Evolution of the McEliece Public Key Encryption Scheme

被引:4
|
作者
Bucerzan, Dominic [1 ]
Dragoi, Vlad [2 ]
Kalachi, Herve Tale [2 ,3 ]
机构
[1] Aurel Vlaicu Univ Arad, Dept Math & Comp Sci, Arad 310330, Romania
[2] Univ Rouen, UFR Sci & Tech, EA 4108, Lab LITIS, F-76800 St Etienne Du Rouvray, France
[3] Univ Yaounde I, Dept Math, Yaounde, Cameroon
来源
INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017 | 2017年 / 10543卷
关键词
Post-quantum cryptography; Coding theory; McEliece encryption scheme; SECRET PERMUTATION; TIMING ATTACK; CODES; CRYPTOSYSTEM; IMPLEMENTATION; EQUIVALENCE; SECURITY;
D O I
10.1007/978-3-319-69284-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays codebased cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [31] SoK: Public Key Encryption with Openings
    Brunetta, Carlo
    Heum, Hans
    Stam, Martijn
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 35 - 68
  • [32] A Posteriori Openable Public Key Encryption
    Bultel, Xavier
    Lafourcade, Pascal
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 17 - 31
  • [33] Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
    Xagawa, Keita
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 142 - 161
  • [34] Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain
    Yang, Xiaodong
    Chen, Guilan
    Wang, Meiding
    Li, Ting
    Wang, Caifen
    IEEE ACCESS, 2020, 8 : 158765 - 158777
  • [35] An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Hsu, Shih-Ting
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (02) : 255 - 273
  • [36] A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
    Liu, Xiaoguang
    Dong, Hao
    Kumari, Neha
    Kar, Jayaprakash
    IEEE ACCESS, 2023, 11 : 58754 - 58764
  • [37] On the Security and Key Generation of the ZHFE Encryption Scheme
    Zhang, Wenbin
    Tan, Chik How
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 289 - 304
  • [38] A New ID-based Multi-Recipient Public-key Encryption Scheme
    Pang Liaojun
    Gao Lu
    Pei Qingqi
    Gui Jingjing
    Wang Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 89 - 92
  • [39] Aleakage-resilient certificateless public key encryption scheme with CCA2 security
    Zhou, Yan-wei
    Yang, Bo
    Cheng, Hao
    Wang, Qing-long
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (04) : 481 - 493
  • [40] Efficient Public-Key Searchable Encryption Scheme From PSI With Scalable Proxy Servers
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 3527 - 3540