Semantically secure McEliece public-key cryptosystem

被引:0
|
作者
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
McEliece public-key cryptosystem; semantic security; provable security; conversion; coding theory;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such as the integer factoring problem and the discrete logarithm problem (which will be. solved in polynomial-time after the emergence of quantum computers). While the McEliece PKC is based on another theory, i.e. coding theory, it is vulnerable against several practical attacks. In this paper. we summarize currently known attacks to the McEliece PKC, and then point out that, without any decrypt ion oracles or any partial knowledge on the plaintext of the challenge ciphertext, no polynomial-time algorithm is known for inverting the McEliece PKC whose parameters are carefully chosen. Under the assumption that this inverting problem is hard, we propose a slightly modified version of McEliece PKC that can be proven, in the random oracle model, to be semantically secure against adaptive chosen-ciphertext attacks. Our conversion can achieve the reduction of the redundant data down to 1/3-1/4 compared with the generic conversions for practical parameters.
引用
收藏
页码:74 / 83
页数:10
相关论文
共 50 条
  • [41] Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    Berson, TA
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 213 - 220
  • [42] A Differential Knapsack Public-Key Cryptosystem
    Murakami, Yasuyuki
    Kasahara, Masao
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 613 - 617
  • [43] Comment on the "Quantum Public-Key Cryptosystem"
    Zhou, Ri-gui
    Li, Wei
    Huan, Tian-tian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (03) : 1033 - 1037
  • [44] ANOTHER PRACTICAL PUBLIC-KEY CRYPTOSYSTEM
    SHIMADA, M
    ELECTRONICS LETTERS, 1992, 28 (23) : 2146 - 2147
  • [45] Cryptanalysis of the WD public-key cryptosystem
    Huang, HF
    Chang, CC
    FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 249 - 254
  • [46] On finite automaton public-key cryptosystem
    Tao, RJ
    Chen, SH
    THEORETICAL COMPUTER SCIENCE, 1999, 226 (1-2) : 143 - 172
  • [47] SECURITY OF OKAMOTO PUBLIC-KEY CRYPTOSYSTEM
    KOYAMA, K
    ELECTRONICS LETTERS, 1986, 22 (20) : 1033 - 1034
  • [48] SIMPLE AND EFFECTIVE PUBLIC-KEY CRYPTOSYSTEM
    LU, SC
    LEE, LN
    COMSAT TECHNICAL REVIEW, 1979, 9 (01): : 15 - 24
  • [49] On the key-privacy issue of McEliece public-key encryption
    Yamakawa, Shigenori
    Cui, Yang
    Kobara, Kazukuni
    Hagiwara, Manabu
    Imai, Hideki
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2007, 4851 : 168 - +
  • [50] A New Knapsack Public-Key Cryptosystem
    Zhang, Weidong
    Wang, Baocang
    Hu, Yupu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 53 - 56