(2) background technology
Classic cryptographic technique, symmetric cryptographic technique and public key cryptography technology three phases have been experienced in the development of cryptographic technique.1976, American scholar Diffie and Hellman proposed the thought of public key cryptography, indicated the arriving of public key cryptography technology.The public key encryption method of generally using has schemes such as RSA, Rabin and EIGamal (referring to " applied cryptography ", U.S. BruceSchneier is outstanding, and Wu Shizhong, Zhu Shixiong etc. translates, China Machine Press, January calendar year 2001,334-342 page or leaf) at present.In order to shorten parameter length, the EIGamal scheme is everlasting, and simulation realizes that at this moment, it is called as the ECC scheme on the elliptic curve.
In the scheme of using at present the fail safe of RSA and Rabin scheme based on be the factorization problems of counting greatly, the fail safe of EIGamal scheme based on be discrete logarithm problem, and the fail safe of ECC scheme based on be discrete logarithm problem in the elliptic curve group, in the limited time and resource, be impossible promptly to finding the solution of the problems referred to above.Along with the raising of computer run speed, the security parameter of appeal scheme has become increasing, has greatly reduced the efficient of enciphering/deciphering.The particularly realization of quantum computer in the future makes big number factorization and discrete logarithm find the solution and can carry out in polynomial time.
Because main theory involved in the present invention and technology are the applicant and propose first, and great majority are still unexposed delivers.For the ease of the understanding of the present invention, the spy describes them.
2.1 basic symbol involved in the present invention
F
q: q unit finite field
F
qThe set of last n dimensional vector
F
qThe set of last non-zero n dimensional vector
F
qThe set of last n dimension row vector
F
qThe set of last non-zero n dimension row vector
F
qThe set of last n * m matrix
R (M): the row vector set of matrix M
C (M): the column vector set of matrix M
The element of matrix M is the resulting column vector in back by rows
F
q[x]: F
qGo up multinomial set about literal x
V
S(A): the vector space that Vector Groups A generated
2.2 BMQ problem and difficulty thereof on the finite field prove
At first introduce F
qOn " BMQ problem ".Be F
qOn " problem of finding the solution of bisection multivariate quadratic equation group (Bisectional Multivariate Quadratic equations solving problem) ".It is defined as follows:
Definition 2.1 (BMQ problem): F
qOn total 2n the variable of equation group E and m equation, being constructed as follows of each equation:
(
Be determined value, k=1 ..., m)
Separating of equation group E asked in examination
The BMQ problem is a special case of MQ problem.Difference is that the variable in the BMQ equation group has been divided into two groups that quantity equates.And only contain quadratic expression in each equation, and any one quadratic expression is a product of respectively getting one in these two groups of variablees.Therefore in the BMQ equation group, 2n variable formed n just
2Individual quadratic expression.Different with it, in the MQ equation group, in each equation except containing quadratic expression, the one more formula.Therefore 2n variable can be formed 2n altogether
2+ n quadratic expression and 2n expression of first degree.
In addition, F
qOn the MQ equation group unique solution can be arranged.But when q>2, if x=is (x
1..., x
n) and y=(y
1..., y
n) be that of BMQ equation group E separates, then to c ∈ F arbitrarily
q{ 0}, cx=(cx
1..., cx
n) and c
-1Y=(c
-1y
1..., c
-1y
n) also must be separating of E.Therefore when q>2, F
qOn the BMQ solution of equations not unique.F
qOn the MQ problem be proved to be NP completely, prove F below
qOn the BMQ problem also be NP completely.
Theorem 2.1:F
qOn the BMQ problem be NP completely.
The proof: the 3-coloring problem of known figure G be NP completely, if but this problem reduction is F
qOn the BMQ problem, then the latter also must be NP completely.But the 3-coloring problem reduction that at first proves G is F
2On the BMQ problem, conceive as follows:
1) each vertex v of G
iAll corresponding F
2On a pair of variable (x
i, y
i)
2) v
iPainted and (x
i, y
i) corresponding relation between the value is:
v
iColor-1, color-2, color-3 and if only if (x
i, y
i)=(0,1), (1,0), (1,1)
3) for each isolated vertex v of G
s, add EQUATION x
sy
s=1 in equation group E
4) if vertex v among the G
iAnd v
jAdjacent, then add EQUATION x
iy
j+ x
jy
i=1 in equation group E
Can get F thus
2On BMQ equation group E.For isolated vertex v
s, by the EQUATION x in the 3rd step
sy
s=1, it has unique solution (x as can be known
s, y
s)=(1,1), promptly to each isolated vertex of G equal color-3.
And for adjacent vertex v
iAnd v
j, by the EQUATION x in the 4th step
iy
j+ x
jy
i=1, as can be known:
(x
i,y
i)≠(0,0)∧(x
j,y
j)≠(0,0)∧(x
i,y
i)≠(x
j,y
j)
Be v
iAnd v
jEach can only be painted with one of three kinds of colors, and v
iAnd v
jNot homochromy.So but the 3-coloring problem reduction of G is solving equation group E.Thereby proved F
2On the BMQ problem be NP completely.
But the 3-coloring problem of demonstrate,proving G again also reduction is F
qBMQ problem on (q>2), conceive as follows:
1) each vertex v of G
iAll corresponding F
qIn three groups of variablees, two pairs every group:
And the value of every group of variable can only have following two kinds of situations:
Or
(brief note is respectively
With
α, β ∈ F
q0})
2) vertex v
iPainted with its corresponding relation between the value of corresponding three groups of variablees be:
v
iAnd if only if color-1
v
iAnd if only if color-2
v
iAnd if only if color-3
3) for each vertex v of G
t, selected arbitrarily δ ∈ F
q0}, and add following equation in equation group E:
4) if vertex v among the G
iAnd v
jAdjacent, equation is in equation group E below then adding
Can get F thus
qOn BMQ equation group E.By the equation in the 3rd step, as can be known each summit of G lucky one of 3 kinds of colors.And, can guarantee that then any two adjacent vertexs of G different colors by the 4th equation that goes on foot.So but the 3-coloring problem reduction of G is to F
qLast BMQ equation group E finds the solution.So F
qOn the BMQ problem also be NP completely.
Card is finished.
2.3BMQ problem find the solution the difficulty analysis
Though we have proved F in theory
qOn the BMQ problem be NP completely, but this and do not mean that to finding the solution of any BMQ equation group all be difficult, it is found the solution, and the number of variable and equation has confidential relation in difficulty and the equation group.Below it is carried out labor.
If F
qOn BMQ equation group E contain 2n variable x
1..., x
n, y
1..., y
nWith m equation.With each the quadratic expression (x among the E
iy
j) all use a new variables z
IjRepresent, then can obtain N
1=n
2Individual variable and M
1The linear function group E of=m equation
1Claim this process to be " to the once heavily linearisation of E ".
If m 〉=n
2, then can obtain E
1All z that separates
Ij, and then by z
IjAnti-release E separates
Otherwise, make r=n
2-m.Then can obtain E
1The basis separate and be
And E
1A particular solution
And E
1General solution can show be:
Z=(z
11,z
12,…,z
nn)=Z
0+α
1Z
1+α
2Z
2+…+α
rZ
r (α
i∈F
q) (Ⅰ)
But the E that obtains like this
1Q
rThe overwhelming majority in individual the separating is " parasitic solution (parasitic solution) ", and by E
1Parasitic solution Z can't obtain the legal of E and separate.Especially, when E has just that (q-1) is individual to be separated, E
1Has only a non-parasitic solution.E when though E separates
1Non-parasitic solution must be arranged, but work as q
rWhen very big, can't pass through E
1All rough power of separating attempts deriving separating of E.
From present solution technique to MQ problem on the finite field, the most effective " heavily linearisation (relinearization) " method that surely belongs to Kipnis and Shamir proposition.The basic thought of this method is by the equation number being represented less than the general solution of the equation group of variable number, being constructed the more equation of high order.Thereby make the equation of higher degree sum that finally obtains number more than or equal to high order variable product term (new variables).And finally obtain separating of full scale equation group by counter pushing away.
Because the BMQ problem is a special case of MQ problem, so heavy linearization technique is still effective to finding the solution the BMQ problem.But wanting respective change aspect the reconstruct of equation and variable.Concrete grammar is as follows:
For F
qOn BMQ equation group E, as m<n
2The time, by the discussion of front as can be known, the key of finding the solution E is to determine equation group E
1Non-parasitic solution Z=(z
11, z
12..., z
Nn).Again by (I) formula, each component z of Z
Ij=x
iy
jSatisfy:
z
ij=s
0+s
1α
1+s
2α
2+…+s
rα
r (Ⅱ)
R=n wherein
2-m, s
0..., s
r∈ F
qBe known constant, α
1..., α
r∈ F
qBe variable.Therefore Z's determines to be equivalent to again how at (α
1..., α
r) q
rPlant and to locate its value exactly in the option.For this reason can be to shape as (x
ax
by
iy
j) 4 formulas carry out the reconstruct of equation and variable.By equation:
(x
ax
by
iy
j)=(x
ay
i)(x
by
j)=(x
ay
j)(x
by
i)
Can get 2 equation of n th order n z
Aiz
Bj=z
Ajz
BiWith this equation of (II) formula substitution, can obtain about α
1..., α
r2 equation of n th order n:
(Ⅲ)
Shape is as (x again
ax
by
iy
j) 4 formulas total
Individual, each can both produce the equation of 1 shape as (III) formula.And shape is as (x
ax
ay
iy
j) and (x
ax
by
iy
i) 4 formulas all do not produce new equation; So can obtain shape by 4 times all formulas adds up to as 2 equation of n th order n of (III) formula:
With each 2 the formula (α in (III) formula
iα
j) and 1 formula α
iAll regard different new variables as, then ading up to of variable:
So can get F
qOn have M
2Individual equation, N
2The linear function group E of individual variable
2Deserve to be called and state reconstruct equation group E
2Process be " to the heavily linearisation of secondary of E ".The M that even now obtains
2Having in the individual equation much is linear correlation, but might as well suppose that they are linear independence each other when analyzing.
If M is arranged this moment
2〉=N
2, then can be by E
2Solve α
1..., α
r∈ F
qAgain with α
1..., α
rSubstitution (II) formula can solve all z
Ij=(x
iy
j), and then the separating of the anti-E of release
If M
2<N
2, then can further carry out three heavily linearisations to E.Promptly to shape as (x
ax
bx
cy
iy
jy
k) 6 formulas carry out similar equation and variable reconstruct.6 formulas like this have following several classes:
(1) shape is as (x
ax
bx
cy
iy
jy
k), total
Individual, each can produce 5 about z
Ij3 equation of n th order n.
(2) shape is as (x
ax
bx
cy
iy
iy
j), total
Individual, each can produce 2 about z
Ij3 equation of n th order n.
(3) shape is as (x
ax
ax
by
iy
jy
k), total
Individual, each can produce 2 about z
Ij3 equation of n th order n.
(4) shape is as (x
ax
ax
by
iy
iy
j), total
Individual, each can produce 1 about z
Ij3 equation of n th order n.
(5) shape is as (x
ax
ax
ay
iy
jy
k) and (x
ax
bx
cy
iy
iy
i) 6 formulas all do not produce about z
Ij3 equation of n th order n. therefore, the tangible as (x of institute
ax
bx
cy
iy
jy
k) 6 formulas can produce about z
IjThe ading up to of 3 equation of n th order n:
With the substitution of (II) formula each about z
Ij3 equation of n th order n, can get following about variable α
1..., α
r3 equation of n th order n:
(Ⅳ)
With each 3 the formula (α in (IV) formula equation
iα
jα
k), 2 formula (α
iα
j) and 1 formula α
iAll regard different new variables as, then ading up to of variable:
Thereby can obtain F
qOn have M
3Individual equation, N
3The linear function group E of individual variable
3
If M
3〉=N
3, then can be by E
3Solve α
1..., α
r, and the separating of the anti-E of release
Otherwise can further carry out four heavily linearisations to E.Promptly to shape as (x
ax
bx
cx
dy
iy
jy
ky
l) 8 formulas carry out equation and variable reconstruct.8 formulas like this have following several classes:
(1) shape is as (x
ax
bx
cx
dy
iy
jy
ky
l), total
Individual, each can produce 23 about z
Ij4 equation of n th order n.
(2) shape is as (x
ax
bx
cx
dy
iy
iy
jy
k), total
Individual, each can produce 11 about z
Ij4 equation of n th order n.
(3) shape is as (x
ax
bx
cx
dy
iy
iy
iy
j), total
Individual, each can produce 3 about z
Ij4 equation of n th order n.
(4) shape is as (x
ax
bx
cx
dy
iy
iy
jy
j), total
Individual, each can produce 5 about z
Ij4 equation of n th order n.
(5) shape is as (x
ax
ax
bx
cy
iy
jy
ky
l), total
Individual, each can produce 11 about z
Ij4 equation of n th order n.
(6) shape is as (x
ax
ax
bx
cy
iy
iy
jy
k), total
Individual, each can produce 6 about z
Ij4 equation of n th order n.
(7) shape is as (x
ax
ax
bx
cy
iy
iy
iy
j), total
Individual, each can produce 2 about z
Ij4 equation of n th order n.
(8) shape is as (x
ax
ax
bx
cy
iy
iy
jy
j), total
Individual, each can produce 3 about z
Ij4 equation of n th order n.
(9) shape is as (x
ax
ax
ax
by
iy
jy
ky
l), total
Individual, each can produce 3 about z
Ij4 equation of n th order n.
(10) shape is as (x
ax
ax
ax
by
iy
iy
jy
k), total
Individual, each can produce 2 about z
Ij4 equation of n th order n.
(11) shape is as (x
ax
ax
ax
by
iy
iy
iy
j), total
Individual, each can produce 1 about z
Ij4 equation of n th order n.
(12) shape is as (x
ax
ax
ax
by
iy
iy
jy
j), total
Individual, each can produce 1 about z
Ij4 equation of n th order n.
(13) shape is as (x
ax
ax
bx
by
iy
jy
ky
l), total
Individual, each can produce 5 about z
Ij4 equation of n th order n.
(14) shape is as (x
ax
ax
bx
by
iy
iy
jy
k), total
Individual, each can produce 3 about z
Ij4 equation of n th order n.
(15) shape is as (x
ax
ax
bx
by
iy
iy
iy
j), total
Individual, each can produce 1 about z
Ij4 equation of n th order n.
(16) shape is as (x
ax
ax
bx
by
iy
iy
jy
j), total
Individual, each can produce 2 about z
Ij4 equation of n th order n.
(17) shape is as (x
ax
ax
ax
ay
iy
jy
ky
l) and (x
ax
bx
cx
dy
iy
iy
iy
i) 8 formulas do not produce about z
Ij4 equation of n th order n. therefore, the tangible as (x of institute
ax
bx
cx
dy
iy
jy
ky
l) 8 formulas can produce about z
Ij4 equation of n th order n add up to:
With each 4 equation of n th order n above the substitution of (II) formula, can get following about variable α
1..., α
r4 equation of n th order n:
With each 4 the formula (α in the equation
iα
jα
kα
l), 3 formula (α
iα
jα
k), 2 formula (α
iα
j) and 1 formula α
iAll regard different new variables as, then ading up to of variable:
So can obtain F
qOn have M
4Individual equation, N
4The linear function group E of individual variable
4
If M
4〉=N
4, then can be by E
4Solve α
1..., α
r, and the separating of the anti-E of release
Otherwise can continue E is carried out the more heavily linearisation of high order.
But along with to heavy the increasing of linearisation number of times of E, gained is about variable α
1..., α
rEquation of higher degree group in variable and equation number also will increase fast.Order is by r variable { α
1, α
2..., α
rDifferent t the product formulas that can constitute
Number be P (r, t).Following theorem is then arranged,
Theorem 2.2:
If to k time of E heavily after the linearisation resulting equation group be E
kE then
kIn each equation all have following form:
With each 1 the formula α in the equation
i, 2 formula (α
iα
j) ..., and k formula
All regard different new variables as.By theorem 2.2, the total N of variable as can be known
kFor about r=n
2The multinomial of-m.And have:
Make E
kThe number of middle equation is M
k, then by the front to M
2, M
3, M
4Calculating M as can be known
kIt is multinomial about n.And when k 〉=3, have:
Especially, when n is big,
Following table has provided n and had got respectively 50,100,150,200 o'clock, partly (M
k, N
k) for given (n, result of calculation r).
Table 1
By the result of calculation of table 1, be not difficult to draw following character:
(1) M
kAbout the n strictly monotone increasing.
(2) N
kAbout r=n
2-m strictly monotone increasing.
(3) for given n and k (k 〉=2), there is r
kAnd as r 〉=r
kThe time, perseverance has: M
k<N
kAnd as r<r
kThe time, perseverance has: M
k〉=N
kAnd r
kIncrease along with the increase of k.R=n again
2So-m is as m≤n
2-r
kThe time, perseverance has M
k<N
kAnd as m>n
2-r
kThe time, perseverance has: M
k〉=N
k.
(4) for given k (k 〉=2), establishing has (M when m≤t * n
k<N
k), then t increases progressively about n.Promptly, make (M along with the increase of n
k<N
k) the value upper bound of the m that satisfies also increasing with respect to n.
Character (3) and (4) can be used to judge whether equation group E can find the solution by heavy linearization technique by k time of introducing previously.For example, as shown in Table 1,
For n=50, as m≤n
2During-2332=168=3.36n, perseverance has: M
3<N
3.
For n=100, as m≤n
2During-9371=629=6.29n, perseverance has: M
3<N
3.
For n=150, as m≤n
2During-21116=1384=9.227n, perseverance has: M
3<N
3.
For n=200, as m≤n
2During-37565=2435=12.175n, perseverance has: M
3<N
3.
Therefore, when n gets 50,100,150,200 respectively, if the number m of equation satisfies respectively among the E:
m≤3.36n、m≤6.29n、m≤9.227n、m≤12.175n
Then perseverance has: (M
2<N
2) ∧ (M
3<N
3).This means can't by secondary and three times heavily linearisation come E is found the solution.
Generally speaking, at F
qLast picked at random has the BMQ equation group E of 2n variable and m equation, if the value of n and m makes (M
k<N
k∧ M
K+1〉=N
K+1) set up, then can't by be no more than k time heavily linearisation find the solution E.
If to E carry out k time heavily after the linearisation resulting equation group be E
k, E then
kThe number of middle equation is at most M
kBut often exist the equation of a large amount of linear correlations in the middle of them.Making wherein, the equation quantity of linear independence is
Even (M is then arranged
k〉=N
k), if but
E
kStill intangibility.
In addition, along with to heavy the increasing of linearisation number of times k of E, equation E
kIn variable number N
kAlso increase fast.Because E
kThe space requirement of coefficient matrix be
Therefore bit works as N
kWhen enough big (〉=2
40), whether no matter (M arranged
k〉=N
k), E on room and time
kEqual intangibility; Promptly can't by k time heavily linearisation find the solution E.
Know again, after n determines, M
iAlso determine thereupon; And N
iThen determine uniquely by r (or m).If can find
Make and work as
The time, perseverance has (M
K-1<N
K-1) and N
kTo such an extent as to enough big E
kIntangibility (k>2) actually.Then have:
(M
2<N
2∧…∧M
k-1<N
k-1)∧(N
k<N
k+1<N
k+2<…)
Therefore work as
The time, for k 〉=2 arbitrarily, can't by direct k time heavily linearisation find the solution E.Yet this fashion can not assert that heavy linearizing method is infeasible to finding the solution E.Though (M is arranged
2<N
2∧ ... ∧ M
K-1<N
K-1), if but can find less r
t=N
t-M
t(2≤t≤k-1) then can be to t heavy resulting equation group E after the linearisation
tReuse general linearization technique again.Be about to E
tIn each variable v
iAll table is r
tIndividual variable
Linear equation:
Then by reconstruct about variable
H 〉=2 equation of n th order n groups come solving equation group E
t, the anti-E's of release separates again.Know again utilize that general linearization technique again constructs about variable
H equation of n th order n group in the variable number be:
So have only as each r
t=N
t-M
tAll make
Enough big (2≤t≤k-1), can assert that just E can't utilize any heavy linearizing method to find the solution.Following theorem is promptly arranged,
Theorem 2.3: picked at random F
qOn have the BMQ equation group E of 2n variable and m equation, if there are k>2 Hes
Make and work as
The time, perseverance has:
Then work as
The time, can't find the solution E by heavy linearizing method.
It should be noted that the front is to N
kAnd M
kThe situation of valuation during not q≤k take into account; And this may be to N
kAnd M
kValuation produce this those long influences that disappear.For example, when q=2, have:
Promptly by shape as (x
ax
by
iy
j) 4 formulas can not only reconstruct about variable α
1..., α
r2 equation of n th order n, can also reconstruct corresponding 3 equation of n th order n.And these 3 equation of n th order n are different from by shape probably as (x
ax
bx
cy
iy
jy
k) 6 formula reconstruct gained.In addition, because
With
So for F
2On the BMQ equation group, M
kAnd N
kComputing formula and the front given will produce deviation.
Can specify suitable lower bound to q for this reason,, can guarantee that then the front is to N such as making q>10
kAnd M
kThe correctness of valuation (2≤k≤10).Below conclusion be putting before this and obtain.
In fact, theorem 2.3 is guarded for the difficulty assessment of the heavy linearization technique of finding the solution BMQ equation group E, because equation group E
kThe equation quantity that neutral line is irrelevant
Can't reach theoretical upper bound M in practice at all
k
By theorem 2.3, for n=50, when r=2332, (M
3<N
3) and N
4=1237553754679 ≈ 1.1255 * 2
40Enough big; But this moment
r
2And r
3Big inadequately.And when r=2445,
r
2And r
3Enough big.Therefore as m≤n
2During-2445=55=1.1n, can't find the solution E by heavy linearizing method.
For n=100, when r=9371, (M
3<N
3) and N
4=321659128415624 ≈ 1.142 * 2
48Enough big, r again
2=19419377 and r
3=5448123 is enough big.So as m≤n
2During-9371=629=6.29n, can't find the solution E by heavy linearizing method.
For n=150, when r=18900, (M
2<N
2) and N
3=1125568744650 ≈ 1.02 * 2
40Enough big, r again
2=53752725 is enough big.So as m≤n
2During-18900=3600=24n, can't find the solution E by heavy linearizing method.
For n=200, when r=28142, (M
2<N
2) and N
3=3715405463639 ≈ 1.69 * 2
41Enough big, but r
2=18295 is big inadequately; And when r=28200, r
2=1652300 is enough big.So as m≤n
2During-28200=11800=59n, can't find the solution E by heavy linearizing method.
Therefore when n gets 50,100,150,200 respectively, if the number m of equation satisfies respectively among the E:
m≤1.1n、m≤6.29n、m≤24n、m≤59n
Then can't find the solution E by heavy linearizing method.
In general, after n determined, m was littler, then the heavily linearisation of BMQ equation group E was found the solution just more infeasible.But because the special construction of BMQ equation group, being not that m is more little finds the solution E with regard to difficult more.This point, is then guessed by a spot of exploration separating of E if m is too small with to find the solution the MQ equation group different probably.M The Representation Equation with E is as follows for this reason:
(p then
1..., p
m) the value space be:
(p again
1..., p
m) value by x * y=(x
1y
1..., x
iy
i..., x
ny
n) unique definite.When x=0 or y=0, x * y=0.Otherwise x * y ≠ 0, and to arbitrarily c ∈ F
q{ 0} has x * y=(cx) * (c
-1Y).So q corresponding to x and y
2nPlant value, x * y has 0 He
The value of kind non-0.And
So have:
Again when n>1,
Therefore have:
As (b
1..., b
m)=0 o'clock, E has (2q at least
n-1) individual shape as (x, 0) and (0, separating y).As (b
1..., b
m) ≠ 0 o'clock, if
Then E does not have and separates; Otherwise E separates (x ≠ 0, y ≠ 0), and to c ∈ F arbitrarily
q{ 0}, (cx, c
-1Y) also be that separating of E (claims (cx, c
-1Y) with (x, y) equivalence).Therefore as (b
1..., b
m) ≠ 0 o'clock, E or nothing are separated, or have separating of (q-1) individual equivalent equivalence at least.
Because (b
1..., b
m)=0 o'clock is easy to E is found the solution.So emphasis is inquired into (b
1..., b
m) ∈ p (E) { during 0}, how E is found the solution.Except above-mentioned heavy linearization technique,, also can sound out E and find the solution by the method for so-called " conjecture " based on the special construction of BMQ equation group.This method is specified among x and the y at random, as will solving another behind it substitution E, then can obtain separating of E.For example, specify x=α=(α
1..., α
n) ≠ 0 then can be about variable y=(y
1..., y
n) the linear function group E ' of n unit:
If E ' separates y=β=(β
1..., β
n), then (x, y)=(α β) is of E and separates, and can derive (q-1) individual separating of equal value with it again by it.If E ' nothing is separated, then proceed to sound out, till finding out the separating of E next time.
As can be known, for given (b
1..., b
m) ∈ p (E) { 0} utilizes conjecture method that E is soundd out the success rate find the solution and is directly proportional with the number of separating of E.When E has that (q-1) is individual to be separated, hit it
If to (b arbitrarily
1..., b
m) ∈ p (E) { 0}, E have just that (q-1) is individual to be separated.Then when n is enough big, can't utilize conjecture method that E is found the solution.
And for { the p of picked at random
1(x, y) ..., p
m(x, y) }, (q of feasible (x ≠ 0, y ≠ 0)
n-1)
2The overwhelming majority who plants value also makes (p
1..., p
m) ≠ 0.So to (b arbitrarily
1..., b
m) ∈ P (E) 0}, the number of on average separating of E is:
When m<2n,
Especially, when m≤n,
The average probability of separating of guesing out E this moment is near a hundred per cent.Can get theorem thus,
Theorem 2.4: picked at random F
qOn have the BMQ equation group E of 2n variable and m 〉=2n equation, if to (b arbitrarily
1..., b
m) ∈ p (E) { 0}, E have just that (q-1) is individual to be separated.Then when n is enough big, can't find the solution E with conjecture method.
By theorem 2.1, theorem 2.3, theorem 2.4; Can get proposition,
Proposition 2.1: picked at random F
qOn have the BMQ equation group E of 2n variable and m equation, if E satisfies:
1) for (b arbitrarily
1..., b
m) ∈ p (E) { 0}, E is at F
qOn have just that (q-1) is individual to be separated
2) there are k>2 Hes
And work as
The time, perseverance has:
3)
It is difficult then finding the solution E.
By proposition 2.1 as can be known, for the F of picked at random
qOn have the BMQ equation group E of 2n variable and m equation, when E satisfies (b arbitrarily
1..., b
m) ∈ p (E) { 0} all just has when (q-1) is individual to be separated; Then the difficulty that E is found the solution is mainly determined by the value of n and m.And F
qSelection only with data computing and the expression relevant, the difficulty of solving a problem is not had influence substantially.Provide definition for this reason,
Definition 2.2: establishing E is at F
qGo up optional BMQ equation group with 2n variable and m equation, and for (b arbitrarily
1..., b
m) ∈ p (E) { 0}, E is at F
qOn have just that (q-1) is individual to be separated.If the value of n and m makes and finds the solution E is difficult, then claim " (n m) does difficult BMQ problem ".
For example, when n gets 50,100,150,200 respectively, do difficult BMQ problem (n, m) value is as shown in table 2.
Table 2
2.4 Ergodic Matrices and character thereof
Definition 2.3 (Ergodic Matrices): establish
If column vector to any non-0
Just get time
In all non-0 column vectors, claim that then A is F
qOn " Ergodic Matrices (Ergodic Matrix) ".
Definition 2.4: establish
The matrix multiplication spanning set of note A is:<A 〉={ A
k| k=1,2,3 ....
About finite field F
qOn (traversal) matrix, following main theorem (proof slightly) is arranged:
Theorem 2.5: to arbitrarily
K ∈ 0,1,2 ...; There is c
0, c
1..., c
N-1∈ F
q, make:
A
k=c
0I+c
1A+c
2A
2+...+c
n-1A
n-1
Theorem 2.6: if
Nonsingular, then A under matrix multiplication the cycle≤(q
n-1).
Theorem 2.7:
For Ergodic Matrices and if only if A under matrix multiplication the cycle=(q
n-1).
Theorem 2.8: if
Be Ergodic Matrices, then<A in just have
Individual Ergodic Matrices.Claim their " equivalences " each other.
Theorem 2.9: if
Be Ergodic Matrices, then vectorial to any non-0 row
Just get time
In all non-0 row vectors.
Theorem 2.10: if
Be Ergodic Matrices, then
And F
q[A] makes a q just under addition of matrices and multiplication
nUnit's finite field.
Theorem 2.11: if
Be Ergodic Matrices, then [A
0=I, A, A
2..., A
N-1] make q just
nThe finite field F of unit
q[A] is about the finite field F of q unit
qOne group of base.Promptly right
There is unique c
0, c
1..., c
N-1∈ F
q, make:
m=c
0I+c
1A+c
2A
2+...+c
n-1A
n-1
By the conclusion of front as can be known, the Ergodic Matrices on the finite field has maximum multiplication cycle and spanning set in the same order nonsingular matrix.And the non-zero column vector of all power premultiplications or the right side with Ergodic Matrices take advantage of the result of a capable vector of non-zero fully to disperse (getting just all over all capable vectors of non-zero column vector sum).Table 3 has provided the statistics of the n * n Ergodic Matrices on the part finite field.
Table 3
Can find F from top statistics
qOn n * n Ergodic Matrices be ubiquitous, and its number increases sharply along with the increase of q and n.
For principle of the present invention being described special introduce " MPEMRL problem ".I.e. so-called " the bilateral power of Ergodic Matrices is taken advantage of problem (Multiplied by the Powers of the Ergodic Matrices on the Right and Left.) on the finite field ".It is defined as follows:
Definition 2.5 (MPEMRL problems):
Be Ergodic Matrices,
Known (Q
1, M, Q
2, T), ask
With
At first proof is found the solution the MPEMRL problem and be can be exchanged into and find the solution corresponding F
qOn the BMQ problem.By
Be Ergodic Matrices, as can be known F
q[Q
1] and F
q[Q
2] under addition of matrices and multiplication, all make q
nUnit's finite field.
Select F arbitrarily
q[Q
1] and F
q[Q
2] about F
qOne group of base
With
Then exist unique
Make:
Promptly have:
With n * n matrix T and each
All turn to n by line linearity
2Dimensional vector
With
Can get F
qOn have 2n variable x
1..., x
n, y
1..., y
nBMQ equation group with m equation:
Wherein
Be coefficient matrix
Order.Note is top by Q
1, M, Q
2, BMQ equation group that T derived is E (Q
1, M, Q
2, T).
Because the addition of matrix and number are taken advantage of with the addition and the number of vector and are taken advantage of indistinction in itself, so also can be with n * n set of matrices<Q
1〉 * M *<Q
2And B
1* M * B
2All regard n as
2The dimensional vector group, and have:
Obviously, E (Q
1, M, Q
2, T) can separate then corresponding M PEMRL problem and necessarily can separate.Work as m=n
2The time,
Full rank is easily tried to achieve E (Q
1, M, Q
2, separating T)
And then can get separating of MPEMRL problem:
As m<n
2The time, if (n m) does not do difficult BMQ problem, then still can be by the group E (Q that solves an equation
1, M, Q
2, T) find the solution corresponding M PEMRL problem.Otherwise can't pass through equation group E (Q
1, M, Q
2, T) find the solution corresponding M PEMRL problem.
Therefore for given MPEMRL problem, can it pass through BMQ equation group E (Q
1, M, Q
2, the key of T) finding the solution is mainly by Rank (<Q
1〉 * M *<Q
2) decision.And about Rank (<Q
1〉 * M *<Q
2) following theorem arranged,
Theorem 2.12: if
Be Ergodic Matrices, then to arbitrarily
Perseverance has:
Rank(<Q
1>×M×<Q
2>)=k×n (1≤k≤n)
Found through experiments, for selected arbitrarily Ergodic Matrices
Allow M all over getting
In all non-null matrix, then Rank (<Q
1〉 * M *<Q
2) all over get n, 2n ..., n
2.Table 4 is the statisticses to the part finite field.
Also find by further experiment, in the table 4 about Rank (<Q
1〉 * M *<Q
2) distributed number and Q
1And Q
2Selection irrelevant, but by n and F
qDetermine uniquely.Therefrom be not difficult to find out following rule:
1. for Ergodic Matrices
With k ∈ 1 ..., n} exists
Make:
Rank(<Q
1>×M×<Q
2>)=k×n
2. for Ergodic Matrices
Make Rank (<Q
1〉 * M *<Q
2)=quantity of the matrix M of k * n increases progressively with q, n, k.
3. for Ergodic Matrices
Make Rank (<Q
1〉 * M *<Q
2)=quantity of the matrix M of n just is n * (q
n-1).
Table 4
Because the MPEMRL problem quite made every effort to the amount of calculation of separating and |<Q
1〉 * M *<Q
2| closely related.And to arbitrarily
With a ∈ F
q0}, perseverance has:
Therefore to T ∈<Q arbitrarily
1〉 * M *<Q
2, have (a at least
1, b
1) ..., (a
Q-1, b
Q-1) ∈ 1 ..., q
n-1}
2, make:
Again |<Q
1|=|<Q
2|=(q
n-1), so set<Q
1〉 * M *<Q
2In the number of different matrixes satisfy:
Further also can demonstrate,prove following theorem:
Theorem 2.13:
Be Ergodic Matrices,
Then and if only if Rank (<Q
1〉 * M *<Q
2)=have during n |<Q
1〉 * M *<Q
2|=(q
n-1); Also have<Q this moment
1〉 * M *<Q
2The Q of 〉=<
1〉 * M=M *<Q
2.
Theorem 2.14: for getting fixed Ergodic Matrices arbitrarily
With
There is positive integer t, makes T ∈<Q arbitrarily
1〉 * M *<Q
2, (a is just arranged
1, b
1) ..., (a
t, b
t) ∈ 1 ..., q
n-1}
2, make:
Theorem 2.15: for Ergodic Matrices
Allow M all over getting
Then |<Q
1〉 * M *<Q
2| all over getting
{ d wherein
1=1 ..., d
k=n} is all positive factors of n.
Definition 2.6: establish
Be Ergodic Matrices,
M=Rank (<Q
1〉 * M *<Q
2).If (n m) does difficult BMQ problem, claims that then " M is about (Q
1, Q
2) strong ".And note: M
S(Q
1, Q
2)={, A|A was about (Q
1, Q
2) strong
" strong matrix " about Ergodic Matrices has following theorem,
Theorem 2.16: establish
Be Ergodic Matrices,
If there is B ∈ M
S(Q
1, Q
2), make:
Rank(<Q
1>×A×<Q
2>)=Rank(<Q
1>×B×<Q
2>)
A ∈ M then
S(Q
1, Q
2).
Theorem 2.17: establish
Be Ergodic Matrices,
With
Be respectively with Q
1And Q
2Ergodic Matrices (a, b and q of equal value
n-1 is coprime), then have:
Theorem 2.18: establish
Be Ergodic Matrices, A ∈ M
S(Q
1, Q
2), then have:
(1) to x ∈<Q
1〉 * A *<Q
2, have: x ∈ M
S(Q
1, Q
2)
(2) to x, y ∈<Q
1〉 * A *<Q
2, if Rank is (<Q
1〉 * (x+y) *<Q
2) 〉=2n, then (x+y) ∈ M
S(Q
1, Q
2)
Theorem 2.18 explanations are for Ergodic Matrices
If can find one about (Q
1, Q
2) strong matrix, then can obtain a plurality of by it about (Q
1, Q
2) strong matrix.By theorem 2.14 and theorem 2.15, can get theorem again:
Theorem 2.19: if
Be Ergodic Matrices, then fixed to getting arbitrarily
A positive factor e who all has n, and to T ∈<Q arbitrarily
1〉 * M *<Q
2, BMQ equation group E (Q
1, M, Q
2, (q T) is just arranged
e-1) individual separating.Claim that positive integer e is " (Q
1, Q
2) about the index of M ", and note is: Exp (Q
1, M, Q
2).
Also find by experiment, for any given Ergodic Matrices
Most
All satisfy Exp (Q
1, M, Q
2)=1.If M ∈ is M
S(Q
1, Q
2) and Exp (Q
1, M, Q
2)=1 is then by proposition 2.1, as can be known to T ∈<Q arbitrarily
1〉 * M *<Q
2, find the solution BMQ equation group E (Q
1, M, Q
2, be difficult T).But also do not mean that corresponding M PEMRL problem intangibility this moment.Although can't be by the group E (Q that solves an equation
1, M, Q
2, T) find the solution it, but it is as follows to find the solution the another kind of method of MPEMRL problem by the character of Ergodic Matrices:
Selected at first arbitrarily F
q[Q
1] and F
q[Q
2] about F
qOne group of base
With
Then exist unique
Make:
Again by
Promptly have
Can get equation group thus:
Note is top by Q
1, M, Q
2, 2n that T derived unit linear function group is
Then
Must separate.And at Q
1, M, Q
2, T is under the known condition, be easy to obtain
Separate.
Order
Be
Separate.Then can release or (x, y)=(0,0), or (x ≠ 0, y ≠ 0).Though (x y)=(0,0) is
One separate, but it is not legal separating as can be known by T ≠ 0.So
Untrivialo solution must be arranged, and the quantity of untrivialo solution is (q
k-1).Wherein:
Appoint and get
Untrivialo solution
Can get
With
Right again
Invert and to get
And
Separate for one that is corresponding MPEMRL problem.
Right
Each untrivialo solution all carry out above-mentioned process, then can draw whole (q of corresponding MPEMRL problem
k-1) individual separating.Especially, if k=1, then corresponding MPEMRL problem just has separating of (q-1) individual equivalent equivalence.Promptly separate for its any two
With
Can both find a ∈ F
q0}, and
A demand went out of corresponding MPEMRL problem and separated and just can release its all separating this moment.Easily the theorem below the card is set up,
Theorem 2.20: establish
Be Ergodic Matrices,
Then have:
Theorem 2.21: establish
Be Ergodic Matrices,
E=Exp (Q
1, M, Q
2).Then to T ∈<Q arbitrarily
1〉 * M *<Q
2, equation group E (Q
1, M, Q
2, (q T) is just arranged
e-1) individual separating.
Theorem 2.22: establish
Be Ergodic Matrices,
E=Exp (Q
1, M, Q
2).Then to T ∈<Q arbitrarily
1〉 * M *<Q
2, equation group
(q is just arranged
e-1) individual untrivialo solution and a null solution.
Theorem 2.23: establish
Be Ergodic Matrices, M ∈ M
S(Q
1, Q
2), if Exp is (Q
1, M, Q
2)=1 is then to T ∈<Q arbitrarily
1〉 * M *<Q
2, find the solution BMQ equation group E (Q
1, M, Q
2, be difficult T).
Theorem 2.24: establish
Be Ergodic Matrices,
And Exp (Q
1, M, Q
2)=1.Then to T ∈<Q arbitrarily
1〉 * M *<Q
2, at known Q
1, Q
2, M, T situation under, can be by the solving equation group
Obtain the separating of whole (q-1) individual equivalent equivalences of corresponding MPEMRL problem fast.
Can obtain an important conclusion thus.That is exactly to work as q
nWhen enough big, for given Ergodic Matrices
With M ∈ M
S(Q
1, Q
2), if Exp is (Q
1, M, Q
2)=1 is then to optional
By BMQ equation group E (Q
1, M, Q
2, T) find the solution
Be difficult; But at known Q
1, Q
2, M, T situation under, by equation group
Find the solution
But be easy.
This point is vital, and the core concept of public key cryptography proposed by the invention derives from this just.Its main thought is with BMQ equation group E (Q
1, M, Q
2, T) as public-key cryptography, and with Q
1, Q
2, B
1, B
2, M is as private cipher key.The sender of the message selects message at random
And it is right with the PKI of message recipient
Calculate (encryption) and get ciphertext
Then ciphertext T is passed to the recipient; The recipient utilizes its private key reconstruct equation group
And by finding the solution of its being restored expressly
So far, background technology involved in the present invention and mathematical knowledge have been explained and have been finished, and are particular content of the present invention and execution mode below.
(3) summary of the invention
The technical issues that need to address of the present invention are to work out a kind of new public key cryptography scheme, and make it to have higher security intensity than the public key cryptography of current extensive employing.
The present invention is used for the encryption and decryption of various data such as character, literal, figure, image and the sound of computer and communication network and file, kept secure and transmission to guarantee data, file content can be widely used in ecommerce, electronic banking and the E-Government.
The present invention wishes that our country can have the core technology of oneself in the public key encryption field, to guarantee information security, economic security and the safety with sovereign right of country, improves the technological means that finance and tax swindle are taken precautions against by China simultaneously.
The present invention is a kind of public key cryptography scheme based on Ergodic Matrices on the Hidden field, according to this method, can make public key encryption/deciphering chip, can develop public key encryption/decryption software etc.Therefore, the present invention is a kind of production public key encryption deciphering product mandatory basic principle of institute and technical scheme, rather than physical product itself.
The given public key cryptography technology scheme of the present invention generates, encrypts, deciphers three parts by key and forms.Herein, file before encrypting or data are called expressly, file or data after encrypting are called ciphertext.
Suppose that user A desire sends a file or data by network to user B, and carry out in the mode of maintaining secrecy.User A and user B desire realize so secure communication process, and its pattern is as follows:
Key generates: at first, user B should go to the 3rd side authoritative institution (CA or digital certificate center) to get a pair of private key (Private Key) and PKI (Public Key) by the output of key generation parts, and private key must must not be divulged a secret by user B oneself keeping; PKI then allows openly to provide to the external world with disclosed form, so that use.
Cryptographic operation: user A obtains the PKI of user B, and the plaintext that on the machine of operation encryption unit desire is sent is encrypted, and obtains ciphertext, and by network ciphertext is sent to user B.
Decryption oprerations: after user B receives the ciphertext that user A sends, on the machine of operation deciphering parts, ciphertext is decrypted, recovers plaintext with own private key.
In key encrypt method, for the efficient of encryption is provided.Usually adopt the mixed cipher technology, promptly come encrypting plaintext, come encrypted symmetric key with public-key cryptosystem again with DSE arithmetic.Employed encryption key of DSE arithmetic and decruption key are same key in essence, are called as session key.
3.1 technical scheme one of the present invention
First technical scheme of the present invention generates, encrypts, deciphers three parts by key and constitutes.Specific as follows:
3.1.1 key generating portion
The key generating portion is used for CA, is used for to each user produces a pair of private key and PKI, and its implementation is as follows:
(1) picked at random F
qOn two n * n Ergodic Matrices
(q>10 and q
nEnough big)
(2) picked at random is about (Q
1, Q
2) strong matrix M ∈ M
S(Q
1, Q
2), require Exp (Q simultaneously
1, M, Q
2)=1.
(3) picked at random F
q[Q
1] and F
q[Q
2] about F
qOne group of base
With
(4) picked at random
The m n-dimensional subspace n
About F
qOne group of base [R
1..., R
m].
(wherein: m=Rank (<Q
1〉 * M *<Q
2))
(5) obtain
Each row vector is about base [R
1..., R
m] coordinates matrix
It is right to make
K the vectorial r of row
k, have:
r
k=λ
k,1R
1+λ
k,2R
2+…+λ
k,mR
m (1≤k≤n
2)
(6) by [R
1..., R
m] m F of generation
qOn BMQ multinomial { ρ
1(x, y) ..., ρ
m(x, y) }:
At last, with (F
q, [ρ
1(x, y) ..., ρ
m(x, y)]) be PKI, with (Q
1, Q
2, M, B
1, B
2, λ) be private key.
3.1.2 encryption section
Encryption section uses for information sender, is used for to expressly encrypting.Information sender and recipient at first determine a kind of general symmetric encipherment algorithm E, and clear packets M is carried out following steps:
(1) obtains recipient's PKI (F
q, [ρ
1(x, y) ..., ρ
m(x, y)])
(2) select at random
Session key:
(3) with recipient's PKI key is encrypted:
C
key=[z
1,…,z
m]=[ρ
1(α,β),…,ρ
m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C
M=E
key(M)
(5) with ciphertext (C
Key, C
M) send to the recipient
3.1.3 decryption portion
Decryption portion is used for the receiving party, is used for ciphertext is decrypted.The recipient with oneself private key as decruption key.
If recipient's private key is (Q
1, Q
2, M, B
1, B
2, λ), the ciphertext of receiving is (C
Key, C
M).Then decrypting process is as follows:
(1) calculates
Can get matrix T ∈<Q
1〉 * M *<Q
2
(2) solve one group of untrivialo solution of following 2n unit linear function group:
(3) by y ' calculating:
(4) obtain the inverse matrix A of A
-1∈<Q
2
(5) calculate A
-1About basic B
2Coordinate
(6) then (x, y) with (α, β) equivalence, reducible thus session key:
key=x×y=(x
1y
1,…,x
1y
n,…,x
ny
1,…,x
ny
n)=α×β
(7) utilize session key key to ciphertext C
MDeciphering obtains expressly:
M=D
key(C
M)
At last, the recipient recovers the plaintext M of transmit leg.
3.2 technical scheme two of the present invention
Second technical scheme of the present invention generates, encrypts, deciphers three parts by key and constitute.Specific as follows:
3.2.1 key generating portion
The key generating portion is used for CA, is used for to each user produces a pair of private key and PKI, and its implementation is as follows:
(1) picked at random F
qOn two n * n Ergodic Matrices
(q>10 and q
nEnough big)
(2) picked at random is about (Q
1, Q
2) strong matrix M ∈ M
S(Q
1, Q
2), require Exp (Q simultaneously
1, M, Q
2)=1.
(3) picked at random F
qOn two n * n nonsingular matrix
(4) calculate F
q[Q
1] and F
q[Q
2] about F
qOne group of base
With
Make:
(5) picked at random
The m n-dimensional subspace n
About F
qOne group of base [R
1..., R
m].
(wherein: m=Rank (<Q
1〉 * M *<Q
2))
(6) obtain
Each row vector is about base [R
1..., R
m] coordinates matrix
It is right to make
K the vectorial r of row
k, have:
r
k=λ
k,1R
1+λ
k,2R
2+…+λ
k,mR
m (1≤k≤n
2)
(7) by [R
1..., R
m] m F of generation
qOn BMQ multinomial { ρ
1(x, y) ..., ρ
m(x, y) }:
(8) at last with (F
q, [ρ
1(x, y) ..., ρ
m(x, y)]) be PKI, with (Q
1, Q
2, M, s
-1, t
-1, λ) be private key.
3.2.2 encryption section
Encryption section uses for information sender, is used for to expressly encrypting.Information sender and recipient at first determine a kind of general symmetric encipherment algorithm E, and clear packets M is carried out following steps:
(1) obtains recipient's PKI (F
q, [ρ
1(x, y) ..., ρ
m(x, y)])
(2) select at random
Session key:
(3) with recipient's PKI key is encrypted:
C
key=[z
1,…,z
m]=[ρ
1(α,β),…,ρ
m(α,β)]
(4) with session key key and symmetric encipherment algorithm E plaintext M is encrypted:
C
M=E
key(M)
(C at last
Key, C
M) be ciphertext, will be sent to the recipient.
3.2.3 decryption portion
Decryption portion is used for the receiving party, is used for ciphertext is decrypted.The recipient with oneself private key as decruption key.
If recipient's private key is (Q
1, Q
2, M, s
-1, t
-1, λ), the ciphertext of receiving is (C
Key, C
M).Then decrypting process is as follows:
(1) calculates
Can get matrix T ∈<Q
1〉 * M *<Q
2
(2) solve one group of untrivialo solution of following 2n unit linear function group:
(3) by y ' calculating:
(4) obtain the inverse matrix A of A
-1∈<Q
2
(5) calculate A
-1About base
Coordinate
(6) calculate
(7) then (α ', β ') with (α, β) equivalence, reducible thus session key:
key=α′×β′=(α′
1β′
1,…,α′
1β′
n,…,α′
nβ′
1,…,α′
nβ′
n)=α×β
(8) utilize session key key to ciphertext C
MDeciphering obtains expressly:
M=D
key(C
M)
At last, the recipient recovers the plaintext M of transmit leg.
3.3 advantage and good effect
Compare with public key cryptography scheme commonly used at present, the given public key cryptography technology scheme of the present invention has following advantage.
3.3.1 fail safe is higher
Can prove the BMQ problem be NP completely.So it is more difficult than big integer factor decomposition and discrete logarithm problem.Therefore, deriving private key or decode expressly from ciphertext from PKI is infeasible in polynomial time.
Moreover public key cryptography commonly used at present all faces the threat of quantum calculation.And do not have effective quantum algorithm for np complete problem.Therefore the present invention can be used as a replacement scheme of existing public key cryptography, thereby has long-range application potential.
3.3.2 key space is big
Work as q
nWhen enough big, because
In Ergodic Matrices and about given Ergodic Matrices to (Q
1, Q
2) the quantity of strong matrix heavy many, so (private key, PKI) in the given technical scheme of the present invention right selection space is very big.
3.3.3 the randomness of PKI is good
The pairing F of PKI in the given technical scheme of the present invention
qOn BMQ multi-direction type group [ρ
1..., ρ
m], be by n
2Dimension row vector space
A specific m n-dimensional subspace n about F
qOne group of base [R
1..., R
m] unique definite.
And
The quantity of m n-dimensional subspace n V be:
For specific m n-dimensional subspace n V, V is about F
qThe quantity of base (greatly linearly independent vector group) be:
(q
m-1)(q
m-q)(q
m-q
2)…(q
m-q
m-1)
So PKI [ρ
1..., ρ
m] selection randomness very big.
3.3.4 fast operation
The enciphering rate of this key encrypt method is fast.Because it only relates to F
qIn simply add/multiplication, and do not relate to any power exponentiation.
The deciphering speed of this key encrypt method is fast simultaneously.Because it only relates to F
qIn simple matrix add/multiplication conciliates the linear function group operation of 2n unit, and do not relate to any matrix power exponentiation.Thereby be convenient to hardware and realize.
3.3.5 technology can disclose
Realization technology of the present invention can disclose fully, and user's PKI also can openly be provided to the external world with the form of digital certificate.As long as private key is not divulged a secret, just can guarantee the safety of ciphertext fully.
3.3.6 it is favourable to national security
The Internet is a kind of open net, and is apparent, transmits sensitive information in the above and must encrypt.Because internet usage is as means of communication for important departments such as the Chinese government, national defence, finance, the tax, therefore, information security is related to national sovereignty safety and economic security.
Therefore, to have a key encrypt method of independent intellectual property right, original innovation significant in research.