Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes

被引:3
|
作者
Calkavur, Selda [1 ]
机构
[1] Kocaeli Univ, Fac Arts & Sci, Math Dept, TR-41380 Kocaeli, Turkey
关键词
public-key cryptosystem; error correcting code; bounded distance decoding; MCELIECE; LENGTH;
D O I
10.3390/e24040498
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding. The public-key cryptosystem is a cryptographic protocol that has two different keys. One of them is a public-key that can be known by everyone, and the other is the private-key only known to the user of the system. The data encrypted with the public-key of a given user can only be decrypted by this user with his or her private-key. In this paper, we propose a public-key cryptosystem based on the error-correcting codes. The decryption is performed by using the bounded distance decoding of the code. For a given code length, dimension, and error-correcting capacity, the new system allows dealing with larger plaintext than other code based public-key cryptosystems.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Security of GPT-like public-key cryptosystems based on linear rank codes
    Kshevetskiy, Alexander
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 143 - +
  • [2] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [3] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [4] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [5] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [6] Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes
    Couvreur, Alain
    Marquez-Corbella, Irene
    Pellikaan, Ruud
    CODING THEORY AND APPLICATIONS, 4TH INTERNATIONAL CASTLE MEETING, 2015, 3 : 133 - 140
  • [7] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [8] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [9] Key Distribution for Heterogeneous Public-Key Cryptosystems
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (05) : 464 - 468
  • [10] ATTACKING RSA PUBLIC-KEY CRYPTOSYSTEMS
    HAWKER, P
    ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1655): : 826 - 827