Unlock instant, AI-driven research and patent intelligence for your innovation.

Post-quantum security signcryption algorithm

A secure and algorithmic technology, applied in the field of post-quantum secure signcryption algorithms, which can solve problems such as insecurity

Active Publication Date: 2020-10-23
CHINA MARITIME POLICE ACADEMY
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although ROM simplifies the security proof, Canetti et al. pointed out that when the random oracle machine is embodied as a Hash function, the provable security scheme under the random oracle machine model may be insecure
Coincidentally, Leurent and Nguyen also pointed out that the random oracle model has theoretical flaws

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Post-quantum security signcryption algorithm
  • Post-quantum security signcryption algorithm
  • Post-quantum security signcryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. example. Based on the embodiments of the present utility model, all other embodiments obtained by persons of ordinary skill in the art without creative work, any modifications, equivalent replacements, improvements, etc., shall be included in the protection of the present utility model. within range.

[0092] Such as figure 1 , figure 1 It is a schematic flow chart of the invention; the post-quantum security signcryption algorithm of the present invention comprises the following steps:

[0093] S1, system setting Setup (1 n ): set 1 n As a security parameter, the system parameter PP is generated as follows:

[0094] (1) Odd prime number q satisfies q≡...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a post-quantum security signcryption algorithm. The post-quantum security signcryption algorithm comprises the following steps: A, system Setup (1n); B, a key generation algorithm KeyGen (1n, PP); C, a signcryption algorithm Signcrypt (msg belongs to {0, 1} 1, sks, pkr); and D, unsigncryption algorithm Unsigncryption (C, skr, pks). A universal one-way hash function is constructed, and elements in the universal one-way hash function are mapped into vectors in Rq. According to the method, the idea of packaging is introduced, the CCA2 safety is realized by combining a partitioning technology, a bonsai tree technology and a blending technology, and the EUF-ACMA safety is realized by utilizing a chameleon hash function confined guessing technology.

Description

technical field [0001] The invention relates to the technical field of signcryption algorithms, in particular to a post-quantum secure signcryption algorithm. Background technique [0002] In digital communication, privacy, data integrity and authentication are the main goals to be achieved. Privacy is achieved through public key encryption, while data integrity and authentication is achieved through signatures. Signcryption is a basic cryptographic primitive that enables both public key encryption and signatures. But the existing signcryption is based on E1Gamal and bilinear pairing, and its security depends on the Diffie-Hellman assumption. [0003] In order to realize a post-quantum secure signcryption scheme, Li Fagen et al. constructed a lattice-based signcryption scheme under the random oracle model (ROM) by using the preimage sampleable function and lattice signature algorithm. Wang Fenghe et al also constructed a lattice-based post-quantum secure signcryption sche...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3236
Inventor 杨孝鹏李伟春冯明奎
Owner CHINA MARITIME POLICE ACADEMY