MinRank Gabidulin Encryption Scheme on Matrix Codes

被引:0
|
作者
Aragon, Nicolas [1 ]
Couvreur, Alain [2 ,3 ,5 ]
Dyseryn, Victor [4 ,5 ]
Gaborit, Philippe [1 ]
Vincotte, Adrien [1 ]
机构
[1] Univ Limoges, XLIM, Limoges, France
[2] INRIA, Le Chesnay, France
[3] Ecole Polytech, LIX, Palaiseau, France
[4] Telecom Paris, LTCI, Paris, France
[5] Inst Polytech Paris, Paris, France
关键词
CRYPTOSYSTEMS; ATTACKS; GPT;
D O I
10.1007/978-981-96-0894-2_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The McEliece scheme is a generic frame introduced in [28], which allows to use any error correcting code for which there exists an efficient decoding algorithm to design an encryption scheme by hiding the generator matrix of the code. Similarly, the Niederreiter frame, introduced in [30], is the dual version of the McEliece scheme, and achieves smaller ciphertexts. In the present paper, we propose a generalization of theMcEliece and the Niederreiter frame tomatrix codes and theMinRank problem, that we apply to Gabidulin matrix codes (Gabidulin rank codes considered as matrix codes). The masking we consider consists in starting from a rank code C, computing a matrix version of C and then concatenating a certain number of rows and columns to the matrix code version of the rank code C before applying an isometry for matrix codes, i.e. right and left multiplications by fixed random matrices. The security of the schemes relies on theMinRank problem to decrypt a ciphertext, and the structural security of the scheme relies on the new EGMC-Indistinguishability problem that we introduce and that we study in detail. The main structural attack that we propose consists in trying to recover the masked linearity over the extension field which is lost during the masking process. Overall, starting from Gabidulin codes, we obtain a very appealing trade off between the size of the ciphertext and the size of the public key. For 128 bits of security we propose parameters ranging from ciphertexts of size 65 B (and public keys of size 98 kB) to ciphertexts of size 138B (and public keys of size 41 kB). For 256 bits of security, we can obtain ciphertext as low as 119 B, or public key as low as 87 kB. Our new approach permits to achieve a better trade-off between ciphertexts and public key than the classical McEliece scheme instantiated with Goppa codes.
引用
收藏
页码:68 / 100
页数:33
相关论文
共 50 条
  • [21] On Hermitian LCD Generalized Gabidulin Codes
    Zhao, Xubo
    Li, Xiaoping
    Yang, Runzhi
    Zhang, Qingqing
    Liu, Jinpeng
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (03) : 607 - 610
  • [22] Properties of subspace subcodes of Gabidulin codes
    Gabidulin, Ernst M.
    Loidreau, Pierre
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2008, 2 (02) : 147 - 157
  • [23] Algebraic decoding of folded Gabidulin codes
    Hannes Bartz
    Vladimir Sidorenko
    Designs, Codes and Cryptography, 2017, 82 : 449 - 467
  • [24] A decoding algorithm for Twisted Gabidulin codes
    Randrianarisoa, Tovohery
    Rosenthal, Joachim
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2771 - 2774
  • [25] The Cubic Simple Matrix Encryption Scheme
    Ding, Jintai
    Petzoldt, Albrecht
    Wang, Lih-chung
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 76 - 87
  • [26] Polynomial-time key recovery attack on the Faure–Loidreau scheme based on Gabidulin codes
    Philippe Gaborit
    Ayoub Otmani
    Hervé Talé Kalachi
    Designs, Codes and Cryptography, 2018, 86 : 1391 - 1403
  • [27] Automorphism groups of Gabidulin-like codes
    Dirk Liebhold
    Gabriele Nebe
    Archiv der Mathematik, 2016, 107 : 355 - 366
  • [28] Further results on LCD generalized Gabidulin codes
    Zhao, Xubo
    Li, Xiaoping
    Yan, Tongjiang
    Sun, Yuhua
    AIMS MATHEMATICS, 2021, 6 (12): : 14044 - 14053
  • [29] A New Rank Metric Codes Based Encryption Scheme
    Loidreau, Pierre
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 3 - 17
  • [30] A New Encryption Scheme Based on Rank Metric Codes
    Lau, Terry Shue Chien
    Tan, Chik How
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 750 - 758