2011 IEEE Information Theory Workshop 2011
DOI: 10.1109/itw.2011.6089577
|View full text |Cite
|
Sign up to set email alerts
|

A new zero-knowledge code based identification scheme with reduced communication

Abstract: In this paper we present a new 5-pass identification scheme with asymptotic cheating probability 1 2 based on the syndrome decoding problem. Our protocol is related to the Stern identification scheme but has a reduced communication cost compared to previous code-based zeroknowledge schemes, moreover our scheme permits to obtain a very low size of public key and secret key. The contribution of this paper is twofold, first we propose a variation on the Stern authentication scheme which permits to decrease asympt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
58
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(58 citation statements)
references
References 6 publications
0
58
0
Order By: Relevance
“…where the Stern protocol is converted from Hamming to rank metric and the function Π P,Q (see Section 3 above) is introduced, and from [5], where the cheating probability of the Veron protocol is improved from 2/3 to 1/2 using the double circulant technique in the Hamming metric. In [5], the intermediate challenge is a random parallel left rotation. To better exploit the rank metric properties, and to make it more difficult to guess the challenge for an attacker, we instead consider a random linear combination of all possible parallel left rotations.…”
Section: Veron Double Circulant Identification Protocol In the Rank Mmentioning
confidence: 99%
See 1 more Smart Citation
“…where the Stern protocol is converted from Hamming to rank metric and the function Π P,Q (see Section 3 above) is introduced, and from [5], where the cheating probability of the Veron protocol is improved from 2/3 to 1/2 using the double circulant technique in the Hamming metric. In [5], the intermediate challenge is a random parallel left rotation. To better exploit the rank metric properties, and to make it more difficult to guess the challenge for an attacker, we instead consider a random linear combination of all possible parallel left rotations.…”
Section: Veron Double Circulant Identification Protocol In the Rank Mmentioning
confidence: 99%
“…2 into a signature scheme, to which we will refer to as Rank Veron Double Circulant (RVDC) Signature scheme, using a generalization of the Fiat-Shamir transform, introduced in [17]. The signature size of the scheme can be reduced by applying the commitment compression technique used in [5]. We will call the scheme resulting from this variation compressed Rank Veron Double Circulant (cRVDC) scheme.…”
Section: Veron Double Circulant Identification Protocol In the Rank Mmentioning
confidence: 99%
“…After generating codes and a key pair, identification marks to nodes are assigned using Algorithm 1. The approach of Aguilar and others of the double-circulant protocol (DCP) for zero-knowledge code-based identification with reduced communication is modified with an encryption/decryption process [43].…”
Section: Identification Marks To Nodes Using Compact Code Identificatmentioning
confidence: 99%
“…Fortunately, there are no quantum attacks known for code-based cryptosystems, which means these cryptosystems can possibly resist to a quantum computer. And code-based cryptosystems [2] are very fast and easy to implement compared to number theory based systems. The first code-based public key cryptographic system [3] was published by McEliece in 1978.…”
Section: Introductionmentioning
confidence: 99%
“…There has been a number of identification schemes proposed these years [2,[12][13][14][15]. In 1993, Stern [13] proposed the first zero-knowledge identification schemes based on hard problem from syndrome decoding.…”
Section: Introductionmentioning
confidence: 99%