Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Shared key processing method and device, storage medium and electronic equipment

A technology of shared key and processing method, applied in the fields of shared key processing method, device, storage medium and electronic equipment, can solve the problem of occupying large communication bandwidth and the like

Active Publication Date: 2020-04-24
AEROSPACE INFORMATION
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of this disclosure is to provide a shared key processing method, device, storage medium and electronic equipment for solving the encryption scheme based on LWE construction in the prior art The problem of occupying a large communication bandwidth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared key processing method and device, storage medium and electronic equipment
  • Shared key processing method and device, storage medium and electronic equipment
  • Shared key processing method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0091] figure 1 It is a flowchart of a method for processing a shared key according to an exemplary embodiment. Such as figure 1 As shown, applied to the sending end, the method includes the following steps:

[0092] Step 101, generate a parameter matrix according to the security parameters.

[0093] Step 102, randomly generating a first private key matrix and a first noise matrix,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a shared key processing method and device, a storage medium and electronic equipment. The method comprises the following steps: generating a parameter matrix according to thesafety parameters; randomly generating a first private key matrix and a first noise matrix, parameter matrix, a first private key matrix and a first noise matrix, determining a first public key matrix, and removing information on a specified bit of each element in the first public key matrix so as to update the first public key matrix; sending the updated first public key matrix and the security parameters to a receiving end, so that the receiving end determines a second public key matrix according to the security parameters, and encrypts the shared key according to the updated first public key matrix and second private key matrix to obtain consensus information; receiving the second public key matrix and the consensus information sent by the receiving end, and decrypting the consensus information according to the first private key matrix and the second public key matrix to obtain the shared key. The communication bandwidth is reduced by removing information on a specified bit of eachelement in a public key matrix.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular, to a shared key processing method, device, storage medium and electronic equipment. Background technique [0002] With the development of quantum computer technology, it is possible to break the public key encryption algorithms RSA and SM2 based on the large integer decomposition problem and the discrete logarithm problem, which prompts researchers to design a public key encryption scheme that can resist quantum computer attacks, that is, " Post-quantum cryptography". The public key encryption algorithm based on SVP (English: Shortest Vector Problem, Chinese: the shortest vector problem) and SIVP (English: Shortest Independent Vector Problem, Chinese: the shortest independent vector) has irreplaceable efficiency and security. One of the breakthroughs is the encryption scheme based on the LWE (English: Learning with errors, Chinese: fault-tolerant learning...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0838H04L9/0861H04L9/0891
Inventor 苏斌
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products