Unlock instant, AI-driven research and patent intelligence for your innovation.

A post-quantum secure signcryption algorithm

A secure and algorithmic technology, applied in the field of post-quantum secure signcryption algorithms, which can solve problems such as insecurity

Active Publication Date: 2022-06-24
CHINA MARITIME POLICE ACADEMY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although ROM simplifies the security proof, Canetti et al. pointed out that when the random oracle machine is embodied as a Hash function, the provable security scheme under the random oracle machine model may be insecure
Coincidentally, Leurent and Nguyen also pointed out that the random oracle model has theoretical flaws

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A post-quantum secure signcryption algorithm
  • A post-quantum secure signcryption algorithm
  • A post-quantum secure signcryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work, any modifications, equivalent replacements, improvements, etc., should be included in the protection scope of the present invention. Inside.

[0092] like figure 1 , figure 1 is a schematic flow chart of the invention; the post-quantum secure signcryption algorithm of the invention includes the following steps:

[0093] S1, system settings Setup (1 n ): set 1 n For the safety parameters, the generated system parameters PP are as follows:

[0094] (1) Odd prime number q satisfies q≡3mod8, m=2 κ , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a post-quantum secure signcryption algorithm, comprising the following steps: A, system settings Setup(1 n ); B, key generation algorithm KeyGen(1 n ,PP); C. Signcryption algorithm Signcrypt(msg∈{0,1} l ,sk s ,pk r ); D. Unsigncryption algorithm Unsigncrypt(C, sk r ,pk s ), the present invention constructs a general-purpose one-way hash function, and maps elements in R to R q vector in . The invention introduces the idea of ​​encapsulation, combines partitioning technology, bonsai tree technology and reconciliation technology to realize CCA2 security, and uses chameleon hash function closed guessing confined guessing technology to realize EUF-ACMA security.

Description

technical field [0001] The invention relates to the technical field of signcryption algorithms, in particular to a post-quantum secure signcryption algorithm. Background technique [0002] In digital communication, privacy, data integrity and authentication are the main goals to be achieved. Privacy is achieved through public key encryption, while data integrity and authentication are achieved through signatures. Signcryption is a basic cryptographic primitive that enables both public key encryption and signing. But the existing signcryption is based on ElGamal and bilinear pairing, and its security relies on the Diffie-Hellman assumption. [0003] In order to realize a post-quantum secure signcryption scheme, Fagen Li et al. constructed a lattice-based signcryption scheme under the random oracle model (ROM) by using the preimage sampleable function and the lattice-based signature algorithm. Wang Fenghe et al. also constructed a lattice-based post-quantum secure signcrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3236
Inventor 杨孝鹏李伟春冯明奎
Owner CHINA MARITIME POLICE ACADEMY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More