Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Lattice-Based Public Key Encryption Method

A public key encryption and public key technology, applied in key distribution, can solve problems such as mathematical difficulties, and achieve the effect of flexible parameter selection, high security, and short length of public key and ciphertext

Active Publication Date: 2021-08-13
北京信息科学技术研究院
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the RLWE problem uses a special ring structure, and this ring structure may be exploited by the adversary to solve the corresponding mathematically difficult problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lattice-Based Public Key Encryption Method
  • A Lattice-Based Public Key Encryption Method
  • A Lattice-Based Public Key Encryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to further illustrate the technical solution of the present invention, the public key encryption method of the present invention will be further described in detail below in conjunction with specific examples.

[0061] The present invention at first provides the definition of some basic symbols as follows:

[0062] 1) represents a collection of integers, that is, Represents the set of residual classes modulo q, namely where q is a positive integer; for any positive integer n, means n direct product of

[0063] 2) Represents a set of real numbers; Represents the set composed of positive real numbers; Represents a set of positive integers, that is,

[0064] 3) order is a positive integer, R q is defined in The degree of polynomial ring on is n-1; when n=1, define for any positive integer means k R q direct product of for any positive integer expressed in R q A set of k×k matrices composed of elements in ;

[0065] 4) For ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lattice-based public key encryption method. The present invention first proposes a class of AMLWE mathematical difficulty problems, and also provides variants and generalized definitions of this type of mathematical difficulty problems. Based on the AMLWE mathematical difficulty problem, the present invention proposes a lattice-selected plaintext-safe public key encryption method. Based on the encryption method, the present invention also provides a key encapsulation mechanism for selecting ciphertext security and a public key encryption method for selecting ciphertext security. The public key encryption method and key encapsulation mechanism designed by the present invention have the characteristics and advantages of provable security, resistance to quantum computer attacks, short length of public key and ciphertext, high calculation efficiency, and flexible parameter selection. Using a general transformation method, the present invention also provides a (authenticated) key exchange protocol.

Description

technical field [0001] The invention belongs to the field of public key encryption in cryptography, relates to the use of related technologies in lattice cryptography, and is embodied as a lattice-based public key encryption method, which can resist quantum computer attacks. Background technique [0002] Public key cryptography has been widely deployed in many practical applications. According to Shor's algorithm, when quantum computers appear, the deployed public-key encryption methods based on RSA or elliptic curves will no longer be secure. The rapid development of quantum computers has prompted us to design quantum-resistant public-key encryption methods. At present, the mainstream anti-quantum security public key encryption method is based on the mathematical difficulty of lattice or encoding. From the comprehensive point of view of efficiency and security, the lattice-based public key encryption method is one of the promising candidate methods, and has been extensive...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0863H04L9/0869H04L63/0428H04L63/0442H04L63/061
Inventor 张江郁昱范淑琴张振峰杨糠
Owner 北京信息科学技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products