Evolution of the McEliece Public Key Encryption Scheme

被引:4
|
作者
Bucerzan, Dominic [1 ]
Dragoi, Vlad [2 ]
Kalachi, Herve Tale [2 ,3 ]
机构
[1] Aurel Vlaicu Univ Arad, Dept Math & Comp Sci, Arad 310330, Romania
[2] Univ Rouen, UFR Sci & Tech, EA 4108, Lab LITIS, F-76800 St Etienne Du Rouvray, France
[3] Univ Yaounde I, Dept Math, Yaounde, Cameroon
关键词
Post-quantum cryptography; Coding theory; McEliece encryption scheme; SECRET PERMUTATION; TIMING ATTACK; CODES; CRYPTOSYSTEM; IMPLEMENTATION; EQUIVALENCE; SECURITY;
D O I
10.1007/978-3-319-69284-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays codebased cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [31] Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
    Kobara, K
    Imai, H
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 19 - 35
  • [32] A New Self-Generated-Certificate Public Key Encryption Scheme with Flexible Public Key
    Zhao Yanhui
    Xu Maozhi
    Shen Xunxun
    CHINA COMMUNICATIONS, 2011, 8 (02) : 12 - 20
  • [33] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [34] QUANTUM MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    Fujita, Hachiro
    QUANTUM INFORMATION & COMPUTATION, 2012, 12 (3-4) : 181 - 202
  • [35] New certificateless public key encryption scheme without pairing
    Yan, Xiaopeng
    Gong, Peng
    Bai, Zhiquan
    Wang, Jiantao
    Li, Ping
    IET INFORMATION SECURITY, 2013, 7 (04) : 271 - 276
  • [36] Security on public key encryption scheme based on ergodic matrices
    School of Computer Engineering, Jiangsu University of Technology, Changzhou
    Jiangsu
    213001, China
    不详
    Anhui
    230027, China
    不详
    Jiangsu
    210003, China
    Tien Tzu Hsueh Pao, 10 (2081-2085):
  • [37] On the security of the McEliece public-key cryptosystern
    Sendrier, N
    INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 141 - 163
  • [38] CRYPTANALYSIS OF MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    KORZHIK, VI
    TURKIN, AI
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 68 - 70
  • [39] Enhanced Public Key Security for the McEliece Cryptosystem
    Baldi, Marco
    Bianchi, Marco
    Chiaraluce, Franco
    Rosenthal, Joachim
    Schipani, Davide
    JOURNAL OF CRYPTOLOGY, 2016, 29 (01) : 1 - 27
  • [40] Combining Public-Key Encryption with Digital Signature Scheme
    Alia, Mohammad Ahmad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 : 870 - 878