Encryption and decryption device and encryption and decryption method based on universal hash functions

A general-purpose hashing, encryption and decryption technology, applied in the field of encryption and decryption devices, can solve problems such as high computational complexity requirements and large storage requirements

Active Publication Date: 2018-11-09
TSINGHUA UNIV
View PDF14 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this approach necessarily introduces large storage requirements and high computational complexity requirements
Therefore, in fact, storage and computational complexity have become the bottlenecks for the widespread application of current post-quantum cryptography methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption device and encryption and decryption method based on universal hash functions
  • Encryption and decryption device and encryption and decryption method based on universal hash functions
  • Encryption and decryption device and encryption and decryption method based on universal hash functions

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0152] Specific embodiment one, use a universal hash function as Matrix to generate private key S and public key A.

[0153] For example, preferably, in a specific embodiment of the present invention, the step 22 may include the following steps:

[0154] Step 221a, from the integer ring Z in a uniform distribution q Take an n×l matrix above to get the S matrix.

[0155] Among them, n is a security parameter, and l is the length of the bit vector to be encrypted.

[0156] Step 221b, generate a general hash function, use the general hash function as matrix.

[0157] Preferably, in a specific embodiment of the present invention, the universal hash function may be a Toeplitz hash matrix.

[0158] Step 221c, according to normal distribution from integer ring Z q Take an l×m matrix to get the E matrix.

[0159] Among them, m is the length of the ciphertext. For example, m=(12+6c)n logn.

[0160] Step 221d, according to S matrix, matrix and E matrix, calculate the inte...

specific Embodiment 2

[0168] Embodiment 2: A general hash function is used as the S matrix to generate the private key S and the public key A.

[0169] For example, preferably, in a specific embodiment of the present invention, the step 22 may include the following steps:

[0170] Step 222a, generate a general hash function, and use the general hash function as an S matrix.

[0171] Step 222b, from the integer ring Z in a uniform distribution q Taking an n×m matrix above, we get matrix.

[0172] Among them, n is a security parameter, and m is the length of the ciphertext. For example, m=(12+6c)n logn.

[0173] Step 222c, according to normal distribution from integer ring Z q Take an l×m matrix to get the E matrix.

[0174] Among them, l is the length of the bit vector to be encrypted.

[0175] Step 222d, according to S matrix, matrix and E matrix, calculate the intermediate matrix B.

[0176] For example, preferably, in a specific embodiment of the present invention, the intermediate m...

specific Embodiment 3

[0182] Specific embodiment 3: A general hash function is used as the E matrix to generate the private key S and the public key A.

[0183] For example, preferably, in a specific embodiment of the present invention, the step 22 may include the following steps:

[0184] Step 223a, from the integer ring Z in a uniform distribution q Take an n×l matrix above to get the S matrix.

[0185] Among them, n is a security parameter, and l is the length of the bit vector to be encrypted.

[0186] Step 223b, from the integer ring Z in a uniform distribution q Taking an n×m matrix above, we get matrix.

[0187] Among them, m is the length of the ciphertext. For example, m=(12+6c)n logn.

[0188] Step 223c, generate a general hash function, and use the general hash function as an E matrix.

[0189] Step 223d, according to S matrix, matrix and E matrix, calculate the intermediate matrix B.

[0190] For example, preferably, in a specific embodiment of the present invention, the inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption and decryption device and an encryption and decryption method based on universal hash functions. The encryption and decryption device comprises a discretized normal distribution generator, a key generator and an encryption / decryption device body, wherein the discretized normal distribution generator is used for generating a normal distribution and obtaining a random variable according to the normal distribution, the key generator is used for generating a private key S and a public key A by using at least one universal hash function, and the encryption / decryption device body is used for outputting encrypted ciphertext according to the public key A and the original text required to be encrypted or is used for outputting the decrypted original text according to the private key S and the ciphertext required to be decrypted. According to the encryption and decryption device and the encryption and decryption method, the storage and calculation complexitycan be greatly lowered.

Description

technical field [0001] The present application relates to the technical field of data encryption and decryption, and in particular to an encryption and decryption device and an encryption and decryption method based on a general hash function. Background technique [0002] With the vigorous development of Internet technology, the importance of communication security is also increasing day by day. In many occasions, both communication parties hope to conduct confidential communication using public channels. For example, when a user submits an account number and password to an online bank, the user hopes that the information will be kept confidential during transmission, that is, no third party can eavesdrop. The encryption method that is currently being widely used is the public key encryption method, and the security of this type of method is based on the algorithm complexity of certain mathematical problems. However, with the development of technology, especially the deve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0825Y04S40/20
Inventor 马雄峰
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products