메뉴 건너뛰기




Volumn 49, Issue 1-3, 2008, Pages 289-305

Semantic security for the McEliece cryptosystem without random oracles

Author keywords

Cryptographic standard model; McEliece cryptosystem; Niederreiter cryptosystem; Semantic security

Indexed keywords

CRYPTOGRAPHIC STANDARD MODEL; MCELIECE CRYPTOSYSTEM; NIEDERREITER CRYPTOSYSTEM; SEMANTIC SECURITY;

EID: 51349142711     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-008-9175-9     Document Type: Article
Times cited : (83)

References (31)
  • 1
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Bellare M., Rogaway P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of CCS, pp. 62-73 (1993).
    • (1993) Proceedings of CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption - How to encrypt with RSA
    • Bellare M., Rogaway P.: Optimal asymmetric encryption - how to encrypt with RSA. In: EUROCRYPT '94, LNCS vol. 950, pp. 92-111 (1995).
    • (1995) EUROCRYPT '94, LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 24144453496 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • 4
    • Blum A., Kalai A., Wasserman H. (2003). Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4): 506-519
    • (2003) J. ACM , vol.50 , pp. 506-519
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 5
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH codes of length 511
    • 1
    • Canteaut A., Chabaud F. (1998). A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH codes of length 511. IEEE Trans. Inform. Theory 44(1): 367-378
    • (1998) IEEE Trans. Inform. Theory , vol.44 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 6
    • 51349115957 scopus 로고    scopus 로고
    • Identity based identification and signature schemes using correcting codes
    • Cayrel P.-L., Gaborit P., Girault M.: Identity based identification and signature schemes using correcting codes. In: WCC '07, pp. 69-78 (2007).
    • (2007) WCC '07 , pp. 69-78
    • Cayrel, P.-L.1    Gaborit, P.2    Girault, M.3
  • 7
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a McEliece-based digital signature scheme
    • Courtois N., Finiasz M., Sendrier N.: How to achieve a McEliece-based digital signature scheme. In: Asiacrypt '01, LNCS vol. 2248, pp. 157-174 (2001).
    • (2001) Asiacrypt '01, LNCS , vol.2248 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Cramer R., Shoup V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Crypto '98, LNCS vol. 1462, pp. 13-25 (1998).
    • (1998) Crypto '98, LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • 4
    • El Gamal T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4): 469-472
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 10
    • 84858691417 scopus 로고    scopus 로고
    • A summary of McEliece-type cryptosystems and their security
    • 2
    • Engelbert D., Overbeck R., Schmidt A. (2007). A summary of McEliece-type cryptosystems and their security. J. Math. Cryptol. 1(2): 151-199
    • (2007) J. Math. Cryptol. , vol.1 , pp. 151-199
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 11
    • 84947905764 scopus 로고    scopus 로고
    • An efficient pseudo-random generator provably as secure as syndrome decoding
    • Fischer J.-B., Stern J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Eurocrypt '96, LNCS vol. 1070, pp. 245-255 (1996).
    • (1996) Eurocrypt '96, LNCS , vol.1070 , pp. 245-255
    • Fischer, J.-B.1    Stern, J.2
  • 12
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Fujisaki E., Okamoto T.: Secure integration of asymmetric and symmetric encryption schemes. In: Crypto '99, LNCS vol. 1666, pp. 537-554 (1999).
    • (1999) Crypto '99, LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 14
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • Goldreich O., Levin L.A.: A hard-core predicate for all one-way functions. In: STOC '89, pp. 25-32 (1989).
    • (1989) STOC '89 , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 16
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB+ protocols
    • Katz J., Shin J.S.: Parallel and concurrent security of the HB and HB+ protocols. In: Eurocrypt '06, LNCS vol. 4004, pp. 73-87 (2006).
    • (2006) Eurocrypt '06, LNCS , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.S.2
  • 18
    • 84937393537 scopus 로고    scopus 로고
    • Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
    • Kobara K., Imai H.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: PKC '01, LNCS vol. 1992, pp. 19-35 (2001).
    • (2001) PKC '01, LNCS , vol.1992 , pp. 19-35
    • Kobara, K.1    Imai, H.2
  • 19
    • 0024078914 scopus 로고    scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • 5
    • Leon J.S. (2001). A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Trans. Inform. Theory 34(5): 1354-1359
    • (2001) IEEE Trans. Inform. Theory , vol.34 , pp. 1354-1359
    • Leon, J.S.1
  • 20
    • 0028294826 scopus 로고
    • The equivalence of McEliece's and Niederreiter's public-key cryptosystems
    • Li Y.X., Deng R.H., Wang X.M. (1994). The equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Trans. Inform. Theory 40, 271-273
    • (1994) IEEE Trans. Inform. Theory , vol.40 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.M.3
  • 21
    • 0035270825 scopus 로고    scopus 로고
    • Weak keys in the McEliece public-key cryptosystem
    • 3
    • Loidreau P., Sendrier N. (2001). Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inform. Theory 47(3): 1207-1211
    • (2001) IEEE Trans. Inform. Theory , vol.47 , pp. 1207-1211
    • Loidreau, P.1    Sendrier, N.2
  • 23
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • McEliece R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Prog. Rep. (1978).
    • (1978) Deep Space Network Prog. Rep.
    • McEliece, R.J.1
  • 24
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • 2
    • Niederreiter H. (1986). Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inform. Theory 15(2): 159-166
    • (1986) Prob. Control Inform. Theory , vol.15 , pp. 159-166
    • Niederreiter, H.1
  • 25
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystem based on discrete logarithm residues
    • Paillier P.: Public-key cryptosystem based on discrete logarithm residues. In: Eurocrypt '99, LNCS vol. 1592, pp. 223-238 (1999).
    • (1999) Eurocrypt '99, LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 27
    • 84957795480 scopus 로고    scopus 로고
    • Chosen-ciphertext security for any one-way cryptosystem
    • Pointcheval D.: Chosen-ciphertext security for any one-way cryptosystem. In: PKC '00, LNCS vol. 1751, pp. 129-146 (2000).
    • (2000) PKC '00, LNCS , vol.1751 , pp. 129-146
    • Pointcheval, D.1
  • 28
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent linear codes: The support splitting algorithm
    • 4
    • Sendrier N. (2000). Finding the permutation between equivalent linear codes: the support splitting algorithm. IEEE Trans. Inform. Theory 46(4): 1193-1203
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 1193-1203
    • Sendrier, N.1
  • 29
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Shoup V.: OAEP reconsidered. In: Crypto '01, LNCS vol. 2139, pp. 239-259 (2001).
    • (2001) Crypto '01, LNCS , vol.2139 , pp. 239-259
    • Shoup, V.1
  • 30
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • Stern J.: A method for finding codewords of small weight. In: Coding Theory and Applications, LNCS vol. 388, pp. 106-113 (1989).
    • (1989) Coding Theory and Applications, LNCS , vol.388 , pp. 106-113
    • Stern, J.1
  • 31
    • 51349147944 scopus 로고    scopus 로고
    • Privacy enhanced and light weight RFID system without tag synchronization and exhaustive search
    • Suzuki M., Kobara K., Imai H.: Privacy enhanced and light weight RFID system without tag synchronization and exhaustive search. In: IEEE SMC (2006).
    • (2006) IEEE SMC
    • Suzuki, M.1    Kobara, K.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.