USRE48644E1 - Cryptographic system using pairing with errors - Google Patents
Cryptographic system using pairing with errors Download PDFInfo
- Publication number
- USRE48644E1 USRE48644E1 US16/678,383 US201316678383A USRE48644E US RE48644 E1 USRE48644 E1 US RE48644E1 US 201316678383 A US201316678383 A US 201316678383A US RE48644 E USRE48644 E US RE48644E
- Authority
- US
- United States
- Prior art keywords
- matrix
- key
- interval
- entry
- numbered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Definitions
- This invention is related to the construction of cryptographic systems, in particular, key exchange (KE) systems, key distribution (KD) systems and identity-based-encryption (IBE) systems, which are based on essentially the same mathematical principle, pairing with errors.
- KE key exchange
- KD key distribution
- IBE identity-based-encryption
- KD key distribution
- KD key distribution
- Shamir proposed another kind of public key encryption system [SHA].
- a person or an entity's public key is generated with a public algorithm from the information that can identify the person or the entity uniquely.
- the information may include the person's name, residential address, birthday, finger print information, e-mail address, social security number and etc. Since the public key is determined by the public information that can identify the person, this type of public key cryptosystem is called an identity-based encryption (IBE) system.
- IBE identity-based encryption
- IBE Identity-based-encryption
- a sender encrypts a message for a given receiver using the receiver's public key based on the identity of the receiver.
- the receiver decrypts the message using the receiver's private key.
- the receiver obtains the private key from a central server, which has a system to generate and distribute the IBE private key for the legitimate user securely.
- An IBE system does not demand the sender to search for the receiver's public key, but rather, a sender in an IBE system derives any receiver's corresponding public key using an algorithm on the information that identifies the receiver, for example, an email address, an ID number or other information.
- Current IBE systems are very complicated and not efficient in terms of computations, since the bilinear paring over elliptic curves is very computationally intensive. These systems based on pairing over elliptic curves can also be broken efficiently if we have a quantum computer as showed in the work of Shor [SHO]. There are also constructions based on lattices, but those are also rather complicated systems for applications [ABB] [ABVVW] [BKPW]. Therefore it is important and desirable that we have secure and efficient IBE systems.
- This invention first contains a novel method for two parties A and B to perform an secure KE over an open communication channel.
- This method is based on the computation of pairing of the same bilinear form in two different ways but each with different small errors.
- each users will choose a private matrix S A , S B respectively with small entries following certain error distributions secretly and a public matrix M randomly.
- each user will compute the multiplication of the user's secret matrix with the publicly chosen matrix but with small errors, exchange the new matrices, and then perform the computation of pairing of S A and S B over the same bilinear form based on M in two different ways but each with different small errors.
- This kind of mathematical computation is called pairing with errors.
- the shared key is derived from the pairings with a rounding technique.
- This invention second contains a novel method to build a KD system with a central server or authority.
- the central server or authority assigns each user i a public ID as a matrix A i with small entries or establish the ID of each user as a matrix A i with small entries following certain error distributions with the information that can identify the user uniquely, and, in a secure way, gives each user a private key based on certain multiplication of this ID matrix with the central server or authority's secret master key M, another matrix, but with small errors.
- any two users in the system will compute the pairing of the two ID matrices of the users with the same bilinear form based on the master key matrix M in two different ways but each with different small errors to derive a shared key between these two users with certain rounding technique.
- This method can be viewed as an extension of the idea of the learning with error problem discovered by Regev in 2005 [Reg].
- the security of this system depends on the hardness of the problem related to pairing with errors. This system involves only matrix multiplication and therefore is very efficient.
- This invention third contains a novel method to build a IBE system with a central server or authority.
- the central server or authority assigns each user i a public ID A i as a matrix with small entries following certain certain error distributions or establish the ID of each user as a matrix with small entries following certain certain error distributions with the information that can identify the user uniquely.
- Each user is given by the central server or authority a private key S i based on certain multiplication of this ID matrix with the central server or authority's master private key S, another matrix, but with errors related to one part of the master public key M, another matrix.
- the central server or authority will establish another half of the mater key as the multiplication of M and S with small errors, which we call M 1 .
- any user who wishes to send the user i a message in the system will compute public key of i which consists of M and a paring of M and A i of the bilinear form based on the master secret key matrix S, then encrypt the message using the encryption system based on the MLWE problem, and the user i will use the secret key S i to decrypt the message.
- This method can be viewed as an extension of the idea of the learning with error problem discovered by REGEV in 2005.
- the security of this system depends the harness of certain lattice problem, which can be mathematically proven hard. This system involves only matrix multiplication and therefore is very efficient.
- a LWE problem can be described as follows. First, we have a parameter n, a (prime) modulus q, and an error probability distribution n on the finite ring (field) F q with q elements. To simplify the exposition, we will take q to be a odd prime and but we can also work on any whole number except that we may need to make slight modifications.
- each element is represented by the set ⁇ (q ⁇ 1)/2, . . . , 0, . . . , (q ⁇ 1)/2 ⁇ .
- an error distribution
- we mean a distribution we mean a distribution such that there is a high probability we will select an element, which is small. There are many such selections and the selection directly affect the security of the system. One should select good error distribution to make sure the system works well and securely.
- ⁇ S, ⁇ , on F q be the probability distribution obtained by selecting an element A in F q n randomly and uniformly, choosing e ⁇ F q according to ⁇ , and outputting (A, ⁇ A, S>+e), where + is the addition that is performed in F q .
- A is a square matrices of the size n ⁇ n and, S and e of the size n ⁇ 1.
- ⁇ S, ⁇ n over F q be the probability distribution obtained by selecting an n ⁇ n matrix A, whose each entry are chosen in F q uniformly and independently, choosing e as a n ⁇ 1 vector over F q with entries chosen according to certain error distribution ⁇ n , for example, each entries follows an error distribution n independently, and outputting (A, A ⁇ S+e), where + is the addition that is performed in F q n .
- An algorithm that solves a LWE with modulus q and error distribution ⁇ n , if, for any vector S in F q n , with any number of independent sample(s) from ⁇ S, ⁇ n , it outputs S (with high probability).
- ⁇ S, ⁇ n 2 over F q be the probability distribution obtained by selecting an n ⁇ n matrix A, whose each entry are chosen in F q uniformly and independently, choosing e as a n ⁇ n matrix over F q with entries following certain error distribution ⁇ n 2 , for example, an distribution chosen according to the error distribution n independently, and outputting (A, A ⁇ S+e), where + is the addition that is performed in F q n 2 .
- An algorithm that solves a LWE with modulus q and error distribution ⁇ n 2 if, for any n ⁇ n matrix S in F q n , with any number of independent sample(s) from ⁇ S, ⁇ n 2 , it outputs S (with a high probability).
- Any element in R q is represented by a degree n polynomial, which can also be viewed as a vector with its corresponding coefficients as its entries.
- q to be even positive number and things need slight modification.
- the RLWE f,q, ⁇ problem is parameterized by an polynomial f(x) of degree n, a prime number q and an error distribution X over R q . It is defined as follows.
- the secret s be an element in R q , a uniformly chosen random ring element.
- this system can be very efficient due to the possibility doing fast multiplication over the ring R q using FFT type of algorithms.
- the system can be essentially understood as that the master key of a central server is a symmetric matrix M of size n ⁇ n and each user's identity can be seen as a row vector H i of size n.
- the central server gives each user the secret H i ⁇ M.
- two users can derive the shared key as H i ⁇ M ⁇ H j t .
- large number of users can collaborate to derive the master key. If one can collect enough (essentially n) H i ⁇ M, which then can be used to find the master key M and therefore break the system.
- the key distribution system is set up step by step as follows.
- the RLWE problem can be viewed as a specialized commutative version of matrix-based LWE since an element in the ring can be view as a homomorphism on the ring.
- A, B, e i can follow different error distributions.
- S i is a solution to a MLWE problem with the pair (A i , B i ) as the problem input. Therefore S i is indeed a secret key that could be used for decryption. Therefore the construction works. We need to choose parameters properly to ensure security.
- the small elements like S, A i , e, e i can follow different error distributions.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
- Complex Calculations (AREA)
Abstract
Description
A×B×C=(A×B)×C=A×(B×C).
Such a product can be mathematically viewed as computing the bilinear paring of the row vectors of A with column vectors of C.
AB+Ea,
then compute
(AB+EA)C or (AB+EA)C+EAC,
or we will compute
BC+EC,
then compute
A(BC+Ec) or (AB+EA)C+EBC,
where EA, EB, EAC, EBC are matrices with small entries following the same (or different) error distributions. Then we have two way to compute the product ABC with small errors or differences between these two matrices. We call such a computation pairing with errors. All our constructions depends on such a paring with errors and on the fact that the two different paring are close to each other if A and C are also small.
-
- (1) Alice and Bob will first publicly select Fq, n and a n×n matrix M over Fq uniformly and randomly, where q is of size of a polynomial of n, for example q≈n3, and an error distribution κn
2 to be a distribution over n×n matrices over Fq, for example, a distribution that each component are independent and each component follow certain error distribution like the discrete error distribution κσ as in the case of LWE, namely a discrete normal distribution over Fq center around 0 with standard deviation approximately √{square root over (n)}. All the information above is public. They jointly and publicly choose a small (prime) integer t (t<<n). - (2) Then each party chooses its own secret Si (i=A, B) as a n×n matrix chosen according to the error distribution κn
2 , ei also as a n×n matrix following the error distribution. For Alice, she computes
MA=MSA+teA,- where t is a small integer (t<<n).
- For Bob, he computes
MB=MtSB+teB.
- For Bob, he computes
- where t is a small integer (t<<n).
- (3) Both parties exchange Mi in the open communication channel. This means both Mi (i=A, B) are public, but keep Si and ei (i=A, B), secret.
- (4) Alice computes:
KA=St A×MB=St AMtSB+tSt AeB.- Bob computes:
KB=Mt A×SB=St AMtSB+tet ASB.
- Bob computes:
- (5) Both of them will perform a rounding technique to derive the shared key as follows:
- (a) Bob will make a list T1 of all positions of the entries of KB such that these entries are in the range of [−(q−1)/4, (q−1)/4] and a list T2 of all positions which are not in the range of [−(q−1)/4, (q−1)/4]. Then Bob will send to Alice the list T1.
- (b) Then each party will compute the residues of these entries modular t in T1, and for the entries not in T1, which is in T2, they will add (q−1)/2 to each entry and compute the residue modular q first (into the range of [−(q−1)/4, (q−1)/4]) then the residue modular t. That gives a shared key between these two users.
- (1) Alice and Bob will first publicly select Fq, n and a n×n matrix M over Fq uniformly and randomly, where q is of size of a polynomial of n, for example q≈n3, and an error distribution κn
-
- (1) an n×n matrix M, a prime integer q, a small positive integer t, and an error distribution κn and;
M′A=MS′A+teA
and
M′B=MtS′B+teB, (2)- where ei, a n×1 vector follows the error distribution κn and the entries of n×1 vectors also follows the same error distribution;
- (3) and the fact that
K′B=Mt A×S′B=(S′A)tMtS′B+t<eA,S′B>- is in the range of [−(q−1)/4, (q−1)/4] or not;
the problem is to find an algorithm to derive
K′A=(S′A)t×MB=(S′A)tMtS′B+t<S′A,eB>
modular t if K′B is in the range of [−(q−1)/4, (q−1)/4], otherwise K′A+(q−1)/2 first modular q then modular t, with a high probability. We call such a problem a pairing with error problem (PEP).
- is in the range of [−(q−1)/4, (q−1)/4] or not;
- (1) an n×n matrix M, a prime integer q, a small positive integer t, and an error distribution κn and;
a(x)=a0+a1x+ . . . +an-1xn-1,
we define
∥a∥=max|ai|,
the l∞ norm of the vector (a0, a1, . . . , an-1) and we treat this vector as an element in Zn and ai an element in Z. We can also choose q to be even positive number and things need slight modification.
(ai,bi=ai×s+ei),
where ai is uniformly random in Rq and ei is selected following certain error distribution X.
-
- We choose f(x) to be the cyclotomic polynomial xn+1 for n=2u, a power of two;
- The error distribution χ is the discrete Gaussian distribution DZ
n ,σ for some n>>σ>ω(√{square root over (log n)})>1; - q=1 (mod 2n) and q a polynomial of n and q≈n3;
- t a small prime and t<<n<<q.
We can also use other parameters for practical applications.
-
- (1) The length of a vector drawn from a discrete Gaussian of with standard deviation a is bounded by σn, namely,
Pr(∥X∥>σn)≤2−n+1,- for X chosen according to X.
- (2) The multiplication in the ring Rq increases from the norms of the constituent elements in a reasonable scale, that is,
∥X×Y(mod f(x))∥≤n∥X∥∥Y∥,- for X, Y ϵ Rq and the norm is the l∞ norm defined above.
- (1) The length of a vector drawn from a discrete Gaussian of with standard deviation a is bounded by σn, namely,
-
- (1) Alice and Bob will first publicly select all the parameters for the RLWEf,q,χ including q(≈n3 or similar polynomial functions of n), n, f(x) and χ. In addition, they will select a random element M over Rq uniformly. All the information above is public.
- (2) Then each party chooses its own secret si as an element in Rq according to the error distribution χ, and ei independently also as an element following the error distribution χ, but jointly choose a small prime integer t (t<<n) For Alice, she computes
MA=MsA+teA, - where t is a small integer (t<<n).
- For Bob, he computes
MB=MsB+teB.
- For Bob, he computes
- (3) Both parties exchange Mi. This means both Mi are public, but certainly keep si and ei secret.
- (4) Alice computes:
KA=sA×MB=sAMsB+teBsA.- Bob computes:
KB=MA×sB=sAMsB+teAsB.
- Bob computes:
- (5) Both of them will perform a rounding technique to derive the shared key as follows:
- (a) Bob will then make a list of size n, and this list consists of pairs in the form of (i, j), where i=0, . . . , n−1, and j=1 if the xi coefficient of KB is in the range of [−(q−1)/4, (q−1)/4], otherwise j=0.
- (b) Then Bob will send this list to Alice. Then each will compute the residue of the corresponding entries modular t in the following way:
- for an element of the list (i, j),
- 1) if j=1, each will compute the i-th entry of KA and KB modular t respectively;
- 2) if j=0, each will add (q−1)/2 to the i-th entry of KA and KB modular q back to range of [−(q−1)/4, (q−1)/4], then compute the residues modular t.
-
- a random element M in Rq, prime integers t, q and the error distribution X with parameters selected as in the RLWEf,q,χ above;
- MA=MsA+teA and MB=MsB+teB, where ei follows the error distribution X and si also follows the error distribution χ;
- and the fact that (KB)i, the coefficients xi of KB=MA×sB=sAMsB+teAsB is in the range of [−(q−1)/4, (q−1)/4] or not;
the problem is to find an algorithm to derive KB (or KA) modular t or KB+(q−1)/2 (or KA+(q−1)/2) modular q (into the range of [−(q−1)/4, (q−1)/4]) and then modular t with a high probability. We call such a problem a pairing with error problem over a ring (RPE).
Hi×M×Hj t=Hj t×M×Hi.
However, large number of users can collaborate to derive the master key. If one can collect enough (essentially n) Hi×M, which then can be used to find the master key M and therefore break the system.
-
- (1) We have a central server, which will select a symmetric randomly chosen n×n matrix S, as a master key, whose entries are in Fq:
S=St. - (2) For each user index as i, the central server gives it a (in general not symmetric) matrix At (as an ID) with small entries following error distribution κn
2 . The ID matrix of each user is public and it can also be generated with information that can identify the user like email address, name and etc. - (3) For each user, the central server distribute securely a secret:
Ei=AiS+tei, - where ei is a matrix (not symmetric) selected following certain error distribution, such as κn
2 . This is kept private for each user.
- (1) We have a central server, which will select a symmetric randomly chosen n×n matrix S, as a master key, whose entries are in Fq:
Ki=Ei×Aj t=AiSAj t+teiAj t;
and the user j computes
Kj=Ai×(Ej)t=AiStAj t+tAiej t=AiSAj t+tAiej t.
This is possible because the IDs are public. They then can use the following simple rounding method to derive a shared key between the two users.
-
- When the user j wants to establish a shared key with the user i, the user j will collect all the entries (including their positions in the matrix) in Kj that are in the range of (−(q−1)/4, (q−1)/4), namely those entries which are closer to 0 than (q−1)/2. Then user j will send to the user i a list of the positions of the entries in the matrix (only the position not the values of the entries themselves) that are randomly selected from the collection, which is tagged by 0, and a list of entries not in the list tagged by 0. Then the user i will select the same entries in its own matrix Ei×Aj. Now they have a shared list of common entry positions, therefore the corresponding entries of the matrix. Then each user will compute the residue of these entries modular t tagged by 1 and compute the residue of the sum of each of these entries tagged by 0 with (q−1)/2 to build a new identical ordered list of values, which will be their shared secret key.
AiSAj t=AiStAj t,
therefore the user j derives
AiSAj t+tAiAiej t.
The difference between the results computed by the two users is:
Ei×At j−Ai×Et J=AiSAt j+teiAt j−(AiSAt j+tAiet j)
=teiAt j−tAiet j.
E=A×S+te′,
A, S where e′ are elements in R, t is small integer, e′ is an error element following the distribution of χ, S is a fixed element and A is select randomly following uniform distribution, and the problem is to find the secret S.
-
- (1) The central server will also select a random element M in Rq following uniform distribution.
- (2) For each user, the central server will assign an public ID as Ai, where Ai should be in the form of a chosen small element in Rq, namely following an error distribution like χ.
- (3) Each member is given a secret key by the central server:
Si=MAS+tee,- where ei follows an error distribution χ.
- (4) If two user i and j wants to build a shared key, one user, say i can use the ID matrix of j, namely Ai, the its secret key to build a shared key with j by computing
Ki=Aj×Si=AjMAi+tAjei,- and j can use its secret key to build a shared key with i by computing
Kj=Ai×Sj=AjMAi+tAiej, - then derive the shared key with the rounding technique as follows:
- (a) i will then make a list of size n, and this list consists of pairs in the form of (a, b), where a=0, . . . , n−1, and b=1 if the xa coefficient of Ki is in the range of [−(q−1)/4, (q−1)/4], otherwise b=0.
- (b) i will send this list to j. Then each will compute the residue of the corresponding entries modular t in the following way:
- for an element of the list (a, b),
- 1) if b=1, each will compute the a-th entry of Ki and Kj modular t respectively;
- 2) if b=0, each will add (q−1)/2 to the a-th entry of Ki and Kj modular q back to range of [−(q−1)/4, (q−1)/4], then compute the residues modular t.
- and j can use its secret key to build a shared key with i by computing
-
- (1) We select an n×n matrix S, whose entries are small following an error distribution κn
2 , for example, each entries independently and randomly follows the distribution κσ. - (2) In the setting of the MLWE, we will derive one output pair (A, E), where
E=A×S+e,
or
E=A×S+te,- and t is small, t<<n, and they form the public key of our encryption system. Here e follow certain error distributions, for example the distribution we use above.
- (3) S is the private key of the cryptosystem.
- (4) A message in is represented as n×n matrix with binary entries of 0, 1 or n×n matrix with entries in the range modular t, namely 0, 1 . . . , t−1.
- (5) A sender chooses a n×n small matrix B similar to S namely following an error distribution κn
2 , for example, each entries independently and randomly follows the distribution κσ. Then the sender compute the encrypted message as:
(D1,D2)=(B×A+e1,B×E+e2+m (q/2)),
or
((D1,D2)=(B×A+te1,B×E+te2+m,- where e1 and e2 are error matrices selected independently following some error distribution like e.
- (6) To decrypt, the legitimate, in the first case, computes
D2−D1×S=(BE+e2+m(q/2)−(BA+e1)S)=eE+e2−e1S+m(q/2),- where everything is done in Fq, and we can check on each entry of the matrix, if it is near 0, we output 0, and if it is near (q−1)/2, we output 1, or we divide them by (q−1)/2 performed as a real number division and round them to 0 or 1 and the output will be the plaintext m; or in the second case, the legitimate user computes
D2−D1×S=(BE+te2+m−(BA+te1)S)=,teE+te2−te1S+m, - then modular t. This will be the plaintext m.
- where everything is done in Fq, and we can check on each entry of the matrix, if it is near 0, we output 0, and if it is near (q−1)/2, we output 1, or we divide them by (q−1)/2 performed as a real number division and round them to 0 or 1 and the output will be the plaintext m; or in the second case, the legitimate user computes
- (1) We select an n×n matrix S, whose entries are small following an error distribution κn
D2−D1×S=BE+e2+m(q/2)−(BA+e)S
=B×(A×S+e)+e2+m(q/2)−(BA+e1)×S
=B×e+e2−e1×S+m(q/2)
B×e+e2−e1×S can be viewed as a error terms, which is determined by the distribution of the following random variable. With proper choice of parameters, like in the case of KE or KD systems, the decryption process will surely return the right answer when n is large enough. The same argument goes with the second case.
E=A×S+te,
t is small positive integer and the entries of S is also small following error distribution κn
(D1,D2)=(BA+te1,BE+te2+m).
Then we decrypt by computing
(BE+te2+m−B(AS+te1))(mod t).
This works because
D2−D1×S=BE+te2+m−(BA+t1e1)S
=B×(A×S+te)+te2+m−(BA+te1)×S
=tB×e+te2−te1×S+m
Since the error terms are small, by modular t, we certainly should get back the original plaintext.
-
- (1) The central server will first select a secret n×n matrix S as the secret master key, where S is selected as a small element following certain error distribution κn
2 like error distributions like in KE and KD systems. - (2) The central server will also select a random element M following uniform distribution or similar distribution, but make sure that M has an inverse. If we could not find one first time, we will try again till we find one. We have a high probability of success to find such a M when q is large. Then the central serve will compute
M1=MS+te,- where e is small following certain error distribution κn
2 .
- where e is small following certain error distribution κn
- (3) Then the central server will publicize M and M1 as the master public key.
- (4) For each user, the central server will assign an public ID as Ai, where Ai is small following certain error distribution κn
2 , and it can be generated from information that can identify the user. - (5) Each member is given a secret key:
Si=SAi+tM−1ei,- where ei's entries are small following the error distribution n. Surely this is the same as given
MSi=MSAi+tei, - since M is public.
- where ei's entries are small following the error distribution n. Surely this is the same as given
- (6) Anyone can use the ID, namely Ai, and the master public key to build a new public key for the user with ID Ai, which is given as the pair (Ai, Bi), where
Ai=M
and
Bi=M1Ai=MSAi+teAi,- and it is used as the public key to encrypt any message use the MLWE encryption system above.
This gives an identity based encryption system.
- and it is used as the public key to encrypt any message use the MLWE encryption system above.
- (1) The central server will first select a secret n×n matrix S as the secret master key, where S is selected as a small element following certain error distribution κn
MSi−Bi=MSi−Bi
=M(SAi+tM−1ei)−MSAi+teAi
=MSAi+tMM−1ei)−MSAi+teAi
=tei−teAi,
Since e, Ai and ei are small, e−Aiei is also small and tei−tAiei is also small. Therefore Si is a solution to a MLWE problem with the pair (Ai, Bi) as the problem input. Therefore Si is indeed a secret key that could be used for decryption. Therefore the construction works. We need to choose parameters properly to ensure security.
E=A×S+te′,
A, S where e′ are elements in Rq, t is small integer, e′ is an error element following an error distribution X, S is a fixed element and A is select randomly following uniform distribution, and the problem is to find the secret S. We also know that one can build a public key encryption systems using the RLWE problem[LPR], where A, and E serve as the public key, and the secret S, which needs to be small, serves as the private key. We can use the fact that in a ring-LWE problem that the multiplication is commutative.
-
- (1) The central server will first select a secret S in R as the secret master key, where S is a selected small element follow certain error distributions χ.
- (2) The central server will also select a random element M in R following uniform distribution and make sure that M has an inverse. If we could not find one first time, we will try again till we find one. We have a high probability of success to find such a M when q is large. Then the central serve will computer
M1−MS−te,- where e is small and follows error distribution χ.
- (3) Then the central server will publicize M and M1 as the master public key.
- (4) For each user, the central server will assign an public ID as Ai, where A, is a small element in Rq, and it follows error distribution χ.
- (5) Each member is given a secret key:
Si=SAi+tM−1ei,- where ei small element in R, and it follow certain error distribution X. Surely this is the same as given
MSi=MSAi+tei, - since M is public.
- where ei small element in R, and it follow certain error distribution X. Surely this is the same as given
- (6) Anyone can use the ID, namely Ai, and the master public key to build a new public key for the user with ID Ai, which is given as the pair (Ai, Bi), where
Ai=M
and
Bi=AiM1=AiMS+tAie=MSAi+tAie,- and it is used as the public key to encrypt any message.
This gives an identity based encryption system.
- and it is used as the public key to encrypt any message.
SiAi−Bi=SiM−Bi
=M(SAi+iM−1ei)−MSAi+Aite
=MSAi+tMM−1ei)−MSAi+Aite
=te−tAiei,
which is due to the fact that this is a commutative ring. Since e, Ai and ei are small, e−Aiei is also small and te−tAiei is also small. Therefore Si is a solution to a ring LWE problem with the pair (Ai, Bi) as the problem input. Therefore Si is indeed a secret key that could be used for decryption.
f(x)=Πfi(x)+g(x),
where each fi, g(x) is a extremely sparse matrix with very few terms, for example, 2 or 3 terms none-zero. Using this kind of polynomial can speed up the encryption and decryption computations.
- [ABB] S. Agrawal, D. Boneh, X. Boyen: Efficient Lattice (H)IBE in the Standard Model. In proceedings of Eurocrypt 2010, Lecture Notes in Computer Science, Volume 6110, pp. 553-572, 2010.
- [ABVVW] S. Agrawal, X. Boyen, V. Vaikuntanathan, P. Voulgaris, H. Wee: Fuzzy Identity Based Encryption from Lattices. IACR Cryptology ePrint Archive 2011: 414 (2011)
- [ACPS] B. Applebaum, D. Cash, C. Peikert, A. Sahai; Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. Advances in Cryptology-CRYPTO 2009, Lecture Notes in Computer Science, Volume 5677 pp 595-618, 2009
- [BKPW] M. Bellare, E. Kiltz, C. Peikert, B. Waters: Identity-Based (Lossy) Trapdoor Functions and Applications. In Proceedings of EUROCRYPT 2012, Lecture Notes in Computer Science, Volume 7237, pp 228-245 2012.
- [BSHKVY] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. in Advances in Cryptology Crypto 92, Lecture Notes in Computer Science, Volume 740, pp 471-486, 1993
- [BKW] A. Blum, A. Kalai, and H. Wasserman. Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM, 50(4), pp 506-19, 2003.
- [COP] D. Coppersmith, Shmuel Winograd, Matrix multiplication via arithmetic progressions, Journal of Symbolic Computation—Special issue on computational algebraic complexity archive 9 (3), pp 251-280, 1990
- [DiHe] W. Diffie, M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (6), pp 644-54, 1976.
- [DiLi] J. Ding, X. Lin, A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem, Cryptology ePrint Archive, Report 688, 2012
- [LNV] K. Lauter, M. Naehrig, V. Vaikuntanathan, Can Homomorphic Encryption be Practical?, Cryptology ePrint Archive, Report 2011/405, 2011, http://eprint.iacr.org,
- [LPR] V. Lyubashevsky, C. Peikert, O. Regev, On ideal lattices and learning with errors over rings In Eurocrypt 2010
- [REG] O. Regev, On lattices, learning with errors, random linear codes, and cryptography, in Proceedings of the 37th Annual ACM Symposium on Theory of Computing STOC05, ACM, pp 84-93, 2005
- [SHA] A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in CryptologyCrypto '84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, pp. 47-53, 1984
- [SHO] P. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal of Computing 26, pp. 1484-1509, 1997.
- [STR] V. Strassen, Gaussian Elimination is not Optimal, Numer. Math. 13, p. 354-356, 1969
Claims (53)
MA=MSA+teA,
MB=MtSB+teB,
KA=St A×MB=St AMtSB+tSt AeB;
KB=Mt A×SB=St AMtSB+tet ASB;
Ei=AiS+tei,
Ki=Ei×Aj t=AiSAj t+teiAj t;
Kj=Ai×(Ej)t=AiStAj t+tAiej t=AiSAj t+tAiej t;
M1=MS+te,
Si=SAi+tM−1ei,
Ai=M
and
Bi=M1Ai=MSAi+teAi,
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/678,383 USRE48644E1 (en) | 2012-04-12 | 2013-04-11 | Cryptographic system using pairing with errors |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261623272P | 2012-04-12 | 2012-04-12 | |
PCT/CN2013/074053 WO2013152725A1 (en) | 2012-04-12 | 2013-04-11 | New cryptographic systems using pairing with errors |
US16/678,383 USRE48644E1 (en) | 2012-04-12 | 2013-04-11 | Cryptographic system using pairing with errors |
US14/491,992 US9246675B2 (en) | 2012-04-12 | 2013-04-11 | Cryptographic systems using pairing with errors |
US201815881531A | 2018-01-26 | 2018-01-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE48644E1 true USRE48644E1 (en) | 2021-07-13 |
Family
ID=49327117
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/881,531 Active USRE47841E1 (en) | 2012-04-12 | 2013-04-11 | Cryptographic system using pairing with errors |
US16/678,335 Active USRE48643E1 (en) | 2012-04-12 | 2013-04-11 | Cryptographic system using pairing with errors |
US14/491,992 Ceased US9246675B2 (en) | 2012-04-12 | 2013-04-11 | Cryptographic systems using pairing with errors |
US16/678,383 Active USRE48644E1 (en) | 2012-04-12 | 2013-04-11 | Cryptographic system using pairing with errors |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/881,531 Active USRE47841E1 (en) | 2012-04-12 | 2013-04-11 | Cryptographic system using pairing with errors |
US16/678,335 Active USRE48643E1 (en) | 2012-04-12 | 2013-04-11 | Cryptographic system using pairing with errors |
US14/491,992 Ceased US9246675B2 (en) | 2012-04-12 | 2013-04-11 | Cryptographic systems using pairing with errors |
Country Status (6)
Country | Link |
---|---|
US (4) | USRE47841E1 (en) |
EP (1) | EP2837128B1 (en) |
KR (1) | KR102116877B1 (en) |
CN (1) | CN104396184B (en) |
TW (1) | TWI502947B (en) |
WO (1) | WO2013152725A1 (en) |
Families Citing this family (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015184991A1 (en) * | 2014-06-04 | 2015-12-10 | Jintai Ding | Improvements on cryptographic systems using pairing with errors |
US9438422B2 (en) * | 2014-06-26 | 2016-09-06 | Intel Corporation | Chaotic-based synchronization for secure network communications |
US10764042B2 (en) | 2015-09-08 | 2020-09-01 | Jintai Ding | Password based key exchange from ring learning with errors |
CN105281914B (en) * | 2015-09-24 | 2018-11-02 | 西安电子科技大学 | A kind of secret handshake method based on lattice password |
JP7421766B2 (en) * | 2015-11-13 | 2024-01-25 | バッジ インコーポレイテッド | Public key/private key biometric authentication system |
KR101880517B1 (en) * | 2016-11-10 | 2018-07-20 | 서울대학교산학협력단 | Public Key Crypto-Method Based on LWE |
KR101905689B1 (en) * | 2016-11-18 | 2018-12-05 | 서울대학교산학협력단 | Calculating apparatus for encrypting message by public key and method thereof |
CN107566121B (en) * | 2016-11-18 | 2020-03-10 | 上海扈民区块链科技有限公司 | Efficient secret consensus method |
US10133603B2 (en) | 2017-02-14 | 2018-11-20 | Bank Of America Corporation | Computerized system for real-time resource transfer verification and tracking |
EP3364596A1 (en) * | 2017-02-15 | 2018-08-22 | Koninklijke Philips N.V. | Key exchange devices and method |
CN106685663B (en) * | 2017-02-15 | 2019-07-19 | 华中科技大学 | The encryption method and circuit of error problem concerning study in a kind of annulus |
US10454892B2 (en) | 2017-02-21 | 2019-10-22 | Bank Of America Corporation | Determining security features for external quantum-level computing processing |
US10447472B2 (en) | 2017-02-21 | 2019-10-15 | Bank Of America Corporation | Block computing for information silo |
US10243976B2 (en) | 2017-02-24 | 2019-03-26 | Bank Of America Corporation | Information securities resource propagation for attack prevention |
US10489726B2 (en) | 2017-02-27 | 2019-11-26 | Bank Of America Corporation | Lineage identification and tracking of resource inception, use, and current location |
US10284496B2 (en) | 2017-03-03 | 2019-05-07 | Bank Of America Corporation | Computerized system for providing resource distribution channels based on predicting future resource distributions |
US10440051B2 (en) | 2017-03-03 | 2019-10-08 | Bank Of America Corporation | Enhanced detection of polymorphic malicious content within an entity |
US10437991B2 (en) | 2017-03-06 | 2019-10-08 | Bank Of America Corporation | Distractional variable identification for authentication of resource distribution |
US10270594B2 (en) | 2017-03-06 | 2019-04-23 | Bank Of America Corporation | Enhanced polymorphic quantum enabled firewall |
EP3373505A1 (en) * | 2017-03-06 | 2018-09-12 | Koninklijke Philips N.V. | Device and method for sharing a matrix for use in a cryptographic protocol |
US10412082B2 (en) | 2017-03-09 | 2019-09-10 | Bank Of America Corporation | Multi-variable composition at channel for multi-faceted authentication |
US10440052B2 (en) | 2017-03-17 | 2019-10-08 | Bank Of America Corporation | Real-time linear identification of resource distribution breach |
US11120356B2 (en) | 2017-03-17 | 2021-09-14 | Bank Of America Corporation | Morphing federated model for real-time prevention of resource abuse |
US11055776B2 (en) | 2017-03-23 | 2021-07-06 | Bank Of America Corporation | Multi-disciplinary comprehensive real-time trading signal within a designated time frame |
US10476854B2 (en) | 2017-04-20 | 2019-11-12 | Bank Of America Corporation | Quantum key distribution logon widget |
US10516543B2 (en) | 2017-05-08 | 2019-12-24 | Amazon Technologies, Inc. | Communication protocol using implicit certificates |
US10511591B2 (en) * | 2017-05-08 | 2019-12-17 | Amazon Technologies, Inc. | Generation of shared secrets using pairwise implicit certificates |
US10798086B2 (en) | 2017-05-08 | 2020-10-06 | Amazon Technologies, Inc. | Implicit certificates using ring learning with errors |
US10630655B2 (en) * | 2017-05-18 | 2020-04-21 | Robert Bosch Gmbh | Post-quantum secure private stream aggregation |
EP3698515B1 (en) * | 2017-10-17 | 2021-02-17 | Koninklijke Philips N.V. | Configurable device for lattice-based cryptography |
EP3474484A1 (en) * | 2017-10-17 | 2019-04-24 | Koninklijke Philips N.V. | Cryptographic device with updatable shared matrix |
US11533181B2 (en) * | 2017-12-08 | 2022-12-20 | Sony Corporation | Information processing apparatus, registration apparatus, information processing method, and registration method |
WO2019231392A1 (en) | 2018-05-30 | 2019-12-05 | 华为国际有限公司 | Key exchange system, method, and apparatus |
CN108923907B (en) * | 2018-06-20 | 2021-01-29 | 中国科学院重庆绿色智能技术研究院 | Homomorphic inner product method based on modular fault-tolerant learning problem |
DE102018122278A1 (en) * | 2018-09-12 | 2020-03-12 | Infineon Technologies Ag | Perform a cryptographic operation |
EP3624391A1 (en) * | 2018-09-12 | 2020-03-18 | Koninklijke Philips N.V. | Public/private key system with decreased encrypted message size |
CN109861821B (en) * | 2019-02-26 | 2020-10-30 | 清华大学 | Error coordination method for LWE public key password |
EP3959841B1 (en) * | 2019-05-09 | 2022-06-08 | Google LLC | Compression and oblivious expansion of rlwe ciphertexts |
US11128454B2 (en) | 2019-05-30 | 2021-09-21 | Bong Mann Kim | Quantum safe cryptography and advanced encryption and key exchange (AEKE) method for symmetric key encryption/exchange |
WO2021061833A1 (en) * | 2019-09-26 | 2021-04-01 | Visa International Service Association | Lattice based signatures with uniform secrets |
KR102418016B1 (en) * | 2019-11-28 | 2022-07-07 | 서울대학교산학협력단 | Identity-based encryption mtthod based on lattices |
WO2021107515A1 (en) * | 2019-11-28 | 2021-06-03 | Seoul National University R&Db Foundation | Identity-based encryption method based on lattices |
US11334667B1 (en) | 2020-01-17 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for disparate quantum computing threat detection |
US11366897B1 (en) * | 2020-01-17 | 2022-06-21 | Wells Fargo Bank, N.A. | Systems and methods for layered quantum computing detection |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
CN113541952B (en) * | 2020-04-17 | 2023-07-25 | 赵运磊 | Digital signature method based on lattice |
CN113541933B (en) * | 2020-04-17 | 2023-07-25 | 赵运磊 | Efficient compact encryption method based on grids |
US11637700B2 (en) | 2020-08-14 | 2023-04-25 | Samsung Electronics Co., Ltd. | Method and apparatus with encryption based on error variance in homomorphic encryption |
CN115276984B (en) * | 2022-07-29 | 2024-03-29 | 山东大学 | Key exchange method and system based on GR-LWE problem |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6263437B1 (en) * | 1998-02-19 | 2001-07-17 | Openware Systems Inc | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks |
US20030081774A1 (en) | 2001-10-26 | 2003-05-01 | Paul Lin | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure |
US20060034457A1 (en) * | 2004-08-12 | 2006-02-16 | Damgaard Ivan B | Key derivation functions to enhance security |
US20070271606A1 (en) * | 2006-05-17 | 2007-11-22 | Amann Keith R | Apparatus and method for establishing a VPN tunnel between a wireless device and a LAN |
US20080044028A1 (en) | 2006-07-25 | 2008-02-21 | National Tsing Hua University | Pair-wise key pre-distribution method for wireless sensor network |
US20080046732A1 (en) | 2006-08-15 | 2008-02-21 | Motorola, Inc. | Ad-hoc network key management |
US20080069344A1 (en) * | 2006-08-30 | 2008-03-20 | Samsung Electronics Co., Ltd. | Method and apparatus for key agreement between devices using polynomial ring |
US20080112596A1 (en) * | 2006-01-23 | 2008-05-15 | Rhoads Geoffrey B | Sensing Data From Physical Objects |
US20090154711A1 (en) | 2007-12-18 | 2009-06-18 | Jho Namsu | Multi-party key agreement method using bilinear map and system therefor |
US20090204823A1 (en) * | 2008-02-07 | 2009-08-13 | Analog Devices, Inc. | Method and apparatus for controlling system access during protected modes of operation |
US20090208019A1 (en) * | 2006-06-30 | 2009-08-20 | Koninklijke Philips Electronics N.V. | Method and apparatus for encrypting/decrypting data |
US7603554B2 (en) * | 2003-06-12 | 2009-10-13 | Panasonic Corporation | Encryption communication system |
US20090327141A1 (en) * | 2007-04-18 | 2009-12-31 | Rabin Michael O | Highly efficient secrecy-preserving proofs of correctness of computation |
US20100077462A1 (en) * | 2008-09-24 | 2010-03-25 | Neustar, Inc. | Secure domain name system |
US8107397B1 (en) * | 2006-06-05 | 2012-01-31 | Purdue Research Foundation | Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks |
US20120166809A1 (en) * | 2010-12-28 | 2012-06-28 | Authernative, Inc. | System and method for cryptographic key exchange using matrices |
US20120236968A1 (en) * | 2011-03-17 | 2012-09-20 | Georgia Tech Research Corporation | Enhanced lattice reduction systems and methods |
US8297510B1 (en) * | 2011-06-30 | 2012-10-30 | Vladimir Yakshtes | Mathematical method of 2D barcode authentication and protection for embedded processing |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7590236B1 (en) | 2004-06-04 | 2009-09-15 | Voltage Security, Inc. | Identity-based-encryption system |
EP1815635B9 (en) * | 2004-11-11 | 2014-01-15 | Certicom Corp. | Custom static diffie-hellman groups |
CN1870499B (en) * | 2005-01-11 | 2012-01-04 | 丁津泰 | Method for generating multiple variable commom key password system |
US7864952B2 (en) * | 2006-06-28 | 2011-01-04 | Voltage Security, Inc. | Data processing systems with format-preserving encryption and decryption engines |
TWI351207B (en) * | 2007-10-29 | 2011-10-21 | Inst Information Industry | Key management system and method for wireless networks |
TWI428002B (en) * | 2010-06-29 | 2014-02-21 | Univ Vanung | Key exchange systems and methods for remote mutual identification |
-
2013
- 2013-04-11 TW TW102112925A patent/TWI502947B/en active
- 2013-04-11 CN CN201380019518.3A patent/CN104396184B/en active Active
- 2013-04-11 WO PCT/CN2013/074053 patent/WO2013152725A1/en active Application Filing
- 2013-04-11 KR KR1020147027625A patent/KR102116877B1/en active IP Right Grant
- 2013-04-11 US US15/881,531 patent/USRE47841E1/en active Active
- 2013-04-11 EP EP13776224.1A patent/EP2837128B1/en active Active
- 2013-04-11 US US16/678,335 patent/USRE48643E1/en active Active
- 2013-04-11 US US14/491,992 patent/US9246675B2/en not_active Ceased
- 2013-04-11 US US16/678,383 patent/USRE48644E1/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6263437B1 (en) * | 1998-02-19 | 2001-07-17 | Openware Systems Inc | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks |
US20030081774A1 (en) | 2001-10-26 | 2003-05-01 | Paul Lin | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure |
US7603554B2 (en) * | 2003-06-12 | 2009-10-13 | Panasonic Corporation | Encryption communication system |
US20060034457A1 (en) * | 2004-08-12 | 2006-02-16 | Damgaard Ivan B | Key derivation functions to enhance security |
US20080112596A1 (en) * | 2006-01-23 | 2008-05-15 | Rhoads Geoffrey B | Sensing Data From Physical Objects |
US20070271606A1 (en) * | 2006-05-17 | 2007-11-22 | Amann Keith R | Apparatus and method for establishing a VPN tunnel between a wireless device and a LAN |
US8107397B1 (en) * | 2006-06-05 | 2012-01-31 | Purdue Research Foundation | Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks |
US20090208019A1 (en) * | 2006-06-30 | 2009-08-20 | Koninklijke Philips Electronics N.V. | Method and apparatus for encrypting/decrypting data |
US20080044028A1 (en) | 2006-07-25 | 2008-02-21 | National Tsing Hua University | Pair-wise key pre-distribution method for wireless sensor network |
US20080046732A1 (en) | 2006-08-15 | 2008-02-21 | Motorola, Inc. | Ad-hoc network key management |
US20080069344A1 (en) * | 2006-08-30 | 2008-03-20 | Samsung Electronics Co., Ltd. | Method and apparatus for key agreement between devices using polynomial ring |
US20090327141A1 (en) * | 2007-04-18 | 2009-12-31 | Rabin Michael O | Highly efficient secrecy-preserving proofs of correctness of computation |
US20090154711A1 (en) | 2007-12-18 | 2009-06-18 | Jho Namsu | Multi-party key agreement method using bilinear map and system therefor |
US20090204823A1 (en) * | 2008-02-07 | 2009-08-13 | Analog Devices, Inc. | Method and apparatus for controlling system access during protected modes of operation |
US20100077462A1 (en) * | 2008-09-24 | 2010-03-25 | Neustar, Inc. | Secure domain name system |
US20120166809A1 (en) * | 2010-12-28 | 2012-06-28 | Authernative, Inc. | System and method for cryptographic key exchange using matrices |
US20120236968A1 (en) * | 2011-03-17 | 2012-09-20 | Georgia Tech Research Corporation | Enhanced lattice reduction systems and methods |
US8297510B1 (en) * | 2011-06-30 | 2012-10-30 | Vladimir Yakshtes | Mathematical method of 2D barcode authentication and protection for embedded processing |
Non-Patent Citations (4)
Title |
---|
Damgard et al., A Quantum Cipher with Near Optimal Key-Recycling, Dept. of Computer Science, University of Arhus, Sep. 13, 2005. * |
Du et al., "A Pairwise Key Management Scheme Based on Hash Function for Wireless Sensor Networks", 2010 Second International Workshop on Education Technology and Computer Science. |
International Patent Application No. PCT/CN2013/074053; Int'l Written Opinion and Search Report; dated Jul. 18, 2013; 9 pages. |
Vadim Lyubashevsky et al"On Ideal Lattices and Learning with Errors Over Rings", Journal of the ACM, vol. 60, No. 6, Article 43, Publication date: Nov. 2013; 36 pages. |
Also Published As
Publication number | Publication date |
---|---|
KR102116877B1 (en) | 2020-06-03 |
EP2837128A1 (en) | 2015-02-18 |
TWI502947B (en) | 2015-10-01 |
KR20150032928A (en) | 2015-03-31 |
USRE48643E1 (en) | 2021-07-13 |
US20150067336A1 (en) | 2015-03-05 |
EP2837128A4 (en) | 2015-04-08 |
USRE47841E1 (en) | 2020-02-04 |
WO2013152725A1 (en) | 2013-10-17 |
CN104396184B (en) | 2017-12-01 |
CN104396184A (en) | 2015-03-04 |
TW201404106A (en) | 2014-01-16 |
EP2837128B1 (en) | 2019-02-27 |
US9246675B2 (en) | 2016-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE48644E1 (en) | Cryptographic system using pairing with errors | |
Dutta et al. | Pairing-based cryptographic protocols: A survey | |
Maurer et al. | Unconditionally secure key agreement and the intrinsic conditional information | |
WO2015184991A1 (en) | Improvements on cryptographic systems using pairing with errors | |
Lv et al. | Group key agreement for secure group communication in dynamic peer systems | |
WO2017041669A1 (en) | Password based key exchange from ring learning with er-rors | |
Dutta et al. | Overview of key agreement protocols | |
Kalyani et al. | Survey on identity based and hierarchical identity based encryption schemes | |
Mikhail et al. | Extension and application of El-Gamal encryption scheme | |
Wang et al. | New identity-based key-encapsulation mechanism and its applications in cloud computing | |
Wang et al. | Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model | |
Karati et al. | Efficient and provably secure random oracle‐free adaptive identity‐based encryption with short‐signature scheme | |
Kalyani et al. | New Hierarchical Identity Based Encryption with maximum hierarchy. | |
Yi et al. | ID-based key agreement for multimedia encryption | |
Li et al. | Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryptions | |
Dehkordi et al. | Certificateless identification protocols from super singular elliptic curve | |
Hezaveh et al. | An efficient solution to the socialist millionaires' problem | |
Chen et al. | A novel k-out-of-n oblivious transfer protocols based on bilinear pairings | |
Han et al. | Attribute-based data transfer with filtering scheme in cloud computing | |
Tso et al. | An id-based non-interactive tripartite key agreement protocol with K-resilience. | |
Jizhong et al. | Full secure identity-based encryption scheme over lattices in the standard model | |
Lv et al. | ID-based authenticated group key agreement from bilinear maps | |
El-Yahyaoui et al. | A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks | |
Anbhuvizhi et al. | A Study On Cipher-Text Attribute Based Encryption Using Secret Sharing Schemes | |
Maftei et al. | A Note on IBE Performance of a Practical Application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |