LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding

被引:8
作者
Renner, Julian [1 ]
Puchinger, Sven [2 ]
Wachter-Zeh, Antonia [1 ]
机构
[1] Tech Univ Munich TUM, Inst Commun Engn, Munich, Germany
[2] Tech Univ Denmark DTU, Dept Appl Math & Comp Sci, Lyngby, Denmark
基金
欧盟地平线“2020”; 欧洲研究理事会;
关键词
Code-based cryptography; Gabidulin codes; Interleaved decoding; List decoding; Rank-metric codes; ERROR; CODES; BOUNDS; ATTACK;
D O I
10.1007/s10623-021-00861-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose the new rank-metric code-based cryptosystem LIGA which is based on the hardness of list decoding and interleaved decoding of Gabidulin codes. LIGA is an improved variant of the Faure-Loidreau (FL) system, which was broken in a structural attack by Gaborit, Otmani, and Tale Kalachi (GOT, 2018). We keep the FL encryption and decryption algorithms, but modify the insecure key generation algorithm. Our crucial observation is that the GOT attack is equivalent to decoding an interleaved Gabidulin code. The new key generation algorithm constructs public keys for which all polynomial-time interleaved decoders fail-hence LIGA resists the GOT attack. We also prove that the public-key encryption version of LIGA is IND-CPA secure in the standard model and the key encapsulation mechanisms version is IND-CCA2 secure in the random oracle model, both under hardness assumptions of formally defined problems related to list decoding and interleaved decoding of Gabidulin codes. We propose and analyze various exponential-time attacks on these problems, calculate their work factors, and compare the resulting parameters to NIST proposals. The strengths of LIGA are short ciphertext sizes and (relatively) small key sizes. Further, LIGA guarantees correct decryption and has no decryption failure rate. It is not based on hiding the structure of a code. Since there are efficient and constant-time algorithms for encoding and decoding Gabidulin codes, timing attacks on the encryption and decryption algorithms can be easily prevented.
引用
收藏
页码:1279 / 1319
页数:41
相关论文
共 52 条
[1]  
Aguilar, 2019, ROLLO RANK OUROBOROS
[2]  
Aguilar Melchor, 2019, HAUTEVILLE RANK QUAS
[3]  
al, SAGEMATH SOFTWARE
[4]  
Al Shehhi H, 2019, LECT NOTES COMPUT SC, V11627, P79, DOI 10.1007/978-3-030-23696-0_5
[5]  
[Anonymous], 2017, Post -Quantum Cryptography
[6]  
Aragon N, 2017, BIKE BIT FLIPPING KE
[7]  
Aragon N, 2018, IEEE INT SYMP INFO, P2421, DOI 10.1109/ISIT.2018.8437464
[8]  
Augot D, 2003, LECT NOTES COMPUT SC, V2656, P229
[9]  
Bardet M., 2020, ALGEBRAIC ATTACKS SO
[10]  
Bernstein D., CLASSIC MCELIECE 2 R