메뉴 건너뛰기




Volumn 2248, Issue , 2001, Pages 402-421

Efficient zero-knowledge authentication based on a linear algebra problem minrank

Author keywords

Entity authentication; Group signatures; Identification; Min Rank problem; Multivariate cryptography; NP complete problems; Rankdistance codes; Ring signatures; Syndrome decoding (SD); Zero knowledge

Indexed keywords

COMPUTATIONAL COMPLEXITY; DECODING; HASH FUNCTIONS; IDENTIFICATION (CONTROL SYSTEMS); LINEAR ALGEBRA; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84946828059     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45682-1_24     Document Type: Conference Paper
Times cited : (65)

References (40)
  • 1
    • 0004247960 scopus 로고    scopus 로고
    • Chapter 7: Complexity Issues in Coding Theory; North Holland
    • Alexander Barg: Handbook of coding theory, Chapter 7: Complexity Issues in Coding Theory; North Holland, 1999.
    • (1999) Handbook of Coding Theory
    • Barg, A.1
  • 2
    • 0017973512 scopus 로고
    • On the inherent intractability of certain coding problems
    • May
    • E.R. Berlekamp, R.J. McEliece, H.C.A. van Tilborg: On the inherent intractability of certain coding problems; IEE Trans. Inf. Th., IT-24(3), pp. 384-386, May 1978.
    • (1978) IEE Trans. Inf. Th , vol.IT-24 , Issue.3 , pp. 384-386
    • Berlekamp, E.R.1    McEliece, R.J.2    Van Tilborg, H.3
  • 5
    • 84990731886 scopus 로고
    • Howto prove yourself: Practical solutions to identification and signature problems
    • Springer-Verlag
    • Amos Fiat, Adi. Shamir: Howto prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology, Crypto ’86, pp. 186-194, Springer-Verlag, 1987.
    • (1987) Advances in Cryptology, Crypto ’86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 6
    • 84949030831 scopus 로고    scopus 로고
    • Attacks on the birational permutation signature schemes
    • Springer-Verlag
    • Don Coppersmith, Jacques Stern, Serge Vaudenay: Attacks on the birational permutation signature schemes; Crypto 93, Springer-Verlag, pp. 435-443.
    • Crypto 93 , pp. 435-443
    • Coppersmith, D.1    Stern, J.2    Vaudenay, S.3
  • 7
    • 23944453664 scopus 로고    scopus 로고
    • The Security of the Birational Permutation Signature Schemes
    • Don Coppersmith, Jacques Stern, Serge Vaudenay, The Security of the Birational Permutation Signature Schemes, in Journal of Cryptology, 10(3), pp. 207-221, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.3 , pp. 207-221
    • Coppersmith, D.1    Stern, J.2    Vaudenay, S.3
  • 8
    • 85027129350 scopus 로고    scopus 로고
    • The security of Hidden Field Equations (HFE)
    • San Francisco 8-12 April, Springer-Verlag
    • Nicolas Courtois: The security of Hidden Field Equations (HFE); Cryptographers’ Track Rsa Conference 2001, San Francisco 8-12 April 2001, LNCS 2020, Springer-Verlag.
    • (2001) Cryptographers’ Track Rsa Conference 2001 , vol.2020
    • Courtois, N.1
  • 9
    • 84946873622 scopus 로고    scopus 로고
    • The HFE cryptosystem home page: http://hfe.minrank.org.
  • 12
    • 84957680703 scopus 로고    scopus 로고
    • Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free?
    • Springer Verlag. See
    • Ronald Cramer, Ivan Damgård: Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free? Crypto’98, LNCS 1642, pp. 424-441, Springer Verlag. See http://www.brics.dk/RS/97/27/
    • Crypto’98 , vol.1642 , pp. 424-441
    • Cramer, R.1    Damgård, I.2
  • 14
    • 84935622001 scopus 로고
    • Ideals over a Non-Commutative Ring and their Applications in Cryptology
    • Ernst M. Gabidulin, A. V. Paramonov, O. V. Tretjakov: Ideals over a Non-Commutative Ring and their Applications in Cryptology. Eurocrypt 1991, pp. 482-489.
    • (1991) Eurocrypt , pp. 482-489
    • Gabidulin, E.M.1    Paramonov Tretjakov, O.V.2
  • 16
    • 85015223738 scopus 로고    scopus 로고
    • A (Non-practical) three pass identification protocol using coding theory; Advances in cryptology
    • Marc Girault: A (non-practical) three pass identification protocol using coding theory; Advances in cryptology, AusCrypt’90, LNCS 453, pp. 265-272.
    • AusCrypt’90 , vol.453 , pp. 265-272
    • Girault, M.1
  • 17
    • 0028676264 scopus 로고
    • Definitions and properties of Zero-knowledge proof systems
    • Oded Goldreich, Y. Oren. Definitions and properties of Zero-knowledge proof systems. Journal of Cryptology 1994, vol.7, no.1, pp.1-32.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 18
    • 84946873625 scopus 로고    scopus 로고
    • The knowledge Complexity of interactive proof systems
    • S. Goldwasser, S. Micali and C. Rackoff, The knowledge Complexity of interactive proof systems; SIAM Journal of computing, 1997, Vol. 6, No.1, pp.84.
    • (1997) SIAM Journal of Computing , vol.6 , Issue.1
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 19
    • 84946873626 scopus 로고    scopus 로고
    • Nicolas Courtois Cryptanalysis of the TTM Cryptosystem
    • 3-9 December, Kyoto, Japan, Springer-Verlag
    • Louis Goubin, Nicolas Courtois Cryptanalysis of the TTM Cryptosystem; Advances of Cryptology, Asiacrypt’2000, 3-9 December 2000, Kyoto, Japan, Springer-Verlag.
    • (2000) Advances of Cryptology, Asiacrypt’2000
    • Goubin, L.1
  • 20
    • 84937409243 scopus 로고
    • A newauthen tication algorithm
    • Sami Harari. A newauthen tication algorithm. In Coding Theory and Applications, volume 388, pp.204-211, LNCS, 1989.
    • (1989) Coding Theory and Applications , vol.388 , pp. 204-211
    • Harari, S.1
  • 21
    • 85034651324 scopus 로고
    • An observation on the security of McEliece’s public-key cryptosystem
    • Springer-Verlag
    • P. J. Lee and E. F. Brickell. An observation on the security of McEliece’s public-key cryptosystem; In Advances in Cryptology, Eurocrypt’88, LNCS 330, pp. 275–280. Springer-Verlag, 1988.
    • (1988) Advances in Cryptology, Eurocrypt’88 , vol.330 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 24
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of Asymmetric Algorithms
    • Springer Verlag
    • Jacques Patarin: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of Asymmetric Algorithms; Eurocrypt’96, Springer Verlag, pp. 33-48.
    • Eurocrypt’96 , pp. 33-48
    • Patarin, J.1
  • 25
    • 33645446502 scopus 로고    scopus 로고
    • Quartz, 128-bit long digital signatures
    • San Francisco 8-12 April, Springer-Verlag
    • Jacques Patarin, Louis Goubin, Nicolas Courtois: Quartz, 128-bit long digital signatures; Cryptographers’ Track Rsa Conference 2001, San Francisco 8-12 April 2001, LNCS 2020, Springer-Verlag.
    • (2001) Cryptographers’ Track Rsa Conference 2001 , vol.2020
    • Patarin, J.1    Goubin, L.2    Courtois, N.3
  • 27
    • 84957375922 scopus 로고    scopus 로고
    • A newIden tification Scheme Based on the Perceptrons Problem
    • Springer-Verlag
    • David Pointcheval: A newIden tification Scheme Based on the Perceptrons Problem; In Advances in Cryptology, Proceedings of Eurocrypt’95, LNCS 921, pp.319-328, Springer-Verlag.
    • Advances in Cryptology, Proceedings of Eurocrypt’95 , vol.921 , pp. 319-328
    • Pointcheval, D.1
  • 30
    • 0012088291 scopus 로고    scopus 로고
    • Efficient signature schemes based on birational permutations
    • Springer-Verlag
    • Adi Shamir: Efficient signature schemes based on birational permutations; Crypto’93, Springer-Verlag, pp. 1-12.
    • Crypto’93 , pp. 1-12
    • Shamir, A.1
  • 31
    • 85032871579 scopus 로고    scopus 로고
    • An efficient Identification Scheme Based on Permuted Kernels, In Advances in Cryptology
    • Springer-Verlag
    • Adi Shamir: An efficient Identification Scheme Based on Permuted Kernels, In Advances in Cryptology, Crypto’89, LNCS 435, pp.606-609, Springer-Verlag.
    • Crypto’89 , vol.435 , pp. 606-609
    • Shamir, A.1
  • 32
    • 84946873629 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE Public Key Cryptosystem; In Advances in Cryptology
    • Springer-Verlag, LNCS
    • Adi Shamir, Aviad Kipnis: Cryptanalysis of the HFE Public Key Cryptosystem; In Advances in Cryptology, Proceedings of Crypto’99, Springer-Verlag, LNCS.
    • Proceedings of Crypto’99
    • Shamir, A.1    Kipnis, A.2
  • 33
    • 77649327985 scopus 로고    scopus 로고
    • Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
    • Springer-Verlag
    • Nicolas Courtois, Adi Shamir, Jacques Patarin, Alexander Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt’2000, LNCS 1807, Springer-Verlag, pp. 392-407.
    • Eurocrypt’2000 , vol.1807 , pp. 392-407
    • Courtois, N.1    Shamir, A.2    Patarin, J.3    Klimov, A.4
  • 34
    • 84955595109 scopus 로고    scopus 로고
    • A newiden tification scheme based on syndrome decoding
    • Springer-Verlag
    • Jacques Stern: A newiden tification scheme based on syndrome decoding; Crypto’93, LNCS 773, pp.13-21, Springer-Verlag.
    • Crypto’93 , vol.773 , pp. 13-21
    • Stern, J.1
  • 35
    • 84995926594 scopus 로고    scopus 로고
    • Designing identification schemes with keys of short size
    • Springer-Verlag
    • Jacques Stern: Designing identification schemes with keys of short size; In Advances in Cryptology, Proceedings of Crypto’94, LNCS 839, pp.164-73, Springer-Verlag.
    • Advances in Cryptology, Proceedings of Crypto’94 , vol.839 , pp. 164-173
    • Stern, J.1
  • 37
    • 14844346471 scopus 로고    scopus 로고
    • The cryptographic security of the syndrome decoding problem for rank distance codes
    • Springer-Verlag
    • Jacques Stern, Florent Chabaud: The cryptographic security of the syndrome decoding problem for rank distance codes. In Advances in Cryptology, Asiacrypt’96, LNCS 1163, pp. 368-381, Springer-Verlag.
    • Advances in Cryptology, Asiacrypt’96 , vol.1163 , pp. 368-381
    • Stern, J.1    Chabaud, F.2
  • 39
    • 0031275868 scopus 로고    scopus 로고
    • The intractability of computing the minimum distance of a code
    • Nov
    • Alexander Vardy: The intractability of computing the minimum distance of a code; IEEE Transactions on Information Theory, Nov 1997, Vol.43, No. 6; pp. 1757-1766.
    • (1997) IEEE Transactions on Information Theory , vol.43 , Issue.6 , pp. 1757-1766
    • Vardy, A.1
  • 40
    • 84946873630 scopus 로고
    • Problème SD, Opérateur Trace, Schémas d’Identification et Codes de Goppa; PhD thesis in french, Toulon University, France, july
    • Pascal Véron, Problème SD, Opérateur Trace, Schémas d’Identification et Codes de Goppa; PhD thesis in french, Toulon University, France, july 1995.
    • (1995)
    • Véron, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.