CN103312498B - A kind of public key cryptography method of anti-quantum calculation - Google Patents
A kind of public key cryptography method of anti-quantum calculation Download PDFInfo
- Publication number
- CN103312498B CN103312498B CN201310247666.2A CN201310247666A CN103312498B CN 103312498 B CN103312498 B CN 103312498B CN 201310247666 A CN201310247666 A CN 201310247666A CN 103312498 B CN103312498 B CN 103312498B
- Authority
- CN
- China
- Prior art keywords
- matrix
- quantum
- dimension
- public key
- modq
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000004364 calculation method Methods 0.000 title claims abstract description 19
- 239000011159 matrix material Substances 0.000 claims description 56
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000010845 search algorithm Methods 0.000 description 1
Landscapes
- Complex Calculations (AREA)
Abstract
The present invention relates to field of information security technology, is a kind of public key cryptography method of anti-quantum calculation.The present invention sets up the difficult problem under a quantum computation environment, and establishes a kind of Public Key Crypto Scheme on this basis.Because this cryptographic system only comprises the basic operation such as addition and multiplication, have under quantum environment implementation efficiency high, existing cryptographic attack can be resisted, there is quantum computation environment under the advantage such as fail safe.This cryptographic system also can use under electronic computer environment, but calculation cost is larger.Method provided by the invention can be widely used in the information safety system such as network security, ecommerce field.
Description
Technical field
The present invention relates to field of information security technology, is a kind of public-key cryptographic keys method of anti-quantum calculation.
Background technology
Quantum computer concept takes graceful proposition by Richard the earliest, has attracted the interest of a large amount of scholar.Through development after a while, achieve a lot of achievements.1985, Deutsch proposed designing a model of first quantum computer, gave the definition of quantum turing machine.Within 1994, Shor proposes the Shor quantum algorithm of big integer Factorization.Its complexity is polynomial time.Shor algorithm is also in continuous development in recent years, expands to hiding subgroup problem generally by Quantum fourier transform.Can stipulations no longer safe to the public key cryptography system hiding subgroup problem, such as RSA, EIGamal and ECC.If quantum computer becomes a reality, existing password is all no longer safe.Within 1996, Grover proposes a kind of general quantum search algorithm.The length of crypt algorithm keys is reduced to half by it.But do not form essence to existing password to threaten.
Similar with classical public key cryptography, if in two keys one can disclose, and by public-key cryptography obtain private key be difficulty or impossible, this quantum cryptography is called quantum public key cryptography.Quantum public key algorithm must can resist the attack with quantum calculation capabilities.There are two class algorithms in quantum public key system, there is the quantum public key algorithm of unconditional security and there is the quantum public key algorithm of computationally secure.It is pointed out that computationally secure in quantum cryptography is for quantum calculation complexity.
Due to the concurrency of quantum calculation, make the double linear problems of difficulty for solving in traditional counting can be partially converted into solvable problem by quantum calculation.The article of the people such as D.Deutsch in 1992 points out that the computing capability of quantum turing machine is stronger than the computing capability of classic computer.But the limit of the computing capability of quantum turing machine is still a challenging problem.Can not time O (2 again for the quantum turing machine NP class problem with oracle
n/2) in solve.
Existing quantum public key cryptography comprises as follows: 1, Quantum Error Correcting Codes.Quantum Error Correcting Codes is independently proposed nineteen ninety-five and 1996 respectively by P.Shor and A.M.Steane.Basic thought and classical error correction code similar.2, based on can not the quantum public key algorithm of cloning theorem.This is a kind of public key algorithm depending on quantum memory.Because quantum memory is difficult to realize technically, this algorithm depends on the realization of quantum computer.But quantum switching technology can be utilized to realize.3, at present quantum calculation is still to the cryptosystem of difficult problem design based on some.For example Japanese scholars proposes a quantum public key algorithm based on the subset sum problem on ring.Based on the NTRU public-key cryptosystem etc. of lattice difficult problem.
At present, the public key cryptography of anti-quantum calculation mainly comprises following several form: the novel cipher 1, adopting the non-difficult math question such as quantum cryptography, DNA password; 2, the password that the mathematical problem being bad to calculate based on quantum calculation builds.Comprise Solving Nonlinear Systems of Equations, difficult problem on lattice, the NPC problems such as knapsack problem, there is no effective quantum algorithm at present.
Summary of the invention
For the technical problem of above-mentioned existence, a kind of public key cryptography method proposing anti-quantum calculation of the present invention.
The technical solution adopted in the present invention is: a kind of public key cryptography method of anti-quantum calculation, is characterized in that, the method for its specific implementation is as follows:
(I) system is set up:
(1) confinement F is provided with
supper n
2dimension matrix A, the valued space of B, M, φ is respectively [0, l], [0, l
1] [0, l
2], [0, l
3], wherein l, l
1, l
2, l
3it is positive integer; Determine l, l
1, l
3value and maintain secrecy, determine l simultaneously
2value and open;
(2) two Big prime p, q, p < q is selected to meet a dominating set pll
1l
2+ l
3l
2+ pl
2l
2l
3< ql
2≤ p; Open Big prime p, q;
(3) at finite field F
stake up an official post and get matrix A, by
calculate F
p, according to
calculate F
q, matrix A is maintained secrecy; Require matrix F simultaneously
pthe value of each element be not less than
if a, x are matrix A respectively, F
qthe element of correspondence position and ax=1 (modq); If
a number y is then again looked for make
so using y as F
pelement export; Wherein matrix I is all 1's matrix, and mod represents modular arithmetic, and max represents the maximum of set;
(4) at finite field F
stake up an official post and get matrix B, calculate n
2dimension matrix
require matrix
matrix h is open;
System parameters is (n, p, q, l
2), PKI is h; Private key is (l, l
1, l
3) and A;
Wherein: finite field F
supper n
2dimension matrix A=(a
ij)
n × n, B=(b
ij)
n × n, wherein s is positive integer.Loop product
operation definition is
(II) ciphering process:
For given plaintext M, Stochastic choice n in span
2the random matrix φ of dimension, utilizes PKI h to calculate ciphertext
(III) decrypting process:
(1) calculate
(2) C is calculated
2=C
1(modp);
(3) from n
4dimension Matrix C
2in to choose footmark be (1,1), (1, n+2), (1,2n+4) ..., (1, n
2), (n+2,1), (n+2, n+2), (n+2,2n+4) ..., (n+2, n
2), (n
2, 1), (n
2, n+2) ..., (n
2, n
2) element composition n
2dimension matrix
wherein footmark (i, j) represents n
4dimension Matrix C
2in the i-th row and jth row intersect element, 1≤i≤n, 1≤j≤n;
(4) calculate expressly
The present invention, relative to prior art, has the following advantages and good effect:
(1) the present invention is the quantum public key cryptography of computationally secure under a kind of quantum environment.Its fail safe performance is mainly based on the quantum calculation difficult problem of structure.Existing quantum algorithm can be resisted attack.In addition, computing of the present invention only containing basic computing, therefore can realize on electronic computer.Although the calculation cost of electronic computer is larger;
(2) the present invention is a kind of quantum key system efficiently, and its computing is mainly the multiplying in finite field.Due to the concurrency of quantum calculation, make the efficiency of calculating higher.
Embodiment
Below in conjunction with specific embodiment, the present invention is described further.
The technical solution adopted in the present invention is: a kind of public key cryptography method of anti-quantum calculation, and the method for its specific implementation is as follows:
(I) system is set up:
(1) confinement F is provided with
supper n
2dimension matrix A, the valued space of B, M, φ is respectively [0, l], [0, l
1], [0, l
2] [0, l
3], wherein l, l
1, l
2, l
3it is positive integer; Determine l, l
1, l
3value and maintain secrecy, determine l simultaneously
2value and open;
(2) two Big prime p, q, p < q is selected to meet a dominating set pll
1l
2+ l
3l
2+ pl
2l
2l
3< ql
2≤ p; Open Big prime p, q;
(3) at finite field F
stake up an official post and get matrix A, by
calculate F
p, according to
calculate F
q, matrix A is maintained secrecy; Require matrix F simultaneously
pthe value of each element be not less than
if a, x are matrix A respectively, F
qthe element of correspondence position and ax=1 (modq); If
a number y is then again looked for make
so using y as F
pelement export; Wherein matrix I is all 1's matrix, and mod represents modular arithmetic, and max represents the maximum of set;
(4) at finite field F
stake up an official post and get matrix B, calculate n
2dimension matrix
require matrix
matrix h is open;
System parameters is (n, p, q, l
2), PKI is h; Private key is (l, l
1, l
3) and A;
Wherein: finite field F
supper n
2dimension matrix A=(a
ij)
n × n, B=(b
ij)
n × n, wherein s is positive integer.Loop product
operation definition is
(II) ciphering process:
For given plaintext M, Stochastic choice n in span
2the random matrix φ of dimension, utilizes PKI h to calculate ciphertext
(III) decrypting process:
(1) calculate
(2) C is calculated
2=C
1(modp);
(3) from n
4dimension Matrix C
2in to choose footmark be (1,1), (1, n+2), (1,2n+4) ..., (1, n
2), (n+2,1), (n+2, n+2), (n+2,2n+4) ..., (n+2, n
2), (n
2, 1), (n
2, n+2) ..., (n
2, n
2) element composition n
2dimension matrix
wherein footmark (i, j) represents n
4dimension Matrix C
2in the i-th row and jth row intersect element, 1≤i≤n, 1≤j≤n;
(4) calculate expressly
It is below a specific embodiment of this method.
(I) system is set up:
System parameters is (n, p, q, l
2), wherein n=2, p=5, q=1857, l
2=4.PKI is matrix
Private key is parameter (l, l
1, l
3) and matrix A.Wherein l=l
1=l
3=4, matrix
If
appoint and get matrix
Calculate
Wherein F
qspan be [372, ∝).
(II) ciphering process:
Stochastic choice matrix
Given plaintext
Calculating ciphertext obtains
(III) decrypting process:
The first step: calculate
Second step: calculate
3rd step: choosing coordinate is (1,1), (Isosorbide-5-Nitrae), and (4,1), the matrix element of (4,4) obtains matrix
4th step: calculate
The content that this specification is not described in detail belongs to the known prior art of those skilled in the art.
The above embodiment is only that protection scope of the present invention is not limited thereto in order to absolutely prove the preferred embodiment that the present invention lifts.The equivalent alternative or conversion that those skilled in the art do on basis of the present invention, all within protection scope of the present invention.Protection scope of the present invention is as the criterion with claims.
Claims (1)
1. a public key cryptography method for anti-quantum calculation, is characterized in that, the method for its specific implementation is as follows:
(I) system is set up:
(1) confinement F is provided with
supper n
2dimension matrix A, the valued space of B, M, φ is respectively [0, l], [0, l
1], [0, l
2], [0, l
3], wherein l, l
1, l
2, l
3it is positive integer; Determine l, l
1, l
3value and maintain secrecy, determine l simultaneously
2value and open;
(2) two Big prime p, q, p < q is selected to meet a dominating set pll
1l
2+ l
3l
2+ pl
2l
2l
3< ql
2≤ p; Open Big prime p, q;
(3) at finite field F
stake up an official post and get matrix A, by F
p⊙ A=I (modp) calculates F
p, according to A ⊙ F
q=I (modq) calculates F
q, matrix A is maintained secrecy; Require matrix F simultaneously
pthe value of each element be not less than
if a, x are matrix A respectively, F
qthe element of correspondence position and ax=1 (modq); If
a number y is then again looked for make
so using y as F
pelement export; Wherein matrix I is all 1's matrix, and mod represents modular arithmetic, and max represents the maximum of set;
(4) at finite field F
stake up an official post and get matrix B, calculate n
2dimension matrix h=pF
q⊙ B+A (modq), A (⊙) h=pB+A ⊙ A (modq); Require matrix pF
q⊙ B+A (modq) ≠ pF
q⊙ B+A; Matrix h is open;
System parameters be (n, q, l
2), PKI is h; Private key is (l, l
1, l
3) and A;
Wherein: finite field F
supper n
2dimension matrix A=(a
ij)
n × n, B=(b
ij)
n × n, wherein s is positive integer; Loop product ⊙ operation definition is
A⊙B=(a
ijb
ij)n×n;
(II) ciphering process:
For given plaintext M, Stochastic choice n in span
2the random matrix φ of dimension, utilizes PKI h to calculate ciphertext
(III) decrypting process:
(1) calculate
(2) C is calculated
2=C
1(modp);
(3) from n
4dimension Matrix C
2in to choose footmark be (1,1), (1, n+2), (1,2n+4) ..., (1, n
2), (n+2,1), (n+2, n+2), (n+2,2n+4) ..., (n+2, n
2), (n
2, 1), (n
2, n+2) ..., (n
2, n
2) element composition n
2dimension Matrix C
3=A ⊙ A ⊙ A ⊙ M (modp), wherein Matrix C
3footmark (i, j) represents n
4dimension Matrix C
2in the i-th row and jth row intersect element, 1≤i≤n, 1≤j≤n;
(4) plaintext M=C is calculated
3⊙ F
p⊙ F
p⊙ F
p(modp).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310247666.2A CN103312498B (en) | 2013-06-20 | 2013-06-20 | A kind of public key cryptography method of anti-quantum calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310247666.2A CN103312498B (en) | 2013-06-20 | 2013-06-20 | A kind of public key cryptography method of anti-quantum calculation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103312498A CN103312498A (en) | 2013-09-18 |
CN103312498B true CN103312498B (en) | 2016-01-27 |
Family
ID=49137309
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310247666.2A Expired - Fee Related CN103312498B (en) | 2013-06-20 | 2013-06-20 | A kind of public key cryptography method of anti-quantum calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103312498B (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106533672A (en) * | 2016-11-29 | 2017-03-22 | 江苏蓝深远望科技股份有限公司 | Method and apparatus for verifying security of encrypted file |
US10133603B2 (en) | 2017-02-14 | 2018-11-20 | Bank Of America Corporation | Computerized system for real-time resource transfer verification and tracking |
US10447472B2 (en) | 2017-02-21 | 2019-10-15 | Bank Of America Corporation | Block computing for information silo |
US10454892B2 (en) | 2017-02-21 | 2019-10-22 | Bank Of America Corporation | Determining security features for external quantum-level computing processing |
US10243976B2 (en) | 2017-02-24 | 2019-03-26 | Bank Of America Corporation | Information securities resource propagation for attack prevention |
US10489726B2 (en) | 2017-02-27 | 2019-11-26 | Bank Of America Corporation | Lineage identification and tracking of resource inception, use, and current location |
US10440051B2 (en) | 2017-03-03 | 2019-10-08 | Bank Of America Corporation | Enhanced detection of polymorphic malicious content within an entity |
US10284496B2 (en) | 2017-03-03 | 2019-05-07 | Bank Of America Corporation | Computerized system for providing resource distribution channels based on predicting future resource distributions |
US10270594B2 (en) | 2017-03-06 | 2019-04-23 | Bank Of America Corporation | Enhanced polymorphic quantum enabled firewall |
US10437991B2 (en) | 2017-03-06 | 2019-10-08 | Bank Of America Corporation | Distractional variable identification for authentication of resource distribution |
US10412082B2 (en) | 2017-03-09 | 2019-09-10 | Bank Of America Corporation | Multi-variable composition at channel for multi-faceted authentication |
US10440052B2 (en) | 2017-03-17 | 2019-10-08 | Bank Of America Corporation | Real-time linear identification of resource distribution breach |
US11120356B2 (en) | 2017-03-17 | 2021-09-14 | Bank Of America Corporation | Morphing federated model for real-time prevention of resource abuse |
US11055776B2 (en) | 2017-03-23 | 2021-07-06 | Bank Of America Corporation | Multi-disciplinary comprehensive real-time trading signal within a designated time frame |
US10476854B2 (en) | 2017-04-20 | 2019-11-12 | Bank Of America Corporation | Quantum key distribution logon widget |
CN108650092B (en) * | 2018-04-28 | 2021-06-04 | 广州大学 | Method for realizing public key cryptosystem based on large prime number |
CN110011790B (en) * | 2019-02-14 | 2020-08-11 | 中国科学院信息工程研究所 | Anti-quantum key negotiation method based on coding |
CN111586685B (en) * | 2020-04-26 | 2022-05-03 | 重庆邮电大学 | Anonymous roaming authentication method based on lattices |
CN113254981B (en) * | 2021-07-07 | 2021-10-29 | 南京区盟链信息科技有限公司 | Post-quantum-safe outsourcing privacy data publishing method and system |
CN118364496A (en) * | 2024-06-19 | 2024-07-19 | 山东云海国创云计算装备产业创新中心有限公司 | Writing method and system of encrypted file, storage medium and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540673A (en) * | 2009-04-24 | 2009-09-23 | 武汉大学 | Public key encryption and decryption method and digital signature method thereof |
CN102006165A (en) * | 2010-11-11 | 2011-04-06 | 西安理工大学 | Ring signature method for anonymizing information based on multivariate public key cryptography |
CN102164032A (en) * | 2011-05-19 | 2011-08-24 | 吉林大学 | Quantum attack-resistant nondeterministic public key cryptography construction method |
KR20110120805A (en) * | 2010-04-29 | 2011-11-04 | 한양대학교 산학협력단 | Method of distillating quantum entanglement and unitary operation processing device used in the same |
-
2013
- 2013-06-20 CN CN201310247666.2A patent/CN103312498B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540673A (en) * | 2009-04-24 | 2009-09-23 | 武汉大学 | Public key encryption and decryption method and digital signature method thereof |
KR20110120805A (en) * | 2010-04-29 | 2011-11-04 | 한양대학교 산학협력단 | Method of distillating quantum entanglement and unitary operation processing device used in the same |
CN102006165A (en) * | 2010-11-11 | 2011-04-06 | 西安理工大学 | Ring signature method for anonymizing information based on multivariate public key cryptography |
CN102164032A (en) * | 2011-05-19 | 2011-08-24 | 吉林大学 | Quantum attack-resistant nondeterministic public key cryptography construction method |
Non-Patent Citations (2)
Title |
---|
一类具有安全加密功能的扩展MQ公钥密码体制;王后珍 等;《中国科学:信息科学》;20111120;全文 * |
基于格困难问题的公钥加密算法的设计与安全性证明;牟宁波;《西安电子科技大学博士学位论文》;20100119;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN103312498A (en) | 2013-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103312498B (en) | A kind of public key cryptography method of anti-quantum calculation | |
CN103414569B (en) | A kind of method of the public key cryptography setting up attack resistance | |
CN106027262B (en) | Multi-variable signing method resisting key recovery attack | |
CN103501227A (en) | Improved multi-variable public key cryptogram encryption and decryption scheme | |
CN104852805A (en) | SM2 signature algorithm protection method for resisting error attack based on lattice | |
Huang et al. | A commutative encryption scheme based on ElGamal encryption | |
Shao et al. | Unidirectional identity-based proxy re-signature | |
Wang et al. | Server aided ciphertext-policy attribute-based encryption | |
Dai | Quantum cryptanalysis on a multivariate cryptosystem based on clipped hopfield neural network | |
CN103067165A (en) | Outsourcing calculation method, device and server of public key system | |
CN105393488B (en) | The method for establishing the public key cryptography of resisting quantum computation attack | |
Ruan et al. | Efficient provably secure password-based explicit authenticated key agreement | |
Zhao et al. | Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data | |
CN109981253A (en) | A kind of asymmet-ric encryption method of the anti-quantum attack based on limited Lee's type group | |
CN105119929A (en) | Safe mode index outsourcing method and system under single malicious cloud server | |
CN108880782A (en) | The secrecy calculation method of minimum value under a kind of cloud computing platform | |
Meshram et al. | PKC Scheme Based on DDLP | |
CN105024822A (en) | Identify-based encryption method from multilinear mapping | |
CN105530091A (en) | Decryption method for TTS signature | |
Guo et al. | Optimal online/offline signature: How to sign a message without online computation | |
WO2022172041A1 (en) | Asymmetric cryptographic schemes | |
Wang et al. | An Attack Scheme of RSA Encryption System with Protocol Failure | |
CN106209376B (en) | A kind of multivariable endorsement method for resisting forgery attack | |
Yang et al. | Generating verifiable random numbers without a trusted party | |
Zu-feng | Linear Regression Protocol for Privacy Protect |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160127 |