CN101783728B - Public key encryption method for ergodic matrix over hidden field - Google Patents

Public key encryption method for ergodic matrix over hidden field Download PDF

Info

Publication number
CN101783728B
CN101783728B CN 200910066449 CN200910066449A CN101783728B CN 101783728 B CN101783728 B CN 101783728B CN 200910066449 CN200910066449 CN 200910066449 CN 200910066449 A CN200910066449 A CN 200910066449A CN 101783728 B CN101783728 B CN 101783728B
Authority
CN
China
Prior art keywords
key
equation
matrix
alpha
mrow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200910066449
Other languages
Chinese (zh)
Other versions
CN101783728A (en
Inventor
赵永哲
裴士辉
赵博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin University
Original Assignee
Jilin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin University filed Critical Jilin University
Priority to CN 200910066449 priority Critical patent/CN101783728B/en
Publication of CN101783728A publication Critical patent/CN101783728A/en
Application granted granted Critical
Publication of CN101783728B publication Critical patent/CN101783728B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a public key encryption method for ergodic matrixes over a hidden field, belonging to the technical field of cryptology and computers. The public key encryption method comprises key generation, encryption and decryption. A user owns two keys, where one key is privately owned and is called as a private key, and the other key can be disclosed and is called as a public key. The public key is (Fq, [rho 1 (x, y), ... , rho m (x, y)]), the private key is (Q1, Q2, M, B1, B2, lambada) and the private key cannot be deduced from the public key; the public key is used to convert a plaintext into a ciphertext (encryption) and the private key is used to restore the ciphertext into the plaintext (decryption). The invention has the advantages that the key space is large, the randomness of the public key is good, the operational speed is fast, the technology can be disclosed and the method can be used for the secure storage and the transmission of any files and data in computers and communication networks.

Description

The key encrypt method of Ergodic Matrices on the Hidden field
(1) technical field
Public key encryption method (being called for short key encrypt method or public key cryptography scheme) belongs to cryptographic technique and field of computer technology, is one of core technology of information security and Trusted Computing.
(2) background technology
Classic cryptographic technique, symmetric cryptographic technique and public key cryptography technology three phases have been experienced in the development of cryptographic technique.1976, American scholar Diffie and Hellman proposed the thought of public key cryptography, indicated the arriving of public key cryptography technology.The public key encryption method of generally using at present has schemes such as RSA, Rabin and EIGamal (referring to " applied cryptography ", U.S. BruceSchneier is outstanding, and Wu Shizhong, Zhu Shixiong etc. translates, China Machine Press, January calendar year 2001,334-342 page or leaf).In order to shorten parameter length, the EIGamal scheme is everlasting, and simulation realizes that at this moment, it is called as the ECC scheme on the elliptic curve.
In the scheme of using at present the fail safe of RSA and Rabin scheme based on be several greatly factorization problems; The fail safe of EIGamal scheme based on be discrete logarithm problem; And the fail safe of ECC scheme based on be the discrete logarithm problem in the elliptic curve group; In the limited time and resource, be impossible promptly to finding the solution of the problems referred to above.Along with the raising of computer run speed, the security parameter of appeal scheme has become increasing, has greatly reduced the efficient of enciphering/deciphering.The particularly realization of quantum computer in the future makes big number factorization and discrete logarithm find the solution and can in polynomial time, carry out.
Because main theory involved in the present invention and technology are the applicant and propose first, and great majority are still unexposed delivers.For the ease of to understanding of the present invention, special they are described.
2.1 basic symbol involved in the present invention
F q: q unit finite field
F q n: F qThe set of last n dimensional vector
F q n{0}:F qThe set of last non-zero n dimensional vector
F q 1 * n: F qThe set of last n dimension row vector
F q 1 * n{0}:F qThe set of last non-zero n dimension row vector
F q N * m: F qThe set of last n * m matrix
R (M): the row vector set of matrix M
C (M): the column vector set of matrix M
The element of
Figure G2009100664497D00011
matrix M is the resulting column vector in back by rows
F q[x]: F qGo up multinomial set about literal x
V S(A): the vector space that Vector Groups A generated
2.2 BMQ problem and difficulty thereof on the finite field prove
At first introduce F qOn " BMQ problem ".Be F qOn " problem of finding the solution of bisection multivariate quadratic equation group (Bisectional Multivariate Quadratic equations solving problem) ".It is defined as follows:
Definition 2.1 (BMQ problem): F qOn total 2n the variable of equation group E and m equation, being constructed as follows of each equation:
Σ i = 1 n Σ j = 1 n a Ij ( k ) x i y j = b k (a Ij (k), b k∈ F qBe determined value, k=1 ..., m) separating of equation group E asked in examination ( x 1 , · · · , x n ) , ( y 1 , · · · , y n ) ∈ F q n .
The BMQ problem is a special case of MQ problem.Difference is that the variable in the BMQ equation group has been divided into two groups that quantity equates.And only contain quadratic expression in each equation, and any quadratic expression is a product of respectively getting one of which in these two groups of variablees.Therefore in the BMQ equation group, 2n variable formed n just 2Individual quadratic expression.Different with it, in the MQ equation group, in each equation except containing quadratic expression, the one more formula.Therefore 2n variable can be formed 2n altogether 2+ n quadratic expression and 2n expression of first degree.
In addition, F qOn the MQ equation group unique solution can be arranged.But when q>2, if x=is (x 1..., x n) and y=(y 1..., y n) be that of BMQ equation group E separates, then to c ∈ F arbitrarily q{0}, cx=(cx 1..., cx n) and c -1Y=(c -1y 1..., c -1y n) also must be separating of E.Therefore when q>2, F qOn the BMQ solution of equations not unique.F qOn the MQ problem be proved to be NP completely, prove F below qOn the BMQ problem also be NP completely.
Theorem 2.1:F qOn the BMQ problem be NP completely.
Proof: the 3-coloring problem of known figure G be NP completely, if but this problem reduction is F qOn the BMQ problem, then the latter also must be NP completely.But the 3-coloring problem reduction that at first proves G is F 2On the BMQ problem, the design as follows:
1) each vertex v of G iAll corresponding F 2On a pair of variable (x i, y i)
2) v iPainted and (x i, y i) corresponding relation between the value is:
v iColor-1, color-2, color-3 and if only if (x i, y i)=(0,1), (1,0), (1,1)
3) for each isolated vertex v of G s, add EQUATION x sy s=1 in equation group E
4) if vertex v among the G iAnd v jAdjacent, then add EQUATION x iy j+ x jy i=1 in equation group E
Can get F thus 2On BMQ equation group E.For isolated vertex v s, by the EQUATION x in the 3rd step sy s=1, can know that it has unique solution (x s, y s)=(1,1), promptly to each isolated vertex of G equal color-3.
And for adjacent vertex v iAnd v j, by the EQUATION x in the 4th step iy j+ x jy i=1, can know:
(x i,y i)≠(0,0)^(x j,y j)≠(0,0)^(x i,y i)≠(x j,y j)
Be v iAnd v jEach can only use one of three kinds of colors painted, and v iAnd v jNot homochromy.So but the 3-coloring problem reduction of G is solving equation group E.Thereby proved F 2On the BMQ problem be NP completely.
But the 3-coloring problem of demonstrate,proving G again also reduction is F qBMQ problem on (q>2), conceive as follows:
1) each vertex v of G iAll corresponding F qIn three groups of variablees, two pairs every group:
x i 1 ( 1 ) y i 1 ( 1 ) x i 2 ( 1 ) y i 2 ( 1 ) x i 1 ( 2 ) y i 1 ( 2 ) x i 2 ( 2 ) y i 2 ( 2 ) x i 1 ( 3 ) y i 1 ( 3 ) x i 2 ( 3 ) y i 2 ( 3 )
And the value of every group of variable can only have following two kinds of situations:
α 0 0 β Or 0 α β 0 (brief note does respectively With
Figure G2009100664497D00035
α , β ∈ F q \ { 0 } )
2) vertex v iPainted with its corresponding relation between the value of corresponding three groups of variablees be:
v iAnd if only if color-1
Figure G2009100664497D00037
v iAnd if only if color-2
Figure G2009100664497D00038
v iAnd if only if color-3
Figure G2009100664497D00039
3) for each vertex v of G t, selected arbitrarily δ ∈ F q{0}, and add following equation in equation group E:
x t 1 ( 1 ) y t 1 ( 1 ) = 0 , x t 2 ( 1 ) y t 2 ( 1 ) = 0 , x t 1 ( 1 ) y t 2 ( 1 ) + x t 2 ( 1 ) y t 1 ( 1 ) = δ
x t 1 ( 2 ) y t 1 ( 2 ) = 0 , x t 2 ( 2 ) y t 2 ( 2 ) = 0 , x t 1 ( 2 ) y t 2 ( 2 ) + x t 2 ( 2 ) y t 1 ( 2 ) = δ
x t 1 ( 3 ) y t 1 ( 3 ) = 0 , x t 2 ( 3 ) y t 2 ( 3 ) = 0 , x t 1 ( 3 ) y t 2 ( 3 ) + x t 2 ( 3 ) y t 1 ( 3 ) = δ
x t 1 ( 1 ) y t 1 ( 2 ) = 0 , x t 1 ( 1 ) y t 2 ( 3 ) = 0 , x t 1 ( 2 ) y t 2 ( 3 ) = 0 , x t 1 ( 1 ) y t 2 ( 1 ) + x t 1 ( 2 ) y t 2 ( 2 ) + x t 1 ( 3 ) y t 2 ( 3 ) = δ
4) if vertex v among the G iAnd v jAdjacent, equation is in equation group E below then adding
x i 1 ( 1 ) y j 2 ( 1 ) = 0 , x i 1 ( 2 ) y j 2 ( 2 ) = 0 , x i 1 ( 3 ) y j 2 ( 3 ) = 0
Can get F thus qOn BMQ equation group E.By the equation in the 3rd step, can know each summit of G lucky one of 3 kinds of colors.And by the 4th the step equation, can guarantee that then any two adjacent vertexs of G various colors.So but the 3-coloring problem reduction of G is to F qLast BMQ equation group E finds the solution.So F qOn the BMQ problem also be NP completely.
Card is finished.
2.3BMQ problem find the solution difficulty analysis
Though we have proved F in theory qOn the BMQ problem be NP completely, but this and do not mean that to finding the solution of any BMQ equation group all be difficult, it is found the solution, and the number of variable and equation has confidential relation in difficulty and the equation group.Carry out labor in the face of it down.
If F qOn BMQ equation group E contain 2n variable x 1..., x n, y 1..., y nWith m equation.With each the quadratic expression (x among the E iy j) all use a new variables z IjRepresent, then can obtain N 1=n 2Individual variable and M 1The linear function group E of=m equation 1Claim that this process is " to the once heavily linearisation of E ".
If m>=n 2, then can obtain E 1All z that separates Ij, and then by z IjAnti-release E separates ( x 1 , · · · , x n ) , ( y 1 , · · · , y n ) ∈ F q n .
Otherwise, make r=n 2-m.Then can obtain E 1The basis separate and be Z 1 , · · · , Z r ∈ F q n 2 , And E 1A particular solution Z 0 ∈ F q n 2 . And E 1General solution can show be:
Z=(z 11,z 12,…,z nm)=Z 01Z 12Z 2+…+α rZ ri∈F q) (I)
But the E that obtains like this 1Q rThe overwhelming majority in individual the separating is " parasitic solution (parasitic solution) ", and by E 1Parasitic solution Z can't obtain the legal of E and separate.Special, when E has just that (q-1) is individual to be separated, E 1Has only a non-parasitic solution.E when though E separates 1Non-parasitic solution must be arranged, but work as q rWhen very big, can't pass through E 1All rough power of separating attempts deriving separating of E.
To the solution technique of MQ problem on the finite field, the most effectively surely belong to " heavily linearisation (relinearization) " method that Kipnis and Shamir propose from present.The basic thought of this method is through the equation number being represented less than the general solution of the equation group of variable number, being constructed the more equation of high order.Thereby make the equation of higher degree sum that finally obtains number more than or equal to high order variable product term (new variables).And finally obtain separating of full scale equation group through counter pushing away.
Because the BMQ problem is a special case of MQ problem, so heavy linearization technique is still effective to finding the solution the BMQ problem.But wanting respective change aspect the reconstruct of equation and variable.Concrete grammar is following:
For F qOn BMQ equation group E, as m<n 2The time, can know that by the discussion of front the key of finding the solution E is to confirm equation group E 1Non-parasitic solution Z=(z 11, z 12..., z Nm).Again by (I) formula, each component z of Z Ij=x iy jSatisfy:
z ij=s 0+s 1α 1+s 2α 2+…+s rα r (II)
R=n wherein 2-m, s 0..., s r∈ F qBe known constant, α 1..., α r∈ F qBe variable.Therefore Z's confirms to be equivalent to again how at (α 1..., α r) q rPlant and to locate its value exactly in the option.For this reason can be to shape like (x ax by iy j) 4 formulas carry out the reconstruct of equation and variable.By equality:
(x ax by iy j)=(x ay i)(x by j)=(x ay j)(x by i)
Can get 2 equation of n th order n z Aiz Bj=z Ajz BiWith this equation of (II) formula substitution, can obtain about α 1..., α r2 equation of n th order n:
Σ 1 ≤ i ≤ j ≤ r a i , j ( α i α j ) + Σ 1 ≤ i ≤ r b i α i = c - - - ( III )
Shape is like (x again ax by iy j) the total C of 4 formulas n 2* C n 2Individual, each can both produce the equation of 1 shape like (III) formula.And shape is like (x ax ay iy j) and (x ax by iy i) 4 formulas all do not produce new equation; So can obtain shape by 4 times all formulas adds up to like 2 equation of n th order n of (III) formula:
M 2 = C n 2 × C n 2 = n 2 ( n - 1 ) 2 4
With each 2 the formula (α in (III) formula iα j) and 1 formula α iAll regard different new variables as, then ading up to of variable:
N 2 = r ( r + 1 ) 2 + r = r ( r + 3 ) 2
So can get F qOn have M 2Individual equation, N 2The linear function group E of individual variable 2Deserve to be called and state reconstruct equation group E 2Process be " to the heavily linearisation of secondary of E ".The M that even now obtains 2Having in the individual equation much is linear correlation, but when analyzing, might as well suppose that they are linear independence each other.
If M is arranged this moment 2>=N 2, then can be by E 2Solve α 1..., α r∈ F qAgain with α 1..., α rSubstitution (II) formula can solve all z Ij=(x iy j), and then the separating of the anti-E of release ( x 1 , · · · , x n ) , ( y 1 , · · · , y n ) ∈ F q n .
If M 2<N 2, then can further carry out three heavily linearisations to E.Promptly to shape like (x ax bx cy iy jy k) 6 formulas carry out similar equation and variable reconstruct.Total following several types of 6 formulas like this:
(1) shape is like (x ax bx cy iy jy k), total C n 3* C n 3Individual, each can produce 5 about z Ij3 equation of n th order n.
(2) shape is like (x ax bx cy iy iy j), total C n 3* 2C n 2Individual, each can produce 2 about z Ij3 equation of n th order n.
(3) shape is like (x ax ax by iy jy k), total 2C n 2* C n 3Individual, each can produce 2 about z Ij3 equation of n th order n.
(4) shape is like (x ax ax by iy iy j), total 2C n 2* 2C n 2Individual, each can produce 1 about z Ij3 equation of n th order n.
(5) shape is like (x ax ax ay iy jy k) and (x ax bx cy iy iy i) 6 formulas all do not produce about z Ij3 equation of n th order n.
Therefore, the tangible as (x of institute ax bx cy iy jy k) 6 formulas can produce about z IjThe ading up to of 3 equation of n th order n:
M 3 = 5 C n 3 × C n 3 + 8 C n 2 × C n 3 + 4 C n 2 × C n 2 = n 2 ( n - 1 ) 2 ( 5 n 2 + 4 n + 8 ) 36
With the substitution of (II) formula each about z Ij3 equation of n th order n, can get as follows about variable α 1..., α r3 equation of n th order n:
Σ 1 ≤ i ≤ j ≤ k ≤ r a i , j , k ( α i α j α k ) + Σ 1 ≤ i ≤ j ≤ r b i , j ( α i α j ) + Σ 1 ≤ i ≤ r c i α i = d - - - ( IV )
With each 3 the formula (α in (IV) formula equation iα jα k), 2 formula (α iα j) and 1 formula α iAll regard different new variables as, then ading up to of variable:
N 3 = r ( r + 1 ) ( r + 2 ) 6 + N 2 = r ( r 2 + 6 r + 11 ) 6
Thereby can obtain F qOn have M 3Individual equation, N 3The linear function group E of individual variable 3
If M 3>=N 3, then can be by E 3Solve α 1..., α r, and the separating of the anti-E of release ( x 1 , · · · , x n ) , ( y 1 , · · · , y n ) ∈ F q n . Otherwise can further carry out four heavily linearisations to E.Promptly to shape like (x ax bx cx dy iy jy ky l) 8 formulas carry out equation and variable reconstruct.Total following several types of 8 formulas like this:
(1) shape is like (x ax bx cx dy iy jy ky l), total C n 4* C n 4Individual, each can produce 23 about z Ij4 equation of n th order n.
(2) shape is like (x ax bx cx dy iy iy jy k), total C n 4* 3C n 3Individual, each can produce 11 about z Ij4 equation of n th order n.
(3) shape is like (x ax bx cx dy iy iy iy j), total C n 4* 2C n 2Individual, each can produce 3 about z Ij4 equation of n th order n.
(4) shape is like (x ax bx cx dy iy iy jy j), total C n 4* C n 2Individual, each can produce 5 about z Ij4 equation of n th order n.
(5) shape is like (x ax ax bx cy iy jy ky l), total 3C n 3* C n 4Individual, each can produce 11 about z Ij4 equation of n th order n.
(6) shape is like (x ax ax bx cy iy iy jy k), total 3C n 3* 3C n 3Individual, each can produce 6 about z Ij4 equation of n th order n.
(7) shape is like (x ax ax bx cy iy iy iy j), total 3C n 3* 2C n 2Individual, each can produce 2 about z Ij4 equation of n th order n.
(8) shape is like (x ax ax bx cy iy iy jy j), total 3C n 3* C n 2Individual, each can produce 3 about z Ij4 equation of n th order n.
(9) shape is like (x ax ax ax by iy jy ky l), total 2C n 2* C n 4Individual, each can produce 3 about z Ij4 equation of n th order n.
(10) shape is like (x ax ax ax by iy iy jy k), total 2C n 2* 3C n 3Individual, each can produce 2 about z Ij4 equation of n th order n.
(11) shape is like (x ax ax ax by iy iy iy j), total 2C n 2* 2C n 2Individual, each can produce 1 about z Ij4 equation of n th order n.
(12) shape is like (x ax ax ax by iy iy jy j), total 2C n 2* C n 2Individual, each can produce 1 about z Ij4 equation of n th order n.
(13) shape is like (x ax ax bx by iy jy ky l), total C n 2* C n 4Individual, each can produce 5 about z Ij4 equation of n th order n.
(14) shape is like (x ax ax bx by iy iy jy k), total C n 2* 3C n 3Individual, each can produce 3 about z Ij4 equation of n th order n.
(15) shape is like (x ax ax bx by iy iy iy j), total C n 2* 2C n 2Individual, each can produce 1 about z Ij4 equation of n th order n.
(16) shape is like (x ax ax bx by iy iy jy j), total C n 2* C n 2Individual, each can produce 2 about z Ij4 equation of n th order n.
(17) shape is like (x ax ax ax ay iy jy ky l) and (x ax bx cx dy iy iy iy i) 8 formulas do not produce about z Ij4 equation of n th order n. therefore, the tangible as (x of institute ax bx cx dy iy jy ky l) 8 formulas can produce about z Ij4 equation of n th order n add up to:
M 4 = 23 C n 4 × C n 4 + 66 C n 3 × C n 4 + 54 C n 3 × C n 3 + 22 C n 2 × C n 4 + 42 C n 2 × C n 3 + 10 C n 2 × C n 2
= n 2 ( n - 1 ) 2 ( 23 n 4 + 34 n 3 + 131 n 2 + 84 n + 108 ) 576
With each 4 equation of n th order n above the substitution of (II) formula, can get as follows about variable α 1..., α r4 equation of n th order n:
Σ 1 ≤ i ≤ j ≤ k ≤ l ≤ r a i , j , k , l ( α i α j α k α l ) + Σ 1 ≤ i ≤ j ≤ k ≤ r b i , j , k ( α i α j α k ) + Σ 1 ≤ i ≤ j ≤ r c i , j ( α i α j ) + Σ 1 ≤ i ≤ r d i α i = e
With each 4 the formula (α in the equation iα jα kα l), 3 formula (α iα jα k), 2 formula (α iα j) and 1 formula α iAll regard different new variables as, then ading up to of variable:
N 4 = r ( r + 1 ) ( r + 2 ) ( r + 3 ) 24 + N 3 = r ( r 3 + 10 r 2 + 35 r + 50 ) 24
So can obtain F qOn have M 4Individual equation, N 4The linear function group E of individual variable 4
If M 4>=N 4, then can be by E 4Solve α 1..., α r, and the separating of the anti-E of release ( x 1 , · · · , x n ) , ( y 1 , · · · , y n ) ∈ F q n . Otherwise can continue E is carried out the more heavily linearisation of high order.
But along with to heavy the increasing of linearisation number of times of E, gained is about variable α 1..., α rEquation of higher degree group in variable and equation number also will increase fast.Order is by r variable { α 1, α 2..., α rDifferent t the product formulas that can constitute
Figure G2009100664497D00066
Number be P (r, t).Following theorem is then arranged,
Theorem 2.2: P ( r , t ) = | { ( α i 1 α i 2 . . . α i t ) | 1 ≤ i 1 ≤ i 2 ≤ . . . ≤ i t ≤ r } | = r ( r + 1 ) ( r + 2 ) . . . ( r + t - 1 ) t !
If to k time of E heavily after the linearisation resulting equation group be E kE then kIn each equation all have following form:
Σ 1 ≤ i 1 ≤ . . . ≤ i k ≤ r a i 1 i 2 . . . i k ( k ) ( α i 1 α i 2 . . . α i k ) + . . . + Σ 1 ≤ i ≤ j ≤ r a ij ( 2 ) ( α i α j ) + Σ 1 ≤ i ≤ r a i ( 1 ) α i = b
With each 1 the formula α in the equation i, 2 formula (α iα j) ..., and k formula All regard different new variables as.By theorem 2.2, can know the total N of variable kFor about r=n 2The multinomial of-m.And have:
N k = Σ t = 1 k P ( r , t ) = r + r ( r + 1 ) 2 + . . . + r ( r + 1 ) . . . ( r + k - 1 ) k !
Make E kThe number of middle equation is M k, then by the front to M 2, M 3, M 4Calculating can know M kIt is multinomial about n.And when k >=3, have:
M k = Σ 2 ≤ i ≤ j ≤ k t i , j C n i × C n j = ( k ! - 1 ) C n k × C n k + ( k ! - 2 ) ( k - 1 ) C n k - 1 × C n k + . . . + t 2,2 C n 2 × C n 2
Special, when n is big, M k ≈ ( k ! - 1 ) C n k × C n k + ( k ! - 2 ) ( k - 1 ) C n k - 1 × C n k . Following table has provided n and had got respectively 50,100,150,200 o'clock, partly (M k, N k) for given (n, result of calculation r).
Table 1
Figure G2009100664497D00072
By the result of calculation of table 1, be not difficult to draw following character:
(1) M kAbout the n strictly monotone increasing.
(2) N kAbout r=n 2-m strictly monotone increasing.
(3) for given n and k (k>=2), there is r kAnd as r>=r kThe time, perseverance has: M k<N kAnd as r<r kThe time, perseverance has: M k>=N kAnd r kIncrease along with the increase of k.R=n again 2So-m is as m≤n 2-r kThe time, perseverance has M k<N kAnd as m>n 2-r kThe time, perseverance has: M k>=N k.
(4) for given k (k>=2), establishing has (M when m≤t * n k<N k), then t increases progressively about n.Promptly, make (M along with the increase of n k<N k) the value upper bound of the m that satisfies also increasing with respect to n.
Character (3) and (4) can be used to judge whether equation group E can find the solution by heavy linearization technique through k time that the front is introduced.For example, can know by table 1,
For n=50, as m≤n 2During-2332=168=3.36n, perseverance has: M 3<N 3.
For n=100, as m≤n 2During-9371=629=6.29n, perseverance has: M 3<N 3.
For n=150, as m≤n 2During-21116=1384=9.227n, perseverance has: M 3<N 3.
For n=200, as m≤n 2During-37565=2435=12.175n, perseverance has: M 3<N 3.
Therefore, when n gets 50,100,150,200 respectively, if the number m of equation satisfies respectively among the E:
m≤3.36n、m≤6.29n、m≤9.227n、m≤12.175n
Then perseverance has: (M 2<N 2) ^ (M 3<N 3).This means can't through secondary and three times heavily linearisation come E is found the solution.
Generally speaking, at F qLast picked at random has the BMQ equation group E of 2n variable and m equation, if the value of n and m makes (M k<N k^M K+1>=N K+1) set up, then can't through be no more than k time heavily linearisation find the solution E.
If to E carry out k time heavily after the linearisation resulting equation group be E k, E then kThe number of middle equation is at most M kBut often exist the equation of a large amount of linear correlations in the middle of them.Making wherein, the equation quantity of linear independence is M kEven (M is then arranged k>=N k), if but (M k<N k), E kStill intangibility.
In addition, along with to heavy the increasing of linearisation number of times k of E, equation E kIn variable number N kAlso increase fast.Because E kThe space requirement of coefficient matrix be N k 2Log 2Therefore the q bit works as N kWhen enough big (>=2 40), whether no matter (M arranged k>=N k), E on room and time kEqual intangibility; Promptly can't through k time heavily linearisation find the solution E.
Know again, after n confirms, M iAlso confirm thereupon; And N iThen confirm uniquely by r (or m).If can find r, make when r>=r, perseverance has (M K-1<N K-1) and N kTo such an extent as to enough big E kAt intangibility (k>2) in fact.Then have:
(M 2<N 2^…^M k-1<N k-1)^(N k<N k+1<N k+2<…)
Therefore as m≤n 2During-r, for k>=2 arbitrarily, can't through direct k time heavily linearisation find the solution E.Yet this fashion can not assert that heavy linearizing method is infeasible to finding the solution E.Though (M is arranged 2<N 2^ ... ^M K-1<N K-1), if but can find less r t=N t-M t(2≤t≤k-1) then can be to t heavy resulting equation group E after the linearisation tReuse general linearization technique again.Be about to E tIn each variable v iAll table is r tIndividual variable
Figure G2009100664497D00081
Linear equation:
v i = α i 1 α i 2 . . . α i s = c 0 + c 1 β 1 + c 2 β 2 + . . . + c r t β r t , ( 1 ≤ s ≤ t , 1 ≤ i ≤ N t )
Then through reconstruct about variable
Figure G2009100664497D00083
H>=2 equation of n th order n groups come solving equation group E t, the anti-E's of release separates again.Know that again the variable number about in the h equation of n th order n group of variable of utilizing general linearization technique again to construct is:
N ‾ t = Σ i = 1 h P ( r t , i ) ≥ Σ i = 1 2 P ( r t , i ) = r t ( r t + 3 ) 2
So have only as each r t=N t-M tAll make N tEnough big (2≤t≤k-1), can assert that just E can't utilize any heavy linearizing method to find the solution.Following theorem is promptly arranged,
Theorem 2.3: picked at random F qOn have the BMQ equation group E of 2n variable and m equation, if having k>2 and r, make when r>=r, perseverance has:
Figure G2009100664497D00091
Then as m≤n 2During-r, can't find the solution E through heavy linearizing method.
It should be noted that the front is to N kAnd M kThe situation of valuation during not q≤k take into account; And this maybe be to N kAnd M kValuation produce this those long influences that disappear.For example, when q=2, have:
( x a x b y i y j ) = ( x a 2 x b y i 2 y j ) = ( x a 2 x b y i y j 2 ) = ( x a x b 2 y i 2 y j ) = ( x a x b 2 y i y j 2 )
⇒ ( x a y i ) ( x b y j ) = ( x a y j ) ( x b y i ) = ( x a y i ) ( x a y j ) ( x b y i ) = ( x a y i ) ( x a y j ) ( x b y j ) = . . .
⇒ z ai z bj = z aj z bi = z ai z aj z bi = z ai z aj z bj = . . .
⇒ z ai z bj = z aj z bi z ai z bj = z ai z aj z bi z ai z bj = z ai z aj z bj z aj z bi = z ai z aj z bi z aj z bi = z ai z aj z bj . . .
Promptly by shape like (x ax by iy j) 4 formulas can not only reconstruct about variable α 1..., α r2 equation of n th order n, can also reconstruct corresponding 3 equation of n th order n.And these 3 equation of n th order n are different from by shape like (x probably ax bx cy iy jy k) 6 formula reconstruct gained.In addition, because α i 3 = α i 2 = α i With α i 2 α j = α i α j 2 = α i α j , So for F 2On the BMQ equation group, M kAnd N kComputing formula and front given will produce deviation.
Can specify suitable lower bound to q for this reason,, can guarantee that then the front is to N such as making q>10 kAnd M kThe correctness of valuation (2≤k≤10).Below conclusion be putting before this and obtain.
In fact, theorem 2.3 is guarded for the difficulty assessment of the heavy linearization technique of finding the solution BMQ equation group E, because equation group E kThe equation quantity M that neutral line is irrelevant kIn reality, can't reach theoretical upper bound M at all k
By theorem 2.3, for n=50, when r=2332, (M 3<N 3) and N 4=1237553754679 ≈ 1.1255 * 2 40Enough big; But this moment
r 2 = 2722610 - 1500625 = 1221985 ⇒ r 2 ( r 2 + 3 ) 2 = 746625503090 ≈ 1.358 × 2 38
r 3 = 2119098894 - 2118882500 = 216394 ⇒ r 3 ( r 3 + 3 ) 2 = 23413506209 ≈ 1.363 × 2 34
r 2And r 3Big inadequately.And when r=2445,
r 2 = 1492055 ⇒ r 2 ( r 2 + 3 ) 2 = 1113116299595 ≈ 1.0124 × 2 40
r 3 = 323145195 ⇒ r 3 ( r 3 + 3 ) 2 = 52211409010511805 ≈ 1.45 × 2 55
r 2And r 3Enough big.Therefore as m≤n 2During-2445=55=1.1n, can't find the solution E through heavy linearizing method.
For n=100, when r=9371, (M 3<N 3) and N 4=321659128415624 ≈ 1.142 * 2 48Enough big, r again 2=19419377 and r 3=5448123 is enough big.So as m≤n 2During-9371=629=6.29n, can't find the solution E through heavy linearizing method.
For n=150, when r=18900, (M 2<N 2) and N 3=1125568744650 ≈ 1.02 * 2 40Enough big, r again 2=53752725 is enough big.So as m≤n 2During-18900=3600=24n, can't find the solution E through heavy linearizing method.
For n=200, when r=28142, (M 2<N 2) and N 3=3715405463639 ≈ 1.69 * 2 41Enough big, but r 2=18295 is big inadequately; And when r=28200, r 2=1652300 is enough big.So as m≤n 2During-28200=11800=59n, can't find the solution E through heavy linearizing method.
Therefore when n gets 50,100,150,200 respectively, if the number m of equation satisfies respectively among the E:
m≤1.1n、m≤6.29n、m≤24n、m≤59n
Then can't find the solution E through heavy linearizing method.
Generally speaking, after n confirmed, m was littler, then the heavily linearisation of BMQ equation group E was found the solution just more infeasible.But because the special construction of BMQ equation group, being not that m is more little finds the solution E with regard to more difficult.This point, is then guessed through a spot of exploration separating of E if m is too small with to find the solution the MQ equation group different probably.M The Representation Equation with E is following for this reason:
p 1 ( x , y ) = Σ i = 1 n Σ j = 1 n a ij ( 1 ) x i y j = b 1 . . . p m ( x , y ) = Σ i = 1 n Σ j = 1 n a ij ( m ) x i y j = b m ( x = ( x 1 , . . . , x n ) , y = ( y 1 , . . . , y n ) ∈ F q n )
(p then 1..., p m) the value space be:
p ( E ) = { ( p 1 ( x , y ) , . . . , p m ( x , y ) ) | x , y ∈ F q n }
(p again 1..., p m) value by x * y=(x 1y 1..., x iy j..., x ny n) unique definite.When x=0 or y=0, x * y=0.Otherwise x * y ≠ 0, and to arbitrarily c ∈ F q{0}, x * y=(cx) * (c is arranged -1Y).So q corresponding to x and y 2nPlant value, x * y has 0 draw
Figure G2009100664497D00103
The value of kind non-0.And p ( E ) ⊆ F q m , So have:
| p ( E ) | ≤ min ( q m , ( q n - 1 ) 2 ( q - 1 ) + 1 )
Again when n>1, q 2 n - 1 < ( q n - 1 ) 2 ( q - 1 ) + 1 < q 2 n . Therefore have:
<math> <mrow> <mo>|</mo> <mi>p</mi> <mrow> <mo>(</mo> <mi>E</mi> <mo>)</mo> </mrow> <mo>|</mo> <mo>&amp;le;</mo> <mfenced open='{' close=''> <mtable> <mtr> <mtd> <mfrac> <msup> <mrow> <mo>(</mo> <msup> <mi>q</mi> <mi>n</mi> </msup> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mrow> <mo>(</mo> <mi>q</mi> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> </mfrac> <mo>+</mo> <mn>1</mn> </mtd> <mtd> <mrow> <mo>(</mo> <mi>m</mi> <mo>&amp;GreaterEqual;</mo> <mn>2</mn> <mi>n</mi> <mo>)</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <msup> <mi>q</mi> <mi>m</mi> </msup> </mtd> <mtd> <mrow> <mo>(</mo> <mi>m</mi> <mo>&lt;;</mo> <mn>2</mn> <mi>n</mi> <mo>)</mo> </mrow> </mtd> </mtr> </mtable> </mfenced> </mrow></math>
As (b 1..., b m)=0 o'clock, E has (2q at least n-1) individual shape as (x, 0) and (0, separating y).As (b 1..., b m) ≠ 0 o'clock, if ( b 1 , . . . , b m ) &NotElement; p ( E ) , Then E does not have and separates; Otherwise E separates (x ≠ 0, y ≠ 0), and to c ∈ F arbitrarily q{0}, (cx, c -1Y) also be that separating of E (claimed (cx, c -1Y) with (x, y) equivalence).Therefore as (b 1..., b m) ≠ 0 o'clock, E or nothing are separated, or have separating of (q-1) individual equivalent equivalence at least.
Because (b 1..., b m)=0 o'clock is easy to E is found the solution.So emphasis is inquired into (b 1..., b m) ∈ p (E) {0} the time, how E is found the solution.Except above-mentioned heavy linearization technique,, also can sound out E and find the solution through the method for so-called " conjecture " based on the special construction of BMQ equation group.This method is specified among x and the y at random, as with solving another behind it substitution E, then can obtain separating of E.For example, specify x=α=(α 1..., α n) ≠ 0 then can be about variable y=(y 1..., y n) the linear function group E ' of n unit:
p 1 ( &alpha; , y ) = b 1 . . . p m ( &alpha; , y ) = b m
If E ' separates y=β=(β 1..., β n), then (x, y)=(α β) is of E and separates, and can derive (q-1) individual separating of equal value with it again by it.If E ' nothing is separated, then proceed to sound out, till finding out the separating of E next time.
Can know, for given (b 1..., b m) ∈ p (E) {0}, utilize conjecture method that E is soundd out the success rate find the solution and be directly proportional with the number of separating of E.When E has that (q-1) is individual to be separated, hit it
Figure G2009100664497D00112
If to (b arbitrarily 1..., b m) ∈ p (E) {0}, E has just that (q-1) is individual to be separated.Then when n is enough big, can't utilize conjecture method that E is found the solution.
And for { the p of picked at random 1(x, y) ..., p m(x, y) }, (q of feasible (x ≠ 0, y ≠ 0) n-1) 2The overwhelming majority who plants value also makes (p 1..., p m) ≠ 0.So to (b arbitrarily 1..., b m) ∈ P (E) {0}, the number of on average separating of E is:
<math> <mrow> <mover> <mi>k</mi> <mo>&amp;OverBar;</mo> </mover> <mo>=</mo> <mfrac> <msup> <mrow> <mo>(</mo> <msup> <mi>q</mi> <mi>n</mi> </msup> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mrow> <mo>|</mo> <mi>p</mi> <mrow> <mo>(</mo> <mi>E</mi> <mo>)</mo> </mrow> <mo>|</mo> <mo>-</mo> <mn>1</mn> </mrow> </mfrac> <mo>&amp;GreaterEqual;</mo> <mfenced open='{' close=''> <mtable> <mtr> <mtd> <mrow> <mo>(</mo> <mi>q</mi> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> </mtd> <mtd> <mrow> <mo>(</mo> <mi>m</mi> <mo>&amp;GreaterEqual;</mo> <mn>2</mn> <mi>n</mi> <mo>)</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mfrac> <msup> <mrow> <mo>(</mo> <msup> <mi>q</mi> <mi>n</mi> </msup> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mrow> <mo>(</mo> <msup> <mi>q</mi> <mi>m</mi> </msup> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> </mfrac> </mtd> <mtd> <mrow> <mo>(</mo> <mi>m</mi> <mo>&lt;;</mo> <mn>2</mn> <mi>n</mi> <mo>)</mo> </mrow> </mtd> </mtr> </mtable> </mfenced> </mrow></math>
When m<2n, k>(q-1).Especially, when m≤n, k>=(q n-1) average probability of separating of, guesing out E this moment is near a hundred per cent.Can get theorem thus,
Theorem 2.4: picked at random F qOn have the BMQ equation group E of 2n variable and m>=2n equation, if to (b arbitrarily 1..., b m) ∈ p (E) {0}, E has just that (q-1) is individual to be separated.Then when n is enough big, can't find the solution E with conjecture method.
By theorem 2.1, theorem 2.3, theorem 2.4; Can get proposition,
Proposition 2.1: picked at random F qOn have the BMQ equation group E of 2n variable and m equation, if E satisfies:
1) for (b arbitrarily 1..., b m) ∈ p (E) {0}, E is at F qOn have just that (q-1) is individual to be separated
2) have k>2 and r, and when r >=r, perseverance has:
Figure G2009100664497D00114
3)2n≤m≤n 2-r
It is difficult then finding the solution E.
Can know by proposition 2.1, for the F of picked at random qOn have the BMQ equation group E of 2n variable and m equation, when E satisfies (b arbitrarily 1..., b m) ∈ p (E) {0}, all just have when (q-1) is individual to be separated; The difficulty of then E being found the solution is mainly determined by the value of n and m.And F qSelection only with data computing with the expression relevant, the difficulty of solving a problem is not had influence basically.Provide definition for this reason,
Definition 2.2: establishing E is at F qGo up optional BMQ equation group with 2n variable and m equation, and for (b arbitrarily 1..., b m) ∈ p (E) {0}, E is at F qOn have just that (q-1) is individual to be separated.If the value of n and m makes and finds the solution E is difficult, then claim " (n m) does difficult BMQ problem ".
For example, when n gets 50,100,150,200 respectively, do difficult BMQ problem (n, m) value is as shown in table 2.
Table 2
Figure G2009100664497D00121
2.4 Ergodic Matrices and character thereof
Definition 2.3 (Ergodic Matrices): establish A &Element; F q n &times; n , If column vector to any non-0 v &Element; F q n \ { 0 } , { Av , A 2 v , . . . , A q n - 1 v } Just get all over F q n{0} in all non-0 column vectors, claim that then A is F qOn " Ergodic Matrices (Ergodic Matrix) ".
Definition 2.4: establish A &Element; F q n &times; n , The matrix multiplication spanning set of note A is:<a>={ A k| k=1,2,3 ....
About finite field F qOn (traversal) matrix, following main theorem (proof slightly) is arranged:
Theorem 2.5: to arbitrarily A &Element; F q n &times; n , K ∈ 0,1,2 ...; There is c 0, c 1..., c N-1∈ F q, make:
A k=c 0I+c 1A+c 2A 2+...+c n-1A n-1
Theorem 2.6: if A &Element; F q n &times; n Nonsingular, then A under matrix multiplication the cycle≤(q n-1).
Theorem 2.7: A &Element; F q n &times; n For Ergodic Matrices and if only if A under matrix multiplication the cycle=(q n-1).
Theorem 2.8: if A &Element; F q n &times; n Be Ergodic Matrices, then<a>In just have
Figure G2009100664497D001210
Individual Ergodic Matrices.Claim their " equivalences " each other.
Theorem 2.9: if A &Element; F q n &times; n Be Ergodic Matrices, then vectorial to any non-0 row r &Element; F q 1 &times; n \ { 0 } , { RA , r A 2 , . . . , r A q n - 1 } Just get all over F q 1 * nNon-0 row all in ing is vectorial.
Theorem 2.10: if A &Element; F q n &times; n Be Ergodic Matrices, then F q [ A ] = { 0 } &cup; < A > = { 0 , A , A 2 , . . . , A q n - 1 = I } . And F q[A] makes a q just under addition of matrices and multiplication nUnit's finite field.
Theorem 2.11: if A &Element; F q n &times; n Be Ergodic Matrices, then [A 0=I, A, A 2..., A N-1] make q just nThe finite field F of unit q[A] is about the finite field F of q unit qOne group of base.Promptly right &ForAll; m &Element; F q [ A ] , There is unique c 0, c 1..., c N-1∈ F q, make:
n=c 0I+c 1A+c 2A 2+...+c n-1A n-1
Conclusion by the front can know that the Ergodic Matrices on the finite field has maximum multiplication cycle and spanning set in the same order nonsingular matrix.And the non-zero column vector of all power premultiplications or the right side with Ergodic Matrices take advantage of the result of a capable vector of non-zero fully to disperse (getting just all over the capable vector of all non-zero column vector sums).Table 3 has provided the statistics of the n * n Ergodic Matrices on the part finite field.
Table 3
Figure G2009100664497D00131
Can find F from top statistics qOn n * n Ergodic Matrices be ubiquitous, and its number increases sharply along with the increase of q and n.
In order principle of the present invention to be described special introduce " MPEMRL problem ".I.e. so-called " the bilateral power of Ergodic Matrices is taken advantage of problem (Multiplied by the Powers of the Ergodic Matrices on the Right and Left.) on the finite field ".It is defined as follows:
Definition 2.5 (MPEMRL problems): Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M &Element; F q n &times; n \ { 0 } , T = Q 1 x M Q 2 y &Element; &lang; Q 1 &rang; &times; M &times; &lang; Q 2 &rang; ; Known (Q 1, M, Q 2, T), ask Q 1 xAnd Q 2 y.
At first proof is found the solution the MPEMRL problem and can be exchanged into and find the solution corresponding F qOn the BMQ problem.By Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, can know F q[Q 1] and F q[Q 2] under addition of matrices and multiplication, all make q nUnit's finite field.
Select F arbitrarily q[Q 1] and F q[Q 2] about F qOne group of base B 1 = [ Q 1 &alpha; 1 , . . . , Q 1 &alpha; n ] With B 2 = [ Q 2 &beta; 1 , . . . , Q 2 &beta; n ] . Then exist unique ( x 1 , . . . , x n ) , ( y 1 , . . . , y n ) &Element; F q n \ { 0 } , Make:
Q 1 x = &Sigma; i = 1 n x i Q 1 &alpha; i , Q 2 y = &Sigma; j = 1 n y j Q 2 &beta; j
Promptly have:
T = Q 1 x M Q 2 y = &Sigma; i = 1 n &Sigma; j = 1 n ( x i y j ) ( Q 1 &alpha; i M Q 2 &beta; j )
With n * n matrix T and each
Figure G2009100664497D00141
All turn to n by line linearity 2Dimensional vector
Figure G2009100664497D00142
With
Figure G2009100664497D00143
Can get F qOn have 2n variable x 1..., x n, y 1..., y nBMQ equation group with m equation:
[ Q 1 &alpha; 1 M Q 2 &beta; 1 &RightArrow; . . . Q 1 &alpha; 1 M Q 2 &beta; n &RightArrow; . . . Q 1 &alpha; n M Q 2 &beta; 1 &RightArrow; . . . Q 1 &alpha; n M Q 2 &beta; n &RightArrow; ] &times; x 1 y 1 . . . x 1 y n . . . x n y 1 . . . x n y n = [ B 1 M B 2 &RightArrow; ] &times; x 1 y 1 . . . x 1 y n . . . x n y 1 . . . x n y n = T &RightArrow;
Wherein m = Rank ( [ B 1 M B 2 &RightArrow; ] ) Be coefficient matrix [ B 1 M B 2 &RightArrow; ] &Element; F q n 2 &times; n 2 Order.Note is top by Q 1, M, Q 2, BMQ equation group that T derived is E (Q 1, M, Q 2, T).
Because the addition of matrix is taken advantage of with the addition of vector with number and is taken advantage of indistinction in itself with number, so also can be with n * n set of matrices<q 1>* M *<q 2>And B 1* M * B 2All regard n as 2The dimensional vector group, and have:
<math> <mrow> <mi>Rank</mi> <mrow> <mo>(</mo> <mo>&lt;;</mo> <msub> <mi>Q</mi> <mn>1</mn> </msub> <mo>></mo> <mo>&amp;times;</mo> <mi>M</mi> <mo>&amp;times;</mo> <msub> <mrow> <mo>&lt;;</mo> <mi>Q</mi> </mrow> <mn>2</mn> </msub> <mo>></mo> <mo>)</mo> </mrow> <mo>=</mo> <mi>Rank</mi> <mrow> <mo>(</mo> <msub> <mi>B</mi> <mn>1</mn> </msub> <mo>&amp;times;</mo> <mi>M</mi> <mo>&amp;times;</mo> <msub> <mi>B</mi> <mn>2</mn> </msub> <mo>)</mo> </mrow> <mo>=</mo> <mi>Rank</mi> <mrow> <mo>(</mo> <mo>[</mo> <mover> <mrow> <msub> <mi>B</mi> <mn>1</mn> </msub> <mi>M</mi> <msub> <mi>B</mi> <mn>2</mn> </msub> </mrow> <mo>&amp;RightArrow;</mo> </mover> <mo>]</mo> <mo>)</mo> </mrow> <mo>=</mo> <mi>m</mi> </mrow></math>
Obviously, E (Q 1, M, Q 2, T) can separate then corresponding M PEMRL problem and necessarily can separate.Work as m=n 2The time, Full rank is prone to try to achieve E (Q 1, M, Q 2, separating T) ( x 1 , . . . , x n ) , ( y 1 , . . . , y n ) &Element; F q n \ { 0 } ; And then can get separating of MPEMRL problem:
Q 1 x = &Sigma; i = 1 n x i Q 1 &alpha; i , Q 2 y = &Sigma; j = 1 n y j Q 2 &beta; j
As m<n 2The time, if (n m) does not do difficult BMQ problem, then still can be through the group E (Q that solves an equation 1, M, Q 2, T) find the solution corresponding M PEMRL problem.Otherwise can't pass through equation group E (Q 1, M, Q 2, T) find the solution corresponding M PEMRL problem.
Therefore for given MPEMRL problem, can it pass through BMQ equation group E (Q 1, M, Q 2, the key of T) finding the solution mainly by Rank (<q 1>* M *<q 2>) decision.And about Rank (<q 1>* M *<q 2>) following theorem arranged,
Theorem 2.12: if Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, then to arbitrarily M &Element; F q n &times; n \ { 0 } , Perseverance has:
Rank(<Q 1>×M×<Q 2>)=k×n(1≤k≤n)
Find through experiment, for selected arbitrarily Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n , Let M all over getting F q N * nIn all non-null matrix, then Rank (<q 1>* M *<q 2>) all over get n, 2n ..., n 2.Table 4 is the statisticses to the part finite field.
Also find through further experiment, in the table 4 about Rank (<q 1>* M *<q 2>) distributed number and Q 1And Q 2Selection irrelevant, but by n and F qConfirm uniquely.Therefrom be not difficult to find out following rule:
1. for Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n With k ∈ 1 ..., n} exists M &Element; F q n &times; n \ { 0 } , Make:
Rank(<Q 1>×M×<Q 2>)=k×n
2. for Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n , Make Rank (<q 1>* M *<q 2>The quantity of the matrix M of)=k * n increases progressively with q, n, k.
3. for Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n , Make Rank (<q 1>* M *<q 2>The quantity of the matrix M of)=n just is n * (q n-1).
Table 4
Since to the amount of calculation of quite making every effort to separate of MPEMRL problem with |<q 1>* M *<q 2>| closely related.And to arbitrarily Q 1 x M Q 2 y &Element; < Q 1 > &times; M &times; < Q 2 > With a ∈ F q{0}, perseverance has:
<math> <mrow> <mi>a</mi> <msubsup> <mi>Q</mi> <mn>1</mn> <mi>x</mi> </msubsup> <mo>=</mo> <msubsup> <mi>Q</mi> <mn>1</mn> <msup> <mi>x</mi> <mo>&amp;prime;</mo> </msup> </msubsup> <mo>&amp;Element;</mo> <msub> <mrow> <mo>&lt;;</mo> <mi>Q</mi> </mrow> <mn>1</mn> </msub> <mo>></mo> <mo>^</mo> <msup> <mi>a</mi> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msup> <msubsup> <mi>Q</mi> <mn>2</mn> <mi>y</mi> </msubsup> <mo>=</mo> <msubsup> <mi>Q</mi> <mn>2</mn> <msup> <mi>y</mi> <mo>&amp;prime;</mo> </msup> </msubsup> <mo>&amp;Element;</mo> <msub> <mrow> <mo>&lt;;</mo> <mi>Q</mi> </mrow> <mn>2</mn> </msub> <mo>></mo> <mo>^</mo> <msubsup> <mi>Q</mi> <mn>1</mn> <mi>x</mi> </msubsup> <mi>M</mi> <msubsup> <mi>Q</mi> <mn>2</mn> <mi>y</mi> </msubsup> <mo>=</mo> <msubsup> <mi>Q</mi> <mn>1</mn> <msup> <mi>x</mi> <mo>&amp;prime;</mo> </msup> </msubsup> <mi>M</mi> <msubsup> <mi>Q</mi> <mn>2</mn> <msup> <mi>y</mi> <mo>&amp;prime;</mo> </msup> </msubsup> </mrow></math>
Therefore to T ∈ arbitrarily<q 1>* M *<q 2>, have (a at least 1, b 1) ..., (a Q-1, b Q-1) ∈ 1 ..., q n-1} 2, make:
T = Q 1 a 1 M Q 2 b 1 = Q 1 a 2 M Q 2 b 2 = . . . = Q 1 a q - 1 M Q 2 b q - 1
Again |<q 1>|=|<q 2>|=(q n-1), so set<q 1>* M *<q 2>In the number of different matrixes satisfy:
<math> <mrow> <mrow> <mo>(</mo> <msup> <mi>q</mi> <mi>n</mi> </msup> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>&amp;le;</mo> <mo>|</mo> <msub> <mrow> <mo>&lt;;</mo> <mi>Q</mi> </mrow> <mn>1</mn> </msub> <mo>></mo> <mo>&amp;times;</mo> <mi>M</mi> <mo>&amp;times;</mo> <msub> <mrow> <mo>&lt;;</mo> <mi>Q</mi> </mrow> <mn>2</mn> </msub> <mo>></mo> <mo>|</mo> <mo>&amp;le;</mo> <mfrac> <msup> <mrow> <mo>(</mo> <msup> <mi>q</mi> <mi>n</mi> </msup> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mrow> <mo>(</mo> <mi>q</mi> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> </mfrac> </mrow></math>
Further also can demonstrate,prove following theorem:
Theorem 2.13: Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M &Element; F q n &times; n \ { 0 } , Then and if only if Rank (<q 1>* M *<q 2>Have during)=n |<q 1>* M *<q 2>|=(q n-1); Also have this moment<q 1>* M *<q 2>=<q 1>* M=M *<q 2>.
Theorem 2.14: for getting fixed Ergodic Matrices arbitrarily Q 1 , Q 2 &Element; F q n &times; n With M &Element; F q n &times; n \ { 0 } , There is positive integer t, makes T ∈ arbitrarily<q 1>* M *<q 2>, (a is just arranged 1, b 1) ..., (a t, b t) ∈ 1 ..., q n-1} 2, make:
T = Q 1 a 1 M Q 2 b 1 = Q 1 a 2 M Q 2 b 2 = . . . = Q 1 a t M Q 2 b t
Theorem 2.15: for Ergodic Matrices<maths num=" 0113 "><![CDATA[<math><mrow><msub><mi>Q</mi><mn>1</mn></msub><mo>,</mo><msub><mi>Q</mi><mn>2</mn></msub><mo>&Element;</mo><msubsup><mi>F</mi><mi>q</mi><mrow><mi>n</mi><mo>&times;</mo><mi>n</mi></mrow></msubsup><mo>,</mo></mrow></math>]]></maths>Let M all over getting<img file="G2009100664497D00165.GIF" he="58" img-content="drawing" img-format="GIF" inline="yes" orientation="portrait" wi="187"/>Then |<q<sub >1</sub>>* M *<q<sub >2</sub>>| all over getting<maths num=" 0114 "><![CDATA[<math><mrow><mo>{</mo><mfrac><msup><mrow><mo>(</mo><msup><mi>q</mi><mi>n</mi></msup><mo>-</mo><mn>1</mn><mo>)</mo></mrow><mn>2</mn></msup><mrow><mo>(</mo><msup><mi>q</mi><msub><mi>d</mi><mn>1</mn></msub></msup><mo>-</mo><mn>1</mn><mo>)</mo></mrow></mfrac><mo>,</mo><mo>.</mo><mo>.</mo><mo>.</mo><mo>,</mo><mfrac><msup><mrow><mo>(</mo><msup><mi>q</mi><mi>n</mi></msup><mo>-</mo><mn>1</mn><mo>)</mo></mrow><mn>2</mn></msup><mrow><mo>(</mo><msup><mi>q</mi><msub><mi>d</mi><mi>k</mi></msub></msup><mo>-</mo><mn>1</mn><mo>)</mo></mrow></mfrac><mo>}</mo><mo>.</mo></mrow></math>]]></maths>{ d wherein<sub >1</sub>=1 ..., d<sub >k</sub>=n} is all positive factors of n.
Definition 2.6: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M &Element; F q n &times; n \ { 0 } , M=Rank (<q 1>* M *<q 2>).If (n m) does difficult BMQ problem, claims that then " M is about (Q 1, Q 2) strong ".And note: M S(Q 1, Q 2)={, A|A was about (Q 1, Q 2) strong
" strong matrix " about Ergodic Matrices has following theorem,
Theorem 2.16: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, A &Element; F q n &times; n \ { 0 } , If there is B ∈ M S(Q 1, Q 2), make:
Rank(<Q 1>×A×<Q 2>)=Rank(<Q 1>×B×<Q 2>)
A ∈ M then S(Q 1, Q 2).
Theorem 2.17: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, Q 1 aAnd Q 2 bBe respectively with Q 1And Q 2Ergodic Matrices (a, b and q of equal value n-1 is coprime), then have: M S ( Q 1 , Q 2 ) = M S ( Q 1 a , Q 2 b ) .
Theorem 2.18: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, A ∈ M S(Q 1, Q 2), then have:
(1) to x ∈<q 1>* A *<q 2>, have: x ∈ M S(Q 1, Q 2)
(2) to x, y ∈<q 1>* A *<q 2>If, Rank (<q 1>* (x+y) *<q 2>)>=2n, then (x+y) ∈ M S(Q 1, Q 2)
Theorem 2.18 explanations are for Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n , If can find one about (Q 1, Q 2) strong matrix, then can obtain a plurality of by it about (Q 1, Q 2) strong matrix.By theorem 2.14 and theorem 2.15, can get theorem again:
Theorem 2.19: if Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, then fixed to getting arbitrarily M &Element; F q n &times; n \ { 0 } , A positive factor e who all has n, and to T ∈ arbitrarily<q 1>* M *<q 2>, BMQ equation group E (Q 1, M, Q 2, (q T) is just arranged e-1) individual separating.Claim that positive integer e is " (Q 1, Q 2) about the index of M ", and note is: Exp (Q 1, M, Q 2).
Also find through experiment, for any given Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n , Most M &Element; F q n &times; n \ { 0 } All satisfy Exp (Q 1, M, Q 2)=1.If M ∈ is M S(Q 1, Q 2) and Exp (Q 1, M, Q 2)=1 then by proposition 2.1, can be known T ∈ arbitrarily<q 1>* M *<q 2>, find the solution BMQ equation group E (Q 1, M, Q 2, be difficult T).But also do not mean that corresponding M PEMRL problem intangibility this moment.Although can't be through the group E (Q that solves an equation 1, M, Q 2, T) find the solution it, but it is following to find the solution the another kind of method of MPEMRL problem by the character of Ergodic Matrices:
Selected at first arbitrarily F q[Q 1] and F q[Q 2] about F qOne group of base B 1 = [ Q 1 &alpha; 1 , . . . , Q 1 &alpha; n ] With B 2 = [ Q 2 &beta; 1 , . . . , Q 2 &beta; n ] . Then exist unique x = ( x 1 , . . . , x n ) , y = ( y 1 , . . . , y n ) &Element; F q n \ { 0 } , Make:
Q 1 x = &Sigma; i = 1 n x i Q 1 &alpha; i , Q 2 - y = &Sigma; j = 1 n y j Q 2 &beta; j
Again by T = Q 1 x M Q 2 y , Q 1 x M = T Q 2 - y ; Promptly have &Sigma; i = 1 n x i ( Q 1 &alpha; i M ) = &Sigma; j = 1 n y i ( T Q 2 &beta; j ) ; Can get equation group thus:
[ Q 1 &alpha; 1 M &RightArrow; . . . Q 1 &alpha; n M &RightArrow; - T Q 2 &beta; 1 &RightArrow; . . . - T Q 2 &beta; n &RightArrow; ] &times; x 1 . . . x n y 1 . . . y n = 0
Note is top by Q 1, M, Q 2, 2n that T derived unit linear function group does
Figure G2009100664497D00177
Then
Figure G2009100664497D00178
Must separate.And at Q 1, M, Q 2, T is under the known condition, be easy to obtain
Figure G2009100664497D00179
Separate.
Order x = ( x 1 , . . . , x n ) , y = ( y 1 , . . . , y n ) &Element; F q n Be
Figure G2009100664497D001711
Separate.Then can release or (x, y)=(0,0), or (x ≠ 0, y ≠ 0).Though (x; Y)=(0; 0) separates for one that is
Figure G2009100664497D001712
, but can know that by T ≠ 0 it is not legal separating.So
Figure G2009100664497D001713
Untrivialo solution must be arranged, and the quantity of untrivialo solution is (q k-1).Wherein:
k = 2 n - Rank ( [ Q 1 &alpha; 1 M &RightArrow; . . . Q 1 &alpha; n M &RightArrow; - T Q 2 &beta; 1 &RightArrow; . . . - T Q 2 &beta; n &RightArrow; ] )
Appoint and get
Figure G2009100664497D001715
Untrivialo solution x = ( x 1 , . . . , x n ) , y = ( y 1 , . . . , y n ) &Element; F q n \ { 0 } , Can get Q 1 x = &Sigma; i = 1 n x i Q 1 &alpha; i With Q 2 - y = &Sigma; j = 1 n y j Q 2 &beta; j , Again to Q 2 -yInvert and to get Q 2 yAnd (Q 1 x, Q 2 y) be of corresponding MPEMRL problem and separate.
Right
Figure G2009100664497D001719
Each untrivialo solution all carry out above-mentioned process, then can draw whole (q of corresponding MPEMRL problem k-1) individual separating.Especially, if k=1, then corresponding MPEMRL problem just has separating of (q-1) individual equivalent equivalence.Promptly separate for its any two With
Figure G2009100664497D001721
Can both find a ∈ F q{0}, and Q 1 x j = ( a Q 1 x i ) , Q 2 y j = ( a - 1 Q 2 y i ) . A demand went out of corresponding MPEMRL problem and separated and just can release its all separating this moment.Be prone to the following theorem of card and set up,
Theorem 2.20: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M &Element; F q n &times; n \ { 0 } , Then have:
Exp ( Q 1 , M , Q 2 ) = 2 n - Rank ( [ Q 1 &alpha; 1 M &RightArrow; . . . Q 1 &alpha; n M &RightArrow; M Q 2 &beta; 1 &RightArrow; . . . M Q 2 &beta; n &RightArrow; ] )
Theorem 2.21: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M &Element; F q n &times; n \ { 0 } , E=Exp (Q 1, M, Q 2).Then to T ∈ arbitrarily<q 1>* M *<q 2>, equation group E (Q 1, M, Q 2, (q T) is just arranged e-1) individual separating.
Theorem 2.22: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M &Element; F q n &times; n \ { 0 } , E=Exp (Q 1, M, Q 2).Then to T ∈ arbitrarily<q 1>* M *<q 2>, equation group
Figure G2009100664497D001731
(q is just arranged e-1) individual untrivialo solution and a null solution.
Theorem 2.23: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M ∈ M S(Q 1, Q 2), if Exp is (Q 1, M, Q 2)=1 is then to T ∈ arbitrarily<q 1>* M *<q 2>, find the solution BMQ equation group E (Q 1, M, Q 2, be difficult T).
Theorem 2.24: establish Q 1 , Q 2 &Element; F q n &times; n Be Ergodic Matrices, M &Element; F q n &times; n \ { 0 } , And Exp (Q 1, M, Q 2)=1.Then to T ∈ arbitrarily<q 1>* M *<q 2>, at known Q 1, Q 2, M, T situation under, can pass through the solving equation group
Figure G2009100664497D00183
Come to obtain fast the separating of whole (q-1) individual equivalent equivalences of corresponding MPEMRL problem.
Can obtain an important conclusion thus.That is exactly to work as q nWhen enough big, for given Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n With M ∈ M S(Q 1, Q 2), if Exp is (Q 1, M, Q 2)=1 is then to optional T = Q 1 x M Q 2 y &Element; < Q 1 > &times; M &times; < Q 2 > , By BMQ equation group E (Q 1, M, Q 2, T) find the solution (Q 1 x, Q 2 y) be difficult; But at known Q 1, Q 2, M, T situation under, by equation group
Figure G2009100664497D00186
Find the solution (Q 1 x, Q 2 y) but be easy.
This point is vital, and the core concept of public key cryptography proposed by the invention derives from this just.Its main thought is with BMQ equation group E (Q 1, M, Q 2, T) as public-key cryptography, and with Q 1, Q 2, B 1, B 2, M is as private cipher key.The sender of the message selects message at random ( Q 1 x , Q 2 y ) &Element; < Q 1 > &times; < Q 2 > , And with the PKI of message recipient to (Q 1 x, Q 2 y) calculating (encryption) must ciphertext T = Q 1 x M Q 2 y &Element; < Q 1 > &times; M &times; < Q 2 > , Then ciphertext T is passed to the recipient; The recipient utilizes its private key reconstruct equation group
Figure G2009100664497D00189
And through finding the solution of its being restored expressly (Q 1 x, Q 2 y).
So far, background technology involved in the present invention and mathematical knowledge have been explained and have been finished, and are particular content of the present invention and execution mode below.
(3) summary of the invention
The technical issues that need to address of the present invention are to work out a kind of new public key cryptography scheme, and make it to have higher security intensity than the public key cryptography of current extensive employing.
The present invention is used for the encryption and decryption of various data such as character, literal, figure, image and the sound of computer and communication network and file; Kept secure and transmission to guarantee data, file content can be widely used in ecommerce, electronic banking and the E-Government.
The present invention hopes that our country can have the core technology of oneself in the public key encryption field, to guarantee information security, economic security and the safety with sovereign right of country, improves the technological means that finance and tax swindle are taken precautions against by China simultaneously.
The present invention is a kind of public key cryptography scheme based on Ergodic Matrices on the Hidden field, according to this method, can make public key encryption/deciphering chip, can develop public key encryption/decryption software etc.Therefore, the present invention is a kind of production public key encryption deciphering product mandatory basic principle of institute and technical scheme, rather than physical product itself.
The given public key cryptography technology scheme of the present invention generates, encrypts, deciphers three parts by key and forms.Herein, file before encrypting or data are called expressly, file or data after encrypting are called ciphertext.
Suppose that user A desire sends a file or data through network to user B, and carry out with the mode of maintaining secrecy.User A and user B desire realize so secure communication process, and its pattern is following:
Key generates: at first, user B should go to the 3rd side authoritative institution (CA or digital certificate center) to get a pair of private key (Private Key) and PKI (Public Key) by the output of key generation parts, and private key must must not be divulged a secret by user B oneself keeping; PKI then allows openly to provide to the external world with disclosed form, so that use.
Cryptographic operation: user A obtains the PKI of user B, and the plaintext that on the machine of operation encryption unit, desire is sent is encrypted, and obtains ciphertext, and sends ciphertext to user B through network.
Decryption oprerations: after user B receives the ciphertext that user A sends, on the machine of operation deciphering parts, ciphertext is deciphered, recover plaintext with own private key.
In key encrypt method, for the efficient of encryption is provided.Usually adopt the mixed cipher technology, promptly come encrypting plaintext, come encrypted symmetric key with public-key cryptosystem again with DSE arithmetic.Employed encryption key of DSE arithmetic and decruption key are same key in essence, are called as session key.
3.1 technical scheme one of the present invention
First technical scheme of the present invention generates, encrypts, deciphers three parts by key and constitutes.Specific as follows:
3.1.1 key generates part
Key generates part and supplies CA to use, and is used for to each user produces a pair of private key and PKI, and its implementation is following:
(1) picked at random F qOn two n * n Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n . (q>10 and q nEnough big)
(2) picked at random is about (Q 1, Q 2) strong matrix M ∈ M S(Q 1, Q 2), require Exp (Q simultaneously 1, M, Q 2)=1.
(3) picked at random F q[Q 1] and F q[Q 2] about F qOne group of base B 1 = [ Q 1 &alpha; 1 , . . . , Q 1 &alpha; n ] With B 2 = [ Q 2 &beta; 1 , . . . , Q 2 &beta; n ] .
(4) picked at random The m n-dimensional subspace n
Figure G2009100664497D00195
About F qOne group of base [R 1..., R m]. (wherein: m=Rank (<q 1>* M *<q 2>))
(5) obtain
Figure G2009100664497D00196
Each row vector is about base [R 1..., R m] coordinates matrix
&lambda; = &lambda; 1,1 &lambda; 1,2 . . . &lambda; 1 , m . . . &lambda; n 2 , 1 &lambda; n 2 , 2 . . . &lambda; n 2 , m &Element; F q n 2 &times; m
It is right to make
Figure G2009100664497D00198
K the vectorial r of row k, have:
r k=λ k,1R 1k,2R 2+…+λ k,mR m(1≤k≤n 2)
(6) by [R 1..., R m] m F of generation qOn BMQ multinomial { ρ 1(x, y) ..., ρ m(x, y) }:
&rho; 1 ( x , y ) &rho; 2 ( x , y ) . . . &rho; m ( x , y ) = R 1 R 2 . . . R m &times; x 1 y 1 . . . x 1 y n . . . x n y 1 . . . x n y n , ( x = ( x 1 , . . . , x n ) , y = ( y 1 , . . . , y n ) &Element; F q n )
At last, with (F q, [ρ 1(x, y) ..., ρ m(x, y)]) be PKI, with (Q 1, Q 2, M, B 1, B 2, λ) be private key.
3.1.2 encryption section
Encryption section supplies information sender to use, and is used for to expressly encrypting.Information sender and recipient at first confirm a kind of general symmetric encipherment algorithm E, and clear packets M is carried out following steps:
(1) obtains recipient's PKI (F q, [ρ 1(x, y) ..., ρ m(x, y)])
(2) select at random &alpha; = ( &alpha; 1 , . . . , &alpha; n ) , &beta; = ( &beta; 1 , . . . , &beta; n ) &Element; F q n \ { 0 } , Session key:
key = &alpha; &times; &beta; = ( &alpha; 1 &beta; 1 , . . . , &alpha; 1 &beta; n , . . . , &alpha; n &beta; 1 , . . . , &alpha; n &beta; n ) &Element; F q n 2 \ { 0 }
(3) with recipient's PKI key is encrypted:
C key=[z 1,…,z m]=[ρ 1(α,β),…,ρ m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C M=E key(M)
(5) with ciphertext (C Key, C M) send to the recipient
3.1.3 decryption portion
Decryption portion supplies the receiving party to use, and is used for ciphertext is deciphered.The recipient with oneself private key as decruption key.
If recipient's private key is (Q 1, Q 2, M, B 1, B 2, λ), the ciphertext of receiving is (C Key, C M).Then decrypting process is following:
(1) calculates T &RightArrow; = &lambda; &times; C Key T = &lambda; &times; [ z 1 , . . . , z m ] T , Can get matrix T ∈<q 1>* M *<q 2>
(2) solve one group of untrivialo solution of following 2n unit linear function group: x = ( x 1 , . . . , x n ) , y &prime; = ( y 1 &prime; , . . . , y n &prime; ) &Element; F q n \ { 0 }
[ Q 1 &alpha; 1 M &RightArrow; . . . Q 1 &alpha; n M &RightArrow; - T Q 2 &beta; 1 &RightArrow; . . . - T Q 2 &beta; n &RightArrow; ] &times; [ x 1 . . . x n y 1 &prime; . . . y n &prime; ] T = 0
(3) by y ' calculating: A = &Sigma; j = 1 n y j &prime; Q 2 &beta; j &Element; < Q 2 >
(4) obtain the inverse matrix A of A -1∈<q 2>
(5) calculate A -1About basic B 2Coordinate y = ( y 1 , . . . , y n ) &Element; F q n \ { 0 } ( A - 1 = &Sigma; j = 1 n y j Q 2 &beta; j )
(6) then (x, y) with (α, β) equivalence, reducible thus session key:
key=x×y=(x 1y 1,…,x 1y n,…,x ny 1,…,x ny n)=α×β
(7) utilize session key key to ciphertext C MDeciphering obtains expressly:
M=D key(C M)
At last, the recipient recovers the plaintext M of transmit leg.
3.2 technical scheme two of the present invention
Second technical scheme of the present invention generates, encrypts, deciphers three parts by key and constitute.Specific as follows:
3.2.1 key generates part
Key generates part and supplies CA to use, and is used for to each user produces a pair of private key and PKI, and its implementation is following:
(1) picked at random F qOn two n * n Ergodic Matrices Q 1 , Q 2 &Element; F q n &times; n . (q>10 and q nEnough big)
(2) picked at random is about (Q 1, Q 2) strong matrix M ∈ M S(Q 1, Q 2), require Exp (Q simultaneously 1, M, Q 2)=1.
(3) picked at random F qOn two n * n nonsingular matrix s , t &Element; F q n &times; n .
(4) calculate F q[Q 1] and F q[Q 2] about F qOne group of base B 1 = [ Q 1 &alpha; 1 , . . . , Q 1 &alpha; n ] With B 2 = [ Q 2 &beta; 1 , . . . , Q 2 &beta; n ] . Make:
Q 1 &alpha; j = &Sigma; i = 1 n s [ i , j ] Q 1 i - 1 , Q 2 &beta; j = &Sigma; i = 1 n t [ i , j ] Q 2 i - 1 , ( j = 1,2 , . . . , n )
(5) picked at random
Figure G2009100664497D00217
The m n-dimensional subspace n
Figure G2009100664497D00218
About F qOne group of base [R 1..., R m]. (wherein: m=Rank (<q 1>* M *<q 2>))
(6) obtain
Figure G2009100664497D00219
Each row vector is about base [R 1..., R m] coordinates matrix
&lambda; = &lambda; 1,1 &lambda; 1,2 . . . &lambda; 1 , m . . . &lambda; n 2 , 1 &lambda; n 2 , 2 . . . &lambda; n 2 , m &Element; F q n 2 &times; m
It is right to make
Figure G2009100664497D002111
K the vectorial r of row k, have:
r k=λ k,1R 1k,2R 2+…+λ k,mR m(1≤k≤n 2)
(7) by [R 1..., R m] m F of generation qOn BMQ multinomial { ρ 1(x, y) ..., ρ m(x, y) }:
&rho; 1 ( x , y ) &rho; 2 ( x , y ) . . . &rho; m ( x , y ) = R 1 R 2 . . . R m &times; x 1 y 1 . . . x 1 y n . . . x n y 1 . . . x n y n ( x = ( x 1 , . . . , x n ) , y = ( y 1 , . . . , y n ) &Element; F q n )
(8) at last with (F q, [ρ 1(x, y) ..., ρ m(x, y)]) be PKI, with (Q 1, Q 2, M, s -1, t -1, λ) be private key.
3.2.2 encryption section
Encryption section supplies information sender to use, and is used for to expressly encrypting.Information sender and recipient at first confirm a kind of general symmetric encipherment algorithm E, and clear packets M is carried out following steps:
(1) obtains recipient's PKI (F q, [ρ 1(x, y) ..., ρ m(x, y)])
(2) select at random &alpha; = ( &alpha; 1 , . . . , &alpha; n ) , &beta; = ( &beta; 1 , . . . , &beta; n ) &Element; F q n \ { 0 } , Session key:
key = &alpha; &times; &beta; = ( &alpha; 1 &beta; 1 , . . . , &alpha; 1 &beta; n , . . . , &alpha; n &beta; 1 , . . . , &alpha; n &beta; n ) &Element; F q n 2 \ { 0 }
(3) with recipient's PKI key is encrypted:
C key=[z 1,…,z m]=[ρ 1(α,β),…,ρ m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C M=E key(M)
(C at last Key, C M) be ciphertext, will be sent out to the recipient.
3.2.3 decryption portion
Decryption portion supplies the receiving party to use, and is used for ciphertext is deciphered.The recipient with oneself private key as decruption key.
If recipient's private key is (Q 1, Q 2, M, s -1, t -1, λ), the ciphertext of receiving is (C Key, C M).Then decrypting process is following:
(1) calculates T &RightArrow; = &lambda; &times; C Key T = &lambda; &times; [ z 1 , . . . , z m ] T , Can get matrix T ∈<q 1>* M *<q 2>
(2) solve one group of untrivialo solution of following 2n unit linear function group: x = ( x 1 , . . . , x n ) , y &prime; = ( y 1 &prime; , . . . , y n &prime; ) &Element; F q n \ { 0 }
[ Q 1 0 M &RightArrow; . . . Q 1 n - 1 M &RightArrow; - T Q 2 0 &RightArrow; . . . - T Q 2 n - 1 &RightArrow; ] &times; [ x 1 . . . x n y 1 &prime; . . . y n &prime; ] T = 0
(3) by y ' calculating: A = &Sigma; j = 1 n y j &prime; Q 2 &beta; j &Element; < Q 2 >
(4) obtain the inverse matrix A of A -1∈<q 2>
(5) calculate A -1About base [Q 2 0..., Q 2 N-1] coordinate y = ( y 1 , . . . , y n ) &Element; F q n \ { 0 } ( A - 1 = &Sigma; j = 1 n y j Q 2 &beta; j )
(6) calculate &alpha; &prime; = ( &alpha; 1 &prime; , . . . , &alpha; n &prime; ) = s - 1 x , &beta; &prime; = ( &beta; 1 &prime; , . . . , &beta; n &prime; ) = t - 1 y &Element; F q n \ { 0 }
(7) then (α ', β ') with (α, β) equivalence, reducible thus session key:
key=α′×β′=(α′ 1β′ 1,…,α′ 1β′ n,…,α′ nβ′ 1,…,α′ nβ′ n)=α×β
(8) utilize session key key to ciphertext C MDeciphering obtains expressly:
M=D key(C M)
At last, the recipient recovers the plaintext M of transmit leg.
3.3 advantage and good effect
Compare with public key cryptography scheme commonly used at present, the given public key cryptography technology scheme of the present invention has following advantage.
3.3.1 fail safe is higher
Can prove the BMQ problem be NP completely.So it is more difficult than big integer factor decomposition and discrete logarithm problem.Therefore, deriving private key or decode expressly from ciphertext from PKI is infeasible in polynomial time.
Moreover public key cryptography commonly used at present all faces the threat of quantum calculation.And do not have effective quantum algorithm for np complete problem.Therefore the present invention can be used as a replacement scheme of existing public key cryptography, thereby has long-range application potential.
3.3.2 key space is big
Work as q nWhen enough big, because F q N * nIn Ergodic Matrices and about given Ergodic Matrices to (Q 1, Q 2) the quantity of strong matrix heavy many, so (private key, PKI) in the given technical scheme of the present invention right selection space is very big.
3.3.3 the randomness of PKI is good
The pairing F of PKI in the given technical scheme of the present invention qOn BMQ multi-direction type group [ρ 1..., ρ m], be by n 2Dimension row vector space
Figure G2009100664497D00231
A specific m n-dimensional subspace n about F qOne group of base [R 1..., R m] unique definite.
And the quantity of the m n-dimensional subspace n V of
Figure G2009100664497D00232
is:
( q n 2 - 1 ) ( q n 2 - q ) ( q n 2 - q 2 ) . . . ( q n 2 - q m - 1 ) ( q m - 1 ) ( q m - q ) ( q m - q 2 ) . . . ( q m - q m - 1 )
For specific m n-dimensional subspace n V, V is about F qThe quantity of base (greatly linearly independent vector group) be:
(q m-1)(q m-q)(q m-q 2)…(q m-q m-1)
So PKI [ρ 1..., ρ m] selection randomness very big.
3.3.4 fast operation
The enciphering rate of this key encrypt method is fast.Because it only relates to F qIn simply add/multiplication, and do not relate to any power exponentiation.
The deciphering speed of this key encrypt method is fast simultaneously.Because it only relates to F qIn simple matrix add/multiplication conciliates the linear function group operation of 2n unit, and do not relate to any matrix power exponentiation.Thereby be convenient to hardware and realize.
3.3.5 technology can disclose
Realization technology of the present invention can disclose fully, and user's PKI also can use the form of digital certificate openly to provide to the external world.As long as private key is not divulged a secret, just can guarantee the safety of ciphertext fully.
3.3.6 it is favourable to national security
The Internet is a kind of open net, and is obvious, transmits sensitive information in the above and must encrypt.Because internet usage is as means of communication for important departments such as the Chinese government, national defence, finance, the tax, therefore, information security is related to national sovereignty safety and economic security.
Therefore, to have a key encrypt method of independent intellectual property right, original innovation significant in research.
(4) embodiment
The characteristics of this key encrypt method are that it can let each user obtain two keys, and a key can disclose, and are used for encrypting, and a key can only the individual have, and are used for deciphering.Like this, can not worry that key divulged a secret in the transmittance process on the net.When the agreement correspondent transmitted information on the net, the sender used recipient's PKI that file or message are encrypted, and the recipient uses the private key of oneself that it is deciphered after receiving ciphertext.
Two keys are got by CA (Certificate Authentication) authentication center that each user can arrive appointment.The ca authentication center is the mechanism that the user is registered, key is produced, distributes and manages.It utilizes the key generation method generation user's of 3.1.1 or 3.2.1 joint PKI and private key.
This encryption method can realize that it comprises two parts with logic circuit chip or program language: chip or program are developed according to key generation method in (1), are used by the ca authentication center; (2) develop chip or program according to the encryption and decryption method of 3.1.2,3.1.3 or 3.2.2,3.2.3 joint, use by the general user.

Claims (1)

1. the key encrypt method of Ergodic Matrices on the Hidden field; Generating, encrypt, decipher three parts by key forms; Key generates part and supplies the generation user of third party authoritative institution (private key, PKI) right, and encryption section supplies the PKI of message sender use message receiver expressly converting ciphertext into; Decryption portion supplies message receiver to use the private key of oneself to be reduced into ciphertext expressly, it is characterized in that:
Key generates part and has adopted the following step:
(1) picked at random F qLast two n * n Ergodic Matrices
Figure FSB00000872367400011
Require q>10 and q nEnough big;
(2) picked at random is about (Q 1, Q 2) strong matrix M ∈ M S(Q 1, Q 2), and M satisfies:
Figure FSB00000872367400012
Here M S(Q 1, Q 2) be by Ergodic Matrices
Figure FSB00000872367400013
Determined set of matrices, it is defined as:
Figure FSB00000872367400014
(3) picked at random F q[Q 1] and F q[Q 2] about F qBase
Figure FSB00000872367400015
With
Figure FSB00000872367400016
(4) by B 1, M, B 2Calculate n 2* n 2Matrix
Figure FSB00000872367400017
All row vectors by A obtain the set of row vector again
Figure FSB00000872367400018
Make m=Rank (<q 1>* M *<q 2>), the capable vector space V that is then generated by Vector Groups H S(H) order also is m, i.e. V S(H) do the vector space of embarking on journey
Figure FSB00000872367400019
The m n-dimensional subspace n, last picked at random V S(H) about F qOne group of base [R 1..., R m];
(5) because each row vector of the matrix A in the 4th step all can be by [R 1..., R m] linear expression, each row vector that therefore can obtain A is about base [R 1..., R m] coordinates matrix:
Figure FSB000008723674000110
And λ satisfies, for k the vectorial r of row of matrix A k(1≤k≤n 2), r is arranged kK, 1R 1+ λ K, 2R 2+ ... + λ K, mR m
(6) by [R 1..., R m] m F of generation qOn BMQ multinomial ρ 1(x, y) ..., ρ m(x, y):
Figure FSB000008723674000111
(7) with (F q, [ρ 1(x, y) ..., ρ m(x, y)]) be PKI, (Q 1, Q 2, M, B 1, B 2, λ) be private key;
Encryption section has adopted the following step:
Message sender and recipient confirm a kind of general symmetric encipherment algorithm E in advance, and transmit leg is done plaintext W then:
(1) obtains recipient's PKI (F q, [ρ 1(x, y) ..., ρ m(x, y)]);
(2) select
Figure FSB00000872367400021
at random session key then:
Figure FSB00000872367400022
(3) with recipient's PKI Key is encrypted:
Figure FSB00000872367400023
(4) with session key Key and symmetric encipherment algorithm E plaintext W is encrypted: C W=E Key(W);
(5) with (C Key, C W) send to reciever;
Decryption portion has adopted the following step:
Message receiver uses the private key (Q of oneself 1, Q 2, M, B 1, B 2, λ), to the message (C that receives Key, C W) do:
(1) by λ, C KeyCalculate n 2Dimensional vector
Figure FSB00000872367400024
Z is regarded as
Figure FSB00000872367400025
Then can unique definite F qOn n * n matrix T ∈<q 1>* M *<q 2>
(2) by B 1, M, B 2, the following 2n of T simultaneous unit linear function group, obtain one of which group untrivialo solution then
(3) by y ', B 2Calculate n * n matrix:
Figure FSB00000872367400028
(4) obtain the matrix P of matrix of P -1∈<q 2>
(5) calculate P -1About basic B 2Coordinate Make
Figure FSB000008723674000210
(6) because (x, y) with (s, t) equivalence, so can by (x y) restores session key:
Key=x×y=(x 1y 1,…,x 1y n,…,x ny 1,…,x ny n)=s×t;
(7) at last by C W, Key and the decipherment algorithm D corresponding with AES E recover expressly: W=D Key(C W).
CN 200910066449 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field Expired - Fee Related CN101783728B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910066449 CN101783728B (en) 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910066449 CN101783728B (en) 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field

Publications (2)

Publication Number Publication Date
CN101783728A CN101783728A (en) 2010-07-21
CN101783728B true CN101783728B (en) 2012-12-19

Family

ID=42523555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910066449 Expired - Fee Related CN101783728B (en) 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field

Country Status (1)

Country Link
CN (1) CN101783728B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123028A (en) * 2011-02-28 2011-07-13 成都四方信息技术有限公司 Working method of random key generation
CN102136911A (en) * 2011-03-11 2011-07-27 西京学院 Method for encrypting electronic document
CN102164032A (en) * 2011-05-19 2011-08-24 吉林大学 Quantum attack-resistant nondeterministic public key cryptography construction method
CN105634732B (en) * 2016-01-21 2018-06-19 中国人民武装警察部队工程大学 A kind of more bit reversible information hidden methods of ciphertext domain
CN108737098A (en) * 2018-06-27 2018-11-02 山西师范大学 Key generation method, information encipher-decipher method, device, medium and electronic equipment
CN113315628B (en) * 2021-04-09 2022-12-16 中国科学院信息工程研究所 Key packaging method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6788788B1 (en) * 1998-09-16 2004-09-07 Murata Kikai Kabushiki Kaisha Cryptographic communication method, encryption method, and cryptographic communication system
CN101321058A (en) * 2007-06-07 2008-12-10 管海明 Method and system for encoding and decoding digital message

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6788788B1 (en) * 1998-09-16 2004-09-07 Murata Kikai Kabushiki Kaisha Cryptographic communication method, encryption method, and cryptographic communication system
CN101321058A (en) * 2007-06-07 2008-12-10 管海明 Method and system for encoding and decoding digital message

Also Published As

Publication number Publication date
CN101783728A (en) 2010-07-21

Similar Documents

Publication Publication Date Title
JP6783877B2 (en) Cryptographic text query methods and systems for fully homomorphic encryption
CN104396184B (en) Xinmi City&#39;s code system based on wrong pairing
Kanso et al. A fast and efficient chaos-based keyed hash function
CN101374043B (en) Cipher key negotiating method, enciphering/deciphering method and signature/verification method
CN101783728B (en) Public key encryption method for ergodic matrix over hidden field
KR19990082665A (en) Common Key Communication Method
CN103346875B (en) The production method of digital chaotic ciphers in chaotic secret communication system
Agrawal et al. Elliptic curve cryptography with hill cipher generation for secure text cryptosystem
CN101977109A (en) Linear mixed high ordered equation public key algorithm
EP2742644B1 (en) Encryption and decryption method
CN104135473A (en) A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
Ma et al. Practical privacy-preserving frequent itemset mining on supermarket transactions
CN103746810B (en) Anonymous sign-cryption method from certificate public key system to identity public key system
CN102025489A (en) Public key cryptography improvement method for hidden field ergodic matrices and signature scheme
CN101267300A (en) Multi-variant public key encryption method based on mutual prime number sequent and lever function
CN102164032A (en) Quantum attack-resistant nondeterministic public key cryptography construction method
Chen et al. Certificateless signatures: structural extensions of security models and new provably secure schemes
CN109040041A (en) Data hierarchy encryption device and related electronic device, storage medium
CN102064938B (en) One is based on multivariate and probabilistic public key encryption method
CN108124076A (en) Image encryption method based on isomery chaos and keccak hash functions
CN107465508A (en) A kind of method, system and the equipment of software and hardware combining construction true random number
CN109981254A (en) A kind of miniature public key encryption method based on limited Lee&#39;s type group&#39;s resolution problem
Mohan et al. An Encryption Technique Using A Complete Graph With A Self-Invertible Matrix
KR20010067016A (en) High speed rsa public key cryptographic apparatus and method
Uthman Umar An Improved RSA based on Double Even Magic Square of order 32

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: JILIN UNIVERSITY

Free format text: FORMER OWNER: ZHAO YONGZHE

Effective date: 20101230

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 130012 COLLEGE OF COMPUTER SCIENCE AND TECHNOLOGY, JILIN UNIVERSITY, NO.2699, QIANJIN AVENUE, CHANGCHUN CITY, JILIN PROVINCE TO: 130012 NO.2699, QIANJIN AVENUE, CHANGCHUN CITY, JILIN PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20101230

Address after: 130012 Changchun Qianjin Street, Jilin, No. 2699

Applicant after: Jilin University

Address before: 130012 School of computer science and technology, Jilin University, Changchun, Jilin, China,

Applicant before: Zhao Yongzhe

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121219

Termination date: 20150119

EXPY Termination of patent right or utility model