Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes

被引:3
作者
Calkavur, Selda [1 ]
机构
[1] Kocaeli Univ, Fac Arts & Sci, Math Dept, TR-41380 Kocaeli, Turkey
关键词
public-key cryptosystem; error correcting code; bounded distance decoding; MCELIECE; LENGTH;
D O I
10.3390/e24040498
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding. The public-key cryptosystem is a cryptographic protocol that has two different keys. One of them is a public-key that can be known by everyone, and the other is the private-key only known to the user of the system. The data encrypted with the public-key of a given user can only be decrypted by this user with his or her private-key. In this paper, we propose a public-key cryptosystem based on the error-correcting codes. The decryption is performed by using the bounded distance decoding of the code. For a given code length, dimension, and error-correcting capacity, the new system allows dealing with larger plaintext than other code based public-key cryptosystems.
引用
收藏
页数:9
相关论文
共 19 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
[Anonymous], 1983, COMMUN ACM, DOI DOI 10.1145/357980.358017
[3]  
Berger TP, 2009, LECT NOTES COMPUT SC, V5580, P77, DOI 10.1007/978-3-642-02384-2_6
[4]   How to mask the structure of codes for a cryptographic use [J].
Berger, TP ;
Loidreau, P .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (01) :63-79
[5]   INHERENT INTRACTABILITY OF CERTAIN CODING PROBLEMS [J].
BERLEKAMP, ER ;
MCELIECE, RJ ;
VANTILBORG, HCA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (03) :384-386
[6]   A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511 [J].
Canteaut, A ;
Chabaud, F .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) :367-378
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
Hill R., 1986, 1 COURSE NUMERICAL A
[9]   A METHOD FOR ARITHMETIC COMPARISON OF DATA REPRESENTED IN A RESIDUE NUMBER SYSTEM [J].
Krasnobayev, V. A. ;
Yanko, A. S. ;
Koshman, S. A. .
CYBERNETICS AND SYSTEMS ANALYSIS, 2016, 52 (01) :145-150
[10]  
Krouk E., 1997, P INT C THEOR APPL C, P285