Analysis of Information Set Decoding for a Sub-linear Error Weight

被引:49
|
作者
Torres, Rodolfo Canto [1 ,2 ]
Sendrier, Nicolas [1 ]
机构
[1] Inria, Rocquencourt, France
[2] Inria, 2 Rue Simone IFF, Paris, France
来源
关键词
APPROXIMATION COMPLEXITY; CODE;
D O I
10.1007/978-3-319-29360-8_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of code-based cryptography is strongly related to the hardness of generic decoding of linear codes. The best known generic decoding algorithms all derive from the Information Set Decoding algorithm proposed by Prange in 1962. The ISD algorithm was later improved by Stern in 1989 (and Dumer in 1991). Those last few years, some significant improvements have occurred. First by May, Meurer, and Thomae at Asiacrypt 2011, then by Becker, Joux, May, and Meurer at Eurocrypt 2012, and finally by May and Ozerov at Eurocrypt 2015. With those methods, correcting w errors in a binary linear code of length n and dimension k has a cost 2(cw(1+o(1))) when the length n grows, where c is a constant, depending of the code rate k/n and of the error rate w/n. The above ISD variants have all improved that constant c when they appeared. When the number of errors w is sub-linear, w = o(n), the cost of all ISD variants still has the form 2(cw(1+o(1))). We prove here that the constant c only depends of the code rate k/n and is the same for all the known ISD variants mentioned above, including the fifty years old Prange algorithm. The most promising variants of McEliece encryption scheme use either Goppa codes, with w = O(n/log(n)), or MDPC codes, with w = O(root n). Our result means that, in those cases, when we scale up the system parameters, the improvement of the latest variants of ISD become less and less significant. This fact has been observed already, we give here a formal proof of it. Moreover, our proof seems to indicate that any foreseeable variant of ISD should have the same asymptotic behavior.
引用
收藏
页码:144 / 161
页数:18
相关论文
共 50 条
  • [1] Set Cover in Sub-linear Time
    Indyk, Piotr
    Mahabadi, Sepideh
    Rubinfeld, Ronitt
    Vakilian, Ali
    Yodpinyanee, Anak
    SODA'18: PROCEEDINGS OF THE TWENTY-NINTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2018, : 2467 - 2486
  • [2] Localization of a vertex reinforced random walk on with sub-linear weight
    Basdevant, Anne-Laure
    Schapira, Bruno
    Singh, Arvind
    PROBABILITY THEORY AND RELATED FIELDS, 2014, 159 (1-2) : 75 - 115
  • [3] A note on the cluster set of the law of the iterated logarithm under sub-linear expectations
    Li-Xin Zhang
    Probability,Uncertainty and Quantitative Risk, 2022, (02) : 85 - 100
  • [4] A note on the cluster set of the law of the iterated logarithm under sub-linear expectations
    Zhang, Li-Xin
    PROBABILITY UNCERTAINTY AND QUANTITATIVE RISK, 2022, 7 (02) : 85 - 100
  • [5] Fun with sub-linear time algorithms
    Trevisan, Luca
    Fun with Algorithms, Proceedings, 2007, 4475 : 15 - 15
  • [7] Shift Finding in Sub-linear Time
    Andoni, Alexandr
    Hassanieh, Haitham
    Indyk, Piotr
    Katabi, Dina
    PROCEEDINGS OF THE TWENTY-FOURTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS (SODA 2013), 2013, : 457 - 465
  • [8] Online Prediction in Sub-linear Space
    Peng, Binghui
    Zhang, Fred
    PROCEEDINGS OF THE 2023 ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, SODA, 2023, : 1611 - 1634
  • [9] Information-Set Decoding for Linear Codes over Fq
    Peters, Christiane
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 81 - 94
  • [10] The sub-linear calculus in homogenic Besov spaces
    Bourdaud, Gerard
    Meyer, Yves
    REVISTA MATEMATICA IBEROAMERICANA, 2006, 22 (02) : 725 - 746