메뉴 건너뛰기




Volumn 73, Issue 2, 2014, Pages 641-666

Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes

Author keywords

Code based cryptography; Distinguisher; Generalized Reed Solomon codes; Homomorphic encryption; Key recovery

Indexed keywords

MATRIX ALGEBRA; PUBLIC KEY CRYPTOGRAPHY; RECOVERY; REED-SOLOMON CODES;

EID: 84905217777     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-014-9967-z     Document Type: Article
Times cited : (98)

References (33)
  • 3
    • 14844342361 scopus 로고    scopus 로고
    • How to mask the structure of codes for a cryptographic use
    • Berger T.P., Loidreau P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35(1), 63-79 (2005).
    • (2005) Des. Codes Cryptogr , vol.35 , Issue.1 , pp. 63-79
    • Berger, T.P.1    Loidreau, P.2
  • 5
    • 84905265658 scopus 로고    scopus 로고
    • ArXiv:1111.4301. This paper was accepted for publication in the proceedings of the 44th ACM Symposium on Theory of Computing (STOC). The authors withdrew their paper after they learned that their scheme was threatened
    • Bogdanov A., Lee C.H.: Homomorphic encryption from codes. ArXiv:1111.4301. This paper was accepted for publication in the proceedings of the 44th ACM Symposium on Theory of Computing (STOC). The authors withdrew their paper after they learned that their scheme was threatened (2011).
    • (2011) Homomorphic Encryption from Codes
    • Bogdanov, A.1    Lee, C.H.2
  • 7
    • 84873940575 scopus 로고    scopus 로고
    • When homomorphism becomes a liability
    • Brakerski Z.: When homomorphism becomes a liability. In: TCC, pp. 143-161 (2013).
    • (2013) TCC , pp. 143-161
    • Brakerski, Z.1
  • 8
    • 70350343371 scopus 로고    scopus 로고
    • Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field
    • Halevi S. (ed.) Springer, Berlin
    • Cascudo I., Chen H., Cramer R., Xing C.: Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field. In: Halevi S. (ed.) Advances in Cryptology: CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 466-486. Springer, Berlin (2009).
    • (2009) Advances in Cryptology: CRYPTO 2009. Lecture Notes in Computer Science , vol.5677 , pp. 466-486
    • Cascudo, I.1    Chen, H.2    Cramer, R.3    Xing, C.4
  • 9
    • 80051980228 scopus 로고    scopus 로고
    • The torsion-limit for algebraic function fields and its application to arithmetic secret sharing
    • Rogaway P. (ed.) Springer, Berlin
    • Cascudo I., Cramer R., Xing C.: The torsion-limit for algebraic function fields and its application to arithmetic secret sharing. In: Rogaway P. (ed.) Advances in Cryptology: CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, pp. 685-705. Springer, Berlin (2011).
    • (2011) Advances in Cryptology: CRYPTO 2011. Lecture Notes in Computer Science , vol.6841 , pp. 685-705
    • Cascudo, I.1    Cramer, R.2    Xing, C.3
  • 11
    • 84916596072 scopus 로고    scopus 로고
    • Polynomial time attack on wild McEliece over quadratic extensions
    • (To appear)
    • Couvreur A., Otmani A., Tillich J.P.: Polynomial time attack on wild McEliece over quadratic extensions. In: EUROCRYPT (2014) (To appear).
    • (2014) Eurocrypt
    • Couvreur, A.1    Otmani, A.2    Tillich, J.P.3
  • 12
    • 83655202691 scopus 로고    scopus 로고
    • A distinguisher for high rate McEliece cryptosystems
    • ITW 2011, Paraty, Brasil
    • Faugère J.-C., Gauthier V., Otmani A., Perret L., Tillich J.-P.: A distinguisher for high rate McEliece cryptosystems. In: Proceedings of the Information Theory Workshop 2011, ITW 2011, Paraty, Brasil, pp. 282-286 (2011).
    • (2011) Proceedings of the Information Theory Workshop 2011 , pp. 282-286
    • Faugère, J.-C.1
  • 13
    • 84884481641 scopus 로고    scopus 로고
    • A distinguisher for high-rate McEliece cryptosystems
    • Faugère J.-C., Gauthier-Umaña V., Otmani A., Perret L., Tillich J.-P.: A distinguisher for high-rate McEliece cryptosystems. IEEE Trans. Inf. Theory, 59(10), 6830-6844 (2013).
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.10 , pp. 6830-6844
    • Faugère, J.-C.1
  • 16
    • 25444433745 scopus 로고
    • Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem
    • Davies D. (ed.) Springer, Berlin
    • Gibson J.: Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. In: Davies D. (ed.) Advances in Cryptology: EUROCRYPT 91. Lecture Notes in Computer Science, vol. 547, pp. 517-521. Springer, Berlin (1991).
    • (1991) Advances in Cryptology: EUROCRYPT 91. Lecture Notes in Computer Science , vol.547 , pp. 517-521
    • Gibson, J.1
  • 18
    • 0003197258 scopus 로고
    • A unified description of an error locating procedure for linear codes
    • Voneshta Voda
    • Kötter R.: A unified description of an error locating procedure for linear codes. In: Proceedings of the Algebraic and Combinatorial Coding Theory, Voneshta Voda, pp. 113-117 (1992).
    • (1992) Proceedings of the Algebraic and Combinatorial Coding Theory , pp. 113-117
    • Kötter, R.1
  • 19
    • 0035270825 scopus 로고    scopus 로고
    • Weak keys in the McEliece public-key cryptosystem
    • Loidreau P., Sendrier N.: Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inf. Theory 47(3), 1207-1211 (2001).
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.3 , pp. 1207-1211
    • Loidreau, P.1    Sendrier, N.2
  • 21
    • 84905278896 scopus 로고    scopus 로고
    • The non-gap sequence of a subcode of a generalized Reed-Solomon code
    • Finiasz M., Sendrier N., Charpin P., Otmani A. (eds.) Paris
    • Márquez-Corbella I., Martínez-Moro E., Pellikaan R.: The non-gap sequence of a subcode of a generalized Reed-Solomon code. In: Finiasz M., Sendrier N., Charpin P., Otmani A. (eds.) Proceedings of the 7th International Workshop on Coding and Cryptography WCC 2011, Paris, pp. 183-193 (2011).
    • (2011) Proceedings of the 7th International Workshop on Coding and Cryptography WCC 2011 , pp. 183-193
    • Márquez-Corbella, I.1
  • 22
    • 84872377040 scopus 로고    scopus 로고
    • The non-gap sequence of a subcode of a generalized Reed-Solomon code
    • Márquez-Corbella I., Martínez-Moro E., Pellikaan R.: The non-gap sequence of a subcode of a generalized Reed-Solomon code. Des. Codes Cryptogr. 66, 1-17 (2012).
    • (2012) Des. Codes Cryptogr , vol.66 , pp. 1-17
    • Márquez-Corbella, I.1
  • 26
    • 0002448405 scopus 로고
    • A public-key system based on algebraic coding theory
    • McEliece R.J.: A public-key system based on algebraic coding theory, pp. 114-116. Jet Propulsion Lab, DSN Progress, Report 44 (1978).
    • (1978) Jet Propulsion Lab, DSN Progress, Report , vol.44 , pp. 114-116
    • McEliece, R.J.1
  • 28
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159-166 (1986).
    • (1986) Probl. Control Inf. Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 29
    • 38249008268 scopus 로고
    • On decoding by error location and dependent sets of error positions
    • Pellikaan R.: On decoding by error location and dependent sets of error positions. Discret. Math. 106-107, 368-381 (1992).
    • (1992) Discret. Math , vol.106-107 , pp. 368-381
    • Pellikaan, R.1
  • 30
    • 0027983324 scopus 로고
    • A public-key cryptosystem based on Reed-Muller codes
    • Sidelnikov V.M.: A public-key cryptosystem based on Reed-Muller codes. Discret. Math. Appl. 4(3), 191-207 (1994).
    • (1994) Discret. Math. Appl , vol.4 , Issue.3 , pp. 191-207
    • Sidelnikov, V.M.1
  • 31
    • 84929257781 scopus 로고
    • On the insecurity of cryptosystems based on generalized Reed-Solomon codes
    • Sidelnikov V.M., Shestakov S.O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discret. Math. Appl. 1(4), 439-444 (1992).
    • (1992) Discret. Math. Appl , vol.1 , Issue.4 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 32
    • 39049099966 scopus 로고    scopus 로고
    • Two NP-complete problems in coding theory with an application in code based cryptography
    • Wieschebrink C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory, pp. 1733-1737 (2006).
    • (2006) IEEE International Symposium on Information Theory , pp. 1733-1737
    • Wieschebrink, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.