Encryption/decryption and signature method and system
A decryption algorithm and encryption algorithm technology, applied in the field of e-commerce applications, can solve the problems of large amount of key calculation, insecurity, and slow operation speed of non-knapsack cryptosystem
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0084] see figure 1 , the present invention provides a kind of encryption / decryption method, described method step is as follows:
[0085] Set system parameters and generate public key R and private key W, m, M, where R is an n-order matrix; the specific execution steps are as follows:
[0086] Step 101: Set up the system matrix, let Z and N be sets of integers and positive integers respectively, and M(Z) and M(N) respectively represent the matrix classes whose elements belong to Z and N. Randomly select two matrices B and C of order n×n, satisfying B∈M(Z), C∈M(N).
[0087] Wherein, the larger the dimension of the matrix is, the higher the security is. Generally, when n>100, sufficient security is guaranteed. In this embodiment, the dimension n=128 of the matrix can be determined;
[0088] Select B as a matrix in which each element is an integer whose absolute value is less than 8;
[0089] Select C as a matrix in which each element is a positive integer with a...
Embodiment 2
[0146] see figure 2 , the present invention also provides an encryption / decryption system, the system includes a system parameter setting module, an encryption module and a decryption module;
[0147] The system parameter setting module generates a public key R and a private key W, m, M by setting system parameters, wherein R is an n-order matrix;
[0148] The encryption module is used to encrypt the plaintext x with the public key R, and the encryption algorithm adopts the quadratic knapsack algorithm: xRx T =y, generate ciphertext y;
[0149] The decryption module is used to decrypt the ciphertext y with the private key W, m, M, and the decryption algorithm is: calculate M =y 1 , and then calculate z=-1 the y 1 > m , then by z = Σ i = 1 n x i · 2 i ...
Embodiment 3
[0160] see image 3 , the present invention also provides a signature method, said method comprising the following steps:
[0161] Set system parameters and generate public keys R, m, M and private key W, where R is an n-order matrix. The specific steps are as follows:
[0162] Step 201: Set the system matrix.
[0163] Step 202: Select and calculate system public keys R, m, M and private key W.
[0164] The specific parameter setting process in step 201 to step 202 is the same as step 101 to step 102 in embodiment 1, and will not be repeated here, wherein, there is no limit to the selection of each element in B and C. When signing, select the absolute value of the element The value should be increased accordingly to avoid cracking the private key through exhaustive methods.
[0165] Step 203: Sign the message with the public key and private key, and the signature algorithm is as follows:
[0166] For any message y, calculate the Hash function value h(y); cal...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
