Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes

被引:3
|
作者
Calkavur, Selda [1 ]
机构
[1] Kocaeli Univ, Fac Arts & Sci, Math Dept, TR-41380 Kocaeli, Turkey
关键词
public-key cryptosystem; error correcting code; bounded distance decoding; MCELIECE; LENGTH;
D O I
10.3390/e24040498
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding. The public-key cryptosystem is a cryptographic protocol that has two different keys. One of them is a public-key that can be known by everyone, and the other is the private-key only known to the user of the system. The data encrypted with the public-key of a given user can only be decrypted by this user with his or her private-key. In this paper, we propose a public-key cryptosystem based on the error-correcting codes. The decryption is performed by using the bounded distance decoding of the code. For a given code length, dimension, and error-correcting capacity, the new system allows dealing with larger plaintext than other code based public-key cryptosystems.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Multisecret-sharing schemes and bounded distance decoding of linear codes
    Calkavur, Selda
    Sole, Patrick
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (01) : 107 - 114
  • [22] Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
    Couvreur, Alain
    Gaborit, Philippe
    Gauthier-Umana, Valerie
    Otmani, Ayoub
    Tillich, Jean-Pierre
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 641 - 666
  • [23] Public-key cryptosystems with primitive power roots of unity
    Hirano, Takato
    Wada, Koichiro
    Tanaka, Keisuke
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 98 - 112
  • [24] On non-Abelian homomorphic public-key cryptosystems
    Grigoriev D.
    Ponomarenko I.
    Journal of Mathematical Sciences, 2005, 126 (3) : 1158 - 1166
  • [25] Optimal-resilience proactive public-key cryptosystems
    Frankel, Y
    Gemmell, P
    MacKenzie, PD
    Yung, MT
    38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
  • [26] Reaction attacks against several public-key cryptosystems
    Hall, C
    Goldberg, I
    Schneier, B
    INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
  • [27] High-speed algorithms for public-key cryptosystems
    Joseph, G
    Penzhorn, WT
    2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 945 - 951
  • [28] Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits
    Dima Grigoriev
    Ilia Ponomarenko
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 239 - 255
  • [29] An efficient Montgomery exponentiation algorithm for public-key cryptosystems
    Wu, Chia-Long
    Lou, Der-Chyuan
    Chang, Te-Jen
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 284 - +
  • [30] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55