Methods of generating cryptographic key and digital signature based on lattices
A technology of digital signature and public key, which is applied to the public key of secure communication, digital transmission system, user identity/authority verification, etc., can solve the problem of increasing calculation amount or calculation time, and achieve the effect of improving overall efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Hereinafter, the present application is described in detail with reference to the accompanying drawings. Encryption / decryption may be used as necessary in the information (data) transmission process performed in this application, and all expressions describing the information (data) transmission process herein and in the claims need to be construed as including encryption / decryption, even if not specifically mentioned. In the disclosure, expressions such as "send (transmit) from A to B" and "receive from B to A" may also include sending (transmitting) or receiving performed with another medium interposed therebetween , and does not necessarily mean direct sending (transmission) or receiving from A to B only.
[0041]It should be understood that, in the description of this specification, there is no limitation on the order of each step, unless it is logically and temporally required that the previous step be performed before the subsequent step. That is, except for suc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


