Inverse matrices with applications in public-key cryptography

被引:0
作者
Makoui, Farshid Haidary [1 ]
Gulliver, Thomas Aaron [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, POB 1700,STN CSC, Victoria, BC V8W 2Y2, Canada
关键词
Code-based cryptography; inverse matrix; error-correction coding; blockchain; post quantum cryptography; public-key cryptosystem; PSEUDOINVERSE;
D O I
10.1177/17483026241252407
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography. In particular, they are employed in the McEliece and Niederreiter public-key cryptosystems. For the parity check matrix of these cryptosystems, a systematic non-square binary matrix H with dimensions m x n, n > m, m = n - k, there exist 2m((n -m) )distinct inverse matrices. This article presents an algorithm to generate these matrices as well as a method to construct a random inverse matrix. Then it is extended to non-square matrices in arbitrary fields. This overcomes the limitations of the Moore-Penrose and Gauss-Jordan methods. The application to public-key cryptography is also discussed.
引用
收藏
页数:10
相关论文
共 27 条
[1]  
2014, [No title captured]
[2]   The Moore-Penrose Pseudoinverse: A Tutorial Review of the Theory [J].
Alves Barata, Joao Carlos ;
Hussein, Mahir Saleh .
BRAZILIAN JOURNAL OF PHYSICS, 2012, 42 (1-2) :146-165
[3]  
[Anonymous], 1994, Reed-Solomon Codes and Their Applications
[4]  
[Anonymous], BLACK HAT
[5]   Image encryption algorithm based on the finite fields in chaotic maps [J].
Broumandnia, Ali .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
[6]   A Family of higher-order convergent iterative methods for computing the Moore-Penrose inverse [J].
Chen, Haibin ;
Wang, Yiju .
APPLIED MATHEMATICS AND COMPUTATION, 2011, 218 (08) :4012-4016
[7]  
Daemen J., 2002, The Design of Rijndael
[8]  
Esmaeili M., 2019, Application of Linear Block Codes in Cryptography
[9]  
Farebrother RW., 1988, Statistics Textbooks and Monographs, V91
[10]   Hulls of Generalized Reed-Solomon Codes via Goppa Codes and Their Applications to Quantum Codes [J].
Gao, Yanyan ;
Yue, Qin ;
Huang, Xinmei ;
Zhang, Jun .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (10) :6619-6626