Skip to main content

Digital Signature Schemes from Codes

  • Reference work entry
  • 203 Accesses

Related Concepts

Error Correcting Codes; Signature Scheme; Syndrome Decoding Problem; Zero-Knowledge Protocols

Definition

There exist three different types of methods to obtain a signature scheme with code-based systems (like for number theory–based schemes). The first method (similar to the RSA signature) consists in being able to decode a random element of the syndrome space. This point of view is developed by Courtois-Finiasz-Sendrier [1] and necessitates to hide very large codes to obtain a reasonable probability of decoding (cf. “Digital Signature Scheme Based on McEliece”). The second method uses zero-knowledge identification algorithms together with the Fiat-Shamir paradigm [2], which permits to transform such an algorithm into a signature algorithm. It generally leads to very long signature. For coding theory, the Stern identification protocol [3] is the most efficient. The last method (similar to the El Gamal signature scheme) consists in building a special subset of the...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Courtois N, Finiasz M, Sendrier N (2001) How to achieve a McEliece-based digital signature scheme. In: Boyd C (ed) Advances in cryptology – ASIACRYPT 2001. Lecture notes in computer science, vol 2248. Springer, Berlin, pp 157–174

    Google Scholar 

  2. Fiat A, Shamir A (1987) How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko AM (ed) Advances in cryptology – CRYPTO’86. Lecture notes in computer science, vol 263. Springer, Berlin, pp 186–194

    Google Scholar 

  3. Stern J (1993) A new identification scheme based on syndrome decoding. In: Stinson DR (ed) Advances in cryptology – CRYPTO’93. Lecture notes in computer science, vol 773. Springer, Berlin, pp 13–21

    Google Scholar 

  4. Kabatianskii G, Krouk E, Smeets B (1997) A digital signature scheme based on random error-correcting codes. In: Goos G, Hartmanis J, van Leeuwen J (eds) Crytography and coding. Lecture notes in computer science, vol 1355. Springer, Berlin, pp 161–167

    Google Scholar 

  5. Pointcheval D, Stern J (1996) Security proofs for signature schemes. In: Maurer U (ed) Advances in cryptology – EUROCRYPT’96. Lecture notes in computer science, vol 1070. Springer, Berlin, pp 387–398

    Google Scholar 

  6. Véron P (1997) Improved identification schemes based on error-correcting codes. Appl Algebra Eng Commun Comput 8(1): 57–69

    MATH  Google Scholar 

  7. Gaborit P, Girault M (2007) Lightweight code-based identification and signature. In: IEEE conference, ISIT’07, Nice. IEEE, pp 191–195

    Google Scholar 

  8. Cayrel PL, Gaborit P, Prouff E (2008) Secure implementation of the stern authentication and signature schemes for low-resource devices. In: Grimaud G, Standaert FX (eds) CARDIS 2008. Lecture notes in computer science, vol 5189. Springer, Berlin, pp 191–205

    Google Scholar 

  9. Cayrel PL, Otmani A, Vergnaud D (2007) On kabatianskii-krouk-smeets signatures. In: First international workshop, WAIFI 2007, Madrid. Lecture notes in computer science, vol 4547. Springer, Berlin, pp 237–251

    Google Scholar 

  10. Cayrel PL, Gaborit P, Girault M (2007) Identity-based identification and signature schemes using correcting codes. In: Augot D, Sendrier N, Tillich J-P (eds) International workshop on coding and cryptography, WCC 2007. INRIA, pp 69–78

    Google Scholar 

  11. Melchor CA, Cayrel PL, Gaborit P (2008) A new efficient threshold ring signature scheme based on coding theory. In: Buchmann J, Ding J (eds) PQCrypto. Lecture notes in computer science, vol 5299. Springer, Berlin, pp 1–16

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Gaborit, P., Sendrier, N. (2011). Digital Signature Schemes from Codes. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_379

Download citation

Publish with us

Policies and ethics