Inverse matrices with applications in public-key cryptography

被引:0
|
作者
Makoui, Farshid Haidary [1 ]
Gulliver, Thomas Aaron [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, POB 1700,STN CSC, Victoria, BC V8W 2Y2, Canada
关键词
Code-based cryptography; inverse matrix; error-correction coding; blockchain; post quantum cryptography; public-key cryptosystem; PSEUDOINVERSE;
D O I
10.1177/17483026241252407
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography. In particular, they are employed in the McEliece and Niederreiter public-key cryptosystems. For the parity check matrix of these cryptosystems, a systematic non-square binary matrix H with dimensions m x n, n > m, m = n - k, there exist 2m((n -m) )distinct inverse matrices. This article presents an algorithm to generate these matrices as well as a method to construct a random inverse matrix. Then it is extended to non-square matrices in arbitrary fields. This overcomes the limitations of the Moore-Penrose and Gauss-Jordan methods. The application to public-key cryptography is also discussed.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Public-key cryptography using paraunitary matrices
    Delgosha, Farshid
    Fekri, Faramarz
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (09) : 3489 - 3504
  • [2] Public-Key Cryptography Based on Tropical Circular Matrices
    Huang, Huawei
    Li, Chunhua
    Deng, Lunzhi
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [3] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [4] THE COMPLEXITY OF PROMISE PROBLEMS WITH APPLICATIONS TO PUBLIC-KEY CRYPTOGRAPHY
    EVEN, S
    SELMAN, AL
    YACOBI, Y
    INFORMATION AND CONTROL, 1984, 61 (02): : 159 - 173
  • [5] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [6] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [7] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [8] UNTANGLING PUBLIC-KEY - CRYPTOGRAPHY
    SCHNEIER, B
    DR DOBBS JOURNAL, 1992, 17 (05): : 16 - &
  • [9] NONINTERACTIVE PUBLIC-KEY CRYPTOGRAPHY
    MAURER, UM
    YACOBI, Y
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 498 - 507
  • [10] PUBLIC-RANDOMNESS IN PUBLIC-KEY CRYPTOGRAPHY
    DESANTIS, A
    PERSIANO, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 46 - 62