CN103312498B - A kind of public key cryptography method of anti-quantum calculation - Google Patents

A kind of public key cryptography method of anti-quantum calculation Download PDF

Info

Publication number
CN103312498B
CN103312498B CN201310247666.2A CN201310247666A CN103312498B CN 103312498 B CN103312498 B CN 103312498B CN 201310247666 A CN201310247666 A CN 201310247666A CN 103312498 B CN103312498 B CN 103312498B
Authority
CN
China
Prior art keywords
matrix
quantum
dimension
public key
modq
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310247666.2A
Other languages
Chinese (zh)
Other versions
CN103312498A (en
Inventor
张焕国
吴万青
王后珍
毛少武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201310247666.2A priority Critical patent/CN103312498B/en
Publication of CN103312498A publication Critical patent/CN103312498A/en
Application granted granted Critical
Publication of CN103312498B publication Critical patent/CN103312498B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Complex Calculations (AREA)

Abstract

The present invention relates to field of information security technology, is a kind of public key cryptography method of anti-quantum calculation.The present invention sets up the difficult problem under a quantum computation environment, and establishes a kind of Public Key Crypto Scheme on this basis.Because this cryptographic system only comprises the basic operation such as addition and multiplication, have under quantum environment implementation efficiency high, existing cryptographic attack can be resisted, there is quantum computation environment under the advantage such as fail safe.This cryptographic system also can use under electronic computer environment, but calculation cost is larger.Method provided by the invention can be widely used in the information safety system such as network security, ecommerce field.

Description

A kind of public key cryptography method of anti-quantum calculation
Technical field
The present invention relates to field of information security technology, is a kind of public-key cryptographic keys method of anti-quantum calculation.
Background technology
Quantum computer concept takes graceful proposition by Richard the earliest, has attracted the interest of a large amount of scholar.Through development after a while, achieve a lot of achievements.1985, Deutsch proposed designing a model of first quantum computer, gave the definition of quantum turing machine.Within 1994, Shor proposes the Shor quantum algorithm of big integer Factorization.Its complexity is polynomial time.Shor algorithm is also in continuous development in recent years, expands to hiding subgroup problem generally by Quantum fourier transform.Can stipulations no longer safe to the public key cryptography system hiding subgroup problem, such as RSA, EIGamal and ECC.If quantum computer becomes a reality, existing password is all no longer safe.Within 1996, Grover proposes a kind of general quantum search algorithm.The length of crypt algorithm keys is reduced to half by it.But do not form essence to existing password to threaten.
Similar with classical public key cryptography, if in two keys one can disclose, and by public-key cryptography obtain private key be difficulty or impossible, this quantum cryptography is called quantum public key cryptography.Quantum public key algorithm must can resist the attack with quantum calculation capabilities.There are two class algorithms in quantum public key system, there is the quantum public key algorithm of unconditional security and there is the quantum public key algorithm of computationally secure.It is pointed out that computationally secure in quantum cryptography is for quantum calculation complexity.
Due to the concurrency of quantum calculation, make the double linear problems of difficulty for solving in traditional counting can be partially converted into solvable problem by quantum calculation.The article of the people such as D.Deutsch in 1992 points out that the computing capability of quantum turing machine is stronger than the computing capability of classic computer.But the limit of the computing capability of quantum turing machine is still a challenging problem.Can not time O (2 again for the quantum turing machine NP class problem with oracle n/2) in solve.
Existing quantum public key cryptography comprises as follows: 1, Quantum Error Correcting Codes.Quantum Error Correcting Codes is independently proposed nineteen ninety-five and 1996 respectively by P.Shor and A.M.Steane.Basic thought and classical error correction code similar.2, based on can not the quantum public key algorithm of cloning theorem.This is a kind of public key algorithm depending on quantum memory.Because quantum memory is difficult to realize technically, this algorithm depends on the realization of quantum computer.But quantum switching technology can be utilized to realize.3, at present quantum calculation is still to the cryptosystem of difficult problem design based on some.For example Japanese scholars proposes a quantum public key algorithm based on the subset sum problem on ring.Based on the NTRU public-key cryptosystem etc. of lattice difficult problem.
At present, the public key cryptography of anti-quantum calculation mainly comprises following several form: the novel cipher 1, adopting the non-difficult math question such as quantum cryptography, DNA password; 2, the password that the mathematical problem being bad to calculate based on quantum calculation builds.Comprise Solving Nonlinear Systems of Equations, difficult problem on lattice, the NPC problems such as knapsack problem, there is no effective quantum algorithm at present.
Summary of the invention
For the technical problem of above-mentioned existence, a kind of public key cryptography method proposing anti-quantum calculation of the present invention.
The technical solution adopted in the present invention is: a kind of public key cryptography method of anti-quantum calculation, is characterized in that, the method for its specific implementation is as follows:
(I) system is set up:
(1) confinement F is provided with supper n 2dimension matrix A, the valued space of B, M, φ is respectively [0, l], [0, l 1] [0, l 2], [0, l 3], wherein l, l 1, l 2, l 3it is positive integer; Determine l, l 1, l 3value and maintain secrecy, determine l simultaneously 2value and open;
(2) two Big prime p, q, p < q is selected to meet a dominating set pll 1l 2+ l 3l 2+ pl 2l 2l 3< ql 2≤ p; Open Big prime p, q;
(3) at finite field F stake up an official post and get matrix A, by calculate F p, according to calculate F q, matrix A is maintained secrecy; Require matrix F simultaneously pthe value of each element be not less than if a, x are matrix A respectively, F qthe element of correspondence position and ax=1 (modq); If a number y is then again looked for make so using y as F pelement export; Wherein matrix I is all 1's matrix, and mod represents modular arithmetic, and max represents the maximum of set;
(4) at finite field F stake up an official post and get matrix B, calculate n 2dimension matrix require matrix matrix h is open;
System parameters is (n, p, q, l 2), PKI is h; Private key is (l, l 1, l 3) and A;
Wherein: finite field F supper n 2dimension matrix A=(a ij) n × n, B=(b ij) n × n, wherein s is positive integer.Loop product operation definition is
(II) ciphering process:
For given plaintext M, Stochastic choice n in span 2the random matrix φ of dimension, utilizes PKI h to calculate ciphertext C = M &CircleTimes; ( h + p&phi; ) ( mod q ) ;
(III) decrypting process:
(1) calculate
(2) C is calculated 2=C 1(modp);
(3) from n 4dimension Matrix C 2in to choose footmark be (1,1), (1, n+2), (1,2n+4) ..., (1, n 2), (n+2,1), (n+2, n+2), (n+2,2n+4) ..., (n+2, n 2), (n 2, 1), (n 2, n+2) ..., (n 2, n 2) element composition n 2dimension matrix wherein footmark (i, j) represents n 4dimension Matrix C 2in the i-th row and jth row intersect element, 1≤i≤n, 1≤j≤n;
(4) calculate expressly
The present invention, relative to prior art, has the following advantages and good effect:
(1) the present invention is the quantum public key cryptography of computationally secure under a kind of quantum environment.Its fail safe performance is mainly based on the quantum calculation difficult problem of structure.Existing quantum algorithm can be resisted attack.In addition, computing of the present invention only containing basic computing, therefore can realize on electronic computer.Although the calculation cost of electronic computer is larger;
(2) the present invention is a kind of quantum key system efficiently, and its computing is mainly the multiplying in finite field.Due to the concurrency of quantum calculation, make the efficiency of calculating higher.
Embodiment
Below in conjunction with specific embodiment, the present invention is described further.
The technical solution adopted in the present invention is: a kind of public key cryptography method of anti-quantum calculation, and the method for its specific implementation is as follows:
(I) system is set up:
(1) confinement F is provided with supper n 2dimension matrix A, the valued space of B, M, φ is respectively [0, l], [0, l 1], [0, l 2] [0, l 3], wherein l, l 1, l 2, l 3it is positive integer; Determine l, l 1, l 3value and maintain secrecy, determine l simultaneously 2value and open;
(2) two Big prime p, q, p < q is selected to meet a dominating set pll 1l 2+ l 3l 2+ pl 2l 2l 3< ql 2≤ p; Open Big prime p, q;
(3) at finite field F stake up an official post and get matrix A, by calculate F p, according to calculate F q, matrix A is maintained secrecy; Require matrix F simultaneously pthe value of each element be not less than if a, x are matrix A respectively, F qthe element of correspondence position and ax=1 (modq); If a number y is then again looked for make so using y as F pelement export; Wherein matrix I is all 1's matrix, and mod represents modular arithmetic, and max represents the maximum of set;
(4) at finite field F stake up an official post and get matrix B, calculate n 2dimension matrix require matrix matrix h is open;
System parameters is (n, p, q, l 2), PKI is h; Private key is (l, l 1, l 3) and A;
Wherein: finite field F supper n 2dimension matrix A=(a ij) n × n, B=(b ij) n × n, wherein s is positive integer.Loop product operation definition is
(II) ciphering process:
For given plaintext M, Stochastic choice n in span 2the random matrix φ of dimension, utilizes PKI h to calculate ciphertext C = M &CircleTimes; ( h + p&phi; ) ( mod q ) ;
(III) decrypting process:
(1) calculate
(2) C is calculated 2=C 1(modp);
(3) from n 4dimension Matrix C 2in to choose footmark be (1,1), (1, n+2), (1,2n+4) ..., (1, n 2), (n+2,1), (n+2, n+2), (n+2,2n+4) ..., (n+2, n 2), (n 2, 1), (n 2, n+2) ..., (n 2, n 2) element composition n 2dimension matrix wherein footmark (i, j) represents n 4dimension Matrix C 2in the i-th row and jth row intersect element, 1≤i≤n, 1≤j≤n;
(4) calculate expressly
It is below a specific embodiment of this method.
(I) system is set up:
System parameters is (n, p, q, l 2), wherein n=2, p=5, q=1857, l 2=4.PKI is matrix h = 11 21 933 472 ( mod 1857 ) , Private key is parameter (l, l 1, l 3) and matrix A.Wherein l=l 1=l 3=4, matrix A = 1 1 2 4 .
If appoint and get matrix B = 2 4 1 3 . Calculate F q = 1858 1858 929 1393 , F p = 1 1 3 4 . Wherein F qspan be [372, ∝).
(II) ciphering process:
Stochastic choice matrix &phi; = 2 1 1 3 , Given plaintext M = 2 1 2 3 . Calculating ciphertext obtains C = 42 52 21 26 19 974 938 487 42 52 63 78 19 974 957 1461 ( mod 1857 ) .
(III) decrypting process:
The first step: calculate
Second step: calculate C 2 = C 1 ( mod p ) = 2 2 1 1 3 4 4 1 4 4 2 2 1 4 3 2 ( mod 5 ) ;
3rd step: choosing coordinate is (1,1), (Isosorbide-5-Nitrae), and (4,1), the matrix element of (4,4) obtains matrix
4th step: calculate
The content that this specification is not described in detail belongs to the known prior art of those skilled in the art.
The above embodiment is only that protection scope of the present invention is not limited thereto in order to absolutely prove the preferred embodiment that the present invention lifts.The equivalent alternative or conversion that those skilled in the art do on basis of the present invention, all within protection scope of the present invention.Protection scope of the present invention is as the criterion with claims.

Claims (1)

1. a public key cryptography method for anti-quantum calculation, is characterized in that, the method for its specific implementation is as follows:
(I) system is set up:
(1) confinement F is provided with supper n 2dimension matrix A, the valued space of B, M, φ is respectively [0, l], [0, l 1], [0, l 2], [0, l 3], wherein l, l 1, l 2, l 3it is positive integer; Determine l, l 1, l 3value and maintain secrecy, determine l simultaneously 2value and open;
(2) two Big prime p, q, p < q is selected to meet a dominating set pll 1l 2+ l 3l 2+ pl 2l 2l 3< ql 2≤ p; Open Big prime p, q;
(3) at finite field F stake up an official post and get matrix A, by F p⊙ A=I (modp) calculates F p, according to A ⊙ F q=I (modq) calculates F q, matrix A is maintained secrecy; Require matrix F simultaneously pthe value of each element be not less than if a, x are matrix A respectively, F qthe element of correspondence position and ax=1 (modq); If a number y is then again looked for make so using y as F pelement export; Wherein matrix I is all 1's matrix, and mod represents modular arithmetic, and max represents the maximum of set;
(4) at finite field F stake up an official post and get matrix B, calculate n 2dimension matrix h=pF q⊙ B+A (modq), A (⊙) h=pB+A ⊙ A (modq); Require matrix pF q⊙ B+A (modq) ≠ pF q⊙ B+A; Matrix h is open;
System parameters be (n, q, l 2), PKI is h; Private key is (l, l 1, l 3) and A;
Wherein: finite field F supper n 2dimension matrix A=(a ij) n × n, B=(b ij) n × n, wherein s is positive integer; Loop product ⊙ operation definition is
A⊙B=(a ijb ij)n×n;
(II) ciphering process:
For given plaintext M, Stochastic choice n in span 2the random matrix φ of dimension, utilizes PKI h to calculate ciphertext C = M &CircleTimes; ( h + p &phi; ) ( mod q ) ;
(III) decrypting process:
(1) calculate
(2) C is calculated 2=C 1(modp);
(3) from n 4dimension Matrix C 2in to choose footmark be (1,1), (1, n+2), (1,2n+4) ..., (1, n 2), (n+2,1), (n+2, n+2), (n+2,2n+4) ..., (n+2, n 2), (n 2, 1), (n 2, n+2) ..., (n 2, n 2) element composition n 2dimension Matrix C 3=A ⊙ A ⊙ A ⊙ M (modp), wherein Matrix C 3footmark (i, j) represents n 4dimension Matrix C 2in the i-th row and jth row intersect element, 1≤i≤n, 1≤j≤n;
(4) plaintext M=C is calculated 3⊙ F p⊙ F p⊙ F p(modp).
CN201310247666.2A 2013-06-20 2013-06-20 A kind of public key cryptography method of anti-quantum calculation Expired - Fee Related CN103312498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310247666.2A CN103312498B (en) 2013-06-20 2013-06-20 A kind of public key cryptography method of anti-quantum calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310247666.2A CN103312498B (en) 2013-06-20 2013-06-20 A kind of public key cryptography method of anti-quantum calculation

Publications (2)

Publication Number Publication Date
CN103312498A CN103312498A (en) 2013-09-18
CN103312498B true CN103312498B (en) 2016-01-27

Family

ID=49137309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310247666.2A Expired - Fee Related CN103312498B (en) 2013-06-20 2013-06-20 A kind of public key cryptography method of anti-quantum calculation

Country Status (1)

Country Link
CN (1) CN103312498B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533672A (en) * 2016-11-29 2017-03-22 江苏蓝深远望科技股份有限公司 Method and apparatus for verifying security of encrypted file
US10133603B2 (en) 2017-02-14 2018-11-20 Bank Of America Corporation Computerized system for real-time resource transfer verification and tracking
US10447472B2 (en) 2017-02-21 2019-10-15 Bank Of America Corporation Block computing for information silo
US10454892B2 (en) 2017-02-21 2019-10-22 Bank Of America Corporation Determining security features for external quantum-level computing processing
US10243976B2 (en) 2017-02-24 2019-03-26 Bank Of America Corporation Information securities resource propagation for attack prevention
US10489726B2 (en) 2017-02-27 2019-11-26 Bank Of America Corporation Lineage identification and tracking of resource inception, use, and current location
US10440051B2 (en) 2017-03-03 2019-10-08 Bank Of America Corporation Enhanced detection of polymorphic malicious content within an entity
US10284496B2 (en) 2017-03-03 2019-05-07 Bank Of America Corporation Computerized system for providing resource distribution channels based on predicting future resource distributions
US10270594B2 (en) 2017-03-06 2019-04-23 Bank Of America Corporation Enhanced polymorphic quantum enabled firewall
US10437991B2 (en) 2017-03-06 2019-10-08 Bank Of America Corporation Distractional variable identification for authentication of resource distribution
US10412082B2 (en) 2017-03-09 2019-09-10 Bank Of America Corporation Multi-variable composition at channel for multi-faceted authentication
US10440052B2 (en) 2017-03-17 2019-10-08 Bank Of America Corporation Real-time linear identification of resource distribution breach
US11120356B2 (en) 2017-03-17 2021-09-14 Bank Of America Corporation Morphing federated model for real-time prevention of resource abuse
US11055776B2 (en) 2017-03-23 2021-07-06 Bank Of America Corporation Multi-disciplinary comprehensive real-time trading signal within a designated time frame
US10476854B2 (en) 2017-04-20 2019-11-12 Bank Of America Corporation Quantum key distribution logon widget
CN108650092B (en) * 2018-04-28 2021-06-04 广州大学 Method for realizing public key cryptosystem based on large prime number
CN110011790B (en) * 2019-02-14 2020-08-11 中国科学院信息工程研究所 Anti-quantum key negotiation method based on coding
CN111586685B (en) * 2020-04-26 2022-05-03 重庆邮电大学 Anonymous roaming authentication method based on lattices
CN113254981B (en) * 2021-07-07 2021-10-29 南京区盟链信息科技有限公司 Post-quantum-safe outsourcing privacy data publishing method and system
CN118364496A (en) * 2024-06-19 2024-07-19 山东云海国创云计算装备产业创新中心有限公司 Writing method and system of encrypted file, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540673A (en) * 2009-04-24 2009-09-23 武汉大学 Public key encryption and decryption method and digital signature method thereof
CN102006165A (en) * 2010-11-11 2011-04-06 西安理工大学 Ring signature method for anonymizing information based on multivariate public key cryptography
CN102164032A (en) * 2011-05-19 2011-08-24 吉林大学 Quantum attack-resistant nondeterministic public key cryptography construction method
KR20110120805A (en) * 2010-04-29 2011-11-04 한양대학교 산학협력단 Method of distillating quantum entanglement and unitary operation processing device used in the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540673A (en) * 2009-04-24 2009-09-23 武汉大学 Public key encryption and decryption method and digital signature method thereof
KR20110120805A (en) * 2010-04-29 2011-11-04 한양대학교 산학협력단 Method of distillating quantum entanglement and unitary operation processing device used in the same
CN102006165A (en) * 2010-11-11 2011-04-06 西安理工大学 Ring signature method for anonymizing information based on multivariate public key cryptography
CN102164032A (en) * 2011-05-19 2011-08-24 吉林大学 Quantum attack-resistant nondeterministic public key cryptography construction method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一类具有安全加密功能的扩展MQ公钥密码体制;王后珍 等;《中国科学:信息科学》;20111120;全文 *
基于格困难问题的公钥加密算法的设计与安全性证明;牟宁波;《西安电子科技大学博士学位论文》;20100119;全文 *

Also Published As

Publication number Publication date
CN103312498A (en) 2013-09-18

Similar Documents

Publication Publication Date Title
CN103312498B (en) A kind of public key cryptography method of anti-quantum calculation
CN103414569B (en) A kind of method of the public key cryptography setting up attack resistance
CN106027262B (en) Multi-variable signing method resisting key recovery attack
CN103501227A (en) Improved multi-variable public key cryptogram encryption and decryption scheme
CN104852805A (en) SM2 signature algorithm protection method for resisting error attack based on lattice
Huang et al. A commutative encryption scheme based on ElGamal encryption
Shao et al. Unidirectional identity-based proxy re-signature
Wang et al. Server aided ciphertext-policy attribute-based encryption
Dai Quantum cryptanalysis on a multivariate cryptosystem based on clipped hopfield neural network
CN103067165A (en) Outsourcing calculation method, device and server of public key system
CN105393488B (en) The method for establishing the public key cryptography of resisting quantum computation attack
Ruan et al. Efficient provably secure password-based explicit authenticated key agreement
Zhao et al. Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data
CN109981253A (en) A kind of asymmet-ric encryption method of the anti-quantum attack based on limited Lee&#39;s type group
CN105119929A (en) Safe mode index outsourcing method and system under single malicious cloud server
CN108880782A (en) The secrecy calculation method of minimum value under a kind of cloud computing platform
Meshram et al. PKC Scheme Based on DDLP
CN105024822A (en) Identify-based encryption method from multilinear mapping
CN105530091A (en) Decryption method for TTS signature
Guo et al. Optimal online/offline signature: How to sign a message without online computation
WO2022172041A1 (en) Asymmetric cryptographic schemes
Wang et al. An Attack Scheme of RSA Encryption System with Protocol Failure
CN106209376B (en) A kind of multivariable endorsement method for resisting forgery attack
Yang et al. Generating verifiable random numbers without a trusted party
Zu-feng Linear Regression Protocol for Privacy Protect

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160127