Semantically secure McEliece public-key cryptosystem

被引:0
|
作者
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
McEliece public-key cryptosystem; semantic security; provable security; conversion; coding theory;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such as the integer factoring problem and the discrete logarithm problem (which will be. solved in polynomial-time after the emergence of quantum computers). While the McEliece PKC is based on another theory, i.e. coding theory, it is vulnerable against several practical attacks. In this paper. we summarize currently known attacks to the McEliece PKC, and then point out that, without any decrypt ion oracles or any partial knowledge on the plaintext of the challenge ciphertext, no polynomial-time algorithm is known for inverting the McEliece PKC whose parameters are carefully chosen. Under the assumption that this inverting problem is hard, we propose a slightly modified version of McEliece PKC that can be proven, in the random oracle model, to be semantically secure against adaptive chosen-ciphertext attacks. Our conversion can achieve the reduction of the redundant data down to 1/3-1/4 compared with the generic conversions for practical parameters.
引用
收藏
页码:74 / 83
页数:10
相关论文
共 50 条
  • [41] Secure key-evolving for public key cryptosystems based on the discrete logarithm problem
    Lu, CF
    Shieh, SP
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2004, 20 (02) : 391 - 400
  • [42] Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT
    Xu, Peng
    Tang, Xiaolan
    Wang, Wei
    Jin, Hai
    Yang, Laurence T.
    IEEE ACCESS, 2017, 5 : 24775 - 24784
  • [43] Attack method against the McEliece cryptosystem based on the correlative quasic-cyclic codes set
    Liu, J. (jmliu@mail.xidian.edu.cn), 1600, Science Press (41): : 15 - 19+50
  • [44] Semantically Secure Lattice Codes for Compound MIMO Channels
    Campello, Antonio
    Ling, Cong
    Belfiore, Jean-Claude
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (03) : 1572 - 1584
  • [45] Semantically Secure Lattice Codes for the Gaussian Wiretap Channel
    Ling, Cong
    Luzzi, Laura
    Belfiore, Jean-Claude
    Stehle, Damien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (10) : 6399 - 6416
  • [46] Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX
    Liu Y.
    Qin G.
    Liu P.
    Hu C.
    Guo S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2709 - 2724
  • [47] Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model
    Qian, Haifeng
    Li, Xiangxue
    Huang, Xinli
    INFORMATICA, 2012, 23 (03) : 443 - 460
  • [48] An efficient and provably secure public key encryption scheme based on coding theory
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1440 - 1447
  • [49] SCB Mode: Semantically Secure Length-Preserving Encryption
    Banfi, Fabio
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (04) : 1 - 23
  • [50] A McEliece-Based Key Exchange Protocol for Optical Communication Systems
    Cho, Joo Yeon
    Griesser, Helmut
    Rafique, Danish
    PROCEEDINGS OF THE 2ND WORKSHOP ON COMMUNICATION SECURITY: CRYPTOGRAPHY AND PHYSICAL LAYER SECURITY, 2018, 447 : 109 - 123