2010
DOI: 10.1007/978-3-642-13577-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Post-quantum Cryptography: Code-Based Signatures

Abstract: This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 39 publications
0
11
0
Order By: Relevance
“…Yet we are unaware of any efficient ZK protocol that simultaneously deals with both code-based signature and encryption schemes in the above sense. Designing provably secure group signature schemes has been a long-standing open question in code-based cryptography, as was also discussed in [37].…”
mentioning
confidence: 99%
“…Yet we are unaware of any efficient ZK protocol that simultaneously deals with both code-based signature and encryption schemes in the above sense. Designing provably secure group signature schemes has been a long-standing open question in code-based cryptography, as was also discussed in [37].…”
mentioning
confidence: 99%
“…In the CFS scheme, signatures are generated using various operations like hashing, syndrome generation, multiplication in field, error pattern analysis, and counter value measurements. In this scheme, attacks are also observed [2]. For example, generalized birthday attack.…”
Section: Code-based Signature Schemesmentioning
confidence: 94%
“…Because no polynomial-time methods exist for these three implausible issues, the security of these cryptosystems is highly reliant on them. However, if a real quantum computer is available, non-exponential time quantum algorithms for ECDLP, IFP [2], and DLP exist. Mostly all existing quantum computing-based attacks on public-key cryptosystems are covered in Quantum Attacks on Public-Key Cryptosystems, with a focus on quantum algorithms for ECDLP, IFP, and DLP.…”
Section: A Quantum Attacks On Ifp-based Cryptosystemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Mainstream post-quantum cryptosystems can be categorized into several broad families: lattice-based systems [17,25] and learning with errors [26], code-based systems [2,7,24], hash-based signatures [6,11], and systems based on multivariate polynomials [3,34]. Isogeny-based cryptosystems represent an interesting alternative to the above because they are based on a (relatively) naturally occurring number-theoretic computational problem, namely, the problem of computing isogenies between elliptic curves.…”
Section: Related Workmentioning
confidence: 99%