[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2014/360

McEliece in the world of Escher

Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, and Sergey Bezzateev

Abstract

We present a new family of linear binary codes of length n and dimension k accompanied with a fast list decoding algorithm that can correct up to n/2 errors in a bounded channel with an error density $\rho$. The decisional problem of decoding random codes using these generalized error sets is NP-complete. Next we use the properties of these codes to design both an encryption scheme and a signature scheme. Although in the open literature there have been several proposals how to produce digital signatures from the McEliece public key scheme, as far as we know, this is the first public key scheme based on codes where signatures are produced in a straightforward manner from the decryption procedure of the scheme. The security analysis of our scheme have four parts: 1. An extensive list of attacks using the Information Set Decoding techniques adopted for our codes; 2. An analysis of the cost of a distinguishing attack based on rank attacks on the generator matrix of the code or on its dual code; 3. An analysis of the cost of cheap distinguishing attacks on the generator matrix of the code or on its dual code that have expensive list-decoding properties; 4. We interpret our scheme as multivariate quadratic system and discuss difficulties of solving that system using algebraic approaches such as Gröbner bases. Based on this security analysis we suggest some concrete parameters for the security levels in the range of $2^{80} - 2^{128}$. An additional feature of the decryption process is that it admits massive and trivial parallelization that could potentially make our scheme in hardware as fast as the symmetric crypto primitives.

Note: The same material as previously, but restructured in a form of monograph. The cheap distinguisher attack section is updated to cover signatures.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Public KeyCryptographyMcEliece PKCError Correcting CodesList Decoding
Contact author(s)
danilog @ item ntnu no
simonas @ item ntnu no
hakoja @ item ntnu no
bsv @ aanet ru
History
2014-09-24: last of 4 revisions
2014-05-23: received
See all versions
Short URL
https://ia.cr/2014/360
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/360,
      author = {Danilo Gligoroski and Simona Samardjiska and Håkon Jacobsen and Sergey Bezzateev},
      title = {{McEliece} in the world of Escher},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/360},
      year = {2014},
      url = {https://eprint.iacr.org/2014/360}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.