Evolution of the McEliece Public Key Encryption Scheme

被引:4
|
作者
Bucerzan, Dominic [1 ]
Dragoi, Vlad [2 ]
Kalachi, Herve Tale [2 ,3 ]
机构
[1] Aurel Vlaicu Univ Arad, Dept Math & Comp Sci, Arad 310330, Romania
[2] Univ Rouen, UFR Sci & Tech, EA 4108, Lab LITIS, F-76800 St Etienne Du Rouvray, France
[3] Univ Yaounde I, Dept Math, Yaounde, Cameroon
来源
INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017 | 2017年 / 10543卷
关键词
Post-quantum cryptography; Coding theory; McEliece encryption scheme; SECRET PERMUTATION; TIMING ATTACK; CODES; CRYPTOSYSTEM; IMPLEMENTATION; EQUIVALENCE; SECURITY;
D O I
10.1007/978-3-319-69284-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays codebased cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [1] A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 240 - +
  • [2] A Modified McEliece Public Key Encryption System with a Higher Security Level
    Zhang, Ke
    Tomlinsin, Martin
    Ahmed, Mohammed Zaki
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 991 - 996
  • [3] An efficient incomparable public key encryption scheme
    Lee, Hyang-Sook
    Lim, Seongan
    INFORMATION SCIENCES, 2011, 181 (14) : 3066 - 3072
  • [4] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [5] Key Privacy in McEliece Public Key Cryptosystem
    Wang, Qiang
    Qiu, Xue
    Zhang, Quan
    Tang, Chaojing
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 824 - 828
  • [6] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [7] Quantum public key encryption scheme with four states key
    Liu, Zhixin
    Xie, Qiaoling
    Zha, Yongfu
    Dong, Yumin
    PHYSICA SCRIPTA, 2022, 97 (04)
  • [8] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [9] A Multivariate Public Key Encryption Scheme With Equality Test
    Shen, Xiaoying
    Wang, Licheng
    Zhu, Huijun
    Liu, Yuan
    IEEE ACCESS, 2020, 8 : 75463 - 75472
  • [10] Quantum Resistant Public Key Encryption Scheme HermitianRLCE
    Matthews, Gretchen L.
    Wang, Yongge
    CODE-BASED CRYPTOGRAPHY, CBC 2019, 2019, 11666 : 1 - 10