Evolution of the McEliece Public Key Encryption Scheme

被引:4
|
作者
Bucerzan, Dominic [1 ]
Dragoi, Vlad [2 ]
Kalachi, Herve Tale [2 ,3 ]
机构
[1] Aurel Vlaicu Univ Arad, Dept Math & Comp Sci, Arad 310330, Romania
[2] Univ Rouen, UFR Sci & Tech, EA 4108, Lab LITIS, F-76800 St Etienne Du Rouvray, France
[3] Univ Yaounde I, Dept Math, Yaounde, Cameroon
关键词
Post-quantum cryptography; Coding theory; McEliece encryption scheme; SECRET PERMUTATION; TIMING ATTACK; CODES; CRYPTOSYSTEM; IMPLEMENTATION; EQUIVALENCE; SECURITY;
D O I
10.1007/978-3-319-69284-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays codebased cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [21] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [22] Public key searchable encryption scheme based on blockchain
    Du R.
    Tan A.
    Tian J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 114 - 122
  • [23] ZHFE, a New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 229 - 245
  • [24] Traceable Scheme of Public Key Encryption with Equality Test
    Zhu, Huijun
    Xue, Qingji
    Li, Tianfeng
    Xie, Dong
    ENTROPY, 2022, 24 (03)
  • [25] A Fully Homomorphic Encryption Scheme With a Smaller Public Key
    Zhang, Shaomin
    Li, Kaiqiang
    Wang, Baoyi
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 762 - 767
  • [26] A Multivariate Public Key Encryption Scheme With Equality Test
    Shen, Xiaoying
    Wang, Licheng
    Zhu, Huijun
    Liu, Yuan
    IEEE ACCESS, 2020, 8 : 75463 - 75472
  • [27] A Public Key Encryption Scheme Based on Idempotent Semirings
    Durcheva, Mariana
    Rachev, Martin
    41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690
  • [28] ZHFE, A New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 229 - 245
  • [29] Quantum Resistant Public Key Encryption Scheme HermitianRLCE
    Matthews, Gretchen L.
    Wang, Yongge
    CODE-BASED CRYPTOGRAPHY, CBC 2019, 2019, 11666 : 1 - 10
  • [30] A Public Key Encryption Scheme Based on Compressed Sensing
    Zhen, Liu
    2017 9TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT 2017), 2017, : 20 - 24