Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes

被引:3
|
作者
Calkavur, Selda [1 ]
机构
[1] Kocaeli Univ, Fac Arts & Sci, Math Dept, TR-41380 Kocaeli, Turkey
关键词
public-key cryptosystem; error correcting code; bounded distance decoding; MCELIECE; LENGTH;
D O I
10.3390/e24040498
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding. The public-key cryptosystem is a cryptographic protocol that has two different keys. One of them is a public-key that can be known by everyone, and the other is the private-key only known to the user of the system. The data encrypted with the public-key of a given user can only be decrypted by this user with his or her private-key. In this paper, we propose a public-key cryptosystem based on the error-correcting codes. The decryption is performed by using the bounded distance decoding of the code. For a given code length, dimension, and error-correcting capacity, the new system allows dealing with larger plaintext than other code based public-key cryptosystems.
引用
收藏
页数:9
相关论文
共 50 条
  • [11] THE USE OF FRACTIONS IN PUBLIC-KEY CRYPTOSYSTEMS
    ISSELHORST, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 47 - 55
  • [12] Efficient and secure public-key cryptosystems
    Takagi, T
    CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237
  • [13] Public-key cryptosystems based on cubic curves
    Koyama, Kenji
    Kuwakado, Hidenori
    Tsuruoka, Yukio
    NTT R and D, 1995, 44 (10): : 91 - 98
  • [14] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [15] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [16] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    New Generation Computing, 2005, 23 : 259 - 275
  • [17] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [18] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [19] Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes
    Alain Couvreur
    Philippe Gaborit
    Valérie Gauthier-Umaña
    Ayoub Otmani
    Jean-Pierre Tillich
    Designs, Codes and Cryptography, 2014, 73 : 641 - 666
  • [20] COMPLEXITY-MEASURES FOR PUBLIC-KEY CRYPTOSYSTEMS
    GROLLMANN, J
    SELMAN, AL
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 309 - 335