Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authenticated lattice-based key agreement or key encapsulation

A technology of lattice and key, applied in key distribution

Pending Publication Date: 2022-02-01
KONINKLJIJKE PHILIPS NV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Cryptographic devices and methods are described and claimed herein to address these and other problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticated lattice-based key agreement or key encapsulation
  • Authenticated lattice-based key agreement or key encapsulation
  • Authenticated lattice-based key agreement or key encapsulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] While the presently disclosed subject matter is capable of embodiments in many different forms, one or more specific embodiments are shown in the drawings and will be described in detail herein, it being understood that this disclosure is to be considered as a principle of the disclosed subject matter and are not intended to be limited to the specific embodiments shown and described.

[0071] Hereinafter, elements of the embodiments are described in operation for the sake of understanding. However, it is apparent that the various elements are arranged to perform the functions described as being performed by them.

[0072] Furthermore, the presently disclosed subject matter is not limited to the embodiments, since features described herein or recited in mutually different dependent claims may be combined.

[0073] Various embodiments are disclosed below. exist Figure 1-3 In, various protocols for which the first cryptographic device 10 and the second cryptographic de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Some embodiments are directed to a system with a first cryptographic device (10) and second cryptographic device (20). The devices may compute a final seed from a preshared secret known to the devices, and on a pre-seed that exchanged between them. The final seed may be used to derive a common object (a).

Description

technical field [0001] The presently disclosed subject matter relates to a first cryptographic device, a second cryptographic device, a first cryptographic method, a second cryptographic method, and a computer-readable medium. Background technique [0002] In cryptography, a key agreement protocol is an agreement by which two or more parties can agree on such a key. For example, the agreed upon key may be used to secure further communications between the parties, eg, to authenticate and / or encrypt further communications. An attacker who eavesdrops on all communications between the two parties should know nothing about the key. However, although an attacker who sees the same communication knows nothing or very little, both parties themselves can derive the shared secret. [0003] Practical key agreement protocols were introduced in 1976 when Whitfield Diffie and Martin Hellman introduced the concept of public key cryptography. They propose a system for key agreement betwee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0844H04L9/3093
Inventor O·加西亚莫尔琼L·M·G·M·托尔胡伊泽恩S·巴塔查里亚
Owner KONINKLJIJKE PHILIPS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products