Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods of generating cryptographic key and digital signature based on lattices

A technology of digital signature and public key, which is applied to the public key of secure communication, digital transmission system, user identity/authority verification, etc., can solve the problem of increasing calculation amount or calculation time, and achieve the effect of improving overall efficiency

Pending Publication Date: 2021-05-28
CRYPTO LAB INC +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in that case, the value of the dimension increases rapidly from 1024 to 2048, thereby greatly increasing the amount of operations or operation time required to generate the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods of generating cryptographic key and digital signature based on lattices
  • Methods of generating cryptographic key and digital signature based on lattices
  • Methods of generating cryptographic key and digital signature based on lattices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Hereinafter, the present application is described in detail with reference to the accompanying drawings. Encryption / decryption may be used as necessary in the information (data) transmission process performed in this application, and all expressions describing the information (data) transmission process herein and in the claims need to be construed as including encryption / decryption, even if not specifically mentioned. In the disclosure, expressions such as "send (transmit) from A to B" and "receive from B to A" may also include sending (transmitting) or receiving performed with another medium interposed therebetween , and does not necessarily mean direct sending (transmission) or receiving from A to B only.

[0041]It should be understood that, in the description of this specification, there is no limitation on the order of each step, unless it is logically and temporally required that the previous step be performed before the subsequent step. That is, except for suc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a method of generating digital signature information comprising: receiving a message; computing a particular solution in which a result of calculating the particular solution in a public key becomes a function-processed output value predetermined in the received message; and generating digital signature information for the message using the computed particular solution, wherein the public key is computed using a ring having a dimension (d) represented by a power of 2 and an integer multiplication of 3 or more.

Description

[0001] Cross References to Related Applications [0002] This application is based upon and claims priority to Korean Patent Application No. 10-2020-0147995 filed with the Korean Intellectual Property Office on November 6, 2020, which claims priority to The benefit of Korean Patent Application 10-2019-0155709, the disclosure of which is incorporated herein by reference in its entirety. technical field [0003] Apparatus and methods consistent with the present application relate to methods of generating encryption keys and digital signatures based on lattices, and more particularly, to methods of generating encryption keys and digital signatures based on lattices capable of ensuring parameter flexibility. Background technique [0004] As is well known, encryption methods make it impossible to know the content of a digital message (data) even if a third party steals the message during sending and receiving the message. Encryption methods can be broadly classified into symmetr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/30H04L9/3247H04L9/3093H04L9/0643H04L9/0825H04L9/0866H04L9/0869
Inventor 千丁熙孙容河金杜衡
Owner CRYPTO LAB INC