CN111492615B - 具有可更新共享矩阵的加密设备 - Google Patents

具有可更新共享矩阵的加密设备 Download PDF

Info

Publication number
CN111492615B
CN111492615B CN201880081333.8A CN201880081333A CN111492615B CN 111492615 B CN111492615 B CN 111492615B CN 201880081333 A CN201880081333 A CN 201880081333A CN 111492615 B CN111492615 B CN 111492615B
Authority
CN
China
Prior art keywords
matrix
shared
network node
polynomial
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880081333.8A
Other languages
English (en)
Chinese (zh)
Other versions
CN111492615A (zh
Inventor
O·加西亚莫尔琼
L·M·G·M·托尔胡伊泽恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips NV filed Critical Koninklijke Philips NV
Publication of CN111492615A publication Critical patent/CN111492615A/zh
Application granted granted Critical
Publication of CN111492615B publication Critical patent/CN111492615B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • Computing Systems (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • Computational Mathematics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
CN201880081333.8A 2017-10-17 2018-10-12 具有可更新共享矩阵的加密设备 Active CN111492615B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP17196926.4A EP3474484A1 (en) 2017-10-17 2017-10-17 Cryptographic device with updatable shared matrix
EP17196926.4 2017-10-17
PCT/EP2018/077823 WO2019076737A1 (en) 2017-10-17 2018-10-12 CRYPTOGRAPHIC DEVICE WITH SHARED MATRIX WHICH CAN BE UPDATED

Publications (2)

Publication Number Publication Date
CN111492615A CN111492615A (zh) 2020-08-04
CN111492615B true CN111492615B (zh) 2023-08-29

Family

ID=60138257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880081333.8A Active CN111492615B (zh) 2017-10-17 2018-10-12 具有可更新共享矩阵的加密设备

Country Status (8)

Country Link
US (1) US11212099B2 (https=)
EP (2) EP3474484A1 (https=)
JP (1) JP7208987B2 (https=)
CN (1) CN111492615B (https=)
BR (1) BR112020007373A2 (https=)
MX (1) MX2020003689A (https=)
RU (1) RU2020115996A (https=)
WO (1) WO2019076737A1 (https=)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3698515B1 (en) * 2017-10-17 2021-02-17 Koninklijke Philips N.V. Configurable device for lattice-based cryptography
EP3754896A1 (en) * 2019-06-18 2020-12-23 Koninklijke Philips N.V. Authenticated key agreement
EP4035306A4 (en) 2019-09-26 2022-11-16 Visa International Service Association GRID-BASED SIGNATURES WITH UNIFORM SECRETS
US12143481B2 (en) 2019-09-30 2024-11-12 The Governing Council Of The University Of Toronto Method and system for key generation
GB2587438A (en) * 2019-09-30 2021-03-31 Governing Council Univ Toronto Key generation for use in secured communication
US11153080B1 (en) * 2020-07-29 2021-10-19 John A. Nix Network securing device data using two post-quantum cryptography key encapsulation mechanisms
US20230370251A1 (en) * 2020-10-16 2023-11-16 Nippon Telegraph And Telephone Corporation Secure computation system, secure computation apparatus, secure computation method, and program
KR20220055079A (ko) * 2020-10-26 2022-05-03 삼성에스디에스 주식회사 NTRU LPRime 알고리즘에 대한 부채널 공격을 방지하기 위한 장치 및 방법
US12301709B2 (en) * 2020-11-24 2025-05-13 John A. Nix Multiple post-quantum cryptography key encapsulations with authentication and forward secrecy
US12003629B2 (en) 2020-12-30 2024-06-04 John A. Nix Secure server digital signature generation for post-quantum cryptography key encapsulations
US11632246B2 (en) * 2020-12-30 2023-04-18 International Business Machines Corporation Hybrid key derivation to secure data
CN112765551B (zh) * 2021-01-21 2024-05-07 中国科学院重庆绿色智能技术研究院 一种双重约化的矩阵乘法的分块参数空间优化方法
JP7402191B2 (ja) * 2021-03-03 2023-12-20 Kddi株式会社 乗算装置、乗算方法及び乗算プログラム
CN112910933B (zh) * 2021-05-07 2021-07-13 鹏城实验室 认证方法、认证设备以及验证设备
EP4099609A1 (en) 2021-06-04 2022-12-07 Zama SAS Computational network conversion for fully homomorphic evaluation
US12192184B2 (en) 2021-12-08 2025-01-07 John A. Nix Secure session resumption using post-quantum cryptography
CN114462571B (zh) * 2021-12-31 2024-12-06 科大讯飞股份有限公司 训练深度学习模型的方法、数据处理方法及装置
CN114630319A (zh) * 2022-03-16 2022-06-14 黄文孝 面向智能电网的输变电监测数据安全管理系统及方法
US12567946B2 (en) 2022-06-03 2026-03-03 Kioxia Corporation Encryption device, decryption device, storage system, information processing device, encryption method, decryption method, decompression device, and decompression method
US12413399B2 (en) * 2022-10-06 2025-09-09 Nxp B.V. Fault detection in post-quantum cyptography
JP2025542096A (ja) 2022-11-15 2025-12-25 クォンタム ブリッジ テクノロジーズ インコーポレイテッド セキュアなネットワークにおける鍵生成データの配送のためのシステム及び方法
FR3147019A1 (fr) * 2023-03-24 2024-09-27 Stmicroelectronics International N.V. Vérification d'une donnée

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490901A (zh) * 2013-09-30 2014-01-01 广东南方信息安全产业基地有限公司 基于组合密钥体系的密钥生成和发放方法
EP2846494A1 (en) * 2013-09-06 2015-03-11 Tata Consultancy Services Ltd. Identity based encryption
CN105379173A (zh) * 2013-07-12 2016-03-02 皇家飞利浦有限公司 用于共享密码密钥的系统
CN105930916A (zh) * 2016-04-07 2016-09-07 大连理工大学 一种基于并行模块化神经网络的副产煤气实时预测方法
CN106357410A (zh) * 2016-10-10 2017-01-25 中山大学 一种在没有单向陷门的格签名上构建阈下信道的方法

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4485175B2 (ja) 2002-12-03 2010-06-16 パナソニック株式会社 鍵共有システム、共有鍵生成装置及び共有鍵復元装置
US8621227B2 (en) * 2010-12-28 2013-12-31 Authernative, Inc. System and method for cryptographic key exchange using matrices
WO2013152725A1 (en) * 2012-04-12 2013-10-17 Jintai Ding New cryptographic systems using pairing with errors
US9223720B2 (en) * 2013-12-13 2015-12-29 Oracle International Corporation Systems and methods for rapidly generating suitable pairs of hash functions
WO2015184991A1 (en) * 2014-06-04 2015-12-10 Jintai Ding Improvements on cryptographic systems using pairing with errors
US9577897B2 (en) * 2015-02-20 2017-02-21 Adobe Systems Incorporated Providing visualizations of event sequence data
US10097351B1 (en) * 2016-09-15 2018-10-09 ISARA Corporation Generating a lattice basis for lattice-based cryptography
US9698986B1 (en) * 2016-09-23 2017-07-04 ISARA Corporation Generating shared secrets for lattice-based cryptographic protocols
EP3373505A1 (en) 2017-03-06 2018-09-12 Koninklijke Philips N.V. Device and method for sharing a matrix for use in a cryptographic protocol

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105379173A (zh) * 2013-07-12 2016-03-02 皇家飞利浦有限公司 用于共享密码密钥的系统
EP2846494A1 (en) * 2013-09-06 2015-03-11 Tata Consultancy Services Ltd. Identity based encryption
CN103490901A (zh) * 2013-09-30 2014-01-01 广东南方信息安全产业基地有限公司 基于组合密钥体系的密钥生成和发放方法
CN105930916A (zh) * 2016-04-07 2016-09-07 大连理工大学 一种基于并行模块化神经网络的副产煤气实时预测方法
CN106357410A (zh) * 2016-10-10 2017-01-25 中山大学 一种在没有单向陷门的格签名上构建阈下信道的方法

Also Published As

Publication number Publication date
WO2019076737A1 (en) 2019-04-25
JP7208987B2 (ja) 2023-01-19
JP2020537191A (ja) 2020-12-17
EP3698513B1 (en) 2021-12-08
RU2020115996A3 (https=) 2022-01-12
EP3698513A1 (en) 2020-08-26
RU2020115996A (ru) 2021-11-18
EP3474484A1 (en) 2019-04-24
US20200304305A1 (en) 2020-09-24
CN111492615A (zh) 2020-08-04
US11212099B2 (en) 2021-12-28
BR112020007373A2 (pt) 2020-09-29
MX2020003689A (es) 2020-08-03

Similar Documents

Publication Publication Date Title
CN111492615B (zh) 具有可更新共享矩阵的加密设备
CN111492616B (zh) 用于基于晶格的密码学的可配置设备
CN110870250B (zh) 密钥协商设备和方法
CN110383754B (zh) 基于椭圆曲线同源的密钥协商协议
CN112997448B (zh) 具有减小的公钥大小的公钥/私钥系统
CN110419194A (zh) 密钥交换设备和方法
CN107078906A (zh) 公钥加密系统
EP3547603A1 (en) Configurable device for lattice-based cryptography
CN104854814A (zh) 密钥共享网络设备及其配置
EP3824591A1 (en) Key encapsulation protocols
EP3889764A1 (en) Parallel generation of a random matrix
CN107786327B (zh) 一种基于ldpc码的安全可靠传输方法
CN109495478B (zh) 一种基于区块链的分布式安全通信方法及系统
RU2787692C2 (ru) Протоколы инкапсуляции ключей

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant