CN114065247B - Quantum digital mixing signcryption method - Google Patents
Quantum digital mixing signcryption method Download PDFInfo
- Publication number
- CN114065247B CN114065247B CN202111353954.7A CN202111353954A CN114065247B CN 114065247 B CN114065247 B CN 114065247B CN 202111353954 A CN202111353954 A CN 202111353954A CN 114065247 B CN114065247 B CN 114065247B
- Authority
- CN
- China
- Prior art keywords
- signcryption
- key
- hash function
- signer
- receiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012795 verification Methods 0.000 claims abstract description 34
- 230000001172 regenerating effect Effects 0.000 claims description 5
- 239000011159 matrix material Substances 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 4
- 230000005540 biological transmission Effects 0.000 abstract description 3
- 238000004364 calculation method Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 101150035983 str1 gene Proteins 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a quantum digital mixed signcryption method, which comprises the steps that a signcryption party performs key negotiation with a receiver and a signcryption checking party, the signcryption operation is executed, and the receiver and the signcryption checking party verify mixed signatures. The method of the invention realizes the encryption effect of the plaintext message by mixing the plaintext message, the plaintext abstract and the character string formed by the coefficients of each item except the highest item, the proposal does not need to encrypt the plaintext message by using an extra key, thereby effectively saving key resources and achieving the effect that the plaintext message does not directly appear in the transmission process, and improving the hash function used in the signcryption process, so that the receiver and the signcryption party cannot obtain the irreducible polynomial generating the hash function in advance before verification, and further ensuring the security of the whole signcryption process.
Description
Technical Field
The invention relates to the technical field of quantum security, in particular to a quantum digital mixing signcryption method.
Background
Encryption and digital signature are two basic encryption tools that guarantee confidentiality, integrity, authenticity, and non-repudiation. Until 1997, they were still considered as important but completely different components of various cryptosystems. In an asymmetric key system, a traditional method is to digitally sign a message and then encrypt an output, and the superposition scheme has low efficiency and high cost, and any scheme cannot guarantee the security.
Signcryption is a relatively new cryptographic technique, and Yuliang Zheng proposed the first signcryption scheme in 1997. Zheng also proposes an elliptic curve-based signature encryption scheme that can save 58% of calculation amount and 40% of communication cost compared with a conventional elliptic curve-based signature re-encryption scheme. Compared with the traditional sign-then-encryption scheme, the signcryption can complete the functions of digital signature and encryption in one logic step, effectively reduces the computational power consumption and communication loss, and simultaneously provides the characteristics of the digital signature and encryption scheme in a more efficient manner.
The current general digital signcryption scheme is mostly based on an asymmetric key system, the security of the digital signcryption scheme is based on an unproven mathematical calculation difficult problem, along with the rapid improvement of classical calculation power and the explosive development of quantum algorithms, the violent cracking of various signcryption algorithms by an attacker is possible in the near future, and the security of the current digital signcryption scheme can not meet the requirements of the current rapid development digital society for guaranteeing the security of messages while verifying the authenticity of the messages.
In summary, the security of the existing classical digital signcryption scheme cannot meet the current requirements of the rapidly developed digital society, in addition, when a long message is signed, the existing scheme also has the defects of overlong key length, too much, too low resource utilization rate, poor system compatibility, rapid rise of computation complexity and the like, and under the condition, it is particularly important and urgent to find an efficient and unconditionally safe quantum digital signcryption scheme.
Disclosure of Invention
1. Technical problem to be solved
The security of the classical digital signcryption protocol in the present stage is greatly threatened, a plurality of early hash functions and public key algorithms are already broken, the security is no longer ensured, and especially the appearance of a future quantum computer also forms a fatal threat to the algorithm security of the current digital signcryption protocol. Meanwhile, in the conventional signcryption scheme, a plaintext message to be transmitted needs to be encrypted, which consumes an additional encryption key and occupies additional communication resources. In order to solve the problems, the invention provides a quantum digital mixed signcryption method.
2. Technical proposal
The invention provides a quantum digital mixed signcryption method, which comprises the following steps:
The signer and the receiver conduct key negotiation, respectively obtain a first hash function key and a first key, respectively, and conduct key negotiation, respectively obtain a second hash function key and a second key;
The signer performs mixed signer operation on the message plaintext by using the negotiated secret key, and sends the obtained mixed signature to the receiver;
the receiver sends the received mixed signature and two groups of keys negotiated with the signer to the signer;
The signer sends two groups of keys negotiated with the signer to the receiver;
and the receiver and the signer respectively carry out signcryption verification on the mixed signature, when the two sides pass the signcryption verification, the signcryption is successful, otherwise, the signcryption process is re-executed.
Further, the hybrid signcryption operation includes the steps of:
(1) The signcryption party obtains a group of random numbers from the local place to generate an irreducible polynomial;
(2) The signer obtains a third hash function key of the signer for generating a hash function by using the first hash function key and the second hash function key which are negotiated with the receiver and the signer;
(3) The signcryption party selects an irreducible polynomial and a third hash function key to generate a hash function based on a linear shift register;
(4) The signcryption party uses the hash function to carry out hash operation on the plaintext message to obtain a plaintext abstract;
(5) The signcryption party mixes the plaintext message, the plaintext abstract and the character string formed by the coefficients of each item except the highest item in the irreducible polynomial according to a preset rule to obtain a mixed abstract;
(6) The signer obtains a third key for encryption of the signer by using the first key and the second key negotiated with the receiver and the signer;
(7) And the signer uses a third key to perform unconditional secure encryption on the mixed digest to obtain a mixed signature.
Further, the generating process of the irreducible polynomial is as follows:
1) Firstly, sequentially using coefficients of each item except the highest item in each bit of corresponding polynomial of the random number to generate a polynomial in GF (2) domain, wherein the coefficient of the highest item is 1;
2) Then, verifying whether the polynomial is an irreducible polynomial, if the verification result is no, re-acquiring another group of random numbers from the local of the signcryption party, returning to the step 1) as new random numbers, regenerating the polynomial and verifying; if the verification result is yes, stopping verification to obtain an irreducible polynomial.
Further, the method for verifying whether the polynomial is an irreducible polynomial comprises the following steps:
Sequential verification Whether or not it is true, whereinRepresentation pairRounding, if all i are verified to pass, p (x) is an irreducible polynomial of order n over GF (2); wherein gcd (f (x), g (x)) represents the maximum common factor of f (x) and g (x) over GF (2), f (x) and g (x) referring to two arbitrary polynomials.
Further, the method for verifying whether the polynomial is an irreducible polynomial comprises the following steps:
Verification condition (1) (2)Whether or not to do so simultaneously, whereinRepresentation ofWhere d is an arbitrary element of n, gcd (f (x), g (x)) represents the maximum factors of f (x) and g (x) over GF (2), f (x) and g (x) refer to two arbitrary polynomials, and when both validation conditions are satisfied, p (x) is an irreducible polynomial of order n over GF (2).
Further, before the step 1), if the last bit of the random number is 0, the last bit of the random number is 1; or if the last bit of the n-bit random number is 0, regenerating the random number until the last bit of the generated random number is 1.
Further, the hash function is a toeplitz matrix hash function based on a linear shift register.
Further, the signcryption verification includes the following steps:
(1) The receiver and the signer obtain a fourth hash function key according to the first hash function key and the second hash function key which are owned by the receiver and the signer respectively, and obtain a fourth key according to the first key and the second key;
(2) The receiver and the signature verification party decrypt the mixed signature by using the fourth secret key obtained by each receiver and the signature verification party to obtain a mixed abstract;
(3) Separating the mixed abstract according to a preset rule to obtain a character string composed of the plaintext message, the inverse plaintext abstract and the coefficients of each item except the highest item in the irreducible polynomial;
(4) Generating an irreducible polynomial with the highest term coefficient of 1 by corresponding each bit of the character string to the coefficient of each term except the highest term in the polynomials;
(5) Obtaining a hash function based on a linear shift register by using the irreducible polynomial and a third hash function key;
(6) Carrying out hash operation on the plaintext message by utilizing the hash function to obtain a plaintext abstract;
(7) And judging whether the forward plaintext abstract is equal to the reverse plaintext abstract, if so, accepting the signature, otherwise, refusing the signature.
Further, in the present invention, the length of the plaintext message is m, the lengths of the first hash function key and the second hash function key are n, and the lengths of the first key and the second key are 2n+m.
3. Advantageous effects
Compared with the prior art, the invention has the advantages that:
(1) According to the quantum digital mixed signcryption method provided by the invention, the effect of encrypting the plaintext message to be transmitted is achieved in a mixed mode, an encryption key is not required to be additionally consumed, key resources are greatly saved, and the operation complexity of a three-party processing process is reduced;
(2) The invention provides a quantum digital mixed signcryption method, and unconditional security of the method is a one-time hash technical guarantee based on a non-fixed irreducible polynomial and one-time secret proved by an informatics theory. The security of the hash function used for executing the signcryption process is ensured by the irreducible polynomial and the hash function key together, the irreducible polynomial depends on the random number of the local signcryption party, the random number is not known in advance by the receiver and the signcryption party before the signcryption process, and the security of the whole signcryption process is ensured;
(3) By adopting the signcryption method, the messages with any length can be signed, and the efficiency and the safety are higher.
Drawings
Fig. 1 is a schematic flow chart of the hybrid signcryption.
Detailed Description
According to the cryptographic consensus, the quantum digital mixed signcryption scheme provided by the invention has three participants: the signer Alice, the receiver Bob and the signer Charlie are respectively marked as A, B, C, the plaintext message to be transmitted is M, and the length is M.
The invention will now be described in detail with reference to the drawings and the accompanying specific examples.
The invention provides a specific process of a quantum digital mixed signcryption method, which is shown in figure 1, and comprises the following steps:
1. The signer A and the receiver B carry out key negotiation, respectively obtain a first hash function key L ab and a first key R ab, respectively, and carry out key negotiation with the signer C, respectively obtain a second hash function key L ac and a second key R ac; wherein the first hash function key L ab and the second hash function key L ac have a length n and the first key R ab and the second key R ac have a length 2n+m; in practical use, a length of n of 128 is sufficient to ensure the security of the whole signcryption process.
2. The signcryption party A carries out mixed signcryption operation on the message plaintext by utilizing the negotiated secret key, and the method is concretely as follows:
(1) The signcryption party A obtains a group of random numbers k with the length of n from the local place and is used for generating an irreducible polynomial p (x), specifically:
firstly, sequentially using coefficients of each item except the highest item in each corresponding polynomial of n-bit random number k to generate an n-order polynomial in GF (2) domain, wherein the coefficient of the highest item is 1; for example, the random number k= (a n-1,an-2,...,a1,a0), then the generated polynomial is p (x) =x n+an-1xn-1+…+a1x+a0; preferably, only when a 0 =1, the generated polynomial is likely to be an irreducible polynomial, so, to reduce the calculation amount in the later verification of the irreducible polynomial, the n-bit random number k can be judged first: if a 0 =0, let a 0 =1, regenerate an irreducible polynomial of order n in GF (2) domain; or if a 0 =0, regenerating an n-bit random number until the last bit of the generated random number is 1, and then generating an n-order irreducible polynomial in the GF (2) domain by using the newly generated random number; this reduces the amount of computation in the case of a late verification irreducible polynomial, and finally results in a 0 =1, the resulting polynomial being p (x) =x n+an-1xn-1+…+a1 x+1;
then, verifying whether the polynomial is an irreducible polynomial, if the verification result is no, directly generating another group of n-bit random numbers from a random number generator of the transmitting end, returning the random numbers as new n-bit random numbers to the previous steps to regenerate the polynomial and verify; if the verification result is "yes", stopping verification to obtain an irreducible polynomial p (x).
There are several ways to verify the irreducible polynomials here, preferably the two ways we mention in this invention:
The method comprises the following steps: sequential verification Whether or not it is true, whereinRepresentation pairRounding, if all i are verified to pass, p (x) is an irreducible polynomial of order n over GF (2); wherein gcd (f (x), g (x)) represents the maximum common factor of f (x) and g (x) over GF (2), f (x) and g (x) referring to two arbitrary polynomials.
The second method is as follows: verification condition (1)(2)Whether or not to do so simultaneously, whereinRepresentation ofWhere d is an arbitrary prime factor of n, gcd (f (x), g (x)) represents the maximum factors of f (x) and g (x) over GF (2), f (x) and g (x) refer to two arbitrary polynomials, and when both validation conditions are satisfied, p 1 (x) is an irreducible polynomial of order n over GF (2).
In general, n=2 k is taken, so only d=2 needs to be taken in condition (2). Alternatively, n=2 7 =128 is taken. Since this method only needs to verify these two conditions, we use Fast modular composition algorithm to get quicklyAndBy usingReplacement of condition (2)And (3) performing calculation, and obtaining a calculation result faster by a method of reducing the order.
(2) The signer a obtains a third hash function key L a of the signer for generating a hash function by using the first hash function key L ab and the second hash function key L ac negotiated with the receiver B and the signer C, and in this embodiment, a one-time-pad exclusive-or operation is preferred, that is
(3) Signcryption party a selects the irreducible polynomial p (x) and the third hash function key L a to generate a linear shift register based hash functionPreferably, the present embodiment selects a linear shift register based Toeplitz matrix (LFSR-Toeplitz) hash function
(4) Signcryption party a uses the hash functionCarrying out hash operation on the plaintext message M to obtain a plaintext abstract digest;
(5) The signcryption party A mixes a character string str1 formed by the plaintext message M, the plaintext abstract digest and the coefficients of each term except the highest term in the irreducible polynomial according to a preset rule to obtain a mixed abstract Mdigest, wherein Mdigest = (M, digest, str 1), and the preset rule can be agreed in advance by the signcryption party A, the receiver B and the signcryption party C;
(6) The signer A obtains a third key R a for encryption by using a first key R ab and a second key R a C negotiated with the receiver B and the signer C, and the length of the third key R a is m+2n;
(7) The signcryption party a uses the third key R a to perform unconditionally secure encryption on the hybrid digest Mdigest, and uses an exclusive-or operation to obtain a hybrid signature sig, namely
3. The signer A sends the obtained mixed signature sig to the receiver B;
4. After receiving the mixed signature sig, the receiver B sends the received mixed signature sig and a first hash function key L ab and a first key R ab which are negotiated with the signer A to the signer C;
5. After receiving the information sent by the receiver B, the signer C sends a second hash function key L ac and a second key R ac negotiated by the signer C and the signer A to the receiver B;
The information sent by the receiver B and the signer C is an authenticated classical channel which passes through, so that the receiver B and the signer C are prevented from being tampered with.
6. The receiver B and the signer C respectively perform signer verification on the mixed signature, and the verification processes of the two parties are the same, so in this embodiment, the verification process of the receiver B is taken as an example, and the signer verification process is specifically described. The method comprises the following steps:
(1) After the foregoing steps 4 and 5, the receiver B has a first hash function key L ab, a first key R ab and a second hash function key L ac and a second key R ac which are sent by the signer C and are negotiated with the signer a, and obtains a fourth hash function key L a 'for generating a hash function by using the first hash function key L ab and the second hash function key L ac and obtains a fourth key R a' for decrypting by using the first key R ab and the second key R ac by adopting the same processing method as the signer a;
(2) The receiver B decrypts the received mixed signature sig by using a fourth key R a' to obtain a mixed digest Mdigest;
(3) Separating the mixed abstract Mdigest according to a preset rule to obtain a character string str1 composed of a plaintext message M, an inverse plaintext abstract digest b′ and coefficients of each item except the highest item in the irreducible polynomial;
(4) Generating an irreducible polynomial p (x)', the highest term coefficient of which is 1, by using the coefficients of each term except the highest term in each bit of the corresponding polynomial of the character string str 1;
(5) Obtaining a linear shift register based hash function using an irreducible polynomial p (x)' and a fourth hash function key L a
(6) Using hash functionsCarrying out hash operation on the plaintext message M to obtain a plaintext abstract digest b;
(7) And judging whether the direct plaintext abstract digest b is equal to the inverse plaintext abstract digest b′, if so, receiving the signature by the receiver B, otherwise, refusing the signature.
The signer C performs the verification of the signer secret by the same method as the receiver B, and can be regarded as the success of the whole signer secret process only when the receiver B and the signer C pass the verification and accept the signature, otherwise, the signer secret process fails as long as the B party does not accept, and the signer secret process needs to be carried out again.
After the above process, the receiver B can obtain the plaintext information M to be sent by the signcryption party, and in the whole transmission process, no extra key is needed to encrypt the plaintext, and the plaintext does not appear alone in the whole information transmission process, so that the key resource is greatly saved by using the method of mixing signcryption, the processes of encrypting by the signcryption party and decrypting by the receiver are reduced, and the operation complexity of the processing process is reduced.
The hash function based on the linear shift register adopted in the scheme of the invention can sign and secret information with any length, thereby realizing the sign and secret information of long information and having higher efficiency and safety.
Claims (8)
1. A method of quantum digital hybrid signcryption, the method comprising:
The signer and the receiver conduct key negotiation, respectively obtain a first hash function key and a first key, respectively, and conduct key negotiation, respectively obtain a second hash function key and a second key;
The signer performs mixed signer operation on the message plaintext by using the negotiated secret key, and sends the obtained mixed signature to the receiver;
the receiver sends the received mixed signature and two groups of keys negotiated with the signer to the signer;
The signer sends two groups of keys negotiated with the signer to the receiver;
The receiver and the signer respectively carry out signcryption verification on the mixed signature, when both sides pass the verification, the signcryption is successful, otherwise, the signcryption process is re-executed;
Wherein the hybrid signcryption operation includes the steps of:
(1) The signcryption party obtains a group of random numbers from the local place to generate an irreducible polynomial;
(2) The signer obtains a third hash function key of the signer for generating a hash function by using the first hash function key and the second hash function key which are negotiated with the receiver and the signer;
(3) The signcryption party selects an irreducible polynomial and a third hash function key to generate a hash function based on a linear shift register;
(4) The signcryption party uses the hash function to carry out hash operation on the plaintext message to obtain a plaintext abstract;
(5) The signcryption party mixes the plaintext message, the plaintext abstract and the character string formed by the coefficients of each item except the highest item in the irreducible polynomial according to a preset rule to obtain a mixed abstract;
(6) The signer obtains a third key for encryption of the signer by using the first key and the second key negotiated with the receiver and the signer;
(7) And the signer uses a third key to perform unconditional secure encryption on the mixed digest to obtain a mixed signature.
2. The method of claim 1, wherein the generating of the irreducible polynomial is:
1) Firstly, sequentially using coefficients of each item except the highest item in each bit of corresponding polynomial of the random number to generate a polynomial in GF (2) domain, wherein the coefficient of the highest item is 1;
2) Then, verifying whether the polynomial is an irreducible polynomial, if the verification result is no, re-acquiring another group of random numbers from the local of the signcryption party, returning to the step 1) as new random numbers, regenerating the polynomial and verifying; if the verification result is yes, stopping verification to obtain an irreducible polynomial.
3. The method of quantum digital hybrid signcryption according to claim 2, wherein the method of verifying whether the polynomial is an irreducible polynomial is:
Sequentially verifying whether gcd (p (x), x 2i -x) =1 is true, wherein Representation pairRounding, if all i are verified to pass, p (x) is an irreducible polynomial of order n over GF (2); wherein gcd (f (x), g (x)) represents the maximum common factor of f (x) and g (x) over GF (2), f (x) and g (x) referring to two arbitrary polynomials.
4. The method of quantum digital hybrid signcryption according to claim 2, wherein the method of verifying whether the polynomial is an irreducible polynomial is:
Verification condition 1: Condition 2: Whether or not to do so simultaneously, wherein Representation ofD is an arbitrary prime factor of n, gcd (f (x), g (x)) represents the maximum factors of f (x) and g (x) on GF (2), f (x) and g (x) refer to two arbitrary polynomials, and when the two verification conditions are satisfied at the same time, p (x) is an irreducible polynomial of order n on GF (2).
5. The method of claim 2, wherein prior to step 1), if the last bit of the random number is 0, the last bit of the random number is 1; or if the last bit of the n-bit random number is 0, regenerating the random number until the last bit of the generated random number is 1.
6. The quantum digital hybrid signcryption method of claim 1, wherein the hash function is a linear shift register based toeplitz matrix hash function.
7. The method of quantum digital hybrid signcryption as recited in claim 1, wherein the signcryption verification comprises the steps of:
(1) The receiver and the signer obtain a fourth hash function key according to the first hash function key and the second hash function key which are owned by the receiver and the signer respectively, and obtain a fourth key according to the first key and the second key;
(2) The receiver and the signature verification party decrypt the mixed signature by using the fourth secret key obtained by each receiver and the signature verification party to obtain a mixed abstract;
(3) Separating the mixed abstract according to a preset rule to obtain a character string composed of the plaintext message, the inverse plaintext abstract and the coefficients of each item except the highest item in the irreducible polynomial;
(4) Generating an irreducible polynomial with the highest term coefficient of 1 by corresponding each bit of the character string to the coefficient of each term except the highest term in the polynomials;
(5) Obtaining a hash function based on a linear shift register by using the irreducible polynomial and a third hash function key;
(6) Carrying out hash operation on the plaintext message by utilizing the hash function to obtain a plaintext abstract;
(7) And judging whether the forward plaintext abstract is equal to the reverse plaintext abstract, if so, accepting the signature, otherwise, refusing the signature.
8. The method of any one of claims 1-6, wherein the plaintext message has a length m, the first hash function key and the second hash function key have a length n, and the first key and the second key have a length 2n+m.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111353954.7A CN114065247B (en) | 2021-11-12 | 2021-11-12 | Quantum digital mixing signcryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111353954.7A CN114065247B (en) | 2021-11-12 | 2021-11-12 | Quantum digital mixing signcryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114065247A CN114065247A (en) | 2022-02-18 |
CN114065247B true CN114065247B (en) | 2024-07-19 |
Family
ID=80272523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111353954.7A Active CN114065247B (en) | 2021-11-12 | 2021-11-12 | Quantum digital mixing signcryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114065247B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114362971B (en) * | 2022-03-21 | 2022-06-21 | 南京大学 | Digital asset right confirming and tracing method based on Hash algorithm |
CN114626537B (en) * | 2022-05-17 | 2022-08-16 | 矩阵时光数字科技有限公司 | Irreducible polynomial and quantum secure hash value calculation method based on x86 platform SIMD |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A mixed encryption method in session system |
CN113297633A (en) * | 2021-07-26 | 2021-08-24 | 南京大学 | Quantum digital signature method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1104960B1 (en) * | 1999-12-02 | 2009-08-26 | Sony Deutschland GmbH | Message authentication |
JP5790319B2 (en) * | 2011-08-29 | 2015-10-07 | ソニー株式会社 | Signature verification apparatus, signature verification method, program, and recording medium |
CN106027262B (en) * | 2016-07-01 | 2017-02-22 | 陕西科技大学 | Multi-variable signing method resisting key recovery attack |
CN113572606B (en) * | 2021-07-30 | 2023-08-22 | 矩阵时光数字科技有限公司 | Quantum digital signature system and method based on Gaussian modulation and homodyne detection |
-
2021
- 2021-11-12 CN CN202111353954.7A patent/CN114065247B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A mixed encryption method in session system |
CN113297633A (en) * | 2021-07-26 | 2021-08-24 | 南京大学 | Quantum digital signature method |
Also Published As
Publication number | Publication date |
---|---|
CN114065247A (en) | 2022-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rodriguez-Henriquez et al. | A brief introduction to modern cryptography | |
Burr | Selecting the advanced encryption standard | |
CN113779645B (en) | Quantum digital signature and quantum digital signature encryption method | |
US20080232591A1 (en) | Simple and efficient one-pass authenticated encryption scheme | |
CN113297633B (en) | Quantum digital signature method | |
Weaver | Secure sockets layer | |
CN114065247B (en) | Quantum digital mixing signcryption method | |
US7894608B2 (en) | Secure approach to send data from one system to another | |
CN112187461A (en) | Weapon equipment data hybrid encryption method based on encryption algorithm | |
CN114065249A (en) | Authentication encryption method | |
CN117879833A (en) | Digital signature generation method based on improved elliptic curve | |
CN109831305B (en) | Anti-quantum computation signcryption method and system based on asymmetric key pool | |
CN105306212A (en) | Signcryption method with hidden identity and strong security | |
Aydos et al. | Implementing network security protocols based on elliptic curve cryptography | |
CN114039720B (en) | Unconditional security authentication encryption method based on LFSR hash | |
Amounas et al. | An efficient signcryption scheme based on the elliptic curve discrete logarithm problem | |
Purevjav et al. | Email encryption using hybrid cryptosystem based on Android | |
CN109787772B (en) | Anti-quantum computation signcryption method and system based on symmetric key pool | |
CN112367159A (en) | Medical data safety storage oriented hybrid encryption and decryption method and system | |
CN105515775B (en) | Efficient privacy protection signcryption method | |
Yakubu et al. | Advanced Secure method for data transmission in MANET using RSA algorithm | |
CN116781243B (en) | Unintentional transmission method based on homomorphic encryption, medium and electronic equipment | |
JP2000004223A (en) | Encryption/authentication system | |
Nguyen et al. | A high-performance authentication-encryption scheme | |
Zhao et al. | An improved elegant method to re-initialize hash chains |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |