Code-Based Secret Handshake Scheme, Revisited

被引:0
|
作者
Kim, Minkyu [1 ]
Lee, Hyung Tae [2 ]
机构
[1] ETRI, Affiliated Inst, Daejeon, South Korea
[2] Chung Ang Univ, Sch Comp Sci & Engn, Seoul, South Korea
来源
基金
新加坡国家研究基金会;
关键词
secret handshake; CA-oblivious encryption; code-based construction; code equivalence problem; LESS-FM signatures;
D O I
10.1007/978-3-031-50594-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret handshake (SH) allows two users to authenticate each other anonymously only when they are in the same group. Recently, due to the concern of developments on large-scale quantum computers, designing post-quantum SH has been investigated and three constructions were proposed: One is code-based [21] and two others are lattice-based [1,2]. However, it turns out that the code-based construction [21] has a security flaw that the adversary easily impersonates an honest user to activate a handshake. In this paper, we show how to construct a code-based SH scheme in the framework of CA-oblivious encryption by utilizing the recently proposed code-based signature scheme, called LESS-FM, whose security is based on the hardness of the code equivalence problem. Our proposed scheme is the first secure code-based SH and has the smallest communication cost among all known post-quantum SH schemes. For example, for 80-bit security, our scheme has communication costs of about 260KB and 3.4KB when instantiated with Classic McEliece and BIKE, respectively, while other existing post-quantum constructions have communication costs of megabytes or gigabytes.
引用
收藏
页码:106 / 125
页数:20
相关论文
共 50 条
  • [1] QR Code-Based Visual Secret Sharing Scheme: A Review
    Chu, Shu-Chuan
    Liu, Tao
    Pan, Jeng-Shyang
    Journal of Network Intelligence, 2024, 9 (04): : 2642 - 2661
  • [2] Redundant code-based masking revisited
    Costes N.
    Stam M.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2021 (01): : 426 - 450
  • [3] Delegatable secret handshake scheme
    Wen, Yamin
    Zhang, Fangguo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2284 - 2292
  • [4] A code-based group signature scheme
    Quentin Alamélou
    Olivier Blazy
    Stéphane Cauchie
    Philippe Gaborit
    Designs, Codes and Cryptography, 2017, 82 : 469 - 493
  • [5] A code-based group signature scheme
    Alamelou, Quentin
    Blazy, Olivier
    Cauchie, Stephane
    Gaborit, Philippe
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (1-2) : 469 - 493
  • [6] A code-based hybrid signcryption scheme
    Klamti, Jean Belo
    Hasan, M. Anwarul
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2023, 17 (01)
  • [7] Code-based Blind Signature Scheme
    Liu, Simin
    Ye, Junyao
    Zhu, Huaqing
    2015 4TH INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL PROTECTION (ICEEP 2015), 2015, : 592 - 595
  • [8] Secret handshake scheme with request-based-revealing
    Kawai, Yutaka
    Kunihiro, Noboru
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (05) : 786 - 798
  • [9] A Correction to a Code-Based Blind Signature Scheme
    Blazy, Olivier
    Gaborit, Philippe
    Dang Truong Mac
    CODE-BASED CRYPTOGRAPHY (CBCRYPTO 2021), 2022, 13150 : 84 - 94
  • [10] An Efficient Attack on a Code-Based Signature Scheme
    Phesso, Aurelie
    Tillich, Jean-Pierre
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 86 - 103