Quantum-resisting secret key negotiation method

A technology of quantum key negotiation and key, applied in key distribution, which can solve the problem of no quantum attack, difficulty, etc.

Active Publication Date: 2018-07-10
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a special algebraic structure, the lattice has many good cryptographic properties. There has been no effective algorithm and polynomial time quantum attac

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum-resisting secret key negotiation method
  • Quantum-resisting secret key negotiation method
  • Quantum-resisting secret key negotiation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below through specific embodiments and accompanying drawings.

[0046] 1. Symbol description and suggested parameters

[0047] 1) Z q and Z p , respectively expressed as the interval and set of integers.

[0048] 2) Matrix is a public parameter shared by both communication parties, where Represents a collection of matrices, the matrix in the matrix collection is a matrix of n rows and n columns, and the elements of the matrix belong to Z q .

[0049] 3) Represents a collection of n-dimensional vectors, where each vector has n-h 0 components and h non-zero components, these non-zero components are taken from {±1}, where n is consistent with n in the matrix A in 2) above of. Represents a collection of n×l matrices, where each column of the matrix belongs to The n here is consistent with the n in the ring R in the following 6).

[0050] 4) {0,1} n Represents a set of n-dimensional vectors, each element in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum-resisting secret key negotiation method. A communication party Alice selects a matrix S including n rows and l columns, and F is calculated and sent to a communication party Bob; after that Bob receives the F, a matrix S' including l rows and n columns and a matrix y including n rows and l columns are selected, and W' is calculated; Bob calculates a matrix D' including l rows and l columns and calculates C; and Bob sends B' and C to the Alice. According to the received B' and C, Alice calculates D and km=rec(D, C). According to the method of the invention, theerror probability of negotiation is zero, present quantum attacks and other attack strategies can be resisted, the operation efficiency and practicality are high, the method is easy to enforce, and the method can be integrated to TLS protocols.

Description

technical field [0001] The invention belongs to the field of computer technology and information security technology, and relates to a quantum-resistant key negotiation method, which includes two basic negotiation methods and suggested parameters. It can be proved that the present invention is safe under the standard model, can resist existing quantum attacks, and has high operation efficiency and strong practicability. Background technique [0002] The key agreement method refers to allowing two or more communication parties to negotiate a key in a certain way in an insecure environment to ensure the confidentiality and data integrity of the subsequent communication content. The more famous key exchange protocols are Diffie-Hellman key exchange protocol. This protocol has a wide range of uses, the most well-known being used as an encrypted socket in the TLS protocol. TLS protocol is the abbreviation of Transport Layer Security (Transport Layer Security) protocol, which is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/002H04L9/0838H04L9/0852
Inventor 张振峰陈隆王克
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products