Code-Based Secret Handshake Scheme, Revisited

被引:0
|
作者
Kim, Minkyu [1 ]
Lee, Hyung Tae [2 ]
机构
[1] ETRI, Affiliated Inst, Daejeon, South Korea
[2] Chung Ang Univ, Sch Comp Sci & Engn, Seoul, South Korea
来源
基金
新加坡国家研究基金会;
关键词
secret handshake; CA-oblivious encryption; code-based construction; code equivalence problem; LESS-FM signatures;
D O I
10.1007/978-3-031-50594-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret handshake (SH) allows two users to authenticate each other anonymously only when they are in the same group. Recently, due to the concern of developments on large-scale quantum computers, designing post-quantum SH has been investigated and three constructions were proposed: One is code-based [21] and two others are lattice-based [1,2]. However, it turns out that the code-based construction [21] has a security flaw that the adversary easily impersonates an honest user to activate a handshake. In this paper, we show how to construct a code-based SH scheme in the framework of CA-oblivious encryption by utilizing the recently proposed code-based signature scheme, called LESS-FM, whose security is based on the hardness of the code equivalence problem. Our proposed scheme is the first secure code-based SH and has the smallest communication cost among all known post-quantum SH schemes. For example, for 80-bit security, our scheme has communication costs of about 260KB and 3.4KB when instantiated with Classic McEliece and BIKE, respectively, while other existing post-quantum constructions have communication costs of megabytes or gigabytes.
引用
收藏
页码:106 / 125
页数:20
相关论文
共 50 条
  • [41] On the privacy of a code-based single-server computational PIR scheme
    Bordage, Sarah
    Lavauzelle, Julien
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (04): : 519 - 526
  • [42] New secret sharing scheme based on linear code
    Tan X.
    Wang Z.
    Applied Mathematics-A Journal of Chinese Universities, 2004, 19 (2) : 160 - 166
  • [43] NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
    Tan Xiaoqing Wang ZhiguoDept.of Math.
    AppliedMathematics:AJournalofChineseUniversities, 2004, (02) : 160 - 166
  • [45] The Design of Multi-Attribute Intersection Secret Handshake Scheme
    Wen Y.-M.
    Zhang F.-G.
    Gong Z.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1433 - 1447
  • [46] A Dynamic Matching Secret Handshake Scheme without Random Oracles
    Wen, Yamin
    Gong, Zheng
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 409 - 420
  • [47] Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
    Santini, Paolo
    Baldi, Marco
    Chiaraluce, Franco
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2594 - 2598
  • [48] A QR code-based user-friendly visual cryptography scheme
    Lijing Ren
    Denghui Zhang
    Scientific Reports, 12
  • [49] On the privacy of a code-based single-server computational PIR scheme
    Sarah Bordage
    Julien Lavauzelle
    Cryptography and Communications, 2021, 13 : 519 - 526
  • [50] A Code-based Group Signature Scheme with Shorter Public Key Length
    Assidi, Hafsa
    Ayebie, Edoukou Berenger
    Souidi, El Mamoun
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 432 - 439