NTRU encryption method based on R-LWE and security certification method thereof

An encryption method and security technology, applied in the field of NTRU encryption method and its security proof based on R-LWE, can solve the problems of lack of security, key generation algorithm lattice attack, etc., to improve security and avoid lattice attacks Effect

Inactive Publication Date: 2019-12-06
中芯昊月(深圳)科技控股有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] At present, the NTRU encryption scheme is the only widely used lattice cipher scheme, which has been accepted by the IEEE P1363. lattice attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • NTRU encryption method based on R-LWE and security certification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solution of the present invention will be described in further non-limiting detail below in conjunction with preferred embodiments.

[0046] A kind of NTRU encryption method based on R-LWE, it comprises the following steps:

[0047] 1. Define parameters:

[0048] Define n as a power of 2 and n≥8;

[0049] define p = 2;

[0050] Define q as a prime number, q≥5 and q≤poly(n), q=1mod 2n to ensure that ((x n +1) modq) has n different linear factors;

[0051] The operation result of mod q is limited to Inside, mod(x n The operation result of +1) is a polynomial whose degree does not exceed n-1;

[0052] definition ring For elements in the ring R

[0053] f(x)=f 0 +f 1 x+…+f n-1 x n-1 , g(x)=g 0 +g 1 x+…+g n-1 x n-1 and k∈Z, define the operation as:

[0054] k·f(x)=kf 0 +kf 1 x+…+kf n-1 x n-1

[0055]

[0056] 2. Key pair generation:

[0057] In the ring R=Z(x) / (x n +1) Obtain the private key through Gaussian sampling, the specific s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an NTRU encryption method based on R-LWE and a security certification method thereof. The NTRU ring structure is properly modified, the defect that NTRU lacks strict security certification is overcome through parameter definition, key pair acquisition through Gaussian sampling, encryption and decryption, and the proven NTRU encryption method based on the R-LWE problem is further verified by certifying the security of the NTRU encryption method. According to the R-LWE-based NTRU encryption method and the security certification method thereof, the security of the encryption method can be effectively certified, a screening function is added when a key pair is generated, and a lattice attack is effectively avoided.

Description

technical field [0001] The invention relates to the field of encryption methods, in particular to an R-LWE-based NTRU encryption method and a security proof method thereof. Background technique [0002] In 1976, the idea of ​​the public key cryptosystem was proposed: the key is divided into two parts, the public key and the secret key, and the reciprocal encryption map and decryption map are determined respectively. In this cryptographic system, each user has his own public key and secret key. The public key is public and can be consulted by people like a telephone number. In this way, the communication parties can conduct confidential communication without prior agreement, and there is no need for a "safe channel" to transmit the key; the secret key is secret , kept by each user for decryption purposes. From the point of view of the difficult mathematical problems based on it, public key cryptosystems generally fall into the following categories: (1) public key cryptosyst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0861H04L9/3093
Inventor 邱望洁李婷婷
Owner 中芯昊月(深圳)科技控股有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products