메뉴 건너뛰기




Volumn 29, Issue 1, 2016, Pages 1-27

Enhanced Public Key Security for the McEliece Cryptosystem

Author keywords

Error correcting codes; McEliece cryptosystem; Niederreiter cryptosystem; Public key security; Reed Solomon codes

Indexed keywords

CRYPTOGRAPHY;

EID: 84905884450     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-014-9187-8     Document Type: Article
Times cited : (89)

References (48)
  • 1
    • 84890891494 scopus 로고    scopus 로고
    • Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems, in Proceedings of the IEEE International Conference on Communications (ICC 2013) - Workshop on Information Security over Noisy and Lossy Communication Systems. (Budapest
    • M. Baldi, M. Bianchi, F. Chiaraluce, Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems, in Proceedings of the IEEE International Conference on Communications (ICC 2013) - Workshop on Information Security over Noisy and Lossy Communication Systems. (Budapest, Hungary 2013)
    • (2013) Hungary
    • Baldi, M.1    Bianchi, M.2    Chiaraluce, F.3
  • 2
    • 84883324538 scopus 로고    scopus 로고
    • Security and complexity of the McEliece Cryptosystem based on QC-LDPC codes. IET Inf
    • M. Baldi, M. Bianchi, F. Chiaraluce, Security and complexity of the McEliece Cryptosystem based on QC-LDPC codes. IET Inf. Secur. 7(3), 212–220 (2013)
    • (2013) Secur , vol.7 , Issue.3 , pp. 212-220
    • Baldi, M.1    Bianchi, M.2    Chiaraluce, F.3
  • 4
    • 52149114896 scopus 로고    scopus 로고
    • A new analysis of the McEliece cryptosystem based on QC-LDPC codes, in Security and Cryptography for Networks. LNCS, vol. 5229 (Springer
    • M. Baldi, M. Bodrato, F. Chiaraluce, A new analysis of the McEliece cryptosystem based on QC-LDPC codes, in Security and Cryptography for Networks. LNCS, vol. 5229 (Springer, Berlin/Heidelberg, 2008), pp. 246–262
    • (2008) Berlin/Heidelberg , pp. 246-262
    • Baldi, M.1    Bodrato, M.2    Chiaraluce, F.3
  • 5
    • 51649105649 scopus 로고    scopus 로고
    • Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2007) (Nice
    • M. Baldi, F. Chiaraluce, Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2007) (Nice, France, 2007), pp. 2591–2595
    • (2007) France , pp. 2591-2595
    • Baldi, M.1    Chiaraluce, F.2
  • 6
    • 38549169109 scopus 로고    scopus 로고
    • Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Conference on Communications (ICC 2007) (Glasgow
    • M. Baldi, F. Chiaraluce, R. Garello, F. Mininni, Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Conference on Communications (ICC 2007) (Glasgow, Scotland, 2007), pp. 951–956
    • (2007) Scotland , pp. 951-956
    • Baldi, M.1    Chiaraluce, F.2    Garello, R.3    Mininni, F.4
  • 7
    • 84860003018 scopus 로고    scopus 로고
    • Decoding random binary linear codes in: How 1 + 1 = 0 improves information set decoding, in EUROCRYPT 2012. LNCS, vol
    • A. Becker, A. Joux, A. May, A. Meurer, Decoding random binary linear codes in: How 1 + 1 = 0 improves information set decoding, in EUROCRYPT 2012. LNCS, vol. 7237 (Springer-Verlag 2012), pp. 520–536
    • (2012) Springer-Verlag , pp. 520-536
    • Becker, A.1    Joux, A.2    May, A.3    Meurer, A.4
  • 8
    • 14844342361 scopus 로고    scopus 로고
    • T.P. Berger, P. Loidreau, How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35, 63–79 (2005)
    • T.P. Berger, P. Loidreau, How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35, 63–79 (2005)
  • 9
    • 0017973512 scopus 로고    scopus 로고
    • E. Berlekamp, R. McEliece, H. van Tilborg, On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
    • E. Berlekamp, R. McEliece, H. van Tilborg, On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
  • 10
    • 84890623915 scopus 로고    scopus 로고
    • McBits: fast constant-time code-based cryptography, in Proceedings of the Cryptographic Hardware and Embedded Systems (CHES 2013). LNCS, vol
    • D.J. Bernstein, T. Chou, P. Schwabe, McBits: fast constant-time code-based cryptography, in Proceedings of the Cryptographic Hardware and Embedded Systems (CHES 2013). LNCS, vol. 8086 (Springer, 2013), pp. 250–272
    • (2013) Springer , pp. 250-272
    • Bernstein, D.J.1    Chou, T.2    Schwabe, P.3
  • 11
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the McEliece cryptosystem, in Post-Quantum Cryptography. LNCS, vol. 5299 (Springer
    • D.J. Bernstein, T. Lange, C. Peters, Attacking and defending the McEliece cryptosystem, in Post-Quantum Cryptography. LNCS, vol. 5299 (Springer, Berlin/Heidelberg, 2008), pp. 31–46
    • (2008) Berlin/Heidelberg , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 12
    • 80052013042 scopus 로고    scopus 로고
    • Smaller decoding exponents: ball-collision decoding, in CRYPTO 2011. LNCS, vol
    • D.J. Bernstein, T. Lange, C. Peters, Smaller decoding exponents: ball-collision decoding, in CRYPTO 2011. LNCS, vol. 6841 (Springer-Verlag, 2011), pp. 743–760
    • (2011) Springer-Verlag , pp. 743-760
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 15
    • 47649112427 scopus 로고    scopus 로고
    • Complexity analysis of Reed-Solomon decoding over without using syndromes. EURASIP J. Wirel. Commun. Netw
    • N. Chen, Z. Yan, Complexity analysis of Reed-Solomon decoding over without using syndromes. EURASIP J. Wirel. Commun. Netw. Article ID 843634 (2008)
    • (2008) Article ID 843634
    • Chen, N.1    Yan, Z.2
  • 16
    • 84929461941 scopus 로고    scopus 로고
    • ASIACRYPT
    • N. Courtois, M. Finiasz, N. Sendrier, How to achieve a McEliece-based digital signature scheme, in ASIACRYPT 2001. LNCS, vol. 2248 (Springer, Berlin/Heidelberg, 2001), pp. 157–174
    • (2001) LNCS , vol.2248 , Issue.Springer, Berlin/Heidelberg, 2001 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 17
    • 84905217777 scopus 로고    scopus 로고
    • Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des
    • A. Couvreur, P. Gaborit, V. Gauthier-Umaña, A. Otmani, J.-P. Tillich, Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des. Codes Cryptogr. (2014). doi:10.1007/s10623-014-9967-z
    • (2014) Codes Cryptogr
    • Couvreur, A.1    Gaborit, P.2    Gauthier-Umaña, V.3    Otmani, A.4    Tillich, J.-P.5
  • 18
    • 84866481430 scopus 로고    scopus 로고
    • N. Döttling, R. Dowsley, J. Müller-Quade, A.C.A Nascimento, A CCA2 Secure Variant of the McEliece Cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
    • N. Döttling, R. Dowsley, J. Müller-Quade, A.C.A Nascimento, A CCA2 Secure Variant of the McEliece Cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
  • 19
    • 67650102558 scopus 로고    scopus 로고
    • A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model, in Topics in Cryptology - CT-RSA
    • R. Dowsley, J. Müller-Quade, A.C.A. Nascimento, A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model, in Topics in Cryptology - CT-RSA 2009. LNCS, vol. 5473 (Springer, Berlin/Heidelberg, 2009), pp. 240–251
    • (2009) LNCS , vol.5473 , Issue.Springer, Berlin/Heidelberg, 2009 , pp. 240-251
    • Dowsley, R.1    Müller-Quade, J.2    Nascimento, A.C.A.3
  • 20
    • 84870872249 scopus 로고    scopus 로고
    • M. Elia, J. Rosenthal, D. Schipani, Polynomial evaluation over finite fields: new algorithms and complexity bounds. Appl. Algebra Eng. Commun. Comput. 23(3–4), 129–141 (2011)
    • M. Elia, J. Rosenthal, D. Schipani, Polynomial evaluation over finite fields: new algorithms and complexity bounds. Appl. Algebra Eng. Commun. Comput. 23(3–4), 129–141 (2011)
  • 21
    • 83655202691 scopus 로고    scopus 로고
    • A distinguisher for high rate McEliece cryptosystems, in Proceedings of the IEEE Information Theory Workshop (ITW 2011). (Paraty
    • J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich, A distinguisher for high rate McEliece cryptosystems, in Proceedings of the IEEE Information Theory Workshop (ITW 2011). (Paraty, Brazil, 2011), pp. 282–286
    • (2011) Brazil , pp. 282-286
    • Faugère, J.-C.1    Otmani, A.2    Perret, L.3    Tillich, J.-P.4
  • 22
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes, in CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. LNCS, vol
    • E. Fujisaki, T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, in CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. LNCS, vol. 6110 (Springer-Verlag 1999), pp. 537–554
    • (1999) Springer-Verlag , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 23
    • 84935622001 scopus 로고
    • LNCS, vol
    • E.M. Gabidulin, A.V. Paramonov, O.V. Tretjakov, Ideals over a non-commutative ring and their application in cryptography, in D.W. Davies (ed.) Advances in Cryptology - EUROCRYPT 91. LNCS, vol. 547 (Springer Verlag, 1991)
    • (1991) Springer Verlag
    • Gabidulin, E.M.1    Paramonov, A.V.2    Tretjakov, O.V.3
  • 24
    • 84911134920 scopus 로고    scopus 로고
    • E.M. Gabidulin, O. Kjelsen, How to avoid the Sidelnikov-Shestakov attack, in Error Control, Cryptology, and Speech Compression. LNCS, vol. 829 (Springer, Berlin/Heidelberg 1994), pp. 25–32
    • E.M. Gabidulin, O. Kjelsen, How to avoid the Sidelnikov-Shestakov attack, in Error Control, Cryptology, and Speech Compression. LNCS, vol. 829 (Springer, Berlin/Heidelberg 1994), pp. 25–32
  • 25
    • 84955341192 scopus 로고    scopus 로고
    • V. Gauthier-Umaña, A. Otmani, J.-P. Tillich, A distinguisher-based attack on a variant of McEliece’s cryptosystem based on Reed-Solomon codes
    • V. Gauthier-Umaña, A. Otmani, J.-P. Tillich, A distinguisher-based attack on a variant of McEliece’s cryptosystem based on Reed-Solomon codes. http://arxiv.org/abs/1204.6459
  • 26
    • 84924913965 scopus 로고    scopus 로고
    • A non asymptotic analysis of information set decoding. Cryptology ePrint Archive
    • Y. Hamdaoui, N. Sendrier, A non asymptotic analysis of information set decoding. Cryptology ePrint Archive, Report 2013/162 (2013)
    • (2013) Report , vol.2013
    • Hamdaoui, Y.1    Sendrier, N.2
  • 27
    • 84889341039 scopus 로고    scopus 로고
    • G. Kabatiansky, E. Krouk, S. Semenov, Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept. (Wiley, 2005)
    • G. Kabatiansky, E. Krouk, S. Semenov, Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept. (Wiley, 2005)
  • 29
    • 84955364778 scopus 로고    scopus 로고
    • I. Marquez-Corbella, R. Pellikaan, Error-correcting pairs for a public-key cryptosystem, in Proceedings of the Code-based Cryptography Workshop (CBC 2012) (Lyngby, Denmark, 2012)
    • I. Marquez-Corbella, R. Pellikaan, Error-correcting pairs for a public-key cryptosystem, in Proceedings of the Code-based Cryptography Workshop (CBC 2012) (Lyngby, Denmark, 2012)
  • 30
    • 82955177030 scopus 로고    scopus 로고
    • Decoding random linear codes in O(20.054n), in ASIACRYPT
    • A. May, A., Meurer, E. Thomae, Decoding random linear codes in O(20.054n), in ASIACRYPT 2011. LNCS, vol. 7073 (Springer-Verlag, 2011), pp. 107–124
    • (2011) LNCS , vol.7073 , Issue.Springer-Verlag, 2011 , pp. 107-124
    • May, A.1
  • 31
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • R.J. McEliece, A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, 114–116 (1978)
    • (1978) DSN Progress Report , pp. 114-116
    • McEliece, R.J.1
  • 32
    • 84955421686 scopus 로고    scopus 로고
    • L. Minder, Cryptography based on error correcting codes. Ph.D. thesis, École Polytechnique Fédérale de Lausanne (2007)
    • L. Minder, Cryptography based on error correcting codes. Ph.D. thesis, École Polytechnique Fédérale de Lausanne (2007)
  • 33
    • 84884498151 scopus 로고    scopus 로고
    • MDPC-McEliece: New McEliece variants from moderate density parity-check codes. Cryptology ePrint Archive
    • R. Misoczki, J.-P. Tillich, N. Sendrier, P.S.L.M. Barreto, MDPC-McEliece: New McEliece variants from moderate density parity-check codes. Cryptology ePrint Archive, Report 2012/409 (2012)
    • (2012) Report , vol.2012
    • Misoczki, R.1    Tillich, J.-P.2    Sendrier, N.3    Barreto, P.S.L.M.4
  • 34
    • 0034448183 scopus 로고    scopus 로고
    • Using low density parity check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2000) (Sorrento
    • C. Monico, J. Rosenthal, A. Shokrollahi, Using low density parity check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2000) (Sorrento, Italy, 2000), p. 215
    • (2000) Italy , pp. 215
    • Monico, C.1    Rosenthal, J.2    Shokrollahi, A.3
  • 35
    • 0022582790 scopus 로고
    • H. Niederreiter, Knapsack-type cryptosystems and algebraic coding theory. Probl. Contr. Inf. Theory 15, 159–166 (1986)
    • (1986) Theory , vol.15 , pp. 159-166
    • Niederreiter, H.1
  • 37
    • 0038060507 scopus 로고    scopus 로고
    • A. Ourivski, E.M. Gabidulin, Column scrambler for the GPT cryptosystem. Discret. Appl. Math. 128, 207–221 (2003)
    • A. Ourivski, E.M. Gabidulin, Column scrambler for the GPT cryptosystem. Discret. Appl. Math. 128, 207–221 (2003)
  • 38
    • 43249125012 scopus 로고    scopus 로고
    • R. Overbeck, Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)
    • R. Overbeck, Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)
  • 39
    • 85055706395 scopus 로고    scopus 로고
    • On a CCA2-secure variant of McEliece in the standard model. Cryptology ePrint Archive
    • E. Persichetti, On a CCA2-secure variant of McEliece in the standard model. Cryptology ePrint Archive, Report 2012/268 (2012)
    • (2012) Report , vol.2012
    • Persichetti, E.1
  • 40
    • 77954391096 scopus 로고    scopus 로고
    • Information-set decoding for linear codes over Fq, in N. Sendrier (ed.) Post-Quantum Cryptography. LNCS, vol. 6061 (Springer
    • C. Peters, Information-set decoding for linear codes over Fq, in N. Sendrier (ed.) Post-Quantum Cryptography. LNCS, vol. 6061 (Springer, Berlin/Heidelberg, 2010), pp. 81–94
    • Berlin/Heidelberg , vol.2010 , pp. 81-94
    • Peters, C.1
  • 41
    • 84955387997 scopus 로고    scopus 로고
    • C. Peters, (2010)
    • C. Peters, (2010), http://christianepeters.wordpress.com/publications/tools/
  • 42
    • 84864818403 scopus 로고    scopus 로고
    • An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model, in Information Security and Privacy. LNCS, vol
    • K. Preetha Mathew, S. Vasant, S., Venkatesan, C. Pandu Rangan, An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model, in Information Security and Privacy. LNCS, vol. 7372 (Springer-Verlag, 2012), pp. 166–179
    • (2012) Springer-Verlag , pp. 166-179
    • Preetha Mathew, K.1    Vasant, S.2
  • 43
    • 79960387857 scopus 로고    scopus 로고
    • H. Rashwan, E.M. Gabidulin, B. Honary, Security of the GPT cryptosystem and its applications to cryptography. Secur. Commun. Netw. 4(8), 937–946 (2011)
    • H. Rashwan, E.M. Gabidulin, B. Honary, Security of the GPT cryptosystem and its applications to cryptography. Secur. Commun. Netw. 4(8), 937–946 (2011)
  • 44
    • 84955330265 scopus 로고    scopus 로고
    • CCA2-secure variant of the McEliece cryptosystem in the standard model. Cryptology ePrint Archive
    • R. Rastaghi, An efficient CCA2-secure variant of the McEliece cryptosystem in the standard model. Cryptology ePrint Archive, Report 2013/040 (2013)
    • (2013) Report , vol.2013
    • Rastaghi, R.1
  • 45
    • 80054811885 scopus 로고    scopus 로고
    • On the decoding complexity of cyclic codes up to the BCH bound, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2011) (Saint Petersburg
    • D. Schipani, M. Elia, J. Rosenthal, On the decoding complexity of cyclic codes up to the BCH bound, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2011) (Saint Petersburg, Russia, 2011), pp. 835–839
    • (2011) Russia , pp. 835-839
    • Schipani, D.1    Elia, M.2    Rosenthal, J.3
  • 46
    • 84929257781 scopus 로고
    • On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discret
    • V.M Sidelnikov, S.O. Shestakov, On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discret. Math. Appl. 2(4), 439–444 (1992)
    • (1992) Math. Appl , vol.2 , Issue.4 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 47
    • 84866980464 scopus 로고    scopus 로고
    • Practical key recovery attacks on two McEliece variants, in C. Cid, J.C. Faugère, (eds.) Proceeedings of the 2nd International Conference on Symbolic Computation and Cryptography, (Egham
    • V.G. Umana, G. Leander, Practical key recovery attacks on two McEliece variants, in C. Cid, J.C. Faugère, (eds.) Proceeedings of the 2nd International Conference on Symbolic Computation and Cryptography, (Egham, UK, 2010), pp. 27–44
    • UK , vol.2010 , pp. 27-44
    • Umana, V.G.1    Leander, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.