Unlock instant, AI-driven research and patent intelligence for your innovation.

An alternative implementation method of national secrets for zk-snark bottom bilinear pairing

A zk-snark, bilinear pairing technology, applied to the public key and key distribution of secure communication

Inactive Publication Date: 2021-01-19
BEIJING JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There is currently no effective algorithm to calculate system parameters that meet both zk-snark requirements and SM9 security requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An alternative implementation method of national secrets for zk-snark bottom bilinear pairing
  • An alternative implementation method of national secrets for zk-snark bottom bilinear pairing
  • An alternative implementation method of national secrets for zk-snark bottom bilinear pairing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0059] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be understoo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a national secret substitution implementation method of zk-snark bottom layer bilinear pair. The national secret substitution implementation method of the zk-snark bottom layerbilinear pair comprises the steps of 1, determining a base domain and an order of an elliptic curve; 2, determining an elliptic curve equation on the base domain; 3, determining a generation element of a group 1 of the bilinear pair; step 4, determining an elliptic curve equation on the secondary expansion; step 5, determining a generation element of the group 2; step 6, determining a reduction polynomial of the tower type expansion; step 7, calculating a Miller function; step 8, calculating Final expernation; step 9, calculating R-ate pair.

Description

technical field [0001] The invention belongs to the field of computer information security, and in particular relates to a zk-snark bottom-layer bilinear pairing national secret replacement implementation method. Background technique [0002] In 2005, Barreto and Naehrig proposed a method for constructing constant curves suitable for pairs in the prime number field, and the curves constructed by this method are called BN curves. The construction process is as follows: the base domain and the elliptic curve order are solved by the parameter t, and both the base domain and the elliptic curve order are prime numbers. After determining the base domain, the loop parameter b determines the elliptic curve equation y 2 =x 3 +b mod q, until there are points of order n on the elliptic curve equation. After the elliptic curve equation is determined, an n-order point on the elliptic curve can be randomly selected as the generator of group 1. After determining the quadratic expansion...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0833H04L9/3013H04L9/3026H04L9/3033H04L9/3066
Inventor 黎琳张旭霞
Owner BEIJING JIAOTONG UNIV