JP2010530990A - 公開行列に基づき、エラー補正コードのデコーディングを用いて認証を行う方法 - Google Patents
公開行列に基づき、エラー補正コードのデコーディングを用いて認証を行う方法 Download PDFInfo
- Publication number
- JP2010530990A JP2010530990A JP2010512742A JP2010512742A JP2010530990A JP 2010530990 A JP2010530990 A JP 2010530990A JP 2010512742 A JP2010512742 A JP 2010512742A JP 2010512742 A JP2010512742 A JP 2010512742A JP 2010530990 A JP2010530990 A JP 2010530990A
- Authority
- JP
- Japan
- Prior art keywords
- matrix
- block
- vector
- public
- cyclic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000011159 matrix material Substances 0.000 title claims abstract description 105
- 238000000034 method Methods 0.000 claims abstract description 47
- 125000004122 cyclic group Chemical group 0.000 claims abstract description 35
- 239000013598 vector Substances 0.000 claims description 37
- 238000004590 computer program Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 abstract description 9
- 208000011580 syndromic disease Diseases 0.000 description 15
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/304—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3033—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/024—Channel estimation channel estimation algorithms
- H04L25/0242—Channel estimation channel estimation algorithms using matrix methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/024—Channel estimation channel estimation algorithms
- H04L25/0242—Channel estimation channel estimation algorithms using matrix methods
- H04L25/0244—Channel estimation channel estimation algorithms using matrix methods with inversion
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Error Detection And Correction (AREA)
- Storage Device Security (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
Abstract
Description
さらに、公開行列Gは、下記の式
Claims (15)
- 公開行列に基づき、エラー補正コードのデコーディングを用いて暗号化・認証を行う方法であって、前記公開行列は擬似巡回行列であることを特徴とする、暗号化・認証を行う方法。
- 前記公開行列(H)は、k行および2k列を有し、且つ、k*kのサイズの識別ブロックとk*kのサイズの巡回ブロックとの並置を有する請求項1記載の方法。
- 前記巡回ブロックは、kのサイズのランダムベクトルにより規定される請求項2または3記載の方法。
- 前記巡回ブロックは、バイナリ・データにより構成される請求項2から4のいずれか一項に記載の方法。
- サイズを表すkの数は、317に等しい請求項2から5のいずれか一項に記載の方法。
- 前記擬似巡回行列は、スターン・プロトコルまたはベロン・プロトコルにて使用される請求項2から5のいずれか一項に記載の方法。
- 前記第1の巡回ブロックおよび前記第2の巡回ブロックは、それぞれ、第1のベクトルおよび第2のベクトルにより規定され、前記第1のベクトルおよび前記第2のベクトルにより形成されるベクトルは、低次のベクトルである請求項8記載の方法。
- 前記第1のベクトルおよび前記第2のベクトルがランダムである請求項9記載の方法。
- 前記公開行列は、ベロン・プロトコルにおける公開行列として使用される請求項8から10のいずれか一項に記載の方法。
- 前記ベロン・プロトコルの秘密は、前記第1のベクトルおよび前記第2のベクトルにより構築されるような、行ベクトルから転置された列ベクトルからなる請求項11記載の方法。
- コンピュータ・プログラムの動作によって請求項11記載の方法を実行するための複数の命令を有することを特徴とするコンピュータ・プログラム。
- 請求項1から12のいずれか一項に記載の方法を実行するように構成される処理手段を備えることを特徴とする暗号化装置。
- 請求項14に記載の暗号化装置を具備することを特徴とするスマートカード。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0704518 | 2007-06-22 | ||
FR0704518A FR2917920B1 (fr) | 2007-06-22 | 2007-06-22 | Procede d'authentification utilisant un decodage de code correcteur d'erreurs a partir d'une matrice publique |
PCT/FR2008/000871 WO2009016272A1 (fr) | 2007-06-22 | 2008-06-20 | Procédé d'authentification utilisant un décodage de code correcteur d'erreurs à partir d'une matrice publique |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2010530990A true JP2010530990A (ja) | 2010-09-16 |
JP2010530990A5 JP2010530990A5 (ja) | 2011-08-04 |
JP5426540B2 JP5426540B2 (ja) | 2014-02-26 |
Family
ID=39027648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2010512742A Active JP5426540B2 (ja) | 2007-06-22 | 2008-06-20 | 公開行列に基づき、誤り訂正符号の復号を用いて認証を行う方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8817972B2 (ja) |
EP (1) | EP2158720B1 (ja) |
JP (1) | JP5426540B2 (ja) |
FR (1) | FR2917920B1 (ja) |
WO (1) | WO2009016272A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101913644B1 (ko) | 2017-03-13 | 2018-10-31 | 동국대학교 산학협력단 | 메시지 인증이 가능한 부호 기반 암호화 장치 및 방법 |
JP2022520675A (ja) * | 2018-12-21 | 2022-04-01 | 01 コミュニーク ラボラトリー インコーポレイテッド | 暗号システムおよび方法 |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5564434B2 (ja) * | 2008-01-11 | 2014-07-30 | オランジュ | 確率的対称暗号化のための方法およびエンティティ |
FR2956541B1 (fr) * | 2010-02-18 | 2012-03-23 | Centre Nat Rech Scient | Procede cryptographique de communication d'une information confidentielle. |
GB2522836A (en) * | 2013-12-02 | 2015-08-12 | Neul Ltd | Interference mitigation |
US20160028419A1 (en) * | 2014-07-22 | 2016-01-28 | Lsi Corporation | Systems and Methods for Rank Independent Cyclic Data Encoding |
WO2020146284A1 (en) * | 2019-01-07 | 2020-07-16 | Cryptography Research, Inc. | Efficient squaring with loop equalization in arithmetic logic units |
US11475170B2 (en) * | 2019-05-28 | 2022-10-18 | Nuvoton Technology Corporation | System and method for correction of memory errors |
US11342044B2 (en) | 2019-05-28 | 2022-05-24 | Nuvoton Technology Corporation | System and method for prioritization of bit error correction attempts |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07235922A (ja) * | 1993-12-30 | 1995-09-05 | Jacques Stern | 照合器により少なくとも一の証明器を認証するシステム |
JP2000516733A (ja) * | 1996-08-19 | 2000-12-12 | エヌティーアールユー クリプトシステムズ,インコーポレーテッド | 公開鍵暗号システム方法および装置 |
JP2006133380A (ja) * | 2004-11-04 | 2006-05-25 | Murata Mach Ltd | 復号装置と復号プログラム及び暗号通信システム |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6567465B2 (en) * | 2001-05-21 | 2003-05-20 | Pc Tel Inc. | DSL modem utilizing low density parity check codes |
WO2003065591A2 (en) * | 2002-01-29 | 2003-08-07 | Seagate Technology Llc | A method and decoding apparatus using linear code with parity check matrices composed from circulants |
US20040258240A1 (en) * | 2003-05-02 | 2004-12-23 | Singh Mukesh K. | Cryptosystems |
US7805652B1 (en) * | 2006-02-10 | 2010-09-28 | Marvell International Ltd. | Methods for generating and implementing quasi-cyclic irregular low-density parity check codes |
-
2007
- 2007-06-22 FR FR0704518A patent/FR2917920B1/fr not_active Expired - Fee Related
-
2008
- 2008-06-20 EP EP08826834.7A patent/EP2158720B1/fr active Active
- 2008-06-20 JP JP2010512742A patent/JP5426540B2/ja active Active
- 2008-06-20 US US12/665,831 patent/US8817972B2/en active Active
- 2008-06-20 WO PCT/FR2008/000871 patent/WO2009016272A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07235922A (ja) * | 1993-12-30 | 1995-09-05 | Jacques Stern | 照合器により少なくとも一の証明器を認証するシステム |
JP2000516733A (ja) * | 1996-08-19 | 2000-12-12 | エヌティーアールユー クリプトシステムズ,インコーポレーテッド | 公開鍵暗号システム方法および装置 |
JP2006133380A (ja) * | 2004-11-04 | 2006-05-25 | Murata Mach Ltd | 復号装置と復号プログラム及び暗号通信システム |
Non-Patent Citations (7)
Title |
---|
CSNG199901478001; 畑雅恭,橋本和憲,武田成史: '"高次元対称符号の形成とトポロジーに関する考察 -誤り訂正同時暗号符号化について-"' 電子情報通信学会技術研究報告 Vol.91,No.225, 19910919, p.1-11, 社団法人電子情報通信学会 * |
CSNG200900347057; 山川 茂紀,崔 洋,萩原 学,古原 和邦,今井 秀樹: '"LDPC符号を用いたMcEliece署名方式"' 電子情報通信学会技術研究報告 Vol.108,No.473, 20090302, p.537-543, 社団法人電子情報通信学会 * |
JPN6013002844; 畑雅恭,橋本和憲,武田成史: '"高次元対称符号の形成とトポロジーに関する考察 -誤り訂正同時暗号符号化について-"' 電子情報通信学会技術研究報告 Vol.91,No.225, 19910919, p.1-11, 社団法人電子情報通信学会 * |
JPN6013002848; 笠原正雄: '"代数的誤り訂正符号とランダム符号化に基づく拡大体上の公開鍵暗号"' 電子情報通信学会技術研究報告 Vol.104,No.421, 20041101, p.21-26, 社団法人電子情報通信学会[オンライン] * |
JPN6013002851; 笠原正雄: '"ランダム符号化に基づくK行列PKC -新しいSE(g)-PKCの提案と合わせて-"' 電子情報通信学会技術研究報告 Vol.105,No.664, 20060310, p.113-118, 社団法人電子情報通信学会[オンライン] * |
JPN6013002854; Philippe Gaborit, Cedric Lauradoux, Nicolas Sendrier: '"SYND: a Fast Code-Based Stream Ciper with a Security Reduction"' IEEE International Symposium on Information Theory (ISIT 2007) , 20070624, p.186-190, [online] * |
JPN6013052571; 山川 茂紀,崔 洋,萩原 学,古原 和邦,今井 秀樹: '"LDPC符号を用いたMcEliece署名方式"' 電子情報通信学会技術研究報告 Vol.108,No.473, 20090302, p.537-543, 社団法人電子情報通信学会 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101913644B1 (ko) | 2017-03-13 | 2018-10-31 | 동국대학교 산학협력단 | 메시지 인증이 가능한 부호 기반 암호화 장치 및 방법 |
JP2022520675A (ja) * | 2018-12-21 | 2022-04-01 | 01 コミュニーク ラボラトリー インコーポレイテッド | 暗号システムおよび方法 |
JP7328969B2 (ja) | 2018-12-21 | 2023-08-17 | 01 コミュニーク ラボラトリー インコーポレイテッド | 暗号システムおよび方法 |
Also Published As
Publication number | Publication date |
---|---|
EP2158720A1 (fr) | 2010-03-03 |
FR2917920B1 (fr) | 2009-10-09 |
FR2917920A1 (fr) | 2008-12-26 |
US8817972B2 (en) | 2014-08-26 |
US20110019815A1 (en) | 2011-01-27 |
WO2009016272A1 (fr) | 2009-02-05 |
JP5426540B2 (ja) | 2014-02-26 |
EP2158720B1 (fr) | 2018-11-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110363030B (zh) | 用于执行基于格的密码操作的方法和处理设备 | |
JP5426540B2 (ja) | 公開行列に基づき、誤り訂正符号の復号を用いて認証を行う方法 | |
JP2010530990A5 (ja) | ||
Bertoni et al. | Farfalle: parallel permutation-based cryptography | |
JP7019730B2 (ja) | キー交換デバイス及び方法 | |
Banegas et al. | DAGS: Key encapsulation using dyadic GS codes | |
US20100208885A1 (en) | Cryptographic processing and processors | |
EP3732822B1 (en) | Whitebox computation of keyed message authentication codes | |
US10419207B2 (en) | Cryptographic apparatuses and methods for encrypting and decrypting data using automata | |
Tao et al. | Simple matrix–a multivariate public key cryptosystem (MPKC) for encryption | |
Samardjiska et al. | A reaction attack against cryptosystems based on LRPC codes | |
US11902432B2 (en) | System and method to optimize generation of coprime numbers in cryptographic applications | |
US20220085999A1 (en) | System and method to optimize decryption operations in cryptographic applications | |
CN113498591A (zh) | 一种密码系统和方法 | |
US20110311041A1 (en) | Crytographically transforming data text | |
US9363073B2 (en) | Cryptographic countermeasure method by deriving a secret data | |
Bardet et al. | Improvement of algebraic attacks for solving superdetermined MinRank instances | |
US20220085998A1 (en) | System and method to generate prime numbers in cryptographic applications | |
Lau et al. | On the security of the modified Dual-ouroboros PKE using Gabidulin codes | |
Biryukov et al. | Cryptanalysis of the Atmel cipher in SecureMemory, CryptoMemory and CryptoRF | |
US20230153070A1 (en) | Parallel generation of a random matrix | |
US20220382521A1 (en) | System and method for encryption and decryption using logic synthesis | |
US11070358B2 (en) | Computation device and method | |
Beullens et al. | Practical attacks against the Walnut digital signature scheme | |
CN113475034B (zh) | 电路编译设备和电路评估设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110615 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20110615 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20130129 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20130426 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20130508 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130522 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20131029 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20131128 |
|
R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 Ref document number: 5426540 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |