Abstract
There are substantial variants of McEliece cryptosystem from coding theory. In general, these attempts always utilize two basic ways to enhance performance of the original cryptosystem: reducing the public key size and improving the efficiency and ability of decoding algorithms. Meanwhile, security level is the goal that has always been pursued. Sometimes we need to sacrifice some advantage to get other claims. Recently, Baldi et al. proposed a novel scheme (BBCRS scheme for short) in which the public code is no longer permutation equivalent to the secret code and this distinctly increases the security level. In this paper, we propose a new construction of public key following the idea of BBCRS scheme. The improvement enhances the correction capability and results in a better protection of the secret code. We also discuss some known attacks in detail as in BBCRS scheme which shows that our new scheme is secure under the current means of attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 1994 Proceedings, 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
Mceliece, R.J.: A public-key cryptosystem based on algebraic. Coding Thv 4244, 114–116 (1978)
Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: 2006 IEEE International Symposium on Information Theory, pp. 1733–1737. IEEE, July 2006
Berger, T.P., Cayrel, P.L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: International Conference on Cryptology in Africa, pp. 77–97. Springer, Heidelberg, June 2009
Sendrier, N.: On the security of the McEliece public-key cryptosystem. In: Information, Coding and Mathematics, pp. 141–163. Springer, Boston (2002)
Gauthier, V., Otmani, A., Tillich, J.P.: A distinguisher-based attack on a variant of McEliece’s cryptosystem based on Reed-Solomon codes. arXiv preprint arXiv:1204.6459 (2012)
Loidreau, P.: A new rank metric codes based encryption scheme. In: International Workshop on Post-Quantum Cryptography, pp. 3–17. Springer, Cham, June 2017
Overbeck, R.: Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)
Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 157–174. Springer, Heidelberg, December 2001
Baldi, M., Bianchi, M., Chiaraluce, F.: Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems. In: 2013 IEEE International Conference on Communications Workshops (ICC), pp. 707–711. IEEE, June 2013
Shooshtari, M.K., Ahmadian-Attari, M., Johansson, T., Aref, M.R.: Cryptanalysis of McEliece cryptosystem variants based on quasicyclic low-density parity check codes. IET Inf. Secur. 10(4), 194–202 (2016)
Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.: MDPC-McEliece: new McEliece variants from moderate density paritycheck codes. In: Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pp. 2069–2073. IEEE, July 2013
Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Enhanced public key security for the McEliece cryptosystem. J. Cryptol. 29(1), 1–27 (2016)
Canteaut, A., Sendrier, N.: Cryptanalysis of the original McEliece cryptosystem. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 187–199. Springer, Heidelberg, October 1998
Acknowledgement
The work is supported in part by the National Key R&D Program of China under Grant No. 2017YFB0802302, the Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security) under Grant No. C18603, the NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization under Grant No. U1509219, the Shanghai Natural Science Foundation under Grant No. 17ZR1408400, the National Natural Science Foundation of China under Grant Nos. 61601129, 11701179, the Shanghai Science and Technology Commission Program under Grant No. 18511105700, and the Shanghai Sailing Program under Grant No. 17YF1404300.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, Y., Zeng, P., Chen, S. (2020). An Improved Code-Based Encryption Scheme with a New Construction of Public Key. In: Abawajy, J., Choo, KK., Islam, R., Xu, Z., Atiquzzaman, M. (eds) International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019. ATCI 2019. Advances in Intelligent Systems and Computing, vol 1017. Springer, Cham. https://doi.org/10.1007/978-3-030-25128-4_118
Download citation
DOI: https://doi.org/10.1007/978-3-030-25128-4_118
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25127-7
Online ISBN: 978-3-030-25128-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)