CN101783728A - Public key encryption method for ergodic matrix over hidden field - Google Patents

Public key encryption method for ergodic matrix over hidden field Download PDF

Info

Publication number
CN101783728A
CN101783728A CN 200910066449 CN200910066449A CN101783728A CN 101783728 A CN101783728 A CN 101783728A CN 200910066449 CN200910066449 CN 200910066449 CN 200910066449 A CN200910066449 A CN 200910066449A CN 101783728 A CN101783728 A CN 101783728A
Authority
CN
China
Prior art keywords
centerdot
key
alpha
beta
equation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200910066449
Other languages
Chinese (zh)
Other versions
CN101783728B (en
Inventor
赵永哲
裴士辉
赵博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin University
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200910066449 priority Critical patent/CN101783728B/en
Publication of CN101783728A publication Critical patent/CN101783728A/en
Application granted granted Critical
Publication of CN101783728B publication Critical patent/CN101783728B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a public key encryption method for ergodic matrixes over a hidden field, belonging to the technical field of cryptology and computers. The public key encryption method comprises key generation, encryption and decryption. A user owns two keys, where one key is privately owned and is called as a private key, and the other key can be disclosed and is called as a public key. The public key is (Fq, [rho 1 (x, y), ... , rho m (x, y)]), the private key is (Q1, Q2, M, B1, B2, lambada) and the private key cannot be deduced from the public key; the public key is used to convert a plaintext into a ciphertext (encryption) and the private key is used to restore the ciphertext into the plaintext (decryption). The invention has the advantages that the key space is large, the randomness of the public key is good, the operational speed is fast, the technology can be disclosed and the method can be used for the secure storage and the transmission of any files and data in computers and communication networks.

Description

The key encrypt method of Ergodic Matrices on the Hidden field
(1) technical field
Public key encryption method (being called for short key encrypt method or public key cryptography scheme) belongs to cryptographic technique and field of computer technology, is one of core technology of information security and credible calculating.
(2) background technology
Classic cryptographic technique, symmetric cryptographic technique and public key cryptography technology three phases have been experienced in the development of cryptographic technique.1976, American scholar Diffie and Hellman proposed the thought of public key cryptography, indicated the arriving of public key cryptography technology.The public key encryption method of generally using has schemes such as RSA, Rabin and EIGamal (referring to " applied cryptography ", U.S. BruceSchneier is outstanding, and Wu Shizhong, Zhu Shixiong etc. translates, China Machine Press, January calendar year 2001,334-342 page or leaf) at present.In order to shorten parameter length, the EIGamal scheme is everlasting, and simulation realizes that at this moment, it is called as the ECC scheme on the elliptic curve.
In the scheme of using at present the fail safe of RSA and Rabin scheme based on be the factorization problems of counting greatly, the fail safe of EIGamal scheme based on be discrete logarithm problem, and the fail safe of ECC scheme based on be discrete logarithm problem in the elliptic curve group, in the limited time and resource, be impossible promptly to finding the solution of the problems referred to above.Along with the raising of computer run speed, the security parameter of appeal scheme has become increasing, has greatly reduced the efficient of enciphering/deciphering.The particularly realization of quantum computer in the future makes big number factorization and discrete logarithm find the solution and can carry out in polynomial time.
Because main theory involved in the present invention and technology are the applicant and propose first, and great majority are still unexposed delivers.For the ease of the understanding of the present invention, the spy describes them.
2.1 basic symbol involved in the present invention
F q: q unit finite field
Figure G2009100664497D0000011
F qThe set of last n dimensional vector
F qThe set of last non-zero n dimensional vector
Figure G2009100664497D0000013
F qThe set of last n dimension row vector
Figure G2009100664497D0000014
F qThe set of last non-zero n dimension row vector
Figure G2009100664497D0000015
F qThe set of last n * m matrix
R (M): the row vector set of matrix M
C (M): the column vector set of matrix M
Figure G2009100664497D0000016
The element of matrix M is the resulting column vector in back by rows
F q[x]: F qGo up multinomial set about literal x
V S(A): the vector space that Vector Groups A generated
2.2 BMQ problem and difficulty thereof on the finite field prove
At first introduce F qOn " BMQ problem ".Be F qOn " problem of finding the solution of bisection multivariate quadratic equation group (Bisectional Multivariate Quadratic equations solving problem) ".It is defined as follows:
Definition 2.1 (BMQ problem): F qOn total 2n the variable of equation group E and m equation, being constructed as follows of each equation:
Σ i = 1 n Σ j = 1 n a ij ( k ) x i y j = b k ( a ij ( k ) , b k ∈ F q Be determined value, k=1 ..., m)
Separating of equation group E asked in examination ( x 1 , · · · , x n ) , ( y 1 , · · · , y n ) ∈ F q n .
The BMQ problem is a special case of MQ problem.Difference is that the variable in the BMQ equation group has been divided into two groups that quantity equates.And only contain quadratic expression in each equation, and any one quadratic expression is a product of respectively getting one in these two groups of variablees.Therefore in the BMQ equation group, 2n variable formed n just 2Individual quadratic expression.Different with it, in the MQ equation group, in each equation except containing quadratic expression, the one more formula.Therefore 2n variable can be formed 2n altogether 2+ n quadratic expression and 2n expression of first degree.
In addition, F qOn the MQ equation group unique solution can be arranged.But when q>2, if x=is (x 1..., x n) and y=(y 1..., y n) be that of BMQ equation group E separates, then to c ∈ F arbitrarily q{ 0}, cx=(cx 1..., cx n) and c -1Y=(c -1y 1..., c -1y n) also must be separating of E.Therefore when q>2, F qOn the BMQ solution of equations not unique.F qOn the MQ problem be proved to be NP completely, prove F below qOn the BMQ problem also be NP completely.
Theorem 2.1:F qOn the BMQ problem be NP completely.
The proof: the 3-coloring problem of known figure G be NP completely, if but this problem reduction is F qOn the BMQ problem, then the latter also must be NP completely.But the 3-coloring problem reduction that at first proves G is F 2On the BMQ problem, conceive as follows:
1) each vertex v of G iAll corresponding F 2On a pair of variable (x i, y i)
2) v iPainted and (x i, y i) corresponding relation between the value is:
v iColor-1, color-2, color-3 and if only if (x i, y i)=(0,1), (1,0), (1,1)
3) for each isolated vertex v of G s, add EQUATION x sy s=1 in equation group E
4) if vertex v among the G iAnd v jAdjacent, then add EQUATION x iy j+ x jy i=1 in equation group E
Can get F thus 2On BMQ equation group E.For isolated vertex v s, by the EQUATION x in the 3rd step sy s=1, it has unique solution (x as can be known s, y s)=(1,1), promptly to each isolated vertex of G equal color-3.
And for adjacent vertex v iAnd v j, by the EQUATION x in the 4th step iy j+ x jy i=1, as can be known:
(x i,y i)≠(0,0)∧(x j,y j)≠(0,0)∧(x i,y i)≠(x j,y j)
Be v iAnd v jEach can only be painted with one of three kinds of colors, and v iAnd v jNot homochromy.So but the 3-coloring problem reduction of G is solving equation group E.Thereby proved F 2On the BMQ problem be NP completely.
But the 3-coloring problem of demonstrate,proving G again also reduction is F qBMQ problem on (q>2), conceive as follows:
1) each vertex v of G iAll corresponding F qIn three groups of variablees, two pairs every group:
x i 1 ( 1 ) y i 1 ( 1 ) x i 2 ( 1 ) y i 2 ( 1 ) x i 1 ( 2 ) y i 1 ( 2 ) x i 2 ( 2 ) y i 2 ( 2 ) x i 1 ( 3 ) y i 1 ( 3 ) x i 2 ( 3 ) y i 2 ( 3 )
And the value of every group of variable can only have following two kinds of situations:
Figure G2009100664497D0000032
Or
Figure G2009100664497D0000033
(brief note is respectively
Figure G2009100664497D0000034
With
Figure G2009100664497D0000035
α, β ∈ F q0})
2) vertex v iPainted with its corresponding relation between the value of corresponding three groups of variablees be:
v iAnd if only if color-1
Figure G2009100664497D0000036
v iAnd if only if color-2
Figure G2009100664497D0000037
v iAnd if only if color-3
Figure G2009100664497D0000038
3) for each vertex v of G t, selected arbitrarily δ ∈ F q0}, and add following equation in equation group E:
x t 1 ( 1 ) y t 1 ( 1 ) = 0 , x t 2 ( 1 ) y t 2 ( 1 ) = 0 , x t 1 ( 1 ) y t 2 ( 1 ) + x t 2 ( 1 ) y t 1 ( 1 ) = δ
x t 1 ( 2 ) y t 1 ( 2 ) = 0 , x t 2 ( 2 ) y t 2 ( 2 ) = 0 , x t 2 ( 2 ) y t 2 ( 2 ) + x t 2 ( 2 ) y t 1 ( 2 ) = δ
x t 1 ( 3 ) y t 1 ( 3 ) = 0 , x t 2 ( 3 ) y t 2 ( 3 ) = 0 , x t 1 ( 3 ) y t 2 ( 3 ) + x t 2 ( 3 ) y t 1 ( 3 ) = δ
x t 1 ( 1 ) y t 2 ( 2 ) = 0 , x t 1 ( 1 ) y t 2 ( 3 ) = 0 , x t 1 ( 2 ) y t 2 ( 3 ) = 0 , x t 1 ( 1 ) y t 2 ( 1 ) + x t 1 ( 2 ) y t 2 ( 2 ) + x t 1 ( 3 ) y t 2 ( 3 ) = δ
4) if vertex v among the G iAnd v jAdjacent, equation is in equation group E below then adding
x i 1 ( 1 ) y j 2 ( 1 ) = 0 , x i 1 ( 2 ) y j 2 ( 2 ) = 0 , x i 1 ( 3 ) y j 2 ( 3 ) = 0
Can get F thus qOn BMQ equation group E.By the equation in the 3rd step, as can be known each summit of G lucky one of 3 kinds of colors.And, can guarantee that then any two adjacent vertexs of G different colors by the 4th equation that goes on foot.So but the 3-coloring problem reduction of G is to F qLast BMQ equation group E finds the solution.So F qOn the BMQ problem also be NP completely.
Card is finished.
2.3BMQ problem find the solution the difficulty analysis
Though we have proved F in theory qOn the BMQ problem be NP completely, but this and do not mean that to finding the solution of any BMQ equation group all be difficult, it is found the solution, and the number of variable and equation has confidential relation in difficulty and the equation group.Below it is carried out labor.
If F qOn BMQ equation group E contain 2n variable x 1..., x n, y 1..., y nWith m equation.With each the quadratic expression (x among the E iy j) all use a new variables z IjRepresent, then can obtain N 1=n 2Individual variable and M 1The linear function group E of=m equation 1Claim this process to be " to the once heavily linearisation of E ".
If m 〉=n 2, then can obtain E 1All z that separates Ij, and then by z IjAnti-release E separates
Figure G2009100664497D00000325
Otherwise, make r=n 2-m.Then can obtain E 1The basis separate and be And E 1A particular solution And E 1General solution can show be:
Z=(z 11,z 12,…,z nn)=Z 01Z 12Z 2+…+α rZ ri∈F q) (Ⅰ)
But the E that obtains like this 1Q rThe overwhelming majority in individual the separating is " parasitic solution (parasitic solution) ", and by E 1Parasitic solution Z can't obtain the legal of E and separate.Especially, when E has just that (q-1) is individual to be separated, E 1Has only a non-parasitic solution.E when though E separates 1Non-parasitic solution must be arranged, but work as q rWhen very big, can't pass through E 1All rough power of separating attempts deriving separating of E.
From present solution technique to MQ problem on the finite field, the most effective " heavily linearisation (relinearization) " method that surely belongs to Kipnis and Shamir proposition.The basic thought of this method is by the equation number being represented less than the general solution of the equation group of variable number, being constructed the more equation of high order.Thereby make the equation of higher degree sum that finally obtains number more than or equal to high order variable product term (new variables).And finally obtain separating of full scale equation group by counter pushing away.
Because the BMQ problem is a special case of MQ problem, so heavy linearization technique is still effective to finding the solution the BMQ problem.But wanting respective change aspect the reconstruct of equation and variable.Concrete grammar is as follows:
For F qOn BMQ equation group E, as m<n 2The time, by the discussion of front as can be known, the key of finding the solution E is to determine equation group E 1Non-parasitic solution Z=(z 11, z 12..., z Nn).Again by (I) formula, each component z of Z Ij=x iy jSatisfy:
z ij=s 0+s 1α 1+s 2α 2+…+s rα r (Ⅱ)
R=n wherein 2-m, s 0..., s r∈ F qBe known constant, α 1..., α r∈ F qBe variable.Therefore Z's determines to be equivalent to again how at (α 1..., α r) q rPlant and to locate its value exactly in the option.For this reason can be to shape as (x ax by iy j) 4 formulas carry out the reconstruct of equation and variable.By equation:
(x ax by iy j)=(x ay i)(x by j)=(x ay j)(x by i)
Can get 2 equation of n th order n z Aiz Bj=z Ajz BiWith this equation of (II) formula substitution, can obtain about α 1..., α r2 equation of n th order n:
Σ 1 ≤ i ≤ j ≤ r a i , j ( α i α j ) + Σ 1 ≤ i ≤ r b i α i = c (Ⅲ)
Shape is as (x again ax by iy j) 4 formulas total
Figure G2009100664497D0000044
Individual, each can both produce the equation of 1 shape as (III) formula.And shape is as (x ax ay iy j) and (x ax by iy i) 4 formulas all do not produce new equation; So can obtain shape by 4 times all formulas adds up to as 2 equation of n th order n of (III) formula:
M 2 = C n 2 × C n 2 = n 2 ( n - 1 ) 2 4
With each 2 the formula (α in (III) formula iα j) and 1 formula α iAll regard different new variables as, then ading up to of variable:
N 2 = r ( r + 1 ) 2 + r = r ( r + 3 ) 2
So can get F qOn have M 2Individual equation, N 2The linear function group E of individual variable 2Deserve to be called and state reconstruct equation group E 2Process be " to the heavily linearisation of secondary of E ".The M that even now obtains 2Having in the individual equation much is linear correlation, but might as well suppose that they are linear independence each other when analyzing.
If M is arranged this moment 2〉=N 2, then can be by E 2Solve α 1..., α r∈ F qAgain with α 1..., α rSubstitution (II) formula can solve all z Ij=(x iy j), and then the separating of the anti-E of release
Figure G2009100664497D0000047
If M 2<N 2, then can further carry out three heavily linearisations to E.Promptly to shape as (x ax bx cy iy jy k) 6 formulas carry out similar equation and variable reconstruct.6 formulas like this have following several classes:
(1) shape is as (x ax bx cy iy jy k), total
Figure G2009100664497D0000051
Individual, each can produce 5 about z Ij3 equation of n th order n.
(2) shape is as (x ax bx cy iy iy j), total
Figure G2009100664497D0000052
Individual, each can produce 2 about z Ij3 equation of n th order n.
(3) shape is as (x ax ax by iy jy k), total
Figure G2009100664497D0000053
Individual, each can produce 2 about z Ij3 equation of n th order n.
(4) shape is as (x ax ax by iy iy j), total
Figure G2009100664497D0000054
Individual, each can produce 1 about z Ij3 equation of n th order n.
(5) shape is as (x ax ax ay iy jy k) and (x ax bx cy iy iy i) 6 formulas all do not produce about z Ij3 equation of n th order n. therefore, the tangible as (x of institute ax bx cy iy jy k) 6 formulas can produce about z IjThe ading up to of 3 equation of n th order n:
M 3 = 5 C n 3 × C n 3 + 8 C n 2 × C n 3 + 4 C n 2 × C n 2 = n 2 ( n - 1 ) 2 ( 5 n 2 + 4 n + 8 ) 36
With the substitution of (II) formula each about z Ij3 equation of n th order n, can get following about variable α 1..., α r3 equation of n th order n:
Σ 1 ≤ i ≤ j ≤ k ≤ r a i , j , k ( α i α j α k ) + Σ 1 ≤ i ≤ j ≤ r b i , j ( α i α j ) + Σ 1 ≤ i ≤ r c i α i = d (Ⅳ)
With each 3 the formula (α in (IV) formula equation iα jα k), 2 formula (α iα j) and 1 formula α iAll regard different new variables as, then ading up to of variable:
N 3 = r ( r + 1 ) ( r + 2 ) 6 + N 2 = r ( r 2 + 6 r + 11 ) 6
Thereby can obtain F qOn have M 3Individual equation, N 3The linear function group E of individual variable 3
If M 3〉=N 3, then can be by E 3Solve α 1..., α r, and the separating of the anti-E of release
Figure G2009100664497D0000058
Otherwise can further carry out four heavily linearisations to E.Promptly to shape as (x ax bx cx dy iy jy ky l) 8 formulas carry out equation and variable reconstruct.8 formulas like this have following several classes:
(1) shape is as (x ax bx cx dy iy jy ky l), total
Figure G2009100664497D0000059
Individual, each can produce 23 about z Ij4 equation of n th order n.
(2) shape is as (x ax bx cx dy iy iy jy k), total
Figure G2009100664497D00000510
Individual, each can produce 11 about z Ij4 equation of n th order n.
(3) shape is as (x ax bx cx dy iy iy iy j), total
Figure G2009100664497D00000511
Individual, each can produce 3 about z Ij4 equation of n th order n.
(4) shape is as (x ax bx cx dy iy iy jy j), total
Figure G2009100664497D00000512
Individual, each can produce 5 about z Ij4 equation of n th order n.
(5) shape is as (x ax ax bx cy iy jy ky l), total Individual, each can produce 11 about z Ij4 equation of n th order n.
(6) shape is as (x ax ax bx cy iy iy jy k), total
Figure G2009100664497D00000514
Individual, each can produce 6 about z Ij4 equation of n th order n.
(7) shape is as (x ax ax bx cy iy iy iy j), total
Figure G2009100664497D00000515
Individual, each can produce 2 about z Ij4 equation of n th order n.
(8) shape is as (x ax ax bx cy iy iy jy j), total Individual, each can produce 3 about z Ij4 equation of n th order n.
(9) shape is as (x ax ax ax by iy jy ky l), total Individual, each can produce 3 about z Ij4 equation of n th order n.
(10) shape is as (x ax ax ax by iy iy jy k), total
Figure G2009100664497D00000518
Individual, each can produce 2 about z Ij4 equation of n th order n.
(11) shape is as (x ax ax ax by iy iy iy j), total Individual, each can produce 1 about z Ij4 equation of n th order n.
(12) shape is as (x ax ax ax by iy iy jy j), total
Figure G2009100664497D00000520
Individual, each can produce 1 about z Ij4 equation of n th order n.
(13) shape is as (x ax ax bx by iy jy ky l), total
Figure G2009100664497D0000061
Individual, each can produce 5 about z Ij4 equation of n th order n.
(14) shape is as (x ax ax bx by iy iy jy k), total
Figure G2009100664497D0000062
Individual, each can produce 3 about z Ij4 equation of n th order n.
(15) shape is as (x ax ax bx by iy iy iy j), total
Figure G2009100664497D0000063
Individual, each can produce 1 about z Ij4 equation of n th order n.
(16) shape is as (x ax ax bx by iy iy jy j), total
Figure G2009100664497D0000064
Individual, each can produce 2 about z Ij4 equation of n th order n.
(17) shape is as (x ax ax ax ay iy jy ky l) and (x ax bx cx dy iy iy iy i) 8 formulas do not produce about z Ij4 equation of n th order n. therefore, the tangible as (x of institute ax bx cx dy iy jy ky l) 8 formulas can produce about z Ij4 equation of n th order n add up to:
M 4 = 23 C n 4 × C n 4 + 66 C n 3 × C n 4 + 54 C n 3 × C n 3 + 22 C n 2 × C n 4 + 42 C n 2 × C n 3 + 10 C n 2 × C n 2
= n 2 ( n - 1 ) 2 ( 23 n 4 + 34 n 3 + 131 n 2 + 84 n + 108 ) 576
With each 4 equation of n th order n above the substitution of (II) formula, can get following about variable α 1..., α r4 equation of n th order n:
Σ 1 ≤ i ≤ j ≤ k ≤ l ≤ r a i , j , k , l ( α i α j α k α l ) + Σ 1 ≤ i ≤ j ≤ k ≤ r b i , j , k ( α i α j α k ) + Σ 1 ≤ i ≤ j ≤ r c i , j ( α i α j ) + Σ 1 ≤ i ≤ r d i α i = e
With each 4 the formula (α in the equation iα jα kα l), 3 formula (α iα jα k), 2 formula (α iα j) and 1 formula α iAll regard different new variables as, then ading up to of variable:
N 4 = r ( r + 1 ) ( r + 2 ) ( r + 3 ) 24 + N 3 = r ( r 3 + 10 r 2 + 35 r + 50 ) 24
So can obtain F qOn have M 4Individual equation, N 4The linear function group E of individual variable 4
If M 4〉=N 4, then can be by E 4Solve α 1..., α r, and the separating of the anti-E of release
Figure G2009100664497D0000069
Otherwise can continue E is carried out the more heavily linearisation of high order.
But along with to heavy the increasing of linearisation number of times of E, gained is about variable α 1..., α rEquation of higher degree group in variable and equation number also will increase fast.Order is by r variable { α 1, α 2..., α rDifferent t the product formulas that can constitute
Figure G2009100664497D00000610
Number be P (r, t).Following theorem is then arranged,
Theorem 2.2: P ( r , t ) = | { ( α i 1 α i 2 · · · α i t ) | 1 ≤ i 1 ≤ i 2 ≤ · · · ≤ i t ≤ r } | = r ( r + 1 ) ( r + 2 ) · · · ( r + t - 1 ) t !
If to k time of E heavily after the linearisation resulting equation group be E kE then kIn each equation all have following form:
Σ 1 ≤ i 1 ≤ · · · ≤ i k ≤ r a i 1 i 2 · · · i k ( k ) ( α i 1 α i 2 · · · α i k ) + · · · + Σ 1 ≤ i ≤ j ≤ r a ij ( 2 ) ( α i α j ) + Σ 1 ≤ i ≤ r α i ( 1 ) α i = b
With each 1 the formula α in the equation i, 2 formula (α iα j) ..., and k formula
Figure G2009100664497D00000613
All regard different new variables as.By theorem 2.2, the total N of variable as can be known kFor about r=n 2The multinomial of-m.And have:
N k = Σ t = 1 k P ( r , t ) = r + r ( r + 1 ) 2 + · · · + r ( r + 1 ) · · · ( r + k - 1 ) k !
Make E kThe number of middle equation is M k, then by the front to M 2, M 3, M 4Calculating M as can be known kIt is multinomial about n.And when k 〉=3, have:
M k = Σ 2 ≤ i ≤ j ≤ k t i , j C n i × C n j = ( k ! - 1 ) C n k × C n k + ( k ! - 2 ) ( k - 1 ) C n k - 1 × C n k + · · · + t 2,2 C n 2 × C n 2
Especially, when n is big,
Figure G2009100664497D0000071
Following table has provided n and had got respectively 50,100,150,200 o'clock, partly (M k, N k) for given (n, result of calculation r).
Table 1
Figure G2009100664497D0000072
By the result of calculation of table 1, be not difficult to draw following character:
(1) M kAbout the n strictly monotone increasing.
(2) N kAbout r=n 2-m strictly monotone increasing.
(3) for given n and k (k 〉=2), there is r kAnd as r 〉=r kThe time, perseverance has: M k<N kAnd as r<r kThe time, perseverance has: M k〉=N kAnd r kIncrease along with the increase of k.R=n again 2So-m is as m≤n 2-r kThe time, perseverance has M k<N kAnd as m>n 2-r kThe time, perseverance has: M k〉=N k.
(4) for given k (k 〉=2), establishing has (M when m≤t * n k<N k), then t increases progressively about n.Promptly, make (M along with the increase of n k<N k) the value upper bound of the m that satisfies also increasing with respect to n.
Character (3) and (4) can be used to judge whether equation group E can find the solution by heavy linearization technique by k time of introducing previously.For example, as shown in Table 1,
For n=50, as m≤n 2During-2332=168=3.36n, perseverance has: M 3<N 3.
For n=100, as m≤n 2During-9371=629=6.29n, perseverance has: M 3<N 3.
For n=150, as m≤n 2During-21116=1384=9.227n, perseverance has: M 3<N 3.
For n=200, as m≤n 2During-37565=2435=12.175n, perseverance has: M 3<N 3.
Therefore, when n gets 50,100,150,200 respectively, if the number m of equation satisfies respectively among the E:
m≤3.36n、m≤6.29n、m≤9.227n、m≤12.175n
Then perseverance has: (M 2<N 2) ∧ (M 3<N 3).This means can't by secondary and three times heavily linearisation come E is found the solution.
Generally speaking, at F qLast picked at random has the BMQ equation group E of 2n variable and m equation, if the value of n and m makes (M k<N k∧ M K+1〉=N K+1) set up, then can't by be no more than k time heavily linearisation find the solution E.
If to E carry out k time heavily after the linearisation resulting equation group be E k, E then kThe number of middle equation is at most M kBut often exist the equation of a large amount of linear correlations in the middle of them.Making wherein, the equation quantity of linear independence is
Figure G2009100664497D0000081
Even (M is then arranged k〉=N k), if but
Figure G2009100664497D0000082
E kStill intangibility.
In addition, along with to heavy the increasing of linearisation number of times k of E, equation E kIn variable number N kAlso increase fast.Because E kThe space requirement of coefficient matrix be
Figure G2009100664497D0000083
Therefore bit works as N kWhen enough big (〉=2 40), whether no matter (M arranged k〉=N k), E on room and time kEqual intangibility; Promptly can't by k time heavily linearisation find the solution E.
Know again, after n determines, M iAlso determine thereupon; And N iThen determine uniquely by r (or m).If can find
Figure G2009100664497D0000084
Make and work as
Figure G2009100664497D0000085
The time, perseverance has (M K-1<N K-1) and N kTo such an extent as to enough big E kIntangibility (k>2) actually.Then have:
(M 2<N 2∧…∧M k-1<N k-1)∧(N k<N k+1<N k+2<…)
Therefore work as
Figure G2009100664497D0000086
The time, for k 〉=2 arbitrarily, can't by direct k time heavily linearisation find the solution E.Yet this fashion can not assert that heavy linearizing method is infeasible to finding the solution E.Though (M is arranged 2<N 2∧ ... ∧ M K-1<N K-1), if but can find less r t=N t-M t(2≤t≤k-1) then can be to t heavy resulting equation group E after the linearisation tReuse general linearization technique again.Be about to E tIn each variable v iAll table is r tIndividual variable Linear equation:
v i = α i 1 α i 2 · · · α i s = c 0 + c 1 β 1 + c 2 β 2 + · · · + c r t β r t , ( 1 ≤ s ≤ t , 1 ≤ i ≤ N t )
Then by reconstruct about variable
Figure G2009100664497D0000089
H 〉=2 equation of n th order n groups come solving equation group E t, the anti-E's of release separates again.Know again utilize that general linearization technique again constructs about variable H equation of n th order n group in the variable number be:
N ‾ t = Σ i = 1 h P ( r t , i ) ≥ Σ i = 1 2 P ( r t , i ) = r t ( r t + 3 ) 2
So have only as each r t=N t-M tAll make
Figure G2009100664497D00000812
Enough big (2≤t≤k-1), can assert that just E can't utilize any heavy linearizing method to find the solution.Following theorem is promptly arranged,
Theorem 2.3: picked at random F qOn have the BMQ equation group E of 2n variable and m equation, if there are k>2 Hes
Figure G2009100664497D0000091
Make and work as
Figure G2009100664497D0000092
The time, perseverance has:
Figure G2009100664497D0000093
Then work as
Figure G2009100664497D0000094
The time, can't find the solution E by heavy linearizing method.
It should be noted that the front is to N kAnd M kThe situation of valuation during not q≤k take into account; And this may be to N kAnd M kValuation produce this those long influences that disappear.For example, when q=2, have:
( x a x b y i y j ) = ( x a 2 x b y i 2 y j ) = ( x a 2 x b y i y j 2 ) = ( x a x b 2 y i 2 y j ) = ( x a x b 2 y i y j 2 )
⇒ ( x a y i ) ( x b y j ) = ( x a y j ) ( x b y i ) = ( x a y i ) ( x a y j ) ( x b y i ) = ( x a y i ) ( x a y j ) ( x b y j ) = · · ·
⇒ z ai z bj = z aj z bi = z ai z aj z bi = z ai z aj z bj = · · ·
⇒ z ai z bj = z aj z bi z ai z bj = z ai z aj z bi z ai z bj = z ai z aj z bj z aj z bi = z ai z aj z bi z aj z bi = z ai z aj z bj · · ·
Promptly by shape as (x ax by iy j) 4 formulas can not only reconstruct about variable α 1..., α r2 equation of n th order n, can also reconstruct corresponding 3 equation of n th order n.And these 3 equation of n th order n are different from by shape probably as (x ax bx cy iy jy k) 6 formula reconstruct gained.In addition, because
Figure G2009100664497D0000099
With So for F 2On the BMQ equation group, M kAnd N kComputing formula and the front given will produce deviation.
Can specify suitable lower bound to q for this reason,, can guarantee that then the front is to N such as making q>10 kAnd M kThe correctness of valuation (2≤k≤10).Below conclusion be putting before this and obtain.
In fact, theorem 2.3 is guarded for the difficulty assessment of the heavy linearization technique of finding the solution BMQ equation group E, because equation group E kThe equation quantity that neutral line is irrelevant Can't reach theoretical upper bound M in practice at all k
By theorem 2.3, for n=50, when r=2332, (M 3<N 3) and N 4=1237553754679 ≈ 1.1255 * 2 40Enough big; But this moment
r 2 = 2722610 - 1500625 = 1221985 ⇒ r 2 ( r 2 + 3 ) 2 = 746625503090 ≈ 1.358 × 2 38
r 3 = 2119098894 - 2118882500 = 216394 ⇒ r 3 ( r 3 + 3 ) 2 = 23413506209 ≈ 1.363 × 2 34
r 2And r 3Big inadequately.And when r=2445,
r 2 = 1492055 ⇒ r 2 ( r 2 + 3 ) 2 = 1113116299595 ≈ 1.0124 × 2 40
r 3 = 323145195 ⇒ r 3 ( r 3 + 3 ) 2 = 52211409010511805 ≈ 1.45 × 2 55
r 2And r 3Enough big.Therefore as m≤n 2During-2445=55=1.1n, can't find the solution E by heavy linearizing method.
For n=100, when r=9371, (M 3<N 3) and N 4=321659128415624 ≈ 1.142 * 2 48Enough big, r again 2=19419377 and r 3=5448123 is enough big.So as m≤n 2During-9371=629=6.29n, can't find the solution E by heavy linearizing method.
For n=150, when r=18900, (M 2<N 2) and N 3=1125568744650 ≈ 1.02 * 2 40Enough big, r again 2=53752725 is enough big.So as m≤n 2During-18900=3600=24n, can't find the solution E by heavy linearizing method.
For n=200, when r=28142, (M 2<N 2) and N 3=3715405463639 ≈ 1.69 * 2 41Enough big, but r 2=18295 is big inadequately; And when r=28200, r 2=1652300 is enough big.So as m≤n 2During-28200=11800=59n, can't find the solution E by heavy linearizing method.
Therefore when n gets 50,100,150,200 respectively, if the number m of equation satisfies respectively among the E:
m≤1.1n、m≤6.29n、m≤24n、m≤59n
Then can't find the solution E by heavy linearizing method.
In general, after n determined, m was littler, then the heavily linearisation of BMQ equation group E was found the solution just more infeasible.But because the special construction of BMQ equation group, being not that m is more little finds the solution E with regard to difficult more.This point, is then guessed by a spot of exploration separating of E if m is too small with to find the solution the MQ equation group different probably.M The Representation Equation with E is as follows for this reason:
p 1 ( x , y ) = Σ i = 1 n Σ j = 1 n a ij ( 1 ) x i y j = b 1 · · · p m ( x , y ) = Σ i = 1 n Σ j = 1 n a ij ( m ) x i y j = b m , ( x = ( x 1 , · · · , x n ) , y = ( y 1 , · · · , y n ) ∈ F q n )
(p then 1..., p m) the value space be:
p ( E ) = { ( p 1 ( x , y ) , · · · , p m ( x , y ) ) | x , y ∈ F q n }
(p again 1..., p m) value by x * y=(x 1y 1..., x iy i..., x ny n) unique definite.When x=0 or y=0, x * y=0.Otherwise x * y ≠ 0, and to arbitrarily c ∈ F q{ 0} has x * y=(cx) * (c -1Y).So q corresponding to x and y 2nPlant value, x * y has 0 He The value of kind non-0.And So have:
| p ( E ) | ≤ min ( q m , ( q n - 1 ) 2 ( q - 1 ) + 1 )
Again when n>1, q 2 n - 1 < ( q n - 1 ) 2 ( q - 1 ) + 1 < q 2 n . Therefore have:
| p ( E ) | &le; ( q n - 1 ) 2 ( q - 1 ) + 1 ( m &GreaterEqual; 2 n ) q m ( m < 2 n )
As (b 1..., b m)=0 o'clock, E has (2q at least n-1) individual shape as (x, 0) and (0, separating y).As (b 1..., b m) ≠ 0 o'clock, if Then E does not have and separates; Otherwise E separates (x ≠ 0, y ≠ 0), and to c ∈ F arbitrarily q{ 0}, (cx, c -1Y) also be that separating of E (claims (cx, c -1Y) with (x, y) equivalence).Therefore as (b 1..., b m) ≠ 0 o'clock, E or nothing are separated, or have separating of (q-1) individual equivalent equivalence at least.
Because (b 1..., b m)=0 o'clock is easy to E is found the solution.So emphasis is inquired into (b 1..., b m) ∈ p (E) { during 0}, how E is found the solution.Except above-mentioned heavy linearization technique,, also can sound out E and find the solution by the method for so-called " conjecture " based on the special construction of BMQ equation group.This method is specified among x and the y at random, as will solving another behind it substitution E, then can obtain separating of E.For example, specify x=α=(α 1..., α n) ≠ 0 then can be about variable y=(y 1..., y n) the linear function group E ' of n unit:
p 1 ( &alpha; , y ) = b 1 &CenterDot; &CenterDot; &CenterDot; p m ( &alpha; , y ) = b m
If E ' separates y=β=(β 1..., β n), then (x, y)=(α β) is of E and separates, and can derive (q-1) individual separating of equal value with it again by it.If E ' nothing is separated, then proceed to sound out, till finding out the separating of E next time.
As can be known, for given (b 1..., b m) ∈ p (E) { 0} utilizes conjecture method that E is soundd out the success rate find the solution and is directly proportional with the number of separating of E.When E has that (q-1) is individual to be separated, hit it
Figure G2009100664497D0000112
If to (b arbitrarily 1..., b m) ∈ p (E) { 0}, E have just that (q-1) is individual to be separated.Then when n is enough big, can't utilize conjecture method that E is found the solution.
And for { the p of picked at random 1(x, y) ..., p m(x, y) }, (q of feasible (x ≠ 0, y ≠ 0) n-1) 2The overwhelming majority who plants value also makes (p 1..., p m) ≠ 0.So to (b arbitrarily 1..., b m) ∈ P (E) 0}, the number of on average separating of E is:
k &OverBar; = ( q n - 1 ) 2 | p ( E ) | - 1 &GreaterEqual; ( q - 1 ) ( m &GreaterEqual; 2 n ) ( q n - 1 ) 2 ( q m - 1 ) ( m < 2 n )
When m<2n,
Figure G2009100664497D0000114
Especially, when m≤n,
Figure G2009100664497D0000115
The average probability of separating of guesing out E this moment is near a hundred per cent.Can get theorem thus,
Theorem 2.4: picked at random F qOn have the BMQ equation group E of 2n variable and m 〉=2n equation, if to (b arbitrarily 1..., b m) ∈ p (E) { 0}, E have just that (q-1) is individual to be separated.Then when n is enough big, can't find the solution E with conjecture method.
By theorem 2.1, theorem 2.3, theorem 2.4; Can get proposition,
Proposition 2.1: picked at random F qOn have the BMQ equation group E of 2n variable and m equation, if E satisfies:
1) for (b arbitrarily 1..., b m) ∈ p (E) { 0}, E is at F qOn have just that (q-1) is individual to be separated
2) there are k>2 Hes And work as
Figure G2009100664497D0000117
The time, perseverance has:
Figure G2009100664497D0000118
3) 2 n &le; m &le; n 2 - r &OverBar;
It is difficult then finding the solution E.
By proposition 2.1 as can be known, for the F of picked at random qOn have the BMQ equation group E of 2n variable and m equation, when E satisfies (b arbitrarily 1..., b m) ∈ p (E) { 0} all just has when (q-1) is individual to be separated; Then the difficulty that E is found the solution is mainly determined by the value of n and m.And F qSelection only with data computing and the expression relevant, the difficulty of solving a problem is not had influence substantially.Provide definition for this reason,
Definition 2.2: establishing E is at F qGo up optional BMQ equation group with 2n variable and m equation, and for (b arbitrarily 1..., b m) ∈ p (E) { 0}, E is at F qOn have just that (q-1) is individual to be separated.If the value of n and m makes and finds the solution E is difficult, then claim " (n m) does difficult BMQ problem ".
For example, when n gets 50,100,150,200 respectively, do difficult BMQ problem (n, m) value is as shown in table 2.
Table 2
Figure G2009100664497D0000121
2.4 Ergodic Matrices and character thereof
Definition 2.3 (Ergodic Matrices): establish
Figure G2009100664497D0000122
If column vector to any non-0
Figure G2009100664497D0000123
Just get time
Figure G2009100664497D0000124
In all non-0 column vectors, claim that then A is F qOn " Ergodic Matrices (Ergodic Matrix) ".
Definition 2.4: establish
Figure G2009100664497D0000125
The matrix multiplication spanning set of note A is:<A 〉={ A k| k=1,2,3 ....
About finite field F qOn (traversal) matrix, following main theorem (proof slightly) is arranged:
Theorem 2.5: to arbitrarily
Figure G2009100664497D0000126
K ∈ 0,1,2 ...; There is c 0, c 1..., c N-1∈ F q, make:
A k=c 0I+c 1A+c 2A 2+...+c n-1A n-1
Theorem 2.6: if Nonsingular, then A under matrix multiplication the cycle≤(q n-1).
Theorem 2.7: For Ergodic Matrices and if only if A under matrix multiplication the cycle=(q n-1).
Theorem 2.8: if
Figure G2009100664497D0000129
Be Ergodic Matrices, then<A in just have
Figure G2009100664497D00001210
Individual Ergodic Matrices.Claim their " equivalences " each other.
Theorem 2.9: if
Figure G2009100664497D00001211
Be Ergodic Matrices, then vectorial to any non-0 row
Figure G2009100664497D00001212
Just get time In all non-0 row vectors.
Theorem 2.10: if
Figure G2009100664497D00001215
Be Ergodic Matrices, then
Figure G2009100664497D00001216
And F q[A] makes a q just under addition of matrices and multiplication nUnit's finite field.
Theorem 2.11: if
Figure G2009100664497D00001217
Be Ergodic Matrices, then [A 0=I, A, A 2..., A N-1] make q just nThe finite field F of unit q[A] is about the finite field F of q unit qOne group of base.Promptly right
Figure G2009100664497D00001218
There is unique c 0, c 1..., c N-1∈ F q, make:
m=c 0I+c 1A+c 2A 2+...+c n-1A n-1
By the conclusion of front as can be known, the Ergodic Matrices on the finite field has maximum multiplication cycle and spanning set in the same order nonsingular matrix.And the non-zero column vector of all power premultiplications or the right side with Ergodic Matrices take advantage of the result of a capable vector of non-zero fully to disperse (getting just all over all capable vectors of non-zero column vector sum).Table 3 has provided the statistics of the n * n Ergodic Matrices on the part finite field.
Table 3
Figure G2009100664497D0000131
Can find F from top statistics qOn n * n Ergodic Matrices be ubiquitous, and its number increases sharply along with the increase of q and n.
For principle of the present invention being described special introduce " MPEMRL problem ".I.e. so-called " the bilateral power of Ergodic Matrices is taken advantage of problem (Multiplied by the Powers of the Ergodic Matrices on the Right and Left.) on the finite field ".It is defined as follows:
Definition 2.5 (MPEMRL problems):
Figure G2009100664497D0000132
Be Ergodic Matrices,
Figure G2009100664497D0000133
Figure G2009100664497D0000134
Figure G2009100664497D0000135
Known (Q 1, M, Q 2, T), ask
Figure G2009100664497D0000136
With
Figure G2009100664497D0000137
At first proof is found the solution the MPEMRL problem and be can be exchanged into and find the solution corresponding F qOn the BMQ problem.By
Figure G2009100664497D0000138
Be Ergodic Matrices, as can be known F q[Q 1] and F q[Q 2] under addition of matrices and multiplication, all make q nUnit's finite field.
Select F arbitrarily q[Q 1] and F q[Q 2] about F qOne group of base
Figure G2009100664497D0000139
With
Figure G2009100664497D00001310
Then exist unique
Figure G2009100664497D00001311
Make:
Q 1 x = &Sigma; i = 1 n x i Q 1 &alpha; i , Q 2 y = &Sigma; j = 1 n y j Q 2 &beta; j
Promptly have:
T = Q 1 x M Q 2 y = &Sigma; i = 1 n &Sigma; j = 1 n ( x i y j ) ( Q 1 &alpha; i M Q 2 &beta; j )
With n * n matrix T and each All turn to n by line linearity 2Dimensional vector
Figure G2009100664497D0000142
With
Figure G2009100664497D0000143
Can get F qOn have 2n variable x 1..., x n, y 1..., y nBMQ equation group with m equation:
[ Q 1 &alpha; 1 M Q 2 &beta; 1 &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; 1 M Q 2 &beta; n &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; n M Q 2 &beta; 1 &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; n M Q 2 &beta; n &RightArrow; ] &times; x 1 y 1 &CenterDot; &CenterDot; &CenterDot; x 1 y n &CenterDot; &CenterDot; &CenterDot; x n y 1 &CenterDot; &CenterDot; &CenterDot; x n y n = [ B 1 M B 2 &RightArrow; ] &times; x 1 y 1 &CenterDot; &CenterDot; &CenterDot; x 1 y n &CenterDot; &CenterDot; &CenterDot; x n y 1 &CenterDot; &CenterDot; &CenterDot; x n y n = T &RightArrow;
Wherein
Figure G2009100664497D0000145
Be coefficient matrix
Figure G2009100664497D0000146
Order.Note is top by Q 1, M, Q 2, BMQ equation group that T derived is E (Q 1, M, Q 2, T).
Because the addition of matrix and number are taken advantage of with the addition and the number of vector and are taken advantage of indistinction in itself, so also can be with n * n set of matrices<Q 1〉 * M *<Q 2And B 1* M * B 2All regard n as 2The dimensional vector group, and have:
Rank ( < Q 1 > &times; M &times; < Q 2 > ) = Rank ( B 1 &times; M &times; B 2 ) = Rank ( [ B 1 MB 2 &RightArrow; ] ) = m
Obviously, E (Q 1, M, Q 2, T) can separate then corresponding M PEMRL problem and necessarily can separate.Work as m=n 2The time,
Figure G2009100664497D0000148
Full rank is easily tried to achieve E (Q 1, M, Q 2, separating T)
Figure G2009100664497D0000149
And then can get separating of MPEMRL problem:
Q 1 x = &Sigma; i = 1 n x i Q 1 &alpha; i , Q 2 y = &Sigma; j = 1 n y j Q 2 &beta; j
As m<n 2The time, if (n m) does not do difficult BMQ problem, then still can be by the group E (Q that solves an equation 1, M, Q 2, T) find the solution corresponding M PEMRL problem.Otherwise can't pass through equation group E (Q 1, M, Q 2, T) find the solution corresponding M PEMRL problem.
Therefore for given MPEMRL problem, can it pass through BMQ equation group E (Q 1, M, Q 2, the key of T) finding the solution is mainly by Rank (<Q 1〉 * M *<Q 2) decision.And about Rank (<Q 1〉 * M *<Q 2) following theorem arranged,
Theorem 2.12: if
Figure G2009100664497D00001412
Be Ergodic Matrices, then to arbitrarily
Figure G2009100664497D00001413
Perseverance has:
Rank(<Q 1>×M×<Q 2>)=k×n (1≤k≤n)
Found through experiments, for selected arbitrarily Ergodic Matrices Allow M all over getting
Figure G2009100664497D00001415
In all non-null matrix, then Rank (<Q 1〉 * M *<Q 2) all over get n, 2n ..., n 2.Table 4 is the statisticses to the part finite field.
Also find by further experiment, in the table 4 about Rank (<Q 1〉 * M *<Q 2) distributed number and Q 1And Q 2Selection irrelevant, but by n and F qDetermine uniquely.Therefrom be not difficult to find out following rule:
1. for Ergodic Matrices
Figure G2009100664497D00001416
With k ∈ 1 ..., n} exists
Figure G2009100664497D00001417
Make:
Rank(<Q 1>×M×<Q 2>)=k×n
2. for Ergodic Matrices
Figure G2009100664497D00001418
Make Rank (<Q 1〉 * M *<Q 2)=quantity of the matrix M of k * n increases progressively with q, n, k.
3. for Ergodic Matrices Make Rank (<Q 1〉 * M *<Q 2)=quantity of the matrix M of n just is n * (q n-1).
Table 4
Figure G2009100664497D0000151
Because the MPEMRL problem quite made every effort to the amount of calculation of separating and |<Q 1〉 * M *<Q 2| closely related.And to arbitrarily With a ∈ F q0}, perseverance has:
a Q 1 x = Q 1 x &prime; &Element; < Q 1 > ^ a - 1 Q 2 y = Q 2 y &prime; &Element; < Q 2 > ^ Q 1 x M Q 2 y = Q 1 x &prime; M Q 2 y &prime;
Therefore to T ∈<Q arbitrarily 1〉 * M *<Q 2, have (a at least 1, b 1) ..., (a Q-1, b Q-1) ∈ 1 ..., q n-1} 2, make:
T = Q 1 a 1 M Q 2 b 1 = Q 1 a 2 M Q 2 b 2 = &CenterDot; &CenterDot; &CenterDot; = Q 1 a q - 1 M Q 2 b q - 1
Again |<Q 1|=|<Q 2|=(q n-1), so set<Q 1〉 * M *<Q 2In the number of different matrixes satisfy:
( q n - 1 ) &le; | < Q 1 > &times; M &times; < Q 2 > | &le; ( q n - 1 ) 2 ( q - 1 )
Further also can demonstrate,prove following theorem:
Theorem 2.13:
Figure G2009100664497D0000156
Be Ergodic Matrices, Then and if only if Rank (<Q 1〉 * M *<Q 2)=have during n |<Q 1〉 * M *<Q 2|=(q n-1); Also have<Q this moment 1〉 * M *<Q 2The Q of 〉=< 1〉 * M=M *<Q 2.
Theorem 2.14: for getting fixed Ergodic Matrices arbitrarily
Figure G2009100664497D0000161
With
Figure G2009100664497D0000162
There is positive integer t, makes T ∈<Q arbitrarily 1〉 * M *<Q 2, (a is just arranged 1, b 1) ..., (a t, b t) ∈ 1 ..., q n-1} 2, make:
T = Q 1 a 1 M Q 2 b 1 = Q 1 a 2 M Q 2 b 2 = &CenterDot; &CenterDot; &CenterDot; = Q 1 a t M Q 2 b t
Theorem 2.15: for Ergodic Matrices Allow M all over getting
Figure G2009100664497D0000165
Then |<Q 1〉 * M *<Q 2| all over getting
Figure G2009100664497D0000166
{ d wherein 1=1 ..., d k=n} is all positive factors of n.
Definition 2.6: establish Be Ergodic Matrices,
Figure G2009100664497D0000168
M=Rank (<Q 1〉 * M *<Q 2).If (n m) does difficult BMQ problem, claims that then " M is about (Q 1, Q 2) strong ".And note: M S(Q 1, Q 2)={, A|A was about (Q 1, Q 2) strong
" strong matrix " about Ergodic Matrices has following theorem,
Theorem 2.16: establish
Figure G2009100664497D0000169
Be Ergodic Matrices,
Figure G2009100664497D00001610
If there is B ∈ M S(Q 1, Q 2), make:
Rank(<Q 1>×A×<Q 2>)=Rank(<Q 1>×B×<Q 2>)
A ∈ M then S(Q 1, Q 2).
Theorem 2.17: establish
Figure G2009100664497D00001611
Be Ergodic Matrices,
Figure G2009100664497D00001612
With
Figure G2009100664497D00001613
Be respectively with Q 1And Q 2Ergodic Matrices (a, b and q of equal value n-1 is coprime), then have:
Figure G2009100664497D00001614
Theorem 2.18: establish
Figure G2009100664497D00001615
Be Ergodic Matrices, A ∈ M S(Q 1, Q 2), then have:
(1) to x ∈<Q 1〉 * A *<Q 2, have: x ∈ M S(Q 1, Q 2)
(2) to x, y ∈<Q 1〉 * A *<Q 2, if Rank is (<Q 1〉 * (x+y) *<Q 2) 〉=2n, then (x+y) ∈ M S(Q 1, Q 2)
Theorem 2.18 explanations are for Ergodic Matrices
Figure G2009100664497D00001616
If can find one about (Q 1, Q 2) strong matrix, then can obtain a plurality of by it about (Q 1, Q 2) strong matrix.By theorem 2.14 and theorem 2.15, can get theorem again:
Theorem 2.19: if
Figure G2009100664497D00001617
Be Ergodic Matrices, then fixed to getting arbitrarily
Figure G2009100664497D00001618
A positive factor e who all has n, and to T ∈<Q arbitrarily 1〉 * M *<Q 2, BMQ equation group E (Q 1, M, Q 2, (q T) is just arranged e-1) individual separating.Claim that positive integer e is " (Q 1, Q 2) about the index of M ", and note is: Exp (Q 1, M, Q 2).
Also find by experiment, for any given Ergodic Matrices
Figure G2009100664497D00001619
Most
Figure G2009100664497D00001620
All satisfy Exp (Q 1, M, Q 2)=1.If M ∈ is M S(Q 1, Q 2) and Exp (Q 1, M, Q 2)=1 is then by proposition 2.1, as can be known to T ∈<Q arbitrarily 1〉 * M *<Q 2, find the solution BMQ equation group E (Q 1, M, Q 2, be difficult T).But also do not mean that corresponding M PEMRL problem intangibility this moment.Although can't be by the group E (Q that solves an equation 1, M, Q 2, T) find the solution it, but it is as follows to find the solution the another kind of method of MPEMRL problem by the character of Ergodic Matrices:
Selected at first arbitrarily F q[Q 1] and F q[Q 2] about F qOne group of base With
Figure G2009100664497D00001622
Then exist unique
Figure G2009100664497D00001623
Make:
Q 1 x = &Sigma; i = 1 n x i Q 1 &alpha; i , Q 2 - y = &Sigma; j = 1 n y j Q 2 &beta; j
Again by
Figure G2009100664497D0000173
Figure G2009100664497D0000174
Promptly have
Figure G2009100664497D0000175
Can get equation group thus:
[ Q 1 &alpha; 1 M &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; n M &RightArrow; - TQ 2 &beta; 1 &RightArrow; &CenterDot; &CenterDot; &CenterDot; - TQ 2 &beta; n &RightArrow; ] &times; x 1 &CenterDot; &CenterDot; &CenterDot; x n y 1 &CenterDot; &CenterDot; &CenterDot; y n = 0
Note is top by Q 1, M, Q 2, 2n that T derived unit linear function group is
Figure G2009100664497D0000177
Then
Figure G2009100664497D0000178
Must separate.And at Q 1, M, Q 2, T is under the known condition, be easy to obtain Separate.
Order Be
Figure G2009100664497D00001711
Separate.Then can release or (x, y)=(0,0), or (x ≠ 0, y ≠ 0).Though (x y)=(0,0) is
Figure G2009100664497D00001712
One separate, but it is not legal separating as can be known by T ≠ 0.So
Figure G2009100664497D00001713
Untrivialo solution must be arranged, and the quantity of untrivialo solution is (q k-1).Wherein:
k = 2 n - Rank ( [ Q 1 &alpha; 1 M &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; n M &RightArrow; - TQ 2 &beta; 1 &RightArrow; &CenterDot; &CenterDot; &CenterDot; - TQ 2 &beta; n &RightArrow; ] )
Appoint and get
Figure G2009100664497D00001715
Untrivialo solution
Figure G2009100664497D00001716
Can get
Figure G2009100664497D00001717
With
Figure G2009100664497D00001718
Right again
Figure G2009100664497D00001719
Invert and to get
Figure G2009100664497D00001720
And
Figure G2009100664497D00001721
Separate for one that is corresponding MPEMRL problem.
Right
Figure G2009100664497D00001722
Each untrivialo solution all carry out above-mentioned process, then can draw whole (q of corresponding MPEMRL problem k-1) individual separating.Especially, if k=1, then corresponding MPEMRL problem just has separating of (q-1) individual equivalent equivalence.Promptly separate for its any two
Figure G2009100664497D00001723
With
Figure G2009100664497D00001724
Can both find a ∈ F q0}, and
Figure G2009100664497D00001725
Figure G2009100664497D00001726
A demand went out of corresponding MPEMRL problem and separated and just can release its all separating this moment.Easily the theorem below the card is set up,
Theorem 2.20: establish
Figure G2009100664497D00001727
Be Ergodic Matrices,
Figure G2009100664497D00001728
Then have:
Exp ( Q 1 , M , Q 2 ) = 2 n - Rank ( [ Q 1 &alpha; 1 M &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; n M &RightArrow; MQ 2 &beta; 1 &RightArrow; &CenterDot; &CenterDot; &CenterDot; MQ 2 &beta; n &RightArrow; ] )
Theorem 2.21: establish
Figure G2009100664497D00001730
Be Ergodic Matrices, E=Exp (Q 1, M, Q 2).Then to T ∈<Q arbitrarily 1〉 * M *<Q 2, equation group E (Q 1, M, Q 2, (q T) is just arranged e-1) individual separating.
Theorem 2.22: establish
Figure G2009100664497D00001732
Be Ergodic Matrices,
Figure G2009100664497D00001733
E=Exp (Q 1, M, Q 2).Then to T ∈<Q arbitrarily 1〉 * M *<Q 2, equation group
Figure G2009100664497D00001734
(q is just arranged e-1) individual untrivialo solution and a null solution.
Theorem 2.23: establish Be Ergodic Matrices, M ∈ M S(Q 1, Q 2), if Exp is (Q 1, M, Q 2)=1 is then to T ∈<Q arbitrarily 1〉 * M *<Q 2, find the solution BMQ equation group E (Q 1, M, Q 2, be difficult T).
Theorem 2.24: establish
Figure G2009100664497D0000181
Be Ergodic Matrices,
Figure G2009100664497D0000182
And Exp (Q 1, M, Q 2)=1.Then to T ∈<Q arbitrarily 1〉 * M *<Q 2, at known Q 1, Q 2, M, T situation under, can be by the solving equation group
Figure G2009100664497D0000183
Obtain the separating of whole (q-1) individual equivalent equivalences of corresponding MPEMRL problem fast.
Can obtain an important conclusion thus.That is exactly to work as q nWhen enough big, for given Ergodic Matrices
Figure G2009100664497D0000184
With M ∈ M S(Q 1, Q 2), if Exp is (Q 1, M, Q 2)=1 is then to optional
Figure G2009100664497D0000185
By BMQ equation group E (Q 1, M, Q 2, T) find the solution
Figure G2009100664497D0000186
Be difficult; But at known Q 1, Q 2, M, T situation under, by equation group
Figure G2009100664497D0000187
Find the solution But be easy.
This point is vital, and the core concept of public key cryptography proposed by the invention derives from this just.Its main thought is with BMQ equation group E (Q 1, M, Q 2, T) as public-key cryptography, and with Q 1, Q 2, B 1, B 2, M is as private cipher key.The sender of the message selects message at random
Figure G2009100664497D0000189
And it is right with the PKI of message recipient
Figure G2009100664497D00001810
Calculate (encryption) and get ciphertext Then ciphertext T is passed to the recipient; The recipient utilizes its private key reconstruct equation group
Figure G2009100664497D00001812
And by finding the solution of its being restored expressly
Figure G2009100664497D00001813
So far, background technology involved in the present invention and mathematical knowledge have been explained and have been finished, and are particular content of the present invention and execution mode below.
(3) summary of the invention
The technical issues that need to address of the present invention are to work out a kind of new public key cryptography scheme, and make it to have higher security intensity than the public key cryptography of current extensive employing.
The present invention is used for the encryption and decryption of various data such as character, literal, figure, image and the sound of computer and communication network and file, kept secure and transmission to guarantee data, file content can be widely used in ecommerce, electronic banking and the E-Government.
The present invention wishes that our country can have the core technology of oneself in the public key encryption field, to guarantee information security, economic security and the safety with sovereign right of country, improves the technological means that finance and tax swindle are taken precautions against by China simultaneously.
The present invention is a kind of public key cryptography scheme based on Ergodic Matrices on the Hidden field, according to this method, can make public key encryption/deciphering chip, can develop public key encryption/decryption software etc.Therefore, the present invention is a kind of production public key encryption deciphering product mandatory basic principle of institute and technical scheme, rather than physical product itself.
The given public key cryptography technology scheme of the present invention generates, encrypts, deciphers three parts by key and forms.Herein, file before encrypting or data are called expressly, file or data after encrypting are called ciphertext.
Suppose that user A desire sends a file or data by network to user B, and carry out in the mode of maintaining secrecy.User A and user B desire realize so secure communication process, and its pattern is as follows:
Key generates: at first, user B should go to the 3rd side authoritative institution (CA or digital certificate center) to get a pair of private key (Private Key) and PKI (Public Key) by the output of key generation parts, and private key must must not be divulged a secret by user B oneself keeping; PKI then allows openly to provide to the external world with disclosed form, so that use.
Cryptographic operation: user A obtains the PKI of user B, and the plaintext that on the machine of operation encryption unit desire is sent is encrypted, and obtains ciphertext, and by network ciphertext is sent to user B.
Decryption oprerations: after user B receives the ciphertext that user A sends, on the machine of operation deciphering parts, ciphertext is decrypted, recovers plaintext with own private key.
In key encrypt method, for the efficient of encryption is provided.Usually adopt the mixed cipher technology, promptly come encrypting plaintext, come encrypted symmetric key with public-key cryptosystem again with DSE arithmetic.Employed encryption key of DSE arithmetic and decruption key are same key in essence, are called as session key.
3.1 technical scheme one of the present invention
First technical scheme of the present invention generates, encrypts, deciphers three parts by key and constitutes.Specific as follows:
3.1.1 key generating portion
The key generating portion is used for CA, is used for to each user produces a pair of private key and PKI, and its implementation is as follows:
(1) picked at random F qOn two n * n Ergodic Matrices
Figure G2009100664497D0000191
(q>10 and q nEnough big)
(2) picked at random is about (Q 1, Q 2) strong matrix M ∈ M S(Q 1, Q 2), require Exp (Q simultaneously 1, M, Q 2)=1.
(3) picked at random F q[Q 1] and F q[Q 2] about F qOne group of base
Figure G2009100664497D0000192
With
Figure G2009100664497D0000193
(4) picked at random
Figure G2009100664497D0000194
The m n-dimensional subspace n
Figure G2009100664497D0000195
About F qOne group of base [R 1..., R m].
(wherein: m=Rank (<Q 1〉 * M *<Q 2))
(5) obtain
Figure G2009100664497D0000196
Each row vector is about base [R 1..., R m] coordinates matrix
&lambda; = &lambda; 1,1 &lambda; 1,2 &CenterDot; &CenterDot; &CenterDot; &lambda; 1 , m &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , 1 &lambda; n 2 , 2 &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , m &Element; F q n 2 &times; m
It is right to make
Figure G2009100664497D0000198
K the vectorial r of row k, have:
r k=λ k,1R 1k,2R 2+…+λ k,mR m (1≤k≤n 2)
(6) by [R 1..., R m] m F of generation qOn BMQ multinomial { ρ 1(x, y) ..., ρ m(x, y) }:
&rho; 1 ( x , y ) &rho; 2 ( x , y ) &CenterDot; &CenterDot; &CenterDot; &rho; m ( x , y ) = R 1 R 2 &CenterDot; &CenterDot; &CenterDot; R m &times; x 1 y 1 &CenterDot; &CenterDot; &CenterDot; x 1 y n &CenterDot; &CenterDot; &CenterDot; x n y 1 &CenterDot; &CenterDot; &CenterDot; x n y n , ( x = ( x 1 , &CenterDot; &CenterDot; &CenterDot; , x n ) , y = ( y 1 , &CenterDot; &CenterDot; &CenterDot; , y n ) &Element; F q n )
At last, with (F q, [ρ 1(x, y) ..., ρ m(x, y)]) be PKI, with (Q 1, Q 2, M, B 1, B 2, λ) be private key.
3.1.2 encryption section
Encryption section uses for information sender, is used for to expressly encrypting.Information sender and recipient at first determine a kind of general symmetric encipherment algorithm E, and clear packets M is carried out following steps:
(1) obtains recipient's PKI (F q, [ρ 1(x, y) ..., ρ m(x, y)])
(2) select at random
Figure G2009100664497D0000201
Session key:
key = &alpha; &times; &beta; = ( &alpha; 1 &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; 1 &beta; n , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; n ) &Element; F q n 2 \ { 0 }
(3) with recipient's PKI key is encrypted:
C key=[z 1,…,z m]=[ρ 1(α,β),…,ρ m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C M=E key(M)
(5) with ciphertext (C Key, C M) send to the recipient
3.1.3 decryption portion
Decryption portion is used for the receiving party, is used for ciphertext is decrypted.The recipient with oneself private key as decruption key.
If recipient's private key is (Q 1, Q 2, M, B 1, B 2, λ), the ciphertext of receiving is (C Key, C M).Then decrypting process is as follows:
(1) calculates
Figure G2009100664497D0000203
Can get matrix T ∈<Q 1〉 * M *<Q 2
(2) solve one group of untrivialo solution of following 2n unit linear function group: x = ( x 1 , &CenterDot; &CenterDot; &CenterDot; , x n ) , y &prime; = ( y 1 &prime; , &CenterDot; &CenterDot; &CenterDot; , y n &prime; ) &Element; F q n \ { 0 }
[ Q 1 &alpha; 1 M &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; n M &RightArrow; - T Q 2 &beta; 1 &RightArrow; &CenterDot; &CenterDot; &CenterDot; - T Q 2 &beta; n &RightArrow; ] &times; [ x 1 &CenterDot; &CenterDot; &CenterDot; x n y 1 &prime; &CenterDot; &CenterDot; &CenterDot; y n &prime; ] T = 0
(3) by y ' calculating: A = &Sigma; j = 1 n y j &prime; Q 2 &beta; j &Element; < Q 2 >
(4) obtain the inverse matrix A of A -1∈<Q 2
(5) calculate A -1About basic B 2Coordinate y = ( y 1 , &CenterDot; &CenterDot; &CenterDot; , y n ) &Element; F q n \ { 0 } ( A - 1 = &Sigma; j = 1 n y j Q 2 &beta; j )
(6) then (x, y) with (α, β) equivalence, reducible thus session key:
key=x×y=(x 1y 1,…,x 1y n,…,x ny 1,…,x ny n)=α×β
(7) utilize session key key to ciphertext C MDeciphering obtains expressly:
M=D key(C M)
At last, the recipient recovers the plaintext M of transmit leg.
3.2 technical scheme two of the present invention
Second technical scheme of the present invention generates, encrypts, deciphers three parts by key and constitute.Specific as follows:
3.2.1 key generating portion
The key generating portion is used for CA, is used for to each user produces a pair of private key and PKI, and its implementation is as follows:
(1) picked at random F qOn two n * n Ergodic Matrices
Figure G2009100664497D0000211
(q>10 and q nEnough big)
(2) picked at random is about (Q 1, Q 2) strong matrix M ∈ M S(Q 1, Q 2), require Exp (Q simultaneously 1, M, Q 2)=1.
(3) picked at random F qOn two n * n nonsingular matrix s , t &Element; F q n &times; n .
(4) calculate F q[Q 1] and F q[Q 2] about F qOne group of base
Figure G2009100664497D0000213
With
Figure G2009100664497D0000214
Make:
Q 1 &alpha; j = &Sigma; i = 1 n s [ i , j ] Q 1 i - 1 , Q 2 &beta; j = &Sigma; i = 1 n t [ i , j ] Q 2 i - 1 , ( j = 1,2 , &CenterDot; &CenterDot; &CenterDot; , n )
(5) picked at random
Figure G2009100664497D0000217
The m n-dimensional subspace n
Figure G2009100664497D0000218
About F qOne group of base [R 1..., R m].
(wherein: m=Rank (<Q 1〉 * M *<Q 2))
(6) obtain
Figure G2009100664497D0000219
Each row vector is about base [R 1..., R m] coordinates matrix
&lambda; = &lambda; 1,1 &lambda; 1,2 &CenterDot; &CenterDot; &CenterDot; &lambda; 1 , m &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , 1 &lambda; n 2 , 2 &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , m &Element; F q n 2 &times; m
It is right to make K the vectorial r of row k, have:
r k=λ k,1R 1k,2R 2+…+λ k,mR m (1≤k≤n 2)
(7) by [R 1..., R m] m F of generation qOn BMQ multinomial { ρ 1(x, y) ..., ρ m(x, y) }:
&rho; 1 ( x , y ) &rho; 2 ( x , y ) &CenterDot; &CenterDot; &CenterDot; &rho; m ( x , y ) = R 1 R 2 &CenterDot; &CenterDot; &CenterDot; R m &times; x 1 y 1 &CenterDot; &CenterDot; &CenterDot; x 1 y n &CenterDot; &CenterDot; &CenterDot; x n y 1 &CenterDot; &CenterDot; &CenterDot; x n y n , ( x = ( x 1 , &CenterDot; &CenterDot; &CenterDot; , x n ) , y = ( y 1 , &CenterDot; &CenterDot; &CenterDot; , y n ) &Element; F q n )
(8) at last with (F q, [ρ 1(x, y) ..., ρ m(x, y)]) be PKI, with (Q 1, Q 2, M, s -1, t -1, λ) be private key.
3.2.2 encryption section
Encryption section uses for information sender, is used for to expressly encrypting.Information sender and recipient at first determine a kind of general symmetric encipherment algorithm E, and clear packets M is carried out following steps:
(1) obtains recipient's PKI (F q, [ρ 1(x, y) ..., ρ m(x, y)])
(2) select at random
Figure G2009100664497D0000221
Session key:
key = &alpha; &times; &beta; = ( &alpha; 1 &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; 1 &beta; n , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; n ) &Element; F q n 2 \ { 0 }
(3) with recipient's PKI key is encrypted:
C key=[z 1,…,z m]=[ρ 1(α,β),…,ρ m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C M=E key(M)
(C at last Key, C M) be ciphertext, will be sent to the recipient.
3.2.3 decryption portion
Decryption portion is used for the receiving party, is used for ciphertext is decrypted.The recipient with oneself private key as decruption key.
If recipient's private key is (Q 1, Q 2, M, s -1, t -1, λ), the ciphertext of receiving is (C Key, C M).Then decrypting process is as follows:
(1) calculates
Figure G2009100664497D0000223
Can get matrix T ∈<Q 1〉 * M *<Q 2
(2) solve one group of untrivialo solution of following 2n unit linear function group: x = ( x 1 , &CenterDot; &CenterDot; &CenterDot; , x n ) , y &prime; = ( y 1 &prime; , &CenterDot; &CenterDot; &CenterDot; , y n &prime; ) &Element; F q n \ { 0 }
[ Q 1 0 M &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 n - 1 M &RightArrow; - T Q 2 0 &RightArrow; &CenterDot; &CenterDot; &CenterDot; - T Q 2 n - 1 &RightArrow; ] &times; [ x 1 &CenterDot; &CenterDot; &CenterDot; x n y 1 &prime; &CenterDot; &CenterDot; &CenterDot; y n &prime; ] T = 0
(3) by y ' calculating: A = &Sigma; j = 1 n y j &prime; Q 2 &beta; j &Element; < Q 2 >
(4) obtain the inverse matrix A of A -1∈<Q 2
(5) calculate A -1About base Coordinate y = ( y 1 , &CenterDot; &CenterDot; &CenterDot; , y n ) &Element; F q n \ { 0 } ( A - 1 = &Sigma; j = 1 n y j Q 2 j - 1 )
(6) calculate &alpha; &prime; = ( &alpha; 1 &prime; , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &prime; ) = s - 1 x , &beta; &prime; = ( &beta; 1 &prime; , &CenterDot; &CenterDot; &CenterDot; , &beta; n &prime; ) = t - 1 y &Element; F q n \ { 0 }
(7) then (α ', β ') with (α, β) equivalence, reducible thus session key:
key=α′×β′=(α′ 1β′ 1,…,α′ 1β′ n,…,α′ nβ′ 1,…,α′ nβ′ n)=α×β
(8) utilize session key key to ciphertext C MDeciphering obtains expressly:
M=D key(C M)
At last, the recipient recovers the plaintext M of transmit leg.
3.3 advantage and good effect
Compare with public key cryptography scheme commonly used at present, the given public key cryptography technology scheme of the present invention has following advantage.
3.3.1 fail safe is higher
Can prove the BMQ problem be NP completely.So it is more difficult than big integer factor decomposition and discrete logarithm problem.Therefore, deriving private key or decode expressly from ciphertext from PKI is infeasible in polynomial time.
Moreover public key cryptography commonly used at present all faces the threat of quantum calculation.And do not have effective quantum algorithm for np complete problem.Therefore the present invention can be used as a replacement scheme of existing public key cryptography, thereby has long-range application potential.
3.3.2 key space is big
Work as q nWhen enough big, because
Figure G2009100664497D0000231
In Ergodic Matrices and about given Ergodic Matrices to (Q 1, Q 2) the quantity of strong matrix heavy many, so (private key, PKI) in the given technical scheme of the present invention right selection space is very big.
3.3.3 the randomness of PKI is good
The pairing F of PKI in the given technical scheme of the present invention qOn BMQ multi-direction type group [ρ 1..., ρ m], be by n 2Dimension row vector space
Figure G2009100664497D0000232
A specific m n-dimensional subspace n about F qOne group of base [R 1..., R m] unique definite.
And
Figure G2009100664497D0000233
The quantity of m n-dimensional subspace n V be:
( q n 2 - 1 ) ( q n 2 - q ) ( q n 2 - q 2 ) &CenterDot; &CenterDot; &CenterDot; ( q n 2 - q m - 1 ) ( q m - 1 ) ( q m - q ) ( q m - q 2 ) &CenterDot; &CenterDot; &CenterDot; ( q m - q m - 1 )
For specific m n-dimensional subspace n V, V is about F qThe quantity of base (greatly linearly independent vector group) be:
(q m-1)(q m-q)(q m-q 2)…(q m-q m-1)
So PKI [ρ 1..., ρ m] selection randomness very big.
3.3.4 fast operation
The enciphering rate of this key encrypt method is fast.Because it only relates to F qIn simply add/multiplication, and do not relate to any power exponentiation.
The deciphering speed of this key encrypt method is fast simultaneously.Because it only relates to F qIn simple matrix add/multiplication conciliates the linear function group operation of 2n unit, and do not relate to any matrix power exponentiation.Thereby be convenient to hardware and realize.
3.3.5 technology can disclose
Realization technology of the present invention can disclose fully, and user's PKI also can openly be provided to the external world with the form of digital certificate.As long as private key is not divulged a secret, just can guarantee the safety of ciphertext fully.
3.3.6 it is favourable to national security
The Internet is a kind of open net, and is apparent, transmits sensitive information in the above and must encrypt.Because internet usage is as means of communication for important departments such as the Chinese government, national defence, finance, the tax, therefore, information security is related to national sovereignty safety and economic security.
Therefore, to have a key encrypt method of independent intellectual property right, original innovation significant in research.
(4) embodiment
The characteristics of this key encrypt method are that it can allow each user obtain two keys, and a key can disclose, and are used for encrypting, and a key can only the individual have, and are used for deciphering.Like this, can not worry that key divulged a secret in the transmittance process on the net.When the agreement correspondent transmitted information on the net, the sender used recipient's PKI that file or message are encrypted, and the recipient uses the private key of oneself that it is decrypted after receiving ciphertext.
Two keys are got by CA (Certificate Authentication) authentication center that each user can arrive appointment.The ca authentication center is the mechanism that the user is registered, key is produced, distributes and manages.It utilizes the key generation method generation user's of 3.1.1 or 3.2.1 joint PKI and private key.
This encryption method can realize that it comprises two parts with logic circuit chip or program language: (1) develops chip or program according to key generation method, is used by the ca authentication center; (2) develop chip or program according to the encryption and decryption method of 3.1.2,3.1.3 or 3.2.2,3.2.3 joint, use by the general user.

Claims (1)

1. the key encrypt method of Ergodic Matrices on the Hidden field, generating, encrypt, decipher three parts by key forms, the key generating portion produces user's (private key for third party authoritative institution, PKI) right, encryption section uses receiving party's PKI expressly being converted to ciphertext for information sender, decryption portion uses the private key of oneself that ciphertext is reduced into expressly for the receiving party, it is characterized in that
Scheme one:
● the key generating portion has adopted the following step:
(1) picked at random F qOn two n * n Ergodic Matrices
Figure F2009100664497C0000011
(q>10 and q nEnough big)
(2) picked at random is about (Q 1, Q 2) strong matrix M ∈ M S(Q 1, Q 2), require Exp (Q simultaneously 1, M, Q 2)=1
(3) picked at random F q[Q 1] and F q[Q 2] about F qOne group of base
Figure F2009100664497C0000012
With
Figure F2009100664497C0000013
(4) picked at random
Figure F2009100664497C0000014
The m n-dimensional subspace n About F qOne group of base [R 1..., R m]
(wherein: m=Rank (<Q 1〉 * M *<Q 2))
(5) obtain
Figure F2009100664497C0000016
Each row vector is about base [R 1..., R m] coordinates matrix
&lambda; = &lambda; 1,1 &lambda; 1,2 &CenterDot; &CenterDot; &CenterDot; &lambda; 1 , m &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , 1 &lambda; n 2 , 2 &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , m &Element; F q n 2 &times; m
It is right to make
Figure F2009100664497C0000018
K the vectorial r of row k, have:
r k=λ k,1R 1k,2R 2+…+λ k,mR m (1≤k≤n 2)
(6) by [R 1..., R m] m F of generation qOn BMQ multinomial { ρ 1(x, y) ..., ρ m(x, y) }:
&rho; 1 ( x , y ) &rho; 2 ( x , y ) &CenterDot; &CenterDot; &CenterDot; &rho; m ( x , y ) = R 1 R 2 &CenterDot; &CenterDot; &CenterDot; R m &times; x 1 y 1 &CenterDot; &CenterDot; &CenterDot; x 1 y n &CenterDot; &CenterDot; &CenterDot; x n y 1 &CenterDot; &CenterDot; &CenterDot; x n y n (x=(x 1,…,x n), y = ( y 1 , &CenterDot; &CenterDot; &CenterDot; , y n ) &Element; F q n )
At last, with (F q, [ρ 1(x, y) ..., ρ m(x, y)]) be PKI, with (Q 1, Q 2, M, B 1, B 2, λ) be private key;
● encryption section has adopted the following step:
Information sender and recipient at first determine a kind of general symmetric encipherment algorithm E, and clear packets M is done:
(1) obtains recipient's PKI (F q, [ρ 1(x, y) ..., ρ m(x, y)])
(2) select α=(α at random 1..., α n),
Figure F2009100664497C00000111
Session key:
key = &alpha; &times; &beta; = ( &alpha; 1 &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; 1 &beta; n , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; n ) &Element; F q n 2 \ { 0 }
(3) with recipient's PKI key is encrypted:
C key=[z 1,…,z m]=[ρ 1(α,β),…,ρ m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C M=E key(M)
(C at last Key, C M) be ciphertext, will be sent to reciever.
● decryption portion has adopted the following step:
The recipient uses the private key (Q of oneself 1, Q 2, M, B 1, B 2, λ), at ciphertext (C Key, C M) do:
(1) calculates
Figure F2009100664497C0000022
Can get matrix T ∈<Q 1〉 * M *<Q 2
(2) solve one group of untrivialo solution of following 2n unit linear function group: x=(x 1..., x n),
Figure F2009100664497C0000023
Q 1 &alpha; 1 M &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 &alpha; n M &RightArrow; - TQ 2 &beta; 1 &RightArrow; &CenterDot; &CenterDot; &CenterDot; - TQ 2 &beta; n &RightArrow; &times; x 1 &CenterDot; &CenterDot; &CenterDot; x n y 1 &prime; &CenterDot; &CenterDot; &CenterDot; y n &prime; T = 0
(3) by y ' calculating:
Figure F2009100664497C0000025
(4) obtain the inverse matrix A of A -1∈<Q 2
(5) calculate A -1About basic B 2Coordinate
Figure F2009100664497C0000026
(6) reduction session key:
key=x×y=(x 1y 1,…,x 1y n,…,x ny 1,…,x ny n)=α×β
(7) utilize session key key to ciphertext C MDeciphering obtains expressly:
M=D key(C M)
At last, the recipient recovers the plaintext M of transmit leg;
Scheme two:
● the key generating portion has adopted the following step:
(1) picked at random F qOn two n * n Ergodic Matrices Q 1,
Figure F2009100664497C0000027
(q>10 and q nEnough big)
(2) picked at random is about (Q 1, Q 2) strong matrix M ∈ M S(Q 1, Q 2), require Exp (Q simultaneously 1, M, Q 2)=1
(3) picked at random F qOn two n * n nonsingular matrix s,
Figure F2009100664497C0000028
(4) calculate F q[Q 1] and F q[Q 2] about F qOne group of base
Figure F2009100664497C0000029
With
Figure F2009100664497C00000210
Make:
Q 1 &alpha; j = &Sigma; i = 1 n s [ i , j ] Q 1 i - 1 , Q 2 &beta; j = &Sigma; i = 1 n t [ i , j ] Q 2 i - 1 (j=1,2,…,n)
(5) picked at random The m n-dimensional subspace n
Figure F2009100664497C0000032
About F qOne group of base [R 1..., R m] (wherein: m=Rank (<Q 1〉 * M *<Q 2))
(6) obtain Each row vector is about base [R 1..., R m] coordinates matrix
&lambda; = &lambda; 1,1 &lambda; 1,2 &CenterDot; &CenterDot; &CenterDot; &lambda; 1 , m &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , 1 &lambda; n 2 , 2 &CenterDot; &CenterDot; &CenterDot; &lambda; n 2 , m &Element; F q n 2 &times; m
It is right to make
Figure F2009100664497C0000035
K the vectorial rk of row, have:
r k=λ k,1R 1k,2R 2+…+λ k,mR m (1≤k≤n 2)
(7) by [R 1..., R m] generate the BMQ multinomial { ρ on m the Fq 1(x, y) ..., ρ m(x, y) }:
&rho; 1 ( x , y ) &rho; 2 ( x , y ) &CenterDot; &CenterDot; &CenterDot; &rho; m ( x , y ) = R 1 R 2 &CenterDot; &CenterDot; &CenterDot; R m &times; x 1 y 1 &CenterDot; &CenterDot; &CenterDot; x 1 y n &CenterDot; &CenterDot; &CenterDot; x n y 1 &CenterDot; &CenterDot; &CenterDot; x n y n (x=(x 1,…,x n), y = ( y 1 , &CenterDot; &CenterDot; &CenterDot; , y n ) &Element; F q n )
At last with (F q, [ρ 1(x, y) ..., ρ m(x, y)]) be PKI, with (Q 1, Q 2, M, s -1, t -1, λ) be private key;
● encryption section has adopted the following step:
Information sender and recipient at first determine a kind of general symmetric encipherment algorithm E, and clear packets M is done:
(1) obtains recipient's PKI (F q, [ρ 1(x, y) ..., ρ m(x, y)])
(2) select α=(α at random 1..., α n),
Figure F2009100664497C0000038
Session key:
key = &alpha; &times; &beta; = ( &alpha; 1 &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; 1 &beta; n , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; 1 , &CenterDot; &CenterDot; &CenterDot; , &alpha; n &beta; n ) &Element; F q n 2 \ { 0 }
(3) with recipient's PKI key is encrypted:
C key=[z 1,…,z m]=[ρ 1(α,β),…,ρ m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C M=E key(M)
(C at last Key, C M) be ciphertext, will be sent to the recipient;
● decryption portion has adopted the following step:
The recipient uses the private key (Q of oneself 1, Q 2, M, B 1, B 2, λ), at ciphertext (C Key, C M) do:
(1) calculates
Figure F2009100664497C00000310
Can get matrix T ∈<Q 1〉 * M *<Qx 〉
(2) solve one group of untrivialo solution of following 2n unit linear function group: x=(x 1..., x n),
Figure F2009100664497C0000041
Q 1 0 M &RightArrow; &CenterDot; &CenterDot; &CenterDot; Q 1 n - 1 M &RightArrow; - TQ 2 0 &RightArrow; &CenterDot; &CenterDot; &CenterDot; - TQ 2 n - 1 &RightArrow; &times; x 1 &CenterDot; &CenterDot; &CenterDot; x n y 1 &prime; &CenterDot; &CenterDot; &CenterDot; y n &prime; T = 0
(3) by y ' calculating:
Figure F2009100664497C0000043
(4) obtain the inverse matrix A of A -1∈<Q 2
(5) calculate A -1About base
Figure F2009100664497C0000044
Coordinate
(6) calculate α '=(α ' 1..., α ' n)=s -1X,
(7) then (α ', β ') with (α, β) equivalence, reducible thus session key:
key=α′×β′=(α′ 1β′ 1,…,α′ 1β′ n,…,α′ nβ′ 1,…,α′ nβ′ n)=α×β
(8) utilize session key key to ciphertext C MDeciphering obtains expressly:
M=D key(C M)
At last, the recipient recovers the plaintext M of transmit leg.
CN 200910066449 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field Expired - Fee Related CN101783728B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910066449 CN101783728B (en) 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910066449 CN101783728B (en) 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field

Publications (2)

Publication Number Publication Date
CN101783728A true CN101783728A (en) 2010-07-21
CN101783728B CN101783728B (en) 2012-12-19

Family

ID=42523555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910066449 Expired - Fee Related CN101783728B (en) 2009-01-19 2009-01-19 Public key encryption method for ergodic matrix over hidden field

Country Status (1)

Country Link
CN (1) CN101783728B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123028A (en) * 2011-02-28 2011-07-13 成都四方信息技术有限公司 Working method of random key generation
CN102136911A (en) * 2011-03-11 2011-07-27 西京学院 Method for encrypting electronic document
CN102164032A (en) * 2011-05-19 2011-08-24 吉林大学 Quantum attack-resistant nondeterministic public key cryptography construction method
CN105634732A (en) * 2016-01-21 2016-06-01 中国人民武装警察部队工程大学 Ciphertext domain multi-bit reversible information hiding method
CN108737098A (en) * 2018-06-27 2018-11-02 山西师范大学 Key generation method, information encipher-decipher method, device, medium and electronic equipment
CN113315628A (en) * 2021-04-09 2021-08-27 中国科学院信息工程研究所 Key packaging method, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6788788B1 (en) * 1998-09-16 2004-09-07 Murata Kikai Kabushiki Kaisha Cryptographic communication method, encryption method, and cryptographic communication system
CN101321058B (en) * 2007-06-07 2010-12-15 管海明 Method and system for encoding and decoding digital message

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123028A (en) * 2011-02-28 2011-07-13 成都四方信息技术有限公司 Working method of random key generation
CN102136911A (en) * 2011-03-11 2011-07-27 西京学院 Method for encrypting electronic document
CN102164032A (en) * 2011-05-19 2011-08-24 吉林大学 Quantum attack-resistant nondeterministic public key cryptography construction method
CN105634732A (en) * 2016-01-21 2016-06-01 中国人民武装警察部队工程大学 Ciphertext domain multi-bit reversible information hiding method
CN108737098A (en) * 2018-06-27 2018-11-02 山西师范大学 Key generation method, information encipher-decipher method, device, medium and electronic equipment
CN113315628A (en) * 2021-04-09 2021-08-27 中国科学院信息工程研究所 Key packaging method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN101783728B (en) 2012-12-19

Similar Documents

Publication Publication Date Title
JP6783877B2 (en) Cryptographic text query methods and systems for fully homomorphic encryption
Deng et al. Analysis and improvement of a chaos-based Hash function construction
Kanso et al. A fast and efficient chaos-based keyed hash function
KR19990082665A (en) Common Key Communication Method
CN101783728B (en) Public key encryption method for ergodic matrix over hidden field
EP2742644B1 (en) Encryption and decryption method
Agrawal et al. Elliptic curve cryptography with hill cipher generation for secure text cryptosystem
CN104135473A (en) A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
Ma et al. Practical privacy-preserving frequent itemset mining on supermarket transactions
CN101977109A (en) Linear mixed high ordered equation public key algorithm
Suguna et al. A study on symmetric and asymmetric key encryption algorithms
Sani et al. Creation of S-box based on a hierarchy of Julia sets: image encryption approach
CN103812658B (en) A kind of secure communication protocols based on stream cipher
CN101267300A (en) Multi-variant public key encryption method based on mutual prime number sequent and lever function
CN102025489A (en) Public key cryptography improvement method for hidden field ergodic matrices and signature scheme
CN103746810A (en) Anonymous sign-cryption method from certificate public key system to identity public key system
Chen et al. Certificateless signatures: structural extensions of security models and new provably secure schemes
CN109040041A (en) Data hierarchy encryption device and related electronic device, storage medium
CN102064938B (en) One is based on multivariate and probabilistic public key encryption method
Chauhan et al. Secure key exchange using RSA in extended Playfair cipher technique
Mohan et al. An Encryption Technique Using A Complete Graph With A Self-Invertible Matrix
CN109981254A (en) A kind of miniature public key encryption method based on limited Lee&#39;s type group&#39;s resolution problem
KR20010067016A (en) High speed rsa public key cryptographic apparatus and method
George et al. Add-on security level for public key cryptosystem using magic rectangle with column/row shifting
CN102347840B (en) A kind of public key encryption method based on mutual prime sequences and lever function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: JILIN UNIVERSITY

Free format text: FORMER OWNER: ZHAO YONGZHE

Effective date: 20101230

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 130012 COLLEGE OF COMPUTER SCIENCE AND TECHNOLOGY, JILIN UNIVERSITY, NO.2699, QIANJIN AVENUE, CHANGCHUN CITY, JILIN PROVINCE TO: 130012 NO.2699, QIANJIN AVENUE, CHANGCHUN CITY, JILIN PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20101230

Address after: 130012 Changchun Qianjin Street, Jilin, No. 2699

Applicant after: Jilin University

Address before: 130012 School of computer science and technology, Jilin University, Changchun, Jilin, China,

Applicant before: Zhao Yongzhe

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121219

Termination date: 20150119

EXPY Termination of patent right or utility model