Unlock instant, AI-driven research and patent intelligence for your innovation.

Efficient and compact encryption method based on lattice

An encryption method, an efficient technology, applied in the field of cryptography

Active Publication Date: 2021-10-22
赵运磊
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the decision-type LWE assumption, for a sufficiently large security parameter λ, the probabilistic polynomial-time algorithm cannot distinguish A with non-negligible probability q,s,χ and Uniform distribution on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient and compact encryption method based on lattice
  • Efficient and compact encryption method based on lattice
  • Efficient and compact encryption method based on lattice

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] Generate the system parameters required for encryption (λ, n, q, χ, AKC, l, h, t 1 ,t 2 ); wherein, λ is a security parameter, q ≥ 2, χ is a noise distribution, l and h are positive integers and are polynomials of λ, representing the dimension size, t 1 and t 2 It is a parameter used in the compression function, which is used to reduce the bandwidth when sending ciphertext;

[0100] Public and private key generation (see figure 2 ): The decryptor samples to get a random seed ←{0,1} κ , the length of the seed is a positive integer κ, using Gen to input the seed seed to generate matrix A, where, is a pseudorandom generator that maps random strings of length κ to matrix A; the decryptor samples and in, and are two distributions respectively, used to sample l×1-dimensional vectors, where the elements of each dimension of the vector are R q Polynomials on , the distributions are the same or different; and / or as part of the private key; the decryptor co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lattice-based efficient and compact encryption method. A public key of a decryptor is marked as Y1 = Compress1 (AX1 + E1), a private key is marked as X1, Compress1 (), DeCompress1 (), Compress2 () and Decompress2 () are respectively two groups of compression and decompression functions, Con () and Rec () are consensus algorithms of both parties, and a message to be encrypted is K2. A ciphertext sent by an encryptor is composed of two parts, one part is Y2 = Compress2 (ATX2 + E2), the other part is V <-Con (Sigma 2, K2, params), Sigma 2 = DeCompress1 (Y1) T.X2 + Esigma, and params is a system parameter. And after the decryptor receives the data, the decryptor firstly decompresses the data and then recovers K1 = Rec (sigma 1, V, params) by using a consensus algorithm. Specific parameter selection of the method needs to carry out deep mathematical analysis on error rates of different compression and consensus mechanisms and carry out programming to carry out a large number of tests so as to obtain the optimal balance of the method in efficiency, bandwidth and error rate methods.

Description

technical field [0001] The present invention relates to encryption technology, in particular to lattice-based post-quantum encryption method. Background technique [0002] IBM engineers predict that quantum computers will be used on a large scale within the next two decades. Once quantum computers are produced on a large scale, most public key cryptosystems based on discrete logarithms, elliptic curve discrete logarithms, or large integer decompositions will be broken. Therefore, no matter whether we can accurately predict the arrival time of the quantum computing era, we need to upgrade the current information security system to the anti-quantum level. [0003] Lattice cipher is currently one of the main mathematical methods against quantum attacks. In cryptography, the LWE (Learning With Error) problem has been proven to have a more comprehensive function than other classical lattice-difficult problems (such as SVP and CVP). [0004] For positive continuous numbers σ>...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852
Inventor 赵运磊黄兴忠
Owner 赵运磊