RU2020115996A - Криптографическое устройство с обновляемой общей матрицей - Google Patents

Криптографическое устройство с обновляемой общей матрицей Download PDF

Info

Publication number
RU2020115996A
RU2020115996A RU2020115996A RU2020115996A RU2020115996A RU 2020115996 A RU2020115996 A RU 2020115996A RU 2020115996 A RU2020115996 A RU 2020115996A RU 2020115996 A RU2020115996 A RU 2020115996A RU 2020115996 A RU2020115996 A RU 2020115996A
Authority
RU
Russia
Prior art keywords
matrix
common
elements
network node
polynomials
Prior art date
Application number
RU2020115996A
Other languages
English (en)
Russian (ru)
Other versions
RU2020115996A3 (https=
Inventor
Оскар ГАРСИЯ МОРХОН
Людовикус Маринус Герардус Мария ТОЛХЁЙЗЕН
Original Assignee
Конинклейке Филипс Н.В.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Конинклейке Филипс Н.В. filed Critical Конинклейке Филипс Н.В.
Publication of RU2020115996A publication Critical patent/RU2020115996A/ru
Publication of RU2020115996A3 publication Critical patent/RU2020115996A3/ru

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • Computing Systems (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • Computational Mathematics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
RU2020115996A 2017-10-17 2018-10-12 Криптографическое устройство с обновляемой общей матрицей RU2020115996A (ru)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP17196926.4A EP3474484A1 (en) 2017-10-17 2017-10-17 Cryptographic device with updatable shared matrix
EP17196926.4 2017-10-17
PCT/EP2018/077823 WO2019076737A1 (en) 2017-10-17 2018-10-12 CRYPTOGRAPHIC DEVICE WITH SHARED MATRIX WHICH CAN BE UPDATED

Publications (2)

Publication Number Publication Date
RU2020115996A true RU2020115996A (ru) 2021-11-18
RU2020115996A3 RU2020115996A3 (https=) 2022-01-12

Family

ID=60138257

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2020115996A RU2020115996A (ru) 2017-10-17 2018-10-12 Криптографическое устройство с обновляемой общей матрицей

Country Status (8)

Country Link
US (1) US11212099B2 (https=)
EP (2) EP3474484A1 (https=)
JP (1) JP7208987B2 (https=)
CN (1) CN111492615B (https=)
BR (1) BR112020007373A2 (https=)
MX (1) MX2020003689A (https=)
RU (1) RU2020115996A (https=)
WO (1) WO2019076737A1 (https=)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3698515B1 (en) * 2017-10-17 2021-02-17 Koninklijke Philips N.V. Configurable device for lattice-based cryptography
EP3754896A1 (en) * 2019-06-18 2020-12-23 Koninklijke Philips N.V. Authenticated key agreement
EP4035306A4 (en) 2019-09-26 2022-11-16 Visa International Service Association GRID-BASED SIGNATURES WITH UNIFORM SECRETS
US12143481B2 (en) 2019-09-30 2024-11-12 The Governing Council Of The University Of Toronto Method and system for key generation
GB2587438A (en) * 2019-09-30 2021-03-31 Governing Council Univ Toronto Key generation for use in secured communication
US11153080B1 (en) * 2020-07-29 2021-10-19 John A. Nix Network securing device data using two post-quantum cryptography key encapsulation mechanisms
US20230370251A1 (en) * 2020-10-16 2023-11-16 Nippon Telegraph And Telephone Corporation Secure computation system, secure computation apparatus, secure computation method, and program
KR20220055079A (ko) * 2020-10-26 2022-05-03 삼성에스디에스 주식회사 NTRU LPRime 알고리즘에 대한 부채널 공격을 방지하기 위한 장치 및 방법
US12301709B2 (en) * 2020-11-24 2025-05-13 John A. Nix Multiple post-quantum cryptography key encapsulations with authentication and forward secrecy
US12003629B2 (en) 2020-12-30 2024-06-04 John A. Nix Secure server digital signature generation for post-quantum cryptography key encapsulations
US11632246B2 (en) * 2020-12-30 2023-04-18 International Business Machines Corporation Hybrid key derivation to secure data
CN112765551B (zh) * 2021-01-21 2024-05-07 中国科学院重庆绿色智能技术研究院 一种双重约化的矩阵乘法的分块参数空间优化方法
JP7402191B2 (ja) * 2021-03-03 2023-12-20 Kddi株式会社 乗算装置、乗算方法及び乗算プログラム
CN112910933B (zh) * 2021-05-07 2021-07-13 鹏城实验室 认证方法、认证设备以及验证设备
EP4099609A1 (en) 2021-06-04 2022-12-07 Zama SAS Computational network conversion for fully homomorphic evaluation
US12192184B2 (en) 2021-12-08 2025-01-07 John A. Nix Secure session resumption using post-quantum cryptography
CN114462571B (zh) * 2021-12-31 2024-12-06 科大讯飞股份有限公司 训练深度学习模型的方法、数据处理方法及装置
CN114630319A (zh) * 2022-03-16 2022-06-14 黄文孝 面向智能电网的输变电监测数据安全管理系统及方法
US12567946B2 (en) 2022-06-03 2026-03-03 Kioxia Corporation Encryption device, decryption device, storage system, information processing device, encryption method, decryption method, decompression device, and decompression method
US12413399B2 (en) * 2022-10-06 2025-09-09 Nxp B.V. Fault detection in post-quantum cyptography
JP2025542096A (ja) 2022-11-15 2025-12-25 クォンタム ブリッジ テクノロジーズ インコーポレイテッド セキュアなネットワークにおける鍵生成データの配送のためのシステム及び方法
FR3147019A1 (fr) * 2023-03-24 2024-09-27 Stmicroelectronics International N.V. Vérification d'une donnée

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4485175B2 (ja) 2002-12-03 2010-06-16 パナソニック株式会社 鍵共有システム、共有鍵生成装置及び共有鍵復元装置
US8621227B2 (en) * 2010-12-28 2013-12-31 Authernative, Inc. System and method for cryptographic key exchange using matrices
WO2013152725A1 (en) * 2012-04-12 2013-10-17 Jintai Ding New cryptographic systems using pairing with errors
CN105379173A (zh) * 2013-07-12 2016-03-02 皇家飞利浦有限公司 用于共享密码密钥的系统
IN2013MU02907A (https=) * 2013-09-06 2015-07-03 Tata Consultancy Services Ltd
CN103490901B (zh) * 2013-09-30 2016-07-27 广东南方信息安全产业基地有限公司 基于组合密钥体系的密钥生成和发放方法
US9223720B2 (en) * 2013-12-13 2015-12-29 Oracle International Corporation Systems and methods for rapidly generating suitable pairs of hash functions
WO2015184991A1 (en) * 2014-06-04 2015-12-10 Jintai Ding Improvements on cryptographic systems using pairing with errors
US9577897B2 (en) * 2015-02-20 2017-02-21 Adobe Systems Incorporated Providing visualizations of event sequence data
CN105930916A (zh) * 2016-04-07 2016-09-07 大连理工大学 一种基于并行模块化神经网络的副产煤气实时预测方法
US10097351B1 (en) * 2016-09-15 2018-10-09 ISARA Corporation Generating a lattice basis for lattice-based cryptography
US9698986B1 (en) * 2016-09-23 2017-07-04 ISARA Corporation Generating shared secrets for lattice-based cryptographic protocols
CN106357410B (zh) * 2016-10-10 2019-10-01 中山大学 一种在没有单向陷门的格签名上构建阈下信道的方法
EP3373505A1 (en) 2017-03-06 2018-09-12 Koninklijke Philips N.V. Device and method for sharing a matrix for use in a cryptographic protocol

Also Published As

Publication number Publication date
CN111492615B (zh) 2023-08-29
WO2019076737A1 (en) 2019-04-25
JP7208987B2 (ja) 2023-01-19
JP2020537191A (ja) 2020-12-17
EP3698513B1 (en) 2021-12-08
RU2020115996A3 (https=) 2022-01-12
EP3698513A1 (en) 2020-08-26
EP3474484A1 (en) 2019-04-24
US20200304305A1 (en) 2020-09-24
CN111492615A (zh) 2020-08-04
US11212099B2 (en) 2021-12-28
BR112020007373A2 (pt) 2020-09-29
MX2020003689A (es) 2020-08-03

Similar Documents

Publication Publication Date Title
RU2020115996A (ru) Криптографическое устройство с обновляемой общей матрицей
JP2020537191A5 (https=)
CN110348231A (zh) 实现隐私保护的数据同态加解密方法及装置
JP5957120B1 (ja) 秘密分散方法、秘密分散システム、分散装置、およびプログラム
KR101860461B1 (ko) 암호화 방법 및 암호화 장치
JP2020511832A5 (https=)
JP2022066220A (ja) Polar符号符号化方法および装置
CN110519039B (zh) 一种数据的同态处理方法、设备和介质
Hanis et al. Double image compression and encryption scheme using logistic mapped convolution and cellular automata
CN103812596B (zh) 伪随机序列的生成方法和装置
RU2014106490A (ru) Устройство обработки информации, способ обработки информации и программа
RU2015129778A (ru) Использующее общий ключ сетевое устройство и его конфигурирование
CN110493201B (zh) 一种数据的处理方法、装置和系统
KR102154164B1 (ko) 의사 랜덤 시퀀스 생성 방법 및 데이터 스트림의 코딩 또는 디코딩 방법
AU2020202883B1 (en) Systems and computer-implemented methods for generating pseudo random numbers
CN110011790B (zh) 一种基于编码的抗量子密钥协商方法
CN110098891A (zh) 交织方法和交织装置
CN115801227A (zh) 一种生成置换表的方法及装置
CN108092692B (zh) 一种cdma系统信道扩频装置及方法
CN112272082A (zh) 图像加密/解密的方法及装置、电子设备、存储介质
CN118567609A (zh) 伪随机序列生成方法、装置、设备及存储介质
CN108271254B (zh) 信号传输方法及设备
JP4856909B2 (ja) データ分割・復元システム、端末装置、データ分割・復元方法、およびコンピュータプログラム
KR101637187B1 (ko) 이미지에 기반한 랜덤 넘버 생성장치 및 그 방법
Awad et al. Efficient chaotic permutations for image encryption algorithms