Code-based signatures from new proofs of knowledge for the syndrome decoding problem

被引:0
|
作者
Loïc Bidoux
Philippe Gaborit
Mukul Kulkarni
Victor Mateu
机构
[1] Technology Innovation Institute,
[2] University of Limoges,undefined
来源
Designs, Codes and Cryptography | 2023年 / 91卷
关键词
Code-based cryptography; Signature; Proof of knowledge; 11T71;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study code-based signatures constructed from Proofs of Knowledge (PoK). This line of work can be traced back to Stern who introduced the first efficient PoK for the syndrome decoding problem in 1993 (Stern in A new identification scheme based on syndrome decoding. In: International cryptology conference (CRYPTO), 1993). Afterwards, different variations were proposed in order to reduce signature’s size. In practice, obtaining a smaller signature size relies on the interaction of two main considerations: (i) the underlying protocol and its soundness error and (ii) the types of optimizations which are compatible with a given protocol. In particular, optimizations related to the possibility of using random seeds instead of long vectors have a great impact on the final signature length. Over the years, different variations were proposed to improve the Stern scheme such as the Veron scheme (with public key as a noisy codeword rather than a syndrome) (Véron in Appl Algebra Eng Commun Comput 8(1):57-69, 1997), the AGS scheme which is a 5-pass protocol with soundness error asymptotically equal to 1/2 (Aguilar et al. in A new zero-knowledge code based identification scheme with reduced communication. In: IEEE information theory workshop, 2011) and more recently the FJR approach which permits to decrease the soundness probability to 1/N but induces a performance overhead (Feneuil et al. in Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. Cryptology ePrint archive, report 2021/1576, 2021). Overall the length of the signature depends on a trade-off between: the scheme in itself, the possible optimizations and the cost of the implementation. For instance, depending on the application one may prefer a 30% shorter signature at the cost of a ten times slower implementation rather than a longer signature but a faster implementation. The recent approaches which increase the cost of the implementation open the door to many different types of trade-offs. In this paper we propose three new schemes and different trade-offs, which are all interesting in themselves, since depending on potential future optimizations a scheme may eventually become more efficient than another. All the schemes we propose use a trusted helper: the first scheme permits to get a soundness error of 1/2, the second scheme permits to decrease the soundness error to 1/N but with a different approach than the recent FJR scheme and at last the third scheme proposes a Veron-like adaptation of the FJR scheme in which the public key is a noisy codeword rather than a syndrome. We provide extensive comparison which lists various trade-offs between our schemes and previous ones. The table highlights the benefits of our constructions for certain types of trade-offs.
引用
收藏
页码:497 / 544
页数:47
相关论文
共 50 条
  • [31] A new formulation for a code-based vertical design spectrum
    Kale, Ozkan
    Akkar, Sinan
    EARTHQUAKE ENGINEERING & STRUCTURAL DYNAMICS, 2020, 49 (10): : 963 - 980
  • [32] A New Code-Based Traceable Ring Signature Scheme
    Qi, Yanhong
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [33] A comparison of schools: teacher knowledge of explicit code-based reading instruction
    Rebecca A. Cohen
    Nancy Mather
    Deborah A. Schneider
    Jennifer M. White
    Reading and Writing, 2017, 30 : 653 - 690
  • [34] Polynomial reduction from syndrome decoding problem to regular decoding problem
    Zajac, Pavol
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [35] A comparison of schools: teacher knowledge of explicit code-based reading instruction
    Cohen, Rebecca A.
    Mather, Nancy
    Schneider, Deborah A.
    White, Jennifer M.
    READING AND WRITING, 2017, 30 (04) : 653 - 690
  • [36] Towards a new code-based software development concept enabling code patterns
    Meffert, Klaus
    Philippow, Ilka
    ICSOFT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL SE: SOFTWARE ENGINEERING, 2007, : 363 - 366
  • [37] Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
    Wang, Yong
    Ismail, Eddie Shahril
    MATHEMATICS, 2024, 12 (15)
  • [38] MinRank in the Head Short Signatures from Zero-Knowledge Proofs
    Adj, Gora
    Rivera-Zamarripa, Luis
    Verbel, Javier
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 3 - 27
  • [39] Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures
    Santoso, Bagus
    Yamaguchi, Taiyo
    Ohkubo, Tomoyuki
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 248 - 262
  • [40] A code-based signature scheme from the Lyubashevsky framework
    Song, Yongcheng
    Huang, Xinyi
    Mu, Yi
    Wu, Wei
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2020, 835 : 15 - 30