Evolution of the McEliece Public Key Encryption Scheme

被引:4
|
作者
Bucerzan, Dominic [1 ]
Dragoi, Vlad [2 ]
Kalachi, Herve Tale [2 ,3 ]
机构
[1] Aurel Vlaicu Univ Arad, Dept Math & Comp Sci, Arad 310330, Romania
[2] Univ Rouen, UFR Sci & Tech, EA 4108, Lab LITIS, F-76800 St Etienne Du Rouvray, France
[3] Univ Yaounde I, Dept Math, Yaounde, Cameroon
来源
INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017 | 2017年 / 10543卷
关键词
Post-quantum cryptography; Coding theory; McEliece encryption scheme; SECRET PERMUTATION; TIMING ATTACK; CODES; CRYPTOSYSTEM; IMPLEMENTATION; EQUIVALENCE; SECURITY;
D O I
10.1007/978-3-319-69284-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays codebased cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [41] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 (04) : 481 - 493
  • [42] A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
    Hong, Haibo
    Wang, Licheng
    Shao, Jun
    Yan, Jianhua
    Ahmad, Haseeb
    Wei, Guiyi
    Xie, Mande
    Yang, Yixian
    COMPUTER JOURNAL, 2019, 62 (12) : 1840 - 1848
  • [43] Will quantum computers be the end of public key encryption?
    Woodward, Alan (alan.woodward@surrey.ac.uk), 1600, Taylor and Francis Ltd. (01): : 1 - 22
  • [44] A New Public Key Encryption with Equality Test
    Huang, Kaibin
    Tso, Raylin
    Chen, Yu-Chi
    Li, Wangyu
    Sun, Hung-Min
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 550 - 557
  • [45] Stateful Certificateless Public Key Encryption with Application in Public Cloud
    Vivek, S. Sree
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 130 - 149
  • [46] Integer Reconstruction Public-Key Encryption
    Ferradi, Houda
    Naccache, David
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 412 - 433
  • [47] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [48] Probabilistic Public Key Encryption with Equality Test
    Yang, Guomin
    Tan, Chik How
    Huang, Qiong
    Wong, Duncan S.
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 119 - +
  • [49] A novel public-key encryption scheme based on Bass cyclic units in integral group rings
    Kusmus, Omer
    Hanoymak, Turgut
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (02) : 579 - 589
  • [50] Cryptanalysis of a Public Key Encryption Scheme Based on QC-LDPC and QC-MDPC Codes
    Dragoi, Vlad
    Kalachi, Herve Tale
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (02) : 264 - 267