A post-quantum password-authenticated key exchange method based on error learning on modules
A key exchange and password authentication technology, applied in the field of post-quantum password authentication key exchange based on modular error learning, can solve the problem of low operating efficiency, limited theoretical implementation, program performance and security strength that do not meet practical application requirements, etc. problems, to avoid inefficiencies, and to achieve the effect of simple and efficient solutions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] In order to make the objectives, technical solutions and advantages of the present invention clearer, the details of the solution will be described in detail below with reference to the accompanying drawings.
[0015] 1. Symbolic representation
[0016] In order to express and describe the protocol conveniently, the symbolic representation adopted by the protocol is firstly defined. The integer polynomial quotient ring is represented as where q is the modulus, n is the polynomial degree, is a polynomial of modulus q, X represents the variable of the polynomial; one dimension is d∈N + The ring polynomial vector of is expressed as One dimension is d×d∈N + ×N + The ring polynomial matrix of is expressed as for vector and matrix represent their transposes, respectively. If A is a deterministic algorithm, then a:=Α(b) indicates that the value of algorithm A is a when the input is b; if A is a non-deterministic algorithm, a←Α(b) indicates that the output of algo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


