MinRank Gabidulin Encryption Scheme on Matrix Codes

被引:0
|
作者
Aragon, Nicolas [1 ]
Couvreur, Alain [2 ,3 ,5 ]
Dyseryn, Victor [4 ,5 ]
Gaborit, Philippe [1 ]
Vincotte, Adrien [1 ]
机构
[1] Univ Limoges, XLIM, Limoges, France
[2] INRIA, Le Chesnay, France
[3] Ecole Polytech, LIX, Palaiseau, France
[4] Telecom Paris, LTCI, Paris, France
[5] Inst Polytech Paris, Paris, France
关键词
CRYPTOSYSTEMS; ATTACKS; GPT;
D O I
10.1007/978-981-96-0894-2_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The McEliece scheme is a generic frame introduced in [28], which allows to use any error correcting code for which there exists an efficient decoding algorithm to design an encryption scheme by hiding the generator matrix of the code. Similarly, the Niederreiter frame, introduced in [30], is the dual version of the McEliece scheme, and achieves smaller ciphertexts. In the present paper, we propose a generalization of theMcEliece and the Niederreiter frame tomatrix codes and theMinRank problem, that we apply to Gabidulin matrix codes (Gabidulin rank codes considered as matrix codes). The masking we consider consists in starting from a rank code C, computing a matrix version of C and then concatenating a certain number of rows and columns to the matrix code version of the rank code C before applying an isometry for matrix codes, i.e. right and left multiplications by fixed random matrices. The security of the schemes relies on theMinRank problem to decrypt a ciphertext, and the structural security of the scheme relies on the new EGMC-Indistinguishability problem that we introduce and that we study in detail. The main structural attack that we propose consists in trying to recover the masked linearity over the extension field which is lost during the masking process. Overall, starting from Gabidulin codes, we obtain a very appealing trade off between the size of the ciphertext and the size of the public key. For 128 bits of security we propose parameters ranging from ciphertexts of size 65 B (and public keys of size 98 kB) to ciphertexts of size 138B (and public keys of size 41 kB). For 256 bits of security, we can obtain ciphertext as low as 119 B, or public key as low as 87 kB. Our new approach permits to achieve a better trade-off between ciphertexts and public key than the classical McEliece scheme instantiated with Goppa codes.
引用
收藏
页码:68 / 100
页数:33
相关论文
共 50 条
  • [31] An image encryption scheme employing quick response codes
    Kumar, Avishek
    Nishchal, Naveen K.
    2018 3RD INTERNATIONAL CONFERENCE ON MICROWAVE AND PHOTONICS (ICMAP), 2018,
  • [32] List Decodability of Random Subcodes of Gabidulin Codes
    Liu, Shu
    Xing, Chaoping
    Yuan, Chen
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 159 - 163
  • [33] Rank metric and Gabidulin codes in characteristic zero
    Augot, Daniel
    Loidreau, Pierre
    Robert, Gwezheneg
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 509 - +
  • [34] Decoding Supercodes of Gabidulin Codes and Applications to Cryptanalysis
    Bombar, Maxime
    Couvreur, Alain
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 3 - 22
  • [35] Automorphism groups of Gabidulin-like codes
    Liebhold, Dirk
    Nebe, Gabriele
    ARCHIV DER MATHEMATIK, 2016, 107 (04) : 355 - 366
  • [36] An evaluation of erasure decoding algorithms for Gabidulin codes
    Venturelli, Ricardo Bohaczuk
    Silva, Danilo
    2014 INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM (ITS), 2014,
  • [37] On decoding additive generalized twisted Gabidulin codes
    Kadir, Wrya K.
    Li, Chunlei
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2020, 12 (05): : 987 - 1009
  • [38] On the genericity of maximum rank distance and Gabidulin codes
    Alessandro Neri
    Anna-Lena Horlemann-Trautmann
    Tovohery Randrianarisoa
    Joachim Rosenthal
    Designs, Codes and Cryptography, 2018, 86 : 341 - 363
  • [39] On decoding additive generalized twisted Gabidulin codes
    Wrya K. Kadir
    Chunlei Li
    Cryptography and Communications, 2020, 12 : 987 - 1009
  • [40] Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes
    Gaborit, Philippe
    Otmani, Ayoub
    Kalachi, Herve Tale
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (07) : 1391 - 1403