Semantically secure McEliece public-key cryptosystem

被引:0
|
作者
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
McEliece public-key cryptosystem; semantic security; provable security; conversion; coding theory;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such as the integer factoring problem and the discrete logarithm problem (which will be. solved in polynomial-time after the emergence of quantum computers). While the McEliece PKC is based on another theory, i.e. coding theory, it is vulnerable against several practical attacks. In this paper. we summarize currently known attacks to the McEliece PKC, and then point out that, without any decrypt ion oracles or any partial knowledge on the plaintext of the challenge ciphertext, no polynomial-time algorithm is known for inverting the McEliece PKC whose parameters are carefully chosen. Under the assumption that this inverting problem is hard, we propose a slightly modified version of McEliece PKC that can be proven, in the random oracle model, to be semantically secure against adaptive chosen-ciphertext attacks. Our conversion can achieve the reduction of the redundant data down to 1/3-1/4 compared with the generic conversions for practical parameters.
引用
收藏
页码:74 / 83
页数:10
相关论文
共 50 条
  • [31] MODIFICATION OF A PUBLIC-KEY CRYPTOSYSTEM
    OKAMOTO, T
    ELECTRONICS LETTERS, 1987, 23 (16) : 814 - 815
  • [32] NEW PUBLIC-KEY CRYPTOSYSTEM
    KALIPHA, SM
    SADA, JWA
    HUSSAIN, HA
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 1990, 21 (01) : 205 - 215
  • [33] Enhanced Public Key Security for the McEliece Cryptosystem
    Baldi, Marco
    Bianchi, Marco
    Chiaraluce, Franco
    Rosenthal, Joachim
    Schipani, Davide
    JOURNAL OF CRYPTOLOGY, 2016, 29 (01) : 1 - 27
  • [34] Enhanced Public Key Security for the McEliece Cryptosystem
    Marco Baldi
    Marco Bianchi
    Franco Chiaraluce
    Joachim Rosenthal
    Davide Schipani
    Journal of Cryptology, 2016, 29 : 1 - 27
  • [35] Unconditionally secure public-key cryptosystem using entangled quantum states
    Li, Xiaoyu
    Ma, Yuqing
    Information Technology Journal, 2013, 12 (16) : 3820 - 3824
  • [36] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [37] PIEPRZYK PUBLIC-KEY CRYPTOSYSTEM IS INSECURE
    YANG, YX
    ELECTRONICS LETTERS, 1987, 23 (20) : 1043 - 1044
  • [38] A new quadripartite public-key cryptosystem
    Nagase, T
    Koide, R
    Araki, T
    Hasegawa, Y
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 74 - 79
  • [39] A generalization of the ElGamal public-key cryptosystem
    Ranasinghe, Rajitha
    Athukorala, Pabasara
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2395 - 2403
  • [40] Comment on the “Quantum Public-Key Cryptosystem”
    Ri-gui Zhou
    Wei Li
    Tian-tian Huan
    International Journal of Theoretical Physics, 2015, 54 : 1033 - 1037