Code-based signatures from new proofs of knowledge for the syndrome decoding problem

被引:0
|
作者
Loïc Bidoux
Philippe Gaborit
Mukul Kulkarni
Victor Mateu
机构
[1] Technology Innovation Institute,
[2] University of Limoges,undefined
来源
Designs, Codes and Cryptography | 2023年 / 91卷
关键词
Code-based cryptography; Signature; Proof of knowledge; 11T71;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study code-based signatures constructed from Proofs of Knowledge (PoK). This line of work can be traced back to Stern who introduced the first efficient PoK for the syndrome decoding problem in 1993 (Stern in A new identification scheme based on syndrome decoding. In: International cryptology conference (CRYPTO), 1993). Afterwards, different variations were proposed in order to reduce signature’s size. In practice, obtaining a smaller signature size relies on the interaction of two main considerations: (i) the underlying protocol and its soundness error and (ii) the types of optimizations which are compatible with a given protocol. In particular, optimizations related to the possibility of using random seeds instead of long vectors have a great impact on the final signature length. Over the years, different variations were proposed to improve the Stern scheme such as the Veron scheme (with public key as a noisy codeword rather than a syndrome) (Véron in Appl Algebra Eng Commun Comput 8(1):57-69, 1997), the AGS scheme which is a 5-pass protocol with soundness error asymptotically equal to 1/2 (Aguilar et al. in A new zero-knowledge code based identification scheme with reduced communication. In: IEEE information theory workshop, 2011) and more recently the FJR approach which permits to decrease the soundness probability to 1/N but induces a performance overhead (Feneuil et al. in Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. Cryptology ePrint archive, report 2021/1576, 2021). Overall the length of the signature depends on a trade-off between: the scheme in itself, the possible optimizations and the cost of the implementation. For instance, depending on the application one may prefer a 30% shorter signature at the cost of a ten times slower implementation rather than a longer signature but a faster implementation. The recent approaches which increase the cost of the implementation open the door to many different types of trade-offs. In this paper we propose three new schemes and different trade-offs, which are all interesting in themselves, since depending on potential future optimizations a scheme may eventually become more efficient than another. All the schemes we propose use a trusted helper: the first scheme permits to get a soundness error of 1/2, the second scheme permits to decrease the soundness error to 1/N but with a different approach than the recent FJR scheme and at last the third scheme proposes a Veron-like adaptation of the FJR scheme in which the public key is a noisy codeword rather than a syndrome. We provide extensive comparison which lists various trade-offs between our schemes and previous ones. The table highlights the benefits of our constructions for certain types of trade-offs.
引用
收藏
页码:497 / 544
页数:47
相关论文
共 50 条
  • [21] On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures
    Ren, Yan
    Zhao, Qiuxia
    Guan, Haipeng
    Lin, Zhiqiang
    IEEE ACCESS, 2020, 8 : 17854 - 17862
  • [22] Lossy Cryptography from Code-Based Assumptions
    Dao, Quang
    Jain, Aayush
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT III, 2024, 14922 : 34 - 75
  • [23] Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems
    Strenzke, Falko
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 217 - 230
  • [24] A new code-based designated verifier signature scheme
    Thanalakshmi, Perumal
    Anitha, Ramalingam
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (17)
  • [25] A new code-based digital signature based on the McEliece cryptosystem
    Makoui, Farshid Haidary
    Gulliver, Thomas Aaron
    Dakhilalian, Mohammad
    IET COMMUNICATIONS, 2023, 17 (10) : 1199 - 1207
  • [26] NEW PARADIGMS FOR DIGITAL-SIGNATURES AND MESSAGE AUTHENTICATION BASED ON NONINTERACTIVE ZERO KNOWLEDGE PROOFS
    BELLARE, M
    GOLDWASSER, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 194 - 211
  • [27] A New Dynamic Code-Based Group Signature Scheme
    Ayebie, Berenger Edoukou
    Assidi, Hafsa
    Souidi, El Mamoun
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 346 - 364
  • [28] A New Technique in Rank Metric Code-Based Encryption
    Lau, Terry Shue Chien
    Tan, Chik How
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 16
  • [29] New code-based cryptosystems via the IKKR framework
    Lau, Terry Shue Chien
    Ivanov, Fedor
    Ariffin, Muhammad Rezal Kamel
    Chin, Ji-Jian
    Yap, Timothy Tzen Vun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [30] A new key recovery attack on a code-based signature from the Lyubashevsky framework
    Tan, Chik How
    Prabowo, Theo Fanuela
    INFORMATION PROCESSING LETTERS, 2024, 183