Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-linear mapping-based one-round multi-party key exchange protocol

A key exchange protocol, multi-linear technology, applied in key distribution, can solve security threats, vulnerability to quantum attacks and other problems

Inactive Publication Date: 2021-06-15
JIANGSU UNIV OF TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the post-quantum era, since the discrete logarithm problem or the large integer decomposition problem has a polynomial solution algorithm under quantum computing, the public key cryptosystem based on the traditional number theory problem (such as the discrete logarithm problem, the large integer decomposition problem, etc.) is easy. Suffering from quantum attacks, its security is seriously threatened. Research on new public key cryptosystems that resist quantum attacks (that is, achieve post-quantum security) has become a hot issue in the industry.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-linear mapping-based one-round multi-party key exchange protocol
  • Multi-linear mapping-based one-round multi-party key exchange protocol
  • Multi-linear mapping-based one-round multi-party key exchange protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0019] In the present invention, the symbol convention is as follows:

[0020] Let λ be a security parameter. set symbol represent the set of integers, the set of rational numbers, and the set of real numbers, respectively. Let q be a positive integer, is an integer ring. Let the symbol [q] denote the set of elements {1, 2, K, q}. Let the symbol |q| not only represent the absolute value of q, but also be overloaded to represent the bit length of q.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-linear mapping-based one-round multi-party key exchange protocol. The multi-linear mapping-based one-round multi-party key exchange protocol comprises the following steps: generating respective public parameters by each participant by using a new randomized initialization algorithm and issuing the public parameters; constructing multi-linear mapping according to the public parameters and a new randomization method and issuing the multi-linear mapping; generating a key of each participant according to the multi-linear mapping; and generating a shared key according to the key, so that each participant exchanges information according to the shared key. According to the invention, the multi-linear mapping is constructed based on the randomization method, and the key exchange protocol is generated based on the multi-linear mapping, so that the participants can exchange information safely, efficiently and safely.

Description

technical field [0001] The invention relates to the technical field of information security, and specifically relates to a multi-linear mapping-based round multi-party key exchange protocol, a non-transitory computer-readable storage medium and a computer device. Background technique [0002] Multilinear mapping is a generalization of cryptographic primitives and bilinear mapping. It can not only be used to construct non-interactive key exchange protocols, three-party Diffie-Hellman key exchange protocols and various public key encryption schemes, but also widely used in Evidence encryption (WE: Witness Encryption), indistinguishable fuzzer (IO: Indistinguishability Obfuscation) and function encryption (FE: Function Encryption), etc. As the range of applications of multilinear maps in cryptography continues to expand, the construction schemes that serve as the basis of applications will become more and more important. [0003] In the post-quantum era, since the discrete log...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/061H04L9/0833
Inventor 罗烨于志敏蔡秋茹古春生景征骏
Owner JIANGSU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products