CN103414569A - 一种建立抗攻击的公钥密码的方法 - Google Patents
一种建立抗攻击的公钥密码的方法 Download PDFInfo
- Publication number
- CN103414569A CN103414569A CN2013103822997A CN201310382299A CN103414569A CN 103414569 A CN103414569 A CN 103414569A CN 2013103822997 A CN2013103822997 A CN 2013103822997A CN 201310382299 A CN201310382299 A CN 201310382299A CN 103414569 A CN103414569 A CN 103414569A
- Authority
- CN
- China
- Prior art keywords
- agreement
- party
- sub
- sub trannum
- subgroup
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000004044 response Effects 0.000 claims description 4
- 239000011241 protective layer Substances 0.000 claims description 3
- 230000008901 benefit Effects 0.000 abstract description 3
- 238000004364 calculation method Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 5
- 239000000047 product Substances 0.000 description 5
- 238000000354 decomposition reaction Methods 0.000 description 3
- 206010049669 Dyscalculia Diseases 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000012467 final product Substances 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000036039 immunity Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Detergent Compositions (AREA)
- Complex Calculations (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (6)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310382299.7A CN103414569B (zh) | 2013-08-21 | 2013-08-21 | 一种建立抗攻击的公钥密码的方法 |
PCT/CN2013/001119 WO2015024149A1 (zh) | 2013-08-21 | 2013-09-22 | 一种建立抗攻击的公钥密码的方法 |
US14/450,305 US9537660B2 (en) | 2013-08-21 | 2014-08-04 | Method of establishing public key cryptographic protocols against quantum computational attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310382299.7A CN103414569B (zh) | 2013-08-21 | 2013-08-21 | 一种建立抗攻击的公钥密码的方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103414569A true CN103414569A (zh) | 2013-11-27 |
CN103414569B CN103414569B (zh) | 2016-08-10 |
Family
ID=49607555
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310382299.7A Expired - Fee Related CN103414569B (zh) | 2013-08-21 | 2013-08-21 | 一种建立抗攻击的公钥密码的方法 |
Country Status (3)
Country | Link |
---|---|
US (1) | US9537660B2 (zh) |
CN (1) | CN103414569B (zh) |
WO (1) | WO2015024149A1 (zh) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015081505A1 (zh) * | 2013-12-04 | 2015-06-11 | 王威鉴 | 建立抗量子计算攻击的公钥密码的方法 |
CN105049208A (zh) * | 2015-06-15 | 2015-11-11 | 浙江金大科技有限公司 | 基于双重困难的数据加密方法 |
WO2017063114A1 (zh) * | 2015-10-12 | 2017-04-20 | 王晓峰 | 建立抗攻击的安全性公钥密码的方法 |
CN108449754A (zh) * | 2018-03-16 | 2018-08-24 | 丘佳珏 | 智能设备通过无线路由上网的方法 |
WO2019000231A1 (zh) * | 2017-06-27 | 2019-01-03 | 王威鉴 | 建立抗攻击的公钥密码的方法 |
CN109787752A (zh) * | 2018-09-30 | 2019-05-21 | 王威鉴 | 建立抗攻击的共享密钥的方法 |
CN111400773A (zh) * | 2020-03-12 | 2020-07-10 | 深圳大学 | 数字签名方法、数字签名装置、***和存储介质 |
CN111740821A (zh) * | 2020-05-06 | 2020-10-02 | 深圳大学 | 建立共享密钥的方法及装置 |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
US10505722B2 (en) * | 2016-07-06 | 2019-12-10 | Securerf Corporation | Shared secret communication system with use of cloaking elements |
US10133603B2 (en) | 2017-02-14 | 2018-11-20 | Bank Of America Corporation | Computerized system for real-time resource transfer verification and tracking |
US10447472B2 (en) | 2017-02-21 | 2019-10-15 | Bank Of America Corporation | Block computing for information silo |
US10454892B2 (en) | 2017-02-21 | 2019-10-22 | Bank Of America Corporation | Determining security features for external quantum-level computing processing |
US10243976B2 (en) | 2017-02-24 | 2019-03-26 | Bank Of America Corporation | Information securities resource propagation for attack prevention |
US10489726B2 (en) | 2017-02-27 | 2019-11-26 | Bank Of America Corporation | Lineage identification and tracking of resource inception, use, and current location |
US10284496B2 (en) | 2017-03-03 | 2019-05-07 | Bank Of America Corporation | Computerized system for providing resource distribution channels based on predicting future resource distributions |
US10440051B2 (en) | 2017-03-03 | 2019-10-08 | Bank Of America Corporation | Enhanced detection of polymorphic malicious content within an entity |
US10270594B2 (en) | 2017-03-06 | 2019-04-23 | Bank Of America Corporation | Enhanced polymorphic quantum enabled firewall |
US10437991B2 (en) | 2017-03-06 | 2019-10-08 | Bank Of America Corporation | Distractional variable identification for authentication of resource distribution |
US10412082B2 (en) | 2017-03-09 | 2019-09-10 | Bank Of America Corporation | Multi-variable composition at channel for multi-faceted authentication |
US11120356B2 (en) | 2017-03-17 | 2021-09-14 | Bank Of America Corporation | Morphing federated model for real-time prevention of resource abuse |
US10440052B2 (en) | 2017-03-17 | 2019-10-08 | Bank Of America Corporation | Real-time linear identification of resource distribution breach |
US11055776B2 (en) | 2017-03-23 | 2021-07-06 | Bank Of America Corporation | Multi-disciplinary comprehensive real-time trading signal within a designated time frame |
US10476854B2 (en) | 2017-04-20 | 2019-11-12 | Bank Of America Corporation | Quantum key distribution logon widget |
US20190215148A1 (en) * | 2018-01-11 | 2019-07-11 | Shenzhen University | Method of establishing anti-attack public key cryptogram |
CN109981253B (zh) * | 2019-04-01 | 2022-09-27 | 浙江工商大学 | 一种基于有限李型群的抗量子攻击的非对称加密方法 |
CN110086614B (zh) * | 2019-05-05 | 2023-03-21 | 南京邮电大学 | 一种使用标记单光子源的量子数字签名方法 |
WO2021179258A1 (zh) * | 2020-03-12 | 2021-09-16 | 深圳大学 | 数字签名方法、数字签名装置、***和存储介质 |
WO2021223090A1 (zh) * | 2020-05-06 | 2021-11-11 | 深圳大学 | 建立共享密钥的方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7133523B2 (en) * | 2002-12-20 | 2006-11-07 | Pitney Bowes Inc. | Method and system for solving the word problem in braid group cryptosystems |
CN101374043A (zh) * | 2007-08-24 | 2009-02-25 | 管海明 | 密钥协商的方法、加/解密的方法及签名/验证的方法 |
US20100153728A1 (en) * | 2008-12-16 | 2010-06-17 | Certicom Corp. | Acceleration of key agreement protocols |
CN103200000A (zh) * | 2013-03-27 | 2013-07-10 | 武汉大学 | 一种量子计算环境下的共享密钥建立方法 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6785813B1 (en) * | 1997-11-07 | 2004-08-31 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
US6493449B2 (en) * | 1998-02-26 | 2002-12-10 | Arithmetica, Inc. | Method and apparatus for cryptographically secure algebraic key establishment protocols based on monoids |
US7136484B1 (en) * | 2001-10-01 | 2006-11-14 | Silicon Image, Inc. | Cryptosystems using commuting pairs in a monoid |
FR2831738B1 (fr) * | 2001-10-25 | 2003-12-19 | France Telecom | Procede cryptographique a cle publique base sur les groupes de tresses |
US7961874B2 (en) * | 2004-03-03 | 2011-06-14 | King Fahd University Of Petroleum & Minerals | XZ-elliptic curve cryptography with secret key embedding |
JP2008203548A (ja) * | 2007-02-20 | 2008-09-04 | Oki Electric Ind Co Ltd | 二次双曲線群を使用する鍵生成方法、復号方法、署名検証方法、鍵ストリーム生成方法および装置。 |
US8219820B2 (en) * | 2007-03-07 | 2012-07-10 | Research In Motion Limited | Power analysis countermeasure for the ECMQV key agreement algorithm |
CN102017510B (zh) * | 2007-10-23 | 2013-06-12 | 赵运磊 | 自封闭联合知识证明和Diffie-Hellman密钥交换方法与结构 |
US8699701B2 (en) * | 2010-12-01 | 2014-04-15 | King Fahd University | Method of performing XZ-elliptic curve cryptography for use with network security protocols |
ES2400895B1 (es) * | 2011-05-13 | 2014-03-24 | Telefónica, S.A. | Método para realizar una firma digital de grupo |
-
2013
- 2013-08-21 CN CN201310382299.7A patent/CN103414569B/zh not_active Expired - Fee Related
- 2013-09-22 WO PCT/CN2013/001119 patent/WO2015024149A1/zh active Application Filing
-
2014
- 2014-08-04 US US14/450,305 patent/US9537660B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7133523B2 (en) * | 2002-12-20 | 2006-11-07 | Pitney Bowes Inc. | Method and system for solving the word problem in braid group cryptosystems |
CN101374043A (zh) * | 2007-08-24 | 2009-02-25 | 管海明 | 密钥协商的方法、加/解密的方法及签名/验证的方法 |
US20100153728A1 (en) * | 2008-12-16 | 2010-06-17 | Certicom Corp. | Acceleration of key agreement protocols |
CN103200000A (zh) * | 2013-03-27 | 2013-07-10 | 武汉大学 | 一种量子计算环境下的共享密钥建立方法 |
Non-Patent Citations (2)
Title |
---|
左黎明: "一个基于辨群的公钥密码算法", 《微电子学与计算机》 * |
赵国: "代数学在公钥密码学中的应用", 《西南名族大学自然科学版》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105393488A (zh) * | 2013-12-04 | 2016-03-09 | 王威鉴 | 建立抗量子计算攻击的公钥密码的方法 |
WO2015081505A1 (zh) * | 2013-12-04 | 2015-06-11 | 王威鉴 | 建立抗量子计算攻击的公钥密码的方法 |
CN105393488B (zh) * | 2013-12-04 | 2019-07-09 | 王威鉴 | 建立抗量子计算攻击的公钥密码的方法 |
CN105049208B (zh) * | 2015-06-15 | 2018-04-20 | 浙江工商大学 | 基于双重困难的数据加密方法 |
CN105049208A (zh) * | 2015-06-15 | 2015-11-11 | 浙江金大科技有限公司 | 基于双重困难的数据加密方法 |
WO2017063114A1 (zh) * | 2015-10-12 | 2017-04-20 | 王晓峰 | 建立抗攻击的安全性公钥密码的方法 |
CN106664199A (zh) * | 2015-10-12 | 2017-05-10 | 王晓峰 | 建立抗攻击的安全性公钥密码的方法 |
WO2019000231A1 (zh) * | 2017-06-27 | 2019-01-03 | 王威鉴 | 建立抗攻击的公钥密码的方法 |
CN108449754A (zh) * | 2018-03-16 | 2018-08-24 | 丘佳珏 | 智能设备通过无线路由上网的方法 |
CN109787752A (zh) * | 2018-09-30 | 2019-05-21 | 王威鉴 | 建立抗攻击的共享密钥的方法 |
CN111400773A (zh) * | 2020-03-12 | 2020-07-10 | 深圳大学 | 数字签名方法、数字签名装置、***和存储介质 |
CN111400773B (zh) * | 2020-03-12 | 2022-09-09 | 深圳大学 | 数字签名方法、数字签名装置、***和存储介质 |
CN111740821A (zh) * | 2020-05-06 | 2020-10-02 | 深圳大学 | 建立共享密钥的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
US9537660B2 (en) | 2017-01-03 |
US20150055777A1 (en) | 2015-02-26 |
WO2015024149A1 (zh) | 2015-02-26 |
CN103414569B (zh) | 2016-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103414569B (zh) | 一种建立抗攻击的公钥密码的方法 | |
CN111106936B (zh) | 一种基于sm9的属性加密方法与*** | |
CN108173639B (zh) | 一种基于sm9签名算法的两方合作签名方法 | |
CN107124268B (zh) | 一种可抵抗恶意攻击的隐私集合交集计算方法 | |
CN107911209B (zh) | 建立抗量子计算攻击的安全性公钥密码的方法 | |
CN102263638B (zh) | 认证设备、认证方法和签名生成设备 | |
CN104821880B (zh) | 一种无证书广义代理签密方法 | |
CN110545279A (zh) | 兼具隐私和监管功能的区块链交易方法、装置及*** | |
CN107342859A (zh) | 一种匿名认证方法及其应用 | |
CN109600233A (zh) | 基于sm2数字签名算法的群签名标识签发方法 | |
CN106664199A (zh) | 建立抗攻击的安全性公钥密码的方法 | |
CN104301108A (zh) | 一种从基于身份环境到无证书环境的签密方法 | |
CN109547209A (zh) | 一种两方sm2数字签名生成方法 | |
CN113162751B (zh) | 具备加同态性的加密方法、***及可读存储介质 | |
CN106713349B (zh) | 一种能抵抗选择密文攻击的群组间代理重加密方法 | |
CN107294696A (zh) | 针对Leveled全同态密钥分配方法 | |
CN105393488B (zh) | 建立抗量子计算攻击的公钥密码的方法 | |
CN111865555B (zh) | 一种基于k-Lin假设的同态加密方法 | |
CN102291396B (zh) | 可信平台远程证明的匿名认证算法 | |
CN113132104A (zh) | 一种主动安全的ecdsa数字签名两方生成方法 | |
Ruan et al. | Efficient provably secure password-based explicit authenticated key agreement | |
CN103346999B (zh) | 一种支持not运算符并具有cca安全的cp-abe方法 | |
CN108055134B (zh) | 椭圆曲线点数乘及配对运算的协同计算方法及*** | |
Abdullah et al. | Hybrid quantum-classical key distribution | |
CN109981253B (zh) | 一种基于有限李型群的抗量子攻击的非对称加密方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20170817 Address after: 518000 Guangdong city of Shenzhen province Nanshan District Xili street Zhongshan Road No. 1001 Science Park B6-8B TCL Patentee after: Shenzhen Peng Kam science and technology development enterprises Address before: 518000 Nanhai Road, Guangdong, Shenzhen, No. 3688, No. Co-patentee before: Wang Xiaofeng Patentee before: Wang Weijian |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160810 Termination date: 20190821 |
|
CF01 | Termination of patent right due to non-payment of annual fee |