A Lattice-Based Digital Signature Method

A digital signature and mathematical technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., to achieve the effects of fast calculation speed, short signature length and high security

Active Publication Date: 2022-03-18
北京信息科学技术研究院
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, RSIS and RLWE problems use a special ring structure, and this ring structure may be exploited by the adversary to solve the corresponding difficult problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lattice-Based Digital Signature Method
  • A Lattice-Based Digital Signature Method
  • A Lattice-Based Digital Signature Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to embody the above-mentioned features and advantages of the present invention, the present invention will be further described below through a digital signature method on a lattice based on AMSIS and AMLWE mathematical difficulty problems as a specific embodiment.

[0049] This example involves the use of the hash function Used to generate a matrix A, and anti-collision hash function CRH:{0,1} * →{0,1} 384 . This embodiment also needs to use the hash function where B 60 Indicates ring R q There are exactly 60 elements in which the coefficients are -1 or 1, and the other coefficients are all 0 elements. The hash function H uses the extended output function to generate a random byte stream, and then uses the Fisher-Yates shuffling algorithm to map the random byte stream to B 60 Random elements in .

[0050] This embodiment will use Power2Round q (square power rounding function), Decompose q (decomposition function), HighBits q (take high bit function...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a lattice-based digital signature method, aiming at designing an efficient anti-quantum safe digital signature method based on the mathematical difficulty problem on the lattice. Specifically, the present invention first proposes a class of asymmetric modular small integer solution (AMSIS) mathematically difficult problems, and also provides variants and generalizations of this type of mathematically difficult problems. Through the asymmetric deformation based on the AMSIS mathematical difficulty problem and the modular error learning (MLWE) mathematical difficulty problem, the present invention proposes a digital signature method on a lattice, which has high security, provable security, resistance to quantum computer attacks, and public-private key It has the characteristics and advantages of short signature length, high calculation efficiency, and flexible parameter selection.

Description

technical field [0001] The invention belongs to the field of digital signatures in cryptography, relates to the use of related technologies in lattice cryptography, in particular to a lattice-based digital signature method capable of resisting quantum computer attacks. Background technique [0002] Digital signatures have been widely deployed in many practical applications. According to Shor's algorithm, when quantum computers appear, the deployed digital signature methods based on RSA or elliptic curves will no longer be secure. The rapid development of quantum computers has prompted us to design quantum-resistant secure digital signature methods. Currently, mainstream anti-quantum security digital signature methods are based on designs such as lattice, multivariable, encoding or hash functions. From the comprehensive point of view of efficiency and security, the lattice-based digital signature method is the most promising anti-quantum signature method, and has been exten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/3247
Inventor 张江郁昱范淑琴张振峰杨糠
Owner 北京信息科学技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products