2006
DOI: 10.1007/11779360_24
|View full text |Cite
|
Sign up to set email alerts
|

A New Public-Key Cryptosystem Based on the Problem of Reconstructing p–Polynomials

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
68
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(68 citation statements)
references
References 9 publications
0
68
0
Order By: Relevance
“…Our attack assumes that parameters are chosen so that w u u+1 (n − k) which was always the case in [FL05,Loi07]. We have also seen that taking w > u u+1 (n − k) implies to choose t pub < 1 2 n−k u+1 which exposes further the system to general decoding attacks like [GRS16].…”
Section: Resultsmentioning
confidence: 95%
See 2 more Smart Citations
“…Our attack assumes that parameters are chosen so that w u u+1 (n − k) which was always the case in [FL05,Loi07]. We have also seen that taking w > u u+1 (n − k) implies to choose t pub < 1 2 n−k u+1 which exposes further the system to general decoding attacks like [GRS16].…”
Section: Resultsmentioning
confidence: 95%
“…However the schemes have undergone polynomialtime attacks in [Cor03,Cor04,KY04]. The authors in [FL05] proposed an analog of Augot-Finiasz scheme but in the rank-metric context. The security of [FL05] is related to the difficulty of solving p-polynomial reconstruction corresponding actually to the decoding problem of a Gabidulin code beyond its error-correcting capability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The security of the public-key cryptosystem from [2] relied on the hardness of ML decoding of RS codes but was broken by a structural attack. More recently, some public-key cryptosystems based their security partly upon the difficulty of solving the problem Dec-Gab (Decisional-Gabidulin defined in the following) and Search-Gab (Search-Gabidulin), i.e., decoding Gabidulin codes beyond the unique decoding radius or derived instances of this problem [8,19,33].…”
Section: Introductionmentioning
confidence: 99%
“…Until now the main tool for rank based cryptography was based on masking Gabidulin codes [17] in different ways and using the McEliece (or Niederreiter) setting with these codes. Most cryptosystems based on this idea were broken by using structural attacks which exploit the particular structure of Gabidulin codes ([39], [14], [8], [28], [16]). A similar situation exists in the Hamming case for which all cryptosystems based on Reed-Solomon codes have been broken for a similar reason: Reed-Solomon codes are so structured that they are difficult to mask and there is always structural information leaking.Since the introduction of code-based cryptography by McEliece in 1978, the different cryptosystems proposed in the Hamming distance setting were based on masking a special family of decodable codes, like Goppa, Reed-Muller of Reed-Solomon codes.…”
mentioning
confidence: 99%