cryptosystems. The design of the lattice-based public key cryptographic scheme mainly focuses on the design of the lattice-based public key encryption algorithm, digital signature algorithm and key agreement algorithm. [0003] Attention to lattice theory began with Ajtai's seminal proof. In 1996, Ajtai proved that given suitable parameters, the difficulty of solving problems with small in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3263H04L9/0825H04L9/0838H04L9/3247H04L63/0823H04L63/0869
Inventor 杨亚涛梁斓李子臣刘博雅杨薇张亚泽谢婷
Owner BEIJING ELECTRONICS SCI & TECH INST