Post-quantum encryption and decryption method and system based on identity label, equipment and medium

An identity identification and post-quantum technology, applied in the field of cryptography, can solve the problems of PGP protocol encryption security reduction and achieve the effect of resisting quantum computing attacks

Active Publication Date: 2022-02-08
HUAZHONG UNIV OF SCI & TECH
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the defects and improvement needs of the prior art, the present invention provides a post-quantum encryption and decryption method, system, equipment and medium based on identity identification, the purpose of which is to improve the security of message encryption while increasing the characteristics of identity identification, To solve the problem of reduced security of PGP protocol encryption caused by the development of quantum computers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Post-quantum encryption and decryption method and system based on identity label, equipment and medium
  • Post-quantum encryption and decryption method and system based on identity label, equipment and medium
  • Post-quantum encryption and decryption method and system based on identity label, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0020] In the present invention, the terms "first", "second" and the like (if any) in the present invention and drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence.

[0021] figure 1 It is a flow chart of the ID-based post-quantum encryption and decryption method provided by the embodiment of the present invention. refer to f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a post-quantum encryption and decryption method and system based on an identity label, equipment and a medium, and belongs to the field of cryptography, and the method comprises the following steps: a key generation center generates a sender private key and a receiver private key by using an identity-based post-quantum private key generation algorithm; a sender signs a message plaintext by using a sender private key by using an identity-based post-quantum signature algorithm, sequentially performs splicing compression and symmetric encryption on signature data and the message plaintext, performs identity-based post-quantum encryption on a session key by using a receiver ID, and sends encrypted data and an encrypted session key to the receiver; and a receiver performs identity-based post quantum decryption on the encrypted session key by using the receiver private key, performs symmetric decryption on the encrypted data, performs decompression separation on the decrypted data to obtain a message plaintext and signature data, and performs identity-based post quantum verification by using the sender ID. The message encryption security is improved.

Description

technical field [0001] The present invention belongs to the field of cryptography, and more specifically relates to a post-quantum encryption and decryption method, system, device and medium based on an identity mark. Background technique [0002] Pretty Good Privacy (PGP) is a set of applications that provide encryption and verification functions for data communications, and are usually used to sign, encrypt, and decrypt text, email, and files. OpenPGP is a non-proprietary protocol produced during the development of PGP, which defines a unified standard for encrypted messages, signatures, private keys, and certificates for exchanging public keys. [0003] Although the existing implementation of OpenPGP has been able to solve the encryption and decryption requirements in most scenarios, there are still some significant security risks. On the one hand, the trust model of OpenPGP relies on the "acquaintance relationship", and the security of the key distribution mechanism est...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0863
Inventor 徐鹏缪文俊余啸海徐婉颖郑宇博陈天阳
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products