Semantically secure McEliece public-key cryptosystem

被引:0
|
作者
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
McEliece public-key cryptosystem; semantic security; provable security; conversion; coding theory;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such as the integer factoring problem and the discrete logarithm problem (which will be. solved in polynomial-time after the emergence of quantum computers). While the McEliece PKC is based on another theory, i.e. coding theory, it is vulnerable against several practical attacks. In this paper. we summarize currently known attacks to the McEliece PKC, and then point out that, without any decrypt ion oracles or any partial knowledge on the plaintext of the challenge ciphertext, no polynomial-time algorithm is known for inverting the McEliece PKC whose parameters are carefully chosen. Under the assumption that this inverting problem is hard, we propose a slightly modified version of McEliece PKC that can be proven, in the random oracle model, to be semantically secure against adaptive chosen-ciphertext attacks. Our conversion can achieve the reduction of the redundant data down to 1/3-1/4 compared with the generic conversions for practical parameters.
引用
收藏
页码:74 / 83
页数:10
相关论文
共 50 条
  • [21] Semantic security for the McEliece cryptosystem without random oracles
    Nojima, Ryo
    Imai, Hideki
    Kobara, Kazukuni
    Morozov, Kirill
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 49 (1-3) : 289 - 305
  • [22] Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism
    Wang, Baocang
    Hu, Yupu
    Lv, Xixiang
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1805 - 1814
  • [23] Semantic security for the McEliece cryptosystem without random oracles
    Ryo Nojima
    Hideki Imai
    Kazukuni Kobara
    Kirill Morozov
    Designs, Codes and Cryptography, 2008, 49 : 289 - 305
  • [24] A Public Key Cryptosystem Based On A Subgroup Membership Problem
    Juan Manuel Gonzalez Nieto
    Colin Boyd
    Ed Dawson
    Designs, Codes and Cryptography, 2005, 36 : 301 - 316
  • [25] A public key cryptosystem based on a subgroup membership problem
    Nieto, JG
    Boyd, C
    Dawson, E
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 36 (03) : 301 - 316
  • [26] XTR+:: A provable security public key cryptosystem
    Wang, Zehui
    Zhang, Zhiguo
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 534 - +
  • [27] Threshold public key cryptosystem for encrypting long messages
    Yang, Guang
    Liu, Jiqiang
    Journal of Computational Information Systems, 2015, 11 (02): : 671 - 681
  • [28] Message transmission for GH-public key cryptosystem
    Ashraf, Muhammad
    Kirlar, Baris Bulent
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 578 - 585
  • [29] Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes
    Couvreur, Alain
    Marquez-Corbella, Irene
    Pellikaan, Ruud
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (08) : 5404 - 5418
  • [30] A public key cryptosystem based on three new provable problems
    Su, Shenghui
    Lu, Shuwang
    THEORETICAL COMPUTER SCIENCE, 2012, 426 : 91 - 117