Skip to main content

An Improved Code-Based Encryption Scheme with a New Construction of Public Key

  • Conference paper
  • First Online:
International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 (ATCI 2019)

Abstract

There are substantial variants of McEliece cryptosystem from coding theory. In general, these attempts always utilize two basic ways to enhance performance of the original cryptosystem: reducing the public key size and improving the efficiency and ability of decoding algorithms. Meanwhile, security level is the goal that has always been pursued. Sometimes we need to sacrifice some advantage to get other claims. Recently, Baldi et al. proposed a novel scheme (BBCRS scheme for short) in which the public code is no longer permutation equivalent to the secret code and this distinctly increases the security level. In this paper, we propose a new construction of public key following the idea of BBCRS scheme. The improvement enhances the correction capability and results in a better protection of the secret code. We also discuss some known attacks in detail as in BBCRS scheme which shows that our new scheme is secure under the current means of attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 1994 Proceedings, 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)

    Google Scholar 

  2. Mceliece, R.J.: A public-key cryptosystem based on algebraic. Coding Thv 4244, 114–116 (1978)

    Google Scholar 

  3. Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: 2006 IEEE International Symposium on Information Theory, pp. 1733–1737. IEEE, July 2006

    Google Scholar 

  4. Berger, T.P., Cayrel, P.L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: International Conference on Cryptology in Africa, pp. 77–97. Springer, Heidelberg, June 2009

    Chapter  Google Scholar 

  5. Sendrier, N.: On the security of the McEliece public-key cryptosystem. In: Information, Coding and Mathematics, pp. 141–163. Springer, Boston (2002)

    Chapter  Google Scholar 

  6. Gauthier, V., Otmani, A., Tillich, J.P.: A distinguisher-based attack on a variant of McEliece’s cryptosystem based on Reed-Solomon codes. arXiv preprint arXiv:1204.6459 (2012)

  7. Loidreau, P.: A new rank metric codes based encryption scheme. In: International Workshop on Post-Quantum Cryptography, pp. 3–17. Springer, Cham, June 2017

    Chapter  Google Scholar 

  8. Overbeck, R.: Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)

    Article  MathSciNet  Google Scholar 

  9. Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 157–174. Springer, Heidelberg, December 2001

    Google Scholar 

  10. Baldi, M., Bianchi, M., Chiaraluce, F.: Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems. In: 2013 IEEE International Conference on Communications Workshops (ICC), pp. 707–711. IEEE, June 2013

    Google Scholar 

  11. Shooshtari, M.K., Ahmadian-Attari, M., Johansson, T., Aref, M.R.: Cryptanalysis of McEliece cryptosystem variants based on quasicyclic low-density parity check codes. IET Inf. Secur. 10(4), 194–202 (2016)

    Article  Google Scholar 

  12. Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.: MDPC-McEliece: new McEliece variants from moderate density paritycheck codes. In: Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pp. 2069–2073. IEEE, July 2013

    Google Scholar 

  13. Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Enhanced public key security for the McEliece cryptosystem. J. Cryptol. 29(1), 1–27 (2016)

    Article  MathSciNet  Google Scholar 

  14. Canteaut, A., Sendrier, N.: Cryptanalysis of the original McEliece cryptosystem. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 187–199. Springer, Heidelberg, October 1998

    Google Scholar 

Download references

Acknowledgement

The work is supported in part by the National Key R&D Program of China under Grant No. 2017YFB0802302, the Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security) under Grant No. C18603, the NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization under Grant No. U1509219, the Shanghai Natural Science Foundation under Grant No. 17ZR1408400, the National Natural Science Foundation of China under Grant Nos. 61601129, 11701179, the Shanghai Science and Technology Commission Program under Grant No. 18511105700, and the Shanghai Sailing Program under Grant No. 17YF1404300.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Zeng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, Y., Zeng, P., Chen, S. (2020). An Improved Code-Based Encryption Scheme with a New Construction of Public Key. In: Abawajy, J., Choo, KK., Islam, R., Xu, Z., Atiquzzaman, M. (eds) International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019. ATCI 2019. Advances in Intelligent Systems and Computing, vol 1017. Springer, Cham. https://doi.org/10.1007/978-3-030-25128-4_118

Download citation

Publish with us

Policies and ethics