Unlock instant, AI-driven research and patent intelligence for your innovation.

Quadratic region code producing method and signature method

A technology for generating methods and sub-domains, applied in the fields of information security and cryptography, to achieve the effect of shortening the length, eliminating the necessity and improving the confidentiality

Inactive Publication Date: 2007-02-07
SHANGHAI JIAO TONG UNIV +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The purpose of the present invention is to provide a practical and high security level secondary domain password generation method and secondary domain password signature method, which solves the practical problem of the high security level secondary domain password system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quadratic region code producing method and signature method
  • Quadratic region code producing method and signature method
  • Quadratic region code producing method and signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, the present invention will be described in more detail with reference to the accompanying drawings.

[0025] (1) The concepts of secondary domains and groups

[0026] In order to introduce the secondary domain encryption system of the present invention, here at first introduce the basic concept of secondary domain and class (can refer to Hua Luogeng [14] ,Assume K = Q ( D ) is a quadratic field, where D is an integer without a square factor. reset

[0027] ω = σ - 1 + D σ ,

[0028] Then we know that the discriminant of K is Δ=(2 / σ) 2 d. If α, β∈K, use α to denote the conjugate of α in K, and use [α, β] to denote the module, namely

[0029] [α,β]={xα+yβ|x,y∈Z}=Zα+Zβ ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a binary domain password generating method, which comprises: based on fixed prime q, finding binary domain QD1, making its h(D1) contain prime factor q, while D1 is the non-square factor with large prime factor; the large prime p meets that gcd(q, p-(D1 / P)=1, while (D1 / P) means Lerade mark; obtaining non-maximum binary domain QD, while D=D1p2; building binary password mechanism in QD, while the system only publishes parameter D.

Description

technical field [0001] The invention belongs to the fields of information security and cryptography, and in particular relates to a secondary domain password generation method and a secondary domain password signature method. Background technique [0002] Integer Factorization Problem (IFP) and Discrete Logarithm Problem (DLP) are two important problems in constructing public key cryptosystems. The most representative ones are the RSA algorithm based on IFP and the ElGamal algorithm based on GF-DLP (DLP in the multiplicative group of Galois field). Elliptic Curve Cryptography (ECC), which is currently considered as a substitute for the RSA algorithm, is based on the elliptic curve DLP on the Galois domain, and the elliptic curve DLP was once considered more difficult than GF-DLP. However, Menezes, Okamoto and Vanstone proposed the famous MOV attack method using Weil pairing, and concluded that elliptic curve DLP can be reduced to GF-DLP. [0003] Quadratic field cryptograp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 董晓蕾曹珍富郑志彬位继伟
Owner SHANGHAI JIAO TONG UNIV