Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key generation hardware acceleration architecture and method based on Hash post-quantum signature

A technology of key generation and hardware acceleration, which is applied in the field of key generation hardware acceleration architecture based on post-hash quantum signatures, can solve the problems of long time consumption, low key efficiency and speed, and achieve low latency and high hardware utilization rate, the effect of resisting power attacks

Active Publication Date: 2021-08-06
NANJING UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of LMS is that the efficiency and speed of key generation are very low. The key generation process is the longest part of the LMS scheme, and its delay is approximately equal to the sum of signature and verification delays. This defect constitutes The bottleneck of the application of this scheme in the actual scene, so improving its speed becomes the core of improving the performance of the algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation hardware acceleration architecture and method based on Hash post-quantum signature
  • Key generation hardware acceleration architecture and method based on Hash post-quantum signature
  • Key generation hardware acceleration architecture and method based on Hash post-quantum signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to improve the key generation speed of LMS signature and reduce the time consumption of key generation, the embodiment of the present application provides a hardware acceleration architecture and method for key generation based on post-hashing quantum signature.

[0044] Such as figure 1 As shown, the first aspect of the embodiment of the present application provides a key generation hardware acceleration architecture based on post-hash quantum signature, the key generation hardware acceleration architecture includes a leaf node generation unit and a root node generation unit, and the leaf node The generating module includes an OTS public key module, a HASH_LS module and a first HASH_X module.

[0045] Such as figure 2 As shown, it is a schematic diagram of the overall structure of the hardware acceleration architecture provided by the embodiment of the present application. The OTS public key module includes p groups of parallel OTS key submodules, and p is t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of key generation, provides a key generation hardware acceleration architecture and method based on Hash post-quantum signature, and designs a high-speed and telescopic hardware acceleration architecture based on the characteristics of an algorithm and a parameter set in an LMS key generation process. The architecture is designed to be suitable for all parameter sets of an LMS scheme, low time delay and high hardware utilization rate can be achieved at the same time through appropriate parallel design, and the architecture keeps certain constant power when different parameters are achieved, and power attack can be helped to be resisted to a certain extent.

Description

technical field [0001] The present application relates to the technical field of key generation, in particular to a hardware acceleration architecture and method for key generation based on post-hash quantum signatures. Background technique [0002] Traditional signature algorithms (such as RSA, DSA, ECDSA, etc.) have difficulties in factoring large integers and calculating discrete logarithms. With the rapid development of the field of quantum computing, the emergence of quantum computers will break the security provided by traditional signature algorithms. Therefore, the design of encryption systems for quantum computers has become very urgent. The hash-based signature scheme (Hash-based Signature , HBS) is one of the most potential categories of post-quantum encryption schemes, in which the main calculation function is a hash function (Hash) such as SHA2 and SHA3. Compared with other post-quantum encryption schemes, such as lattice-based, homology-based, and coding-based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/00
CPCH04L9/0825H04L9/0643H04L9/003H04L2209/122Y02D30/50
Inventor 王中风胡潇宋逸峰汪文浩田静
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products