Method for creating public key encryption and key signature, apparatus, and readable storage medium

A technology of public key encryption and secret key, which is applied in the fields of equipment and readable storage media, public key encryption and key signature creation methods, and can solve problems such as increased complexity of solutions and inability to provide clear alternatives

Active Publication Date: 2019-01-25
CROSBIL LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these do not directly address the problem, as these clearly do not provide clear alternatives
In addition, most of the work is devoted to lattice-based cryptography, which is considered the most promising asymmetric cryptographic solution, however, it does not use the underlying cryptography, which increases the complexity of the scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for creating public key encryption and key signature, apparatus, and readable storage medium
  • Method for creating public key encryption and key signature, apparatus, and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that the present disclosure can be more thoroughly understood, and the scope of the present disclosure can be fully conveyed to those skilled in the art. Nothing in the following detailed description is intended to suggest that any particular component, feature, or step is essential to the invention. Those skilled in the art will understand that various features or steps can be substituted for each other or combined without departing from the scope of the present disclosure.

[0042] The solution provided by this embodiment avoids the risk that the asymmetric encryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for creating a public key encryption and key signature of a block chain, comprises: step S101, constructing a function so as to encrypt data under a public key, creating a message by the party owning the converter, decrypting only the recipient using the public key, and decrypting only the corresponding secret key which cannot be obtained from the calculation of the public key, thereby realizing the public key encryption creation of a block chain; step S102, selecting a secret value different from the of the public key encryption of the block chain, and sharingthe secret value for all the converters, so that the other parties can not know, and verifying whether the proxy checks whether the signature format is correct and/or whether the signature is equal to another signature obtained by other means through the hashing operation and verification steps. Also disclosed are corresponding devices and readable storage media. The technical proposal of the present disclosure uses only symmetric encryption and a hash function to securely exchange keys, thereby creating cryptographic proof of authenticity, integrity, and non-repudiation in a basic and efficient manner, which cannot be reverse engineered.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a method, device and readable storage medium for creating public key encryption and key signature. Background technique [0002] The Shor algorithm is very important. It represents the use of quantum computers, which can be used to crack the widely used public key encryption method, that is, the RSA encryption algorithm. The basis of the RSA algorithm is to assume that we cannot effectively decompose a known For integers, Shor's algorithm shows that the factorization problem can be solved efficiently on a quantum computer, so that a sufficiently large quantum computer can crack RSA. At present, the Shor algorithm has greatly promoted the development of quantum computers, and also promoted the physical realization of quantum computers. This algorithm does not guarantee that every operation can get the correct result, but it can increase the probability of success of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0819H04L9/30H04L9/3247
Inventor 安德鲁.威廉.罗斯科陈邦道
Owner CROSBIL LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products