A Secure and Efficient Code-Based Signature Scheme

被引:3
|
作者
Liu, Xiangxin [1 ,2 ]
Yang, Xiaoyuan [1 ,2 ]
Han, Yiliang [1 ,2 ]
Wang, Xu An [1 ,2 ]
机构
[1] Engn Univ Armed Police Force, Network & Informat Secur Key Lab, Xian, Shaanxi, Peoples R China
[2] Engn Univ Armed Police Force, Elect Dept, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
McEliece public key cryptosystem; Niederreiter public key cryptosystem; post-quantum cryptography; code-based signature scheme; NPC problem; KEY MANAGEMENT SCHEME;
D O I
10.1142/S0129054119400173
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The McEliece public key cryptosystem and the Niederreiter public key cryptosystem are the two major branches of the code-based public key cryptosystem. It has been found that the difficult problems relied by these two systems are different from the syndrome decoding problem stated by Berlekamp et al. The Hamming weight of the error vector is fixed and known to the attackers in these two systems, which leading to the disclosure of information, and through which the attacker can implement an effective attack. In this paper, an improved vision of the McEliece public key cryptosystem was given, and a new code-based signature scheme is designed based on the new cryptosystem. As a result, we achieve a more secure variant of McEliece public key cryptosystem and a more secure code-based signature scheme with high security and fast signing speed.
引用
收藏
页码:635 / 645
页数:11
相关论文
共 50 条
  • [1] A provably secure code-based concurrent signature scheme
    Asaar, Maryam Rajabzadeh
    Ameri, Mohammad Hassan
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    [J]. IET INFORMATION SECURITY, 2018, 12 (01) : 34 - 41
  • [2] An Efficient Attack on a Code-Based Signature Scheme
    Phesso, Aurelie
    Tillich, Jean-Pierre
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 86 - 103
  • [3] An efficient code-based threshold ring signature scheme
    Assidi, Hafsa
    Ayebie, Edoukou Berenger
    Souidi, El Mamoun
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 52 - 60
  • [4] A Provably Secure Group Signature Scheme from Code-Based Assumptions
    Ezerman, Martianus Frederic
    Lee, Hyung Tae
    Ling, San
    Khoa Nguyen
    Wang, Huaxiong
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 260 - 285
  • [5] Efficient code-based fully dynamic group signature scheme
    Wang, Luping
    Chen, Jie
    Dai, Huan
    Tao, Chongben
    [J]. THEORETICAL COMPUTER SCIENCE, 2024, 990
  • [6] A code-based group signature scheme
    Quentin Alamélou
    Olivier Blazy
    Stéphane Cauchie
    Philippe Gaborit
    [J]. Designs, Codes and Cryptography, 2017, 82 : 469 - 493
  • [7] A code-based group signature scheme
    Alamelou, Quentin
    Blazy, Olivier
    Cauchie, Stephane
    Gaborit, Philippe
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (1-2) : 469 - 493
  • [8] Code-based Blind Signature Scheme
    Liu, Simin
    Ye, Junyao
    Zhu, Huaqing
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL PROTECTION (ICEEP 2015), 2015, : 592 - 595
  • [9] A provably secure code-based short signature scheme and its nontransferable variant
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [10] A Correction to a Code-Based Blind Signature Scheme
    Blazy, Olivier
    Gaborit, Philippe
    Dang Truong Mac
    [J]. CODE-BASED CRYPTOGRAPHY (CBCRYPTO 2021), 2022, 13150 : 84 - 94