Quantum Resistant Public Key Encryption Scheme HermitianRLCE

被引:0
|
作者
Matthews, Gretchen L. [1 ]
Wang, Yongge [2 ]
机构
[1] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
[2] UNC Charlotte, 9201 Univ City Blvd, Charlotte, NC 28223 USA
来源
基金
美国国家科学基金会;
关键词
Random linear codes; McEliece encryption scheme; Linear code based encryption scheme;
D O I
10.1007/978-3-030-25922-8_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Wang (2017) introduced a random linear code based quantum resistant public key encryption scheme RLCE which is a variant of McEliece encryption scheme. Wang (2017) analyzed an instantiation of RLCE scheme using Generalized Reed-Solomon codes. In this paper, we introduce and analyze Hermitian code based RLCE schemes HermitianRLCE. Based on our security analysis, we provide HermitianRLCE parameters at the 128, 192, and 256 bits security level. These parameters show that HermitianRLCE has much smaller public keys than GRS-RLCE.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [21] An efficient incomparable public key encryption scheme
    Lee, Hyang-Sook
    Lim, Seongan
    INFORMATION SCIENCES, 2011, 181 (14) : 3066 - 3072
  • [22] Secret Key Awareness Security Public Key Encryption Scheme
    Zhang, Guoyan
    Xu, Qiuliang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (04): : 49 - 57
  • [23] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [24] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227
  • [25] Will quantum computers be the end of public key encryption?
    Woodward, Alan (alan.woodward@surrey.ac.uk), 1600, Taylor and Francis Ltd. (01):
  • [26] Public key encryption scheme based on the ergodic matrices
    Pei, Shi-Hui
    Zhao, Yong-Zhe
    Zhao, Hong-Wei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (08): : 1908 - 1913
  • [27] Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong
    Zhou, Liguo
    Zhan, Yu
    Liu, Chengdong
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [28] A Novel Public Key Encryption Scheme For Large Image
    Chen, Lingjiao
    Chen, Xinji
    Peng, Zhigang
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 955 - 960
  • [29] On the security of a Williams based public key encryption scheme
    Mülller, S
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 1 - 18
  • [30] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119