Inverse matrices with applications in public-key cryptography

被引:0
|
作者
Makoui, Farshid Haidary [1 ]
Gulliver, Thomas Aaron [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, POB 1700,STN CSC, Victoria, BC V8W 2Y2, Canada
关键词
Code-based cryptography; inverse matrix; error-correction coding; blockchain; post quantum cryptography; public-key cryptosystem; PSEUDOINVERSE;
D O I
10.1177/17483026241252407
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography. In particular, they are employed in the McEliece and Niederreiter public-key cryptosystems. For the parity check matrix of these cryptosystems, a systematic non-square binary matrix H with dimensions m x n, n > m, m = n - k, there exist 2m((n -m) )distinct inverse matrices. This article presents an algorithm to generate these matrices as well as a method to construct a random inverse matrix. Then it is extended to non-square matrices in arbitrary fields. This overcomes the limitations of the Moore-Penrose and Gauss-Jordan methods. The application to public-key cryptography is also discussed.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Public key cryptography with matrices
    Singh, MK
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 146 - 152
  • [32] Efficient Public-Key Cryptography in the Presence of Key Leakage
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
  • [33] Generalized public-key cryptography with tight security
    Wu, Ge
    Guo, Fuchun
    Susilo, Willy
    INFORMATION SCIENCES, 2019, 504 : 561 - 577
  • [34] A novel unified architecture for public-key cryptography
    Cilardo, A
    Mazzeo, A
    Mazzocca, N
    Romano, L
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2005, : 52 - 57
  • [35] Public-Key Cryptography from Different Assumptions
    Applebaum, Benny
    Barak, Boaz
    Wigderson, Avi
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 171 - 180
  • [36] Public-key cryptography for RFID-tags
    Batina, L.
    Guajardo, J.
    Kerins, T.
    Mentens, N.
    Tuyls, P.
    Verbauwhede, I.
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 217 - +
  • [37] The Magic of Elliptic Curves and Public-Key Cryptography
    Florian Heß
    Andreas Stein
    Sandra Stein
    Manfred Lochter
    Jahresbericht der Deutschen Mathematiker-Vereinigung, 2012, 114 (2) : 59 - 88
  • [38] PUBLIC-KEY CRYPTOGRAPHY - FROM THEORY TO STANDARD
    TEREKHOV, AN
    TISKIN, AV
    PROGRAMMING AND COMPUTER SOFTWARE, 1994, 20 (05) : 189 - 192
  • [39] Information security, mathematics, and public-key cryptography
    Blake-Wilson, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 77 - 99
  • [40] Computational Thinking Enrichment: Public-Key Cryptography
    Rosamond, Frances
    INFORMATICS IN EDUCATION, 2018, 17 (01): : 93 - 103