Semantically secure McEliece public-key cryptosystem

被引:0
|
作者
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
McEliece public-key cryptosystem; semantic security; provable security; conversion; coding theory;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such as the integer factoring problem and the discrete logarithm problem (which will be. solved in polynomial-time after the emergence of quantum computers). While the McEliece PKC is based on another theory, i.e. coding theory, it is vulnerable against several practical attacks. In this paper. we summarize currently known attacks to the McEliece PKC, and then point out that, without any decrypt ion oracles or any partial knowledge on the plaintext of the challenge ciphertext, no polynomial-time algorithm is known for inverting the McEliece PKC whose parameters are carefully chosen. Under the assumption that this inverting problem is hard, we propose a slightly modified version of McEliece PKC that can be proven, in the random oracle model, to be semantically secure against adaptive chosen-ciphertext attacks. Our conversion can achieve the reduction of the redundant data down to 1/3-1/4 compared with the generic conversions for practical parameters.
引用
收藏
页码:74 / 83
页数:10
相关论文
共 50 条
  • [31] A practical public key cryptosystem from Paillier and Rabin schemes
    Galindo, D
    Martín, S
    Morillo, P
    Villar, JL
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 279 - 291
  • [32] A refined definition of semantic security for public-key encryption schemes
    Sakai, H
    Nakamura, N
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (01): : 34 - 39
  • [33] An efficient public key cryptosystem with a privacy enhanced double decryption mechanism
    Youn, TY
    Park, YH
    Kim, CH
    Lim, J
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 144 - 158
  • [34] Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search
    Xu, Peng
    Wu, Qianhong
    Wang, Wei
    Susilo, Willy
    Domingo-Ferrer, Josep
    Jin, Hai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1993 - 2006
  • [35] Code-Based Public-Key Cryptosystems for the Post-Quantum Period
    Kuznetsov, Alexandr
    Svatovskij, Igor
    Kiyan, Nastya
    Pushkar'ov, Andriy
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 125 - 130
  • [36] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (01): : 3 - 8
  • [37] An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems
    Tripathi, Shailendra Kumar
    Gupta, Bhupendra
    Pandian, K. K. Soundra
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 164
  • [38] Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
    Xu, Peng
    He, Shuanghong
    Wang, Wei
    Susilo, Willy
    Jin, Hai
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3712 - 3723
  • [39] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
  • [40] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (04): : 303 - 308