PKC-PC: A variant of the McEliece public-key cryptosystem based on polar codes

被引:9
作者
Hooshmand, Reza [1 ]
Koochak Shooshtari, Masoumeh [2 ]
Reza Aref, Mohammad [2 ]
机构
[1] Shahid Sattari Aeronaut Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
基金
美国国家科学基金会;
关键词
public key cryptography; decoding; error correction codes; computational complexity; polar codes; channel coding; matrix algebra; PKC-PC; McEliece public-key cryptosystem; error-correcting codes; channel-dependent generator matrix; code dimension; code length; transmission channel parameters; random generator matrix; public key sizes; secret key sizes; code-based public-key cryptosystems; polar parameterised syndrome decoding; decoding complexity; encoding complexity; polar parameterised codeword existence; SECURITY; SCHEME;
D O I
10.1049/iet-com.2019.0689
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Polar codes are novel and efficient error-correcting codes with low encoding and decoding complexities. These codes have a channel-dependent generator matrix, which is determined by the code dimension, code length and transmission channel parameters. A variant of the McEliece public-key cryptosystem based on polar codes, called the PKC-PC, is studied. Since the structure of the polar codes' generator matrix depends on the parameters of the channel, the authors have used an efficient approach to conceal their generator matrix. The proposed approach is based on a random selection of rows of the matrix by which a random generator matrix is constructed. Using the characteristics of polar codes and introducing an efficient approach, they could reduce the public and secret key sizes, and computational complexity compared to the McEliece cryptosystem. Moreover, they show that PKC-PC yields an increased security level against conventional attacks as well as possible vulnerabilities to the code-based public-key cryptosystems. Furthermore, they prove the security of the authors' cryptosystem and show that its security is reduced to solve NP-complete problems, called polar parameterised syndrome decoding and polar parameterised codeword existence.
引用
收藏
页码:1883 / 1893
页数:11
相关论文
共 46 条
[1]  
[Anonymous], 2012, 2012409 IACR CRYPT E
[2]   A performance comparison of polar codes and reed-muller codes [J].
Arikan, Erdal .
IEEE COMMUNICATIONS LETTERS, 2008, 12 (06) :447-449
[3]   Systematic Polar Coding [J].
Arikan, Erdal .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (08) :860-862
[4]   Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels [J].
Arikan, Erdal .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (07) :3051-3073
[5]  
Baldi M, LEDAKEM LEDAPKC
[6]   Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes [J].
Baldi, Marco ;
Chiaraluce, Franco .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :2591-2595
[7]   Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes [J].
Baldi, Marco ;
Bianchi, Marco ;
Chiaraluce, Franco .
IET INFORMATION SECURITY, 2013, 7 (03) :212-220
[8]   Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes [J].
Bardet, Magali ;
Chaulet, Julia ;
Dragoi, Vlad ;
Otmani, Ayoub ;
Tillich, Jean-Pierre .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 :118-143
[9]  
Barreto PSLM, 2011, LECT NOTES COMPUT SC, V7071, P179, DOI 10.1007/978-3-642-25405-5_12
[10]   INHERENT INTRACTABILITY OF CERTAIN CODING PROBLEMS [J].
BERLEKAMP, ER ;
MCELIECE, RJ ;
VANTILBORG, HCA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (03) :384-386