Semantically secure McEliece public-key cryptosystem

被引:0
|
作者
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
McEliece public-key cryptosystem; semantic security; provable security; conversion; coding theory;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such as the integer factoring problem and the discrete logarithm problem (which will be. solved in polynomial-time after the emergence of quantum computers). While the McEliece PKC is based on another theory, i.e. coding theory, it is vulnerable against several practical attacks. In this paper. we summarize currently known attacks to the McEliece PKC, and then point out that, without any decrypt ion oracles or any partial knowledge on the plaintext of the challenge ciphertext, no polynomial-time algorithm is known for inverting the McEliece PKC whose parameters are carefully chosen. Under the assumption that this inverting problem is hard, we propose a slightly modified version of McEliece PKC that can be proven, in the random oracle model, to be semantically secure against adaptive chosen-ciphertext attacks. Our conversion can achieve the reduction of the redundant data down to 1/3-1/4 compared with the generic conversions for practical parameters.
引用
收藏
页码:74 / 83
页数:10
相关论文
共 50 条
  • [21] Key Privacy in McEliece Public Key Cryptosystem
    Wang, Qiang
    Qiu, Xue
    Zhang, Quan
    Tang, Chaojing
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 824 - 828
  • [22] Hexi McEliece Public Key Cryptosystem
    Ilanthenral, K.
    Easwarakumar, K. S.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2595 - 2603
  • [23] A Provably Secure Public-Key Cryptosystem Based on Elliptic Curves
    Peng Guohua (College of Mathematics
    Sichuan University)
    信息安全与通信保密, 2005, (07) : 112 - 115
  • [24] Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem
    Verheul, ER
    Doumen, JM
    van Tilborg, HCA
    INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 99 - 119
  • [25] PKC-PC: A variant of the McEliece public-key cryptosystem based on polar codes
    Hooshmand, Reza
    Koochak Shooshtari, Masoumeh
    Reza Aref, Mohammad
    IET COMMUNICATIONS, 2020, 14 (12) : 1883 - 1893
  • [26] On the security of the McEliece public-key cryptosystern
    Sendrier, N
    INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 141 - 163
  • [27] A Complete Public-Key Cryptosystem
    Grigoriev, Diva
    Hirsch, Edward A.
    Pervyshev, Konstantin
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 1 - 12
  • [28] On the security of a public-key cryptosystem
    Grosek, O
    Magliveras, SS
    Wei, W
    PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75
  • [29] Quantum Public-Key Cryptosystem
    Ming-Xing Luo
    Xiu-Bo Chen
    Deng Yun
    Yi-Xian Yang
    International Journal of Theoretical Physics, 2012, 51 : 912 - 924
  • [30] Quantum Public-Key Cryptosystem
    Luo, Ming-Xing
    Chen, Xiu-Bo
    Yun, Deng
    Yang, Yi-Xian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51 (03) : 912 - 924