Micro public key encryption method based on finite plum type group decomposition problem

A public key encryption, limited technology, applied to the encryption device with shift register/memory, key distribution, to achieve the effect of resisting attacks

Active Publication Date: 2019-07-05
ZHEJIANG GONGSHANG UNIVERSITY
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, once a quantum computer of sufficient scale is born, it will bring disastrous consequences to the existing public key cryptosystem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Micro public key encryption method based on finite plum type group decomposition problem
  • Micro public key encryption method based on finite plum type group decomposition problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples.

[0028] The present invention proposes a miniature public key encryption method based on the non-commutative decomposition problem of finite Lie group, and the specific description is given below.

[0029] Symbols and definitions

[0030]

[0031]

[0032] The specific steps of this embodiment are as follows:

[0033] 1. System establishment: input security parameter k, KGC (Key Generation Center) selects a large prime number p, Z p Two random elements x and y and two nilpotent matrices R, T∈M=Mn(p), satisfy C G (R) = R and C G (T)=T, calculate the private key of user B: sk=(exp xR , exp yT ); define three cryptographic hash functions as: Π: {0, 1} l → Z p × Z p , Φ: G → {0, 1} l , Ψ: G×G → {0, 1} l , l is the bit length of the message, calculate the public key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a micro public key encryption method based on a finite groups of lie type decomposition problem. The method comprises the following steps that: a key generation center generates a system main public-private key pair; and then, in the encryption stage, the encryption party A encrypts the message m by using the public key to obtain a ciphertext C; and finally, in the decryption stage, the receiver decrypts the ciphertext C by using the private key to obtain a message m. The method has the capability of resisting attacks of quantum algorithms such as Shor and the like, andalso provides a theoretical basis for designing a safe and efficient password system in the later quantum era.

Description

technical field [0001] The invention relates to a miniature public key encryption method, in particular to a miniature public key encryption method based on the decomposition problem of a finite Lie type group. Background technique [0002] Cryptography technology is the core technology of information security and the cornerstone of cyberspace security. With the popularization of the Internet and the rapid development of information technology, the importance of cryptography has become increasingly prominent. Early cryptography was only used in a few confidential communication scenarios such as military diplomacy, and the cryptographic algorithms used were mainly focused on symmetric cryptographic algorithms such as stream ciphers. Until 1976, Diffie and Hellman first proposed the idea of ​​public key cryptography in "New Directions of Cryptography", which opened a new era of cryptography. [0003] After more than 40 years of development, the public key cryptography algorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0825H04L9/0643
Inventor 韩嵩洪海波赵帅
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products