METHOD FOR OPTIMIZING AN EXECUTION OF A GENERATION OF A CRYSTALS-DILITHIUM POST-QUANTUM SIGNATURE

    公开(公告)号:EP4422126A1

    公开(公告)日:2024-08-28

    申请号:EP23305221.6

    申请日:2023-02-21

    IPC分类号: H04L9/32 H04L9/30

    摘要: The present invention relates to a method method for optimizing the execution of the generation of a Crystals-Dilithium post-quantum digital signature σ = (c̃, z, h) of a message M with a secret key sk = (ρ, K, tr, s1, s2, t0) where ρ, K, tr are 256 bits binary values, s1 and s2 are vectors of length l, respectively k, of elements of the ring Rq whose coefficients are lower than a first predetermined value η, and t0 is a polynomial vector of length k with k, l, n and q integers, said Crystals-Dilithium post-quantum digital signature generation comprising :
    a) generating (S1) a masking vector y, of length l, of polynomials with coefficients less than a second predetermined value γ1,
    b) computing (S2) a first vector of polynomials, of length k, w = Ay, where A is a k × l matrix each of whose entries is a polynomial in the ring Rq = Zq[X]/(Xn + 1),
    c) determining (S3) a second vector of polynomials w1 and a third vector of polynomials w0, both of length k, where every polynomial coefficient wi in Ay, with i in 0, ..., k-1, is written as wi = w1i · 2γ2 + w0i where |w0i| ≤ γ2 with γ2 a third predetermined value,
    d) generating (S4) a challenge c based on the message and the second vector of polynomials w1,
    e) performing rejection tests (S5) comprising testing if test vectors generated from said vectors, said challenge and said secret key fulfill predetermined conditions, and when said conditions are not fulfilled, restarting the signature generation from step a), else generating said signature, the steps a), b), c), d), and e) being repeated until the conditions are satisfied,
    wherein performing rejection tests (S5) comprises :
    - following said determination of said third vector of polynomials w0, generating a first test vector r0 as w0-cs2, and checking whether said first test vector r0 fulfills a first condition,
    - when said first condition is met, generating a second test vector z= y + cs1, and checking whether said second test vector z fulfills a second condition, and wherein, when said second condition is met, said signature is generated from said second test vector.

    ENCRYPTED DATA COMPARISON USING BOOTSTRAPING EVALUTION INVOLVING  TORUS BASED FULLY HOMOMORPHIC SCHEMES

    公开(公告)号:EP4395226A1

    公开(公告)日:2024-07-03

    申请号:EP23168475.4

    申请日:2023-04-18

    申请人: Vaultree, Ltd.

    发明人: Pradhan, Anil

    IPC分类号: H04L9/00 G06F7/02 H04L9/30

    CPC分类号: H04L9/008 H04L9/3093 G06F7/02

    摘要: The present disclosure relates to a system and method for manipulating encrypted data. In particular, the present disclosure relates to improvements homomorphic encryption. Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. As such, computations can be performed on data that has been homomorphically encrypted without access to the secret key. The output from a computation performed on homomorphically encrypted data will be homomorphically encrypted data. This output can be left in an encrypted form.

    KEY-EXCHANGE METHOD, KEY-EXCHANGE SYSTEM, KEY DEVICE, TERMINAL DEVICE, AND PROGRAM

    公开(公告)号:EP3232603A4

    公开(公告)日:2018-03-14

    申请号:EP16737330

    申请日:2016-01-12

    IPC分类号: H04L9/08 G09C1/00 H04L9/30

    摘要: A key device cannot calculate a common key and a client can confirm that processing has been performed correctly by a correct key device. A random number generating unit 12 generates random numbers s 1 , s 2 , s' 1 , and s' 2 . A public keys randomizing unit 13 generates first randomized public keys information obtained by randomizing public keys by using the random number s 1 and second randomized public keys information obtained by randomizing the public keys by using the random number s 2 . A proxy calculation unit 21 calculates a first commission result by using a secret key and calculates a second commission result by using the secret key. A verification unit 14 calculates a first verification value by using the random number s 2 , calculates a second verification value by using the random number s 1 , and verifies whether or not the first verification value and the second verification value coincide with each other. A common key calculation unit 15 calculates a common key by using the random numbers s' 1 and s' 2 if the first verification value and the second verification value coincide with each other.

    HYPERSPHERE-BASED MULTIVARIABLE PUBLIC KEY ENCRYPTION/DECRYPTION SYSTEM AND METHOD
    10.
    发明公开
    HYPERSPHERE-BASED MULTIVARIABLE PUBLIC KEY ENCRYPTION/DECRYPTION SYSTEM AND METHOD 审中-公开
    HYPERSPHÄRENBASIERTESMULTIVARIABLES系统ZURVERSCHLÜSSELUNG/ENTSCHLÜSSELUNGÖFFENTLICHERSCHLÜSSELUND VERFAHREN

    公开(公告)号:EP3096488A4

    公开(公告)日:2017-08-23

    申请号:EP15735039

    申请日:2015-01-07

    IPC分类号: H04L9/30

    CPC分类号: H04L9/3093

    摘要: Disclosed is a hypersphere-based multivariable public key encryption/decryption system, which is composed of an encryption module and a decryption module, wherein the encryption module comprises a processor, and a public key transformation component for transforming plaintext into ciphertext; and the decryption module comprises a processor, a first affine transformation inversion component, a trapdoor component and a second affine transformation inversion component, wherein the trapdoor component comprises a linear equation system construction component and a linear equation system solving component. All components execute corresponding operations, so that a set of data is obtained finally, and the set of data is stored and output as decrypted plaintext; and if the decryption module does not produce data, the processor outputs warning information about a decryption failure to a user. In the system and method of the present invention, the large domain technique is not used. The designed centralizing mapping contains N sets of "centre of sphere" as private keys to realize centralizing hiding. Meanwhile, the running speed is very fast, and only linear equation system solving is required to be conducted in the decryption process.

    摘要翻译: 本发明公开了一种基于超球环的多变量公钥加密/解密系统,由加密模块和解密模块组成,加密模块包括处理器和用于将明文转换为密文的公钥转换组件; 所述解密模块包括处理器,第一仿射变换反转组件,陷门组件和第二仿射变换反转组件,所述陷门组件包括线性方程系统构建组件和线性方程组系统求解组件。 所有的组件都执行相应的操作,最终得到一组数据,并将该组数据存储并输出为解密后的明文; 并且如果解密模块不产生数据,则处理器向用户输出关于解密失败的警告信息。 在本发明的系统和方法中,不使用大域技术。 设计的集中映射包含N组“球体中心”作为私钥实现集中隐藏。 同时,运行速度非常快,只需要在解密过程中进行线性方程组求解。