Font Size: a A A

Design And Implementation Of MPKC Based On One-way Shell-core Function

Posted on:2016-12-03Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhangFull Text:PDF
GTID:2298330467997336Subject:Network Security
Abstract/Summary:PDF Full Text Request
With the development of science and technology, the password is applied moreand more widely. It is not only applied to traditional military defense, but also in theInternet, finance, mobile payment have been more and more widely used; at the sametime, with the progress of science and technology, quantum computer is coming soon,in the future quantum computer era, many of the existing password will be all crack,so the study on the anti quantum computing has become a priority public key. Thecurrent password system mostly based on mathematical problems, while quantumcomputer also is to have a math problem which is not good at mathematics, this kindof problem is constructed on the basis of public key cryptography into the mainstreamafter quantum cryptography.The quantum computer to NPC problems are not good at calculation of NPCpublic key cryptosystem, so the problem of constructing anti based on quantumcomputation, the concept of the idea based on the introduction of the one-waycore-shell function. The so-called one-way shell core function, which is combinedwith a shell function and a kernel function, wherein the shell function may be aone-way function or trapdoor one-way function, the kernel function is a one-wayfunction.The core function is generally expressed as C(x),while the shell functionis S (x).The combination of the two can not only hide the putamen function of theboundary, but also for the attacker, because it did not know how thick the nuclearshell, much, therefore cannot accurately shelling, so as to improve the security of thescheme.In this paper, the difficulty of multivariate nonlinear algebraic equations based on,give the structure scheme of a one-way shell core function: First in the Fq’s n extension field K construction core function C(x) and shell function S(x),among them, S (x),"trap door", based on the lIC (l-IC) to construct.In order to avoid exposing boundary, core function C(x) and (S(?)C)(X) are expressed as c=(c1,…,cn), sc=(sc1,…,scn), on the Fq[x1,…,xn];Second use TG linear transformation.Transform (c,sc) into C,SC as a public key.In order to reduce the public key size, lIC reversible rings respectively on two type and a type of alternating, which not only reduces the number of public key, also reduced the public key size, which improves the system efficiency in lowering the premise of security.At the end of this paper will be based on given scheme, realization of the program, and the results show. Comparison of the final result, found the same agreed key two times, proved that this scheme is successful, also confirmed the feasibility and correctness of the design.
Keywords/Search Tags:one-way function, trapdoor one-way function, one cell-shell function, l-IC
PDF Full Text Request
Related items