会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明公开
    • METHOD FOR OPTIMIZING AN EXECUTION OF A GENERATION OF A CRYSTALS-DILITHIUM POST-QUANTUM SIGNATURE
    • EP4422126A1
    • 2024-08-28
    • EP23305221.6
    • 2023-02-21
    • THALES DIS FRANCE SAS
    • BERZATI, AlexandreCALLE VIERA, Andersson
    • H04L9/32H04L9/30
    • H04L9/3247H04L9/3093H04L2209/04620130101
    • The present invention relates to a method method for optimizing the execution of the generation of a Crystals-Dilithium post-quantum digital signature σ = (c̃, z, h) of a message M with a secret key sk = (ρ, K, tr, s1, s2, t0) where ρ, K, tr are 256 bits binary values, s1 and s2 are vectors of length l, respectively k, of elements of the ring Rq whose coefficients are lower than a first predetermined value η, and t0 is a polynomial vector of length k with k, l, n and q integers, said Crystals-Dilithium post-quantum digital signature generation comprising :
      a) generating (S1) a masking vector y, of length l, of polynomials with coefficients less than a second predetermined value γ1,
      b) computing (S2) a first vector of polynomials, of length k, w = Ay, where A is a k × l matrix each of whose entries is a polynomial in the ring Rq = Zq[X]/(Xn + 1),
      c) determining (S3) a second vector of polynomials w1 and a third vector of polynomials w0, both of length k, where every polynomial coefficient wi in Ay, with i in 0, ..., k-1, is written as wi = w1i · 2γ2 + w0i where |w0i| ≤ γ2 with γ2 a third predetermined value,
      d) generating (S4) a challenge c based on the message and the second vector of polynomials w1,
      e) performing rejection tests (S5) comprising testing if test vectors generated from said vectors, said challenge and said secret key fulfill predetermined conditions, and when said conditions are not fulfilled, restarting the signature generation from step a), else generating said signature, the steps a), b), c), d), and e) being repeated until the conditions are satisfied,
      wherein performing rejection tests (S5) comprises :
      - following said determination of said third vector of polynomials w0, generating a first test vector r0 as w0-cs2, and checking whether said first test vector r0 fulfills a first condition,
      - when said first condition is met, generating a second test vector z= y + cs1, and checking whether said second test vector z fulfills a second condition, and wherein, when said second condition is met, said signature is generated from said second test vector.
    • 10. 发明公开
    • HYPERSPHERE-BASED MULTIVARIABLE PUBLIC KEY ENCRYPTION/DECRYPTION SYSTEM AND METHOD
    • HYPERSPHÄRENBASIERTESMULTIVARIABLES系统ZURVERSCHLÜSSELUNG/ENTSCHLÜSSELUNGÖFFENTLICHERSCHLÜSSELUND VERFAHREN
    • EP3096488A4
    • 2017-08-23
    • EP15735039
    • 2015-01-07
    • SOUTH CHINA UNIV OF TECH (SCUT)
    • TANG SHAOHUACHEN JIAHUI
    • H04L9/30
    • H04L9/3093
    • Disclosed is a hypersphere-based multivariable public key encryption/decryption system, which is composed of an encryption module and a decryption module, wherein the encryption module comprises a processor, and a public key transformation component for transforming plaintext into ciphertext; and the decryption module comprises a processor, a first affine transformation inversion component, a trapdoor component and a second affine transformation inversion component, wherein the trapdoor component comprises a linear equation system construction component and a linear equation system solving component. All components execute corresponding operations, so that a set of data is obtained finally, and the set of data is stored and output as decrypted plaintext; and if the decryption module does not produce data, the processor outputs warning information about a decryption failure to a user. In the system and method of the present invention, the large domain technique is not used. The designed centralizing mapping contains N sets of "centre of sphere" as private keys to realize centralizing hiding. Meanwhile, the running speed is very fast, and only linear equation system solving is required to be conducted in the decryption process.
    • 本发明公开了一种基于超球环的多变量公钥加密/解密系统,由加密模块和解密模块组成,加密模块包括处理器和用于将明文转换为密文的公钥转换组件; 所述解密模块包括处理器,第一仿射变换反转组件,陷门组件和第二仿射变换反转组件,所述陷门组件包括线性方程系统构建组件和线性方程组系统求解组件。 所有的组件都执行相应的操作,最终得到一组数据,并将该组数据存储并输出为解密后的明文; 并且如果解密模块不产生数据,则处理器向用户输出关于解密失败的警告信息。 在本发明的系统和方法中,不使用大域技术。 设计的集中映射包含N组“球体中心”作为私钥实现集中隐藏。 同时,运行速度非常快,只需要在解密过程中进行线性方程组求解。