Symmetrical anti-quantum encryption method based on key packaging technology

An encryption method and anti-quantum technology, applied in the field of data security, can solve problems such as reducing storage efficiency, and achieve the effect of less ciphertext expansion, good application prospects, and efficient encryption

Pending Publication Date: 2021-12-28
上海同态信息科技有限责任公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Ciphertext expansion: The ciphertext produced by the anti-quantum encryption algorithm on the grid is multiple large matrices, while the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetrical anti-quantum encryption method based on key packaging technology
  • Symmetrical anti-quantum encryption method based on key packaging technology
  • Symmetrical anti-quantum encryption method based on key packaging technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the technical means, creative features, goals and effects of the present invention easy to understand, the symmetric anti-quantum encryption method based on the key encapsulation technology of the present invention will be described in detail below in conjunction with the embodiments and accompanying drawings.

[0045]

[0046] figure 1 It is a flowchart of a symmetric quantum-resistant encryption method based on key encapsulation technology in an embodiment of the present invention.

[0047] Such as figure 1 As shown, in this embodiment, the symmetric anti-quantum encryption method based on key encapsulation technology is used to transmit data between the sending client terminal and the receiving client terminal, including the following steps:

[0048] Step S1, public parameter generation step, input security parameter λ, generate public-private key pair pk according to the security parameter λ f ,sk f .

[0049] In this embodiment, the public-pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a symmetric anti-quantum encryption method based on a key packaging technology, which is used for transmitting data between a sending client terminal and a receiving client terminal, and comprises the following steps: step S1, a public parameter generation step; step S2, an encryption step; step S3, a sending step; step S4, a receiving step; and step S5, a decryption step. The anti-quantum encryption method can be combined with quantum key distribution or a public key encryption algorithm with anti-quantum capability to form an anti-quantum encryption system, data can be encrypted efficiently, a generated ciphertext is much shorter than a key generated by a common anti-quantum encryption algorithm, and the anti-quantum encryption method has great advantages in speed and storage efficiency; meanwhile, the method can be combined with an existing encryption system, encryption efficiency is high, ciphertext expansion is little, and the method has good application prospects.

Description

technical field [0001] The invention belongs to the technical field of data security, in particular to a symmetric anti-quantum encryption method based on key encapsulation technology. Background technique [0002] The field of quantum-resistant encryption algorithms is a new field in cryptography. Unlike quantum cryptography, post-quantum cryptography uses existing electronic computers and does not rely on quantum mechanics. It relies on cryptographers who believe that they cannot be effectively solved by quantum computers. computational problems. [0003] The current mainstream construction method is to use lattice ciphers to construct quantum-resistant ciphers. However, the anti-quantum encryption method based on lattice cipher has the following disadvantages: [0004] (1) Inefficiency: Traditional quantum-resistant encryption is based on lattice cipher design, has a large number of matrix operations, and is encrypted bit by bit. This leads to high complexity of algori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06N10/00
CPCG06F21/602G06N10/00
Inventor 庞皓天周俊沈佳辰魏立斐曹珍富李朋林
Owner 上海同态信息科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products