Evolution of the McEliece Public Key Encryption Scheme

被引:4
|
作者
Bucerzan, Dominic [1 ]
Dragoi, Vlad [2 ]
Kalachi, Herve Tale [2 ,3 ]
机构
[1] Aurel Vlaicu Univ Arad, Dept Math & Comp Sci, Arad 310330, Romania
[2] Univ Rouen, UFR Sci & Tech, EA 4108, Lab LITIS, F-76800 St Etienne Du Rouvray, France
[3] Univ Yaounde I, Dept Math, Yaounde, Cameroon
来源
INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017 | 2017年 / 10543卷
关键词
Post-quantum cryptography; Coding theory; McEliece encryption scheme; SECRET PERMUTATION; TIMING ATTACK; CODES; CRYPTOSYSTEM; IMPLEMENTATION; EQUIVALENCE; SECURITY;
D O I
10.1007/978-3-319-69284-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays codebased cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [21] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [22] Dynamic and efficient joint encryption scheme in the plain public key model
    Shao, Zuhua
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 189 - 196
  • [23] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    CRYPTOGRAPHY, 2023, 7 (04)
  • [24] A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things
    Liu, Xiaoguang
    Sun, Yingying
    Dong, Hao
    FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 69 - 86
  • [25] Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
    Hulsing, Andreas
    Meijers, Matthias
    Strub, Pierre-Yves
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 622 - 653
  • [26] A pairing-free certificateless searchable public key encryption scheme for IoMT
    Liu, Xiaoguang
    Sun, Yingying
    Dong, Hao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [27] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks
    Liu, Can
    Chen, Ningjiang
    Huang, Ruwei
    Xie, Yongsheng
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
  • [28] A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations
    Akiyama, Koichiro
    Goto, Yasuhiro
    Okumura, Shinya
    Takagi, Tsuyoshi
    Nuida, Koji
    Hanaoka, Goichiro
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 215 - 234
  • [29] A Public Key Compression Scheme for Fully Homomorphic Encryption Based on Quadratic Parameters With Correction
    Chen, Liquan
    Lim, Ming
    Fan, Zijuan
    IEEE ACCESS, 2017, 5 : 17692 - 17700
  • [30] An improved anti-quantum MST3 public key encryption scheme for remote sensing images
    Wang, Xianmin
    Li, Jing
    Yan, Hongyang
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 530 - 544