GB2572068B - Signature system and method for multivariable public key - Google Patents

Signature system and method for multivariable public key Download PDF

Info

Publication number
GB2572068B
GB2572068B GB1902689.7A GB201902689A GB2572068B GB 2572068 B GB2572068 B GB 2572068B GB 201902689 A GB201902689 A GB 201902689A GB 2572068 B GB2572068 B GB 2572068B
Authority
GB
United Kingdom
Prior art keywords
public key
signature system
multivariable public
multivariable
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB1902689.7A
Other versions
GB201902689D0 (en
GB2572068A (en
Inventor
Tang Shaohua
Peng Zhiniang
Chen Ju
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Publication of GB201902689D0 publication Critical patent/GB201902689D0/en
Publication of GB2572068A publication Critical patent/GB2572068A/en
Application granted granted Critical
Publication of GB2572068B publication Critical patent/GB2572068B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3026Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Physics & Mathematics (AREA)
  • Complex Calculations (AREA)
  • Storage Device Security (AREA)
GB1902689.7A 2016-09-09 2016-12-06 Signature system and method for multivariable public key Expired - Fee Related GB2572068B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610815728.9A CN106330463B (en) 2016-09-09 2016-09-09 A kind of signature system and method for multivariable public key
PCT/CN2016/108691 WO2018045647A1 (en) 2016-09-09 2016-12-06 Multivariable public key signature system and method

Publications (3)

Publication Number Publication Date
GB201902689D0 GB201902689D0 (en) 2019-04-17
GB2572068A GB2572068A (en) 2019-09-18
GB2572068B true GB2572068B (en) 2022-01-26

Family

ID=57787005

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1902689.7A Expired - Fee Related GB2572068B (en) 2016-09-09 2016-12-06 Signature system and method for multivariable public key

Country Status (5)

Country Link
CN (1) CN106330463B (en)
AU (1) AU2016422576B2 (en)
GB (1) GB2572068B (en)
SG (1) SG11201902079RA (en)
WO (1) WO2018045647A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108880816A (en) * 2017-05-15 2018-11-23 深圳职业技术学院 A kind of rainbow signature apparatus
CN109525393A (en) * 2017-09-20 2019-03-26 深圳职业技术学院 A kind of digital signature method of resisting quantum computation attack, verification method and system
CN108989056A (en) * 2018-09-28 2018-12-11 深圳职业技术学院 A kind of rainbow signature apparatus and method based on mask
CN111211897B (en) * 2019-12-20 2021-11-09 河南大学 Time control encryption security enhancement method based on random prediction model
CN114282922B (en) * 2021-12-23 2024-08-13 郑州师范学院 Block chain transaction processing method and device based on cold wallet

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130329883A1 (en) * 2012-06-12 2013-12-12 Kryptnostic Method for fully homomorphic encryption using multivariate cryptography
CN103490897A (en) * 2013-09-17 2014-01-01 华南理工大学 System and method for signing/verification of multivariable public key
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN104009848A (en) * 2014-05-26 2014-08-27 华南理工大学 Mixed type multivariable digital signing system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490883B (en) * 2013-09-17 2016-10-05 华南理工大学 A kind of multi-variable public key ciphering/decryption system and encrypting/decrypting method
CN103780382B (en) * 2014-01-13 2017-01-18 华南理工大学 Multivariable public-key encryption/decryption system and method based on hypersphere

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130329883A1 (en) * 2012-06-12 2013-12-12 Kryptnostic Method for fully homomorphic encryption using multivariate cryptography
CN103490897A (en) * 2013-09-17 2014-01-01 华南理工大学 System and method for signing/verification of multivariable public key
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN104009848A (en) * 2014-05-26 2014-08-27 华南理工大学 Mixed type multivariable digital signing system and method

Also Published As

Publication number Publication date
AU2016422576A1 (en) 2019-03-21
AU2016422576B2 (en) 2020-04-16
CN106330463B (en) 2019-08-20
CN106330463A (en) 2017-01-11
GB201902689D0 (en) 2019-04-17
GB2572068A (en) 2019-09-18
WO2018045647A1 (en) 2018-03-15
SG11201902079RA (en) 2019-05-30

Similar Documents

Publication Publication Date Title
GB201616482D0 (en) System and method for range-boosted key fob
GB201602969D0 (en) Method and system for authentication
HK1232356A1 (en) Authentication system and method
EP3127275A4 (en) Method and system for secure authentication
EP3080959A4 (en) System and method for securing source routing using public key based digital signature
EP3210157A4 (en) Encrypted collaboration system and method
EP3451613C0 (en) Authentication method and system
SG11201610289RA (en) Method and system for information authentication
EP3297207A4 (en) Authentication method and authentication system
EP3105883A4 (en) Authentication system and method
EP3110066A4 (en) Authentication method and authentication system
SG11201707228VA (en) Method and system for facilitating authentication
EP3035587A4 (en) Hypersphere-based multivariable public key signature/verification system and method
EP3100409A4 (en) Authentication system and method
SG10201603367TA (en) Method and system for authentication with asymmetric key
HK1217050A1 (en) System and method for secure authentication
EP3096488A4 (en) Hypersphere-based multivariable public key encryption/decryption system and method
GB2572068B (en) Signature system and method for multivariable public key
EP3321835A4 (en) Manual signature authentication system and method
EP3688925A4 (en) Method and system for key agreement utilizing semigroups
SG11201700954TA (en) A system and method for security enhancement
EP3345371A4 (en) System and method for authentication
EP3465585A4 (en) System and method for account security
EP3198501A4 (en) Authentication system and method
EP3552192A4 (en) System and method for distributed security

Legal Events

Date Code Title Description
789A Request for publication of translation (sect. 89(a)/1977)

Ref document number: 2018045647

Country of ref document: WO

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20221206