Semantic security for the McEliece cryptosystem without random oracles

被引:64
|
作者
Nojima, Ryo [2 ]
Imai, Hideki [1 ]
Kobara, Kazukuni [1 ]
Morozov, Kirill [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Tokyo, Japan
[2] Natl Inst Informat & Commun Technol, Informat Secur Res Ctr, Tokyo, Japan
关键词
semantic security; cryptographic standard model; McEliece cryptosystem; Niederreiter cryptosystem;
D O I
10.1007/s10623-008-9175-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and its dual, the Niederreiter) cryptosystems under the standard assumptions. Such padding has recently been used by Suzuki, Kobara and Imai in the context of RFID security. Our proof relies on the technical result by Katz and Shin from Eurocrypt '05 showing "pseudorandomness" implied by the learning parity with noise (LPN) problem. We do not need the random oracles as opposed to the known generic constructions which, on the other hand, provide a stronger protection as compared to our scheme-against (adaptive) chosen ciphertext attack, i.e., IND-CCA(2). In order to show that the padded version of the cryptosystem remains practical, we provide some estimates for suitable key sizes together with corresponding workload required for successful attack.
引用
收藏
页码:289 / 305
页数:17
相关论文
共 50 条
  • [1] Semantic security for the McEliece cryptosystem without random oracles
    Ryo Nojima
    Hideki Imai
    Kazukuni Kobara
    Kirill Morozov
    Designs, Codes and Cryptography, 2008, 49 : 289 - 305
  • [2] Enhanced Public Key Security for the McEliece Cryptosystem
    Baldi, Marco
    Bianchi, Marco
    Chiaraluce, Franco
    Rosenthal, Joachim
    Schipani, Davide
    JOURNAL OF CRYPTOLOGY, 2016, 29 (01) : 1 - 27
  • [3] Enhanced Public Key Security for the McEliece Cryptosystem
    Marco Baldi
    Marco Bianchi
    Franco Chiaraluce
    Joachim Rosenthal
    Davide Schipani
    Journal of Cryptology, 2016, 29 : 1 - 27
  • [4] Attacking and Defending the McEliece Cryptosystem
    Bernstein, Daniel J.
    Lange, Tanja
    Peters, Christiane
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 31 - +
  • [5] New Variant of the McEliece Cryptosystem
    Moufek, Hamza
    Guenda, Kenza
    CODING THEORY AND APPLICATIONS, 4TH INTERNATIONAL CASTLE MEETING, 2015, 3 : 291 - 296
  • [6] Reducing Key Length of the McEliece Cryptosystem
    Berger, Thierry P.
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    Otmani, Ayoub
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 77 - +
  • [7] Permutation LDPC Codes in McEliece Cryptosystem
    Irwansyah
    Muchtadi-Alamsyah, Intan
    Yuliawan, Fajar
    PROCEEDINGS OF THE 8TH SEAMS-UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2019: DEEPENING MATHEMATICAL CONCEPTS FOR WIDER APPLICATION THROUGH MULTIDISCIPLINARY RESEARCH AND INDUSTRIES COLLABORATIONS, 2019, 2192
  • [8] ON THE CONSTRUCTION OF A SEMANTICALLY SECURE MODIFICATION OF THE MCELIECE CRYPTOSYSTEM
    Kosolapov, Y., V
    Turchenko, O. Y.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2019, (45): : 33 - 43
  • [9] Secure and Compact: A New Variant of McEliece Cryptosystem
    Bindal, Ekta
    Singh, Abhay Kumar
    IEEE ACCESS, 2024, 12 : 35586 - 35596
  • [10] LDPC Codes in the McEliece Cryptosystem: Attacks and Countermeasures
    Baldi, Marco
    ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 160 - 174