Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Quantum Digital Signature and Quantum Digital Signcryption Method

A quantum digital signature and digital signature technology, applied in the field of quantum security, can solve problems such as high resource consumption, security threats, and classic digital signcryption protocol security threats, so as to avoid security risks, ensure security, high efficiency and The effect of unconditional security

Active Publication Date: 2022-02-22
NANJING UNIV +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Purpose of the invention: The purpose of the invention is to provide a quantum digital signature and quantum digital signcryption method, which solves the threat to the security of the classical digital signcryption protocol at this stage. Many early hash functions and public key algorithms have been Being broken, and the emergence of quantum computers in the future will pose a fatal threat to the algorithm security of the current digital signcryption protocol; at the same time, it solves the problem that the leakage of fixed irreducible polynomials in the efficient quantum digital signature scheme will lead to security risks; it also solves the problem of The current digital signature or signcryption protocol is inefficient, consumes more resources, and generates a signature that consumes a lot of communication resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quantum Digital Signature and Quantum Digital Signcryption Method
  • A Quantum Digital Signature and Quantum Digital Signcryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The quantum digital signature method of the present invention has the following three steps: the phase of preparing a key, the phase of generating a signature and the phase of verifying a signature.

[0044] (1) Prepare keys: the signer, the receiver and the verifier hold their own two sets of random keys, and the six strings of keys are divided into two groups, which are denoted as X group and Y group. The two strings of random number key strings held by the signer are denoted as X 1 and Y 1 , similarly the receiver holds X 2 and Y 2 , the verifier holds X 3 and Y 3 , and the keys among the signer, receiver and verifier form a secret sharing; the way to realize the secret sharing is preferably quantum secret sharing;

[0045] Secret sharing relationship: holding both X 2 and X 3 to infer X 1 , while holding Y 2 and Y 3 to infer Y 1 , which satisfies the condition:

[0046] X 1 ⊕ X 2 ⊕ X 3 =0, Y 1 ⊕ Y 2 ⊕ Y 3 =0,

[0047] In the form...

Embodiment 2

[0066] The present invention includes a quantum digital signcryption method, the participants are the signer Alice, the receiver Bob and the verifier Charlie, including the following steps:

[0067] a Encryption: the signer Alice uses a secret key for the plaintext message Encrypt to obtain ciphertext; preferred encryption adopts XOR operation;

[0068] b Digitally sign the ciphertext through the above-mentioned quantum digital signature method. In the process of digitally signing the ciphertext, the ciphertext is used as a message to be signed and the signer will also keep the secret key It is sent to the receiver in an unconditional and safe way, and the unconditional and safe way is realized by quantum key distribution technology or secure distribution of quantum random numbers; the specific process is:

[0069] 1) Prepare keys: Alice the signer, Bob the receiver, and Charlie the verifier hold their own two sets of random keys. These six strings of keys are divided into ...

Embodiment 3

[0089] The present invention includes a quantum digital signcryption method, the participants are the signer Alice, the receiver Bob and the verifier Charlie, and the method includes the following steps:

[0090] S1 encryption: the signer Alice uses the secret key for the plaintext message Encrypt to get the ciphertext; the signer Alice sends the ciphertext to the receiver Bob, and the receiver Bob sends the ciphertext to the verification party Charlie; at the same time, the signer Alice also keeps the secret key It is sent to the receiver Bob and the verifier Charlie in an unconditional and safe way, and the unconditional and safe way is realized by quantum key distribution technology or secure distribution of quantum random numbers;

[0091] S2 digitally signs the plaintext message through the same quantum digital signature method as in Embodiment 1. In the process of digitally signing the plaintext message, the plaintext message is used as the message that needs to be sig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum digital signature and a quantum digital signcryption method, wherein the quantum digital signature includes: generation of a key; generation of a digital signature; verification of the digital signature. The security of the hash function used in the signcryption or signature process of the present invention is ensured by the irreducible polynomial and the hash function key as the input random number, and the irreducible polynomial depends on the local random number. Or the signature process will not be known in advance by the recipient and the signature verification party, that is, the unconditionally secure hash function is used to ensure the security of the entire signcryption or signature process, directly avoiding the fixed irreducible polynomial in other signatures from being damaged. Security risks caused by leaks; and there is no limit to the length of the message when generating the hash value. Each round of signature or signcryption can sign or signcrypt any length of message, and the efficiency of signature or signcryption is very high.

Description

technical field [0001] The invention relates to the technical field of quantum security, in particular to a quantum digital signature and a quantum digital signcryption method. Background technique [0002] Encryption and digital signatures are two basic cryptographic tools for ensuring confidentiality, integrity, authenticity, and non-repudiation. In the asymmetric key system, the traditional method is to digitally sign the message first, and then encrypt the output (sign-then-encryption), which may have two problems: the low efficiency of this superposition scheme and the cost High, and there are situations where neither scheme can guarantee security. Signcryption can complete digital signature and encryption functions in one logical step. Compared with traditional sign-then-encryption, it can effectively reduce computing power consumption and communication loss, and provide digital signature in a more efficient way and properties of encryption schemes. [0003] However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06F21/60G06F21/45G06N10/00
CPCG06F21/64G06F21/602G06F21/45G06N10/00H04L9/3247H04L9/0869H04L9/0852
Inventor 尹华磊翁晨洵富尧陈增兵
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products