메뉴 건너뛰기




Volumn 5921 LNCS, Issue , 2009, Pages 222-235

Provably secure code-based threshold ring signatures

Author keywords

[No Author keywords available]

Indexed keywords

CODE-BASED CRYPTOGRAPHY; CODING THEORY; FINITE SET; FIRST CODE; IDEAL-CIPHER MODEL; PROVABLY SECURE; PUBLIC KEYS; RANDOM ORACLE; SECURITY LEVEL; SECURITY PROOFS; THRESHOLD RING SIGNATURES;

EID: 72449174214     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10868-6_13     Document Type: Conference Paper
Times cited : (33)

References (36)
  • 1
    • 72449140818 scopus 로고    scopus 로고
    • +08] Augot, D., Finiasz, M., Gaborit, P., Manuel, S., Sendrier, N.: Fast syndrome-based hash function. SHA-3 Proposal: FSB (2008), http://www-roc.inria.fr/secret/CBCrypto/index.php?fsb
    • +08] Augot, D., Finiasz, M., Gaborit, P., Manuel, S., Sendrier, N.: Fast syndrome-based hash function. SHA-3 Proposal: FSB (2008), http://www-roc.inria.fr/secret/CBCrypto/index.php?pg=fsb
  • 3
    • 56749180648 scopus 로고    scopus 로고
    • A new efficient threshold ring signature scheme based on coding theory
    • AMCG08, Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
    • [AMCG08] Aguilar Melchor, C., Cayrel, P.L., Gaborit, P.: A new efficient threshold ring signature scheme based on coding theory. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Aguilar Melchor, C.1    Cayrel, P.L.2    Gaborit, P.3
  • 4
    • 70350633827 scopus 로고    scopus 로고
    • Reducing key length of the McEliece cryptosystem
    • BCGO09, Preneel, B, ed, AFRICACRYPT 2009, Springer, Heidelberg
    • [BCGO09] Berger, T., Cayrel, P.L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 60-76. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5580 , pp. 60-76
    • Berger, T.1    Cayrel, P.L.2    Gaborit, P.3    Otmani, A.4
  • 5
    • 33745561884 scopus 로고    scopus 로고
    • [BKM06] Bender, A., Katz, J., Morselli, R.: Ring signatures: Stronger definitions, and constructions without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 60-79. Springer, Heidelberg (2006)
    • [BKM06] Bender, A., Katz, J., Morselli, R.: Ring signatures: Stronger definitions, and constructions without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60-79. Springer, Heidelberg (2006)
  • 6
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the McEliece cryptosystem
    • BLP08, Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
    • [BLP08] Bernstein, J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, J.1    Lange, T.2    Peters, C.3
  • 9
    • 84937420077 scopus 로고    scopus 로고
    • Threshold ring signatures and applications to ad-hoc groups
    • BSS02, Yung,M, ed, CRYPTO 2002, Springer, Heidelberg
    • [BSS02] Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Yung,M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 465-480. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 10
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a McEliece-based digital signature scheme
    • CFS01, Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • [CFS01] Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157-174. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 11
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • CGH04
    • [CGH04] Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 12
    • 38149083391 scopus 로고    scopus 로고
    • Ring signatures of sub-linear size without random oracles
    • CGS07, Arge, L, Cachin, C, Jurdziński, T, Tarlecki, A, eds, ICALP 2007, Springer, Heidelberg
    • [CGS07] Chandran, N., Groth, J., Sahai, A.: Ring signatures of sub-linear size without random oracles. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 423-434. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4596 , pp. 423-434
    • Chandran, N.1    Groth, J.2    Sahai, A.3
  • 13
    • 38149131364 scopus 로고    scopus 로고
    • On Kabatianskii-Krouk- Smeets signatures
    • COV07, Carlet, C, Sunar, B, eds, WAIFI 2007, Springer, Heidelberg
    • [COV07] Cayrel, P.L., Otmani, A., Vergnaud, D.: On Kabatianskii-Krouk- Smeets signatures. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 237-251. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4547 , pp. 237-251
    • Cayrel, P.L.1    Otmani, A.2    Vergnaud, D.3
  • 14
    • 51849085606 scopus 로고    scopus 로고
    • The random oracle model and the ideal cipher model are equivalent
    • CPS08, Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • [CPS08] Coron, J.-S., Patarin, J., Seurin, Y.: The random oracle model and the ideal cipher model are equivalent. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 1-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 1-20
    • Coron, J.-S.1    Patarin, J.2    Seurin, Y.3
  • 15
    • 85024290278 scopus 로고
    • Group signatures
    • CvH92, Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • [CvH92] Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 16
    • 70349873550 scopus 로고    scopus 로고
    • [Dal08] Dallot, L.: Towards a concrete security proof of Courtois, Finiasz and Sendrier signature scheme. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, 4945, pp. 65-77. Springer, Heidelberg (2008)
    • [Dal08] Dallot, L.: Towards a concrete security proof of Courtois, Finiasz and Sendrier signature scheme. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, vol. 4945, pp. 65-77. Springer, Heidelberg (2008)
  • 17
    • 0017018484 scopus 로고
    • New directions in cryptography
    • DH76
    • [DH76] Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Th. 22(6), 644-654 (1976)
    • (1976) IEEE Trans. Inform. Th , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 18
    • 35048854233 scopus 로고    scopus 로고
    • Anonymous identification in ad-hoc groups
    • DKNS04, Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • [DKNS04] Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad-hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609-626. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 609-626
    • Dodis, Y.1    Kiayias, A.2    Nicolosi, A.3    Shoup, V.4
  • 19
    • 72449174805 scopus 로고    scopus 로고
    • Security bounds for the design of code-based cryptosystems
    • FS09, Matsui, M, ed, ASIACRYPT 2009, Springer, Heidelberg
    • [FS09] Finiasz, M., Sendrier, N.: Security bounds for the design of code-based cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009), http://eprint.iacr.org/2009/414
    • (2009) LNCS , vol.5912 , pp. 88-105
    • Finiasz, M.1    Sendrier, N.2
  • 20
    • 84927752554 scopus 로고    scopus 로고
    • Desingated verifier proofs and their applications
    • JSI96, Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • [JSI96] Jakobson, M., Sako, K., Implagliazzo, R.: Desingated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143-154. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 143-154
    • Jakobson, M.1    Sako, K.2    Implagliazzo, R.3
  • 21
    • 84937393537 scopus 로고    scopus 로고
    • [KI01] Kobara, K., Imai, I.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 19-35. Springer, Heidelberg (2001)
    • [KI01] Kobara, K., Imai, I.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
  • 22
    • 70350336456 scopus 로고    scopus 로고
    • On bounded distance decoding, unique shortest vectors, and the minimum distance problem
    • LM09, Tai, X.-C, et al, eds, CRYPTO 2009, Springer, Heidelberg
    • [LM09] Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Tai, X.-C., et al. (eds.) CRYPTO 2009. LNCS, vol. 5677, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 577-594
    • Lyubashevsky, V.1    Micciancio, D.2
  • 23
    • 70350344293 scopus 로고    scopus 로고
    • How risky is the random-oracle model?
    • LN09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
    • [LN09] Leurent, G., Nguyen, P.Q.: How risky is the random-oracle model? In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 445-464. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 445-464
    • Leurent, G.1    Nguyen, P.Q.2
  • 24
    • 0035270825 scopus 로고    scopus 로고
    • Weak keys in McEliece public-key cryptosystem
    • LS01
    • [LS01] Loidreau, P., Sendrier, N.:Weak keys in McEliece public-key cryptosystem. IEEE Trans. Inform. Th. 47(3), 1207-1212 (2001)
    • (2001) IEEE Trans. Inform. Th , vol.47 , Issue.3 , pp. 1207-1212
    • Loidreau, P.1    Sendrier, N.2
  • 25
    • 77954611855 scopus 로고    scopus 로고
    • Compact McEliece keys from goppa codes. Cryptology ePrint Archive
    • MB09, Report 2009/187
    • [MB09] Misoczki, R., Barreto, P.S.L.M.: Compact McEliece keys from goppa codes. Cryptology ePrint Archive, Report 2009/187 (2009), http://eprint.iacr. org/
    • (2009)
    • Misoczki, R.1    Barreto, P.S.L.M.2
  • 26
    • 0003777826 scopus 로고    scopus 로고
    • A public-key cryptosystem based on algebraic coding theory. Technical report, DSN Progress report # 42-44
    • McE78, Jet Propulsion Laboratory, Pasadena, Californila 1978
    • [McE78] McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Technical report, DSN Progress report # 42-44, Jet Propulsion Laboratory, Pasadena, Californila (1978)
    • McEliece, R.J.1
  • 27
    • 79960836060 scopus 로고    scopus 로고
    • Deniable ring authentification
    • Nao02, Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • [Nao02] Naor, M.: Deniable ring authentification. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481-498. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 481-498
    • Naor, M.1
  • 29
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • RST01, Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • [RST01] Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552-565. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 30
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent codes: The support splitting algorithm
    • Sen00
    • [Sen00] Sendrier, N.: Finding the permutation between equivalent codes: the support splitting algorithm. IEEE Trans. Inform. Th. 46, 1193-1203 (2000)
    • (2000) IEEE Trans. Inform. Th , vol.46 , pp. 1193-1203
    • Sendrier, N.1
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • Sha79
    • [Sha79] Shamir, A.: How to share a secret. Commun. of the ACM 22(11), 612-613 (1979)
    • (1979) Commun. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 33
    • 84955606497 scopus 로고
    • An alternative to the Fiat-Shamir protocol
    • Ste90, Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
    • [Ste90] Stern, J.: An alternative to the Fiat-Shamir protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 173-180. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.434 , pp. 173-180
    • Stern, J.1
  • 34
    • 0030283873 scopus 로고    scopus 로고
    • A new paradigm for public key identification
    • Ste96
    • [Ste96] Stern, J.: A new paradigm for public key identification. IEEE Trans. Inform. Th. 42(6), 1757-1768 (1996)
    • (1996) IEEE Trans. Inform. Th , vol.42 , Issue.6 , pp. 1757-1768
    • Stern, J.1
  • 35
    • 36049024799 scopus 로고    scopus 로고
    • [SW07] Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Okamoto, T.,Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 166-180. Springer, Heidelberg (2007)
    • [SW07] Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Okamoto, T.,Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 166-180. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.