Improving the security of the McEliece public-key cryptosystem

被引:0
|
作者
Sun, HM [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung Cty, Taiwan
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
At Crypt'97, Berson showed that the McEliece public-key cryptosystem suffers from two weaknesses: (1) failure to protect any message which is encrypted more than once, (2) failure to protect any messages which have a known linear relation to one another. In this paper, we propose some variants of the McEliece scheme which can prevent from these attacks. These variants will not reduce the information rate in the original scheme. In addition, to improve the information rate, we also propose some variants of the McEliece scheme which can prevent from Barson-like attacks.
引用
收藏
页码:200 / 213
页数:14
相关论文
共 50 条
  • [21] Improving the Security of McEliece-Like Public Key Cryptosystem Based on LDPC Codes
    Shooshtari, Masumeh Koochak
    Ahmadian, Mahmoud
    Payandeh, Ali
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1050 - +
  • [22] AN OBSERVATION ON THE SECURITY OF MCELIECES PUBLIC-KEY CRYPTOSYSTEM
    LEE, PJ
    BRICKELL, EF
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 330 : 275 - 280
  • [23] Key Privacy in McEliece Public Key Cryptosystem
    Wang, Qiang
    Qiu, Xue
    Zhang, Quan
    Tang, Chaojing
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 824 - 828
  • [24] Security of the Niderreiter Form of the GPT public-key cryptosystem
    Berger, T
    Loidreau, P
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 267 - 267
  • [25] Hexi McEliece Public Key Cryptosystem
    Ilanthenral, K.
    Easwarakumar, K. S.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2595 - 2603
  • [26] Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem
    Verheul, ER
    Doumen, JM
    van Tilborg, HCA
    INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 99 - 119
  • [27] PKC-PC: A variant of the McEliece public-key cryptosystem based on polar codes
    Hooshmand, Reza
    Koochak Shooshtari, Masoumeh
    Reza Aref, Mohammad
    IET COMMUNICATIONS, 2020, 14 (12) : 1883 - 1893
  • [28] A Complete Public-Key Cryptosystem
    Grigoriev, Diva
    Hirsch, Edward A.
    Pervyshev, Konstantin
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 1 - 12
  • [29] Quantum Public-Key Cryptosystem
    Ming-Xing Luo
    Xiu-Bo Chen
    Deng Yun
    Yi-Xian Yang
    International Journal of Theoretical Physics, 2012, 51 : 912 - 924
  • [30] Quantum Public-Key Cryptosystem
    Luo, Ming-Xing
    Chen, Xiu-Bo
    Yun, Deng
    Yang, Yi-Xian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51 (03) : 912 - 924