TY - GEN
T1 - An Improved Code-Based Encryption Scheme with a New Construction of Public Key
AU - Zhou, Yuzhuang
AU - Zeng, Peng
AU - Chen, Siyuan
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - There are substantial variants of McEliece cryptosystem from coding theory. In general, these attempts always utilize two basic ways to enhance performance of the original cryptosystem: reducing the public key size and improving the efficiency and ability of decoding algorithms. Meanwhile, security level is the goal that has always been pursued. Sometimes we need to sacrifice some advantage to get other claims. Recently, Baldi et al. proposed a novel scheme (BBCRS scheme for short) in which the public code is no longer permutation equivalent to the secret code and this distinctly increases the security level. In this paper, we propose a new construction of public key following the idea of BBCRS scheme. The improvement enhances the correction capability and results in a better protection of the secret code. We also discuss some known attacks in detail as in BBCRS scheme which shows that our new scheme is secure under the current means of attack.
AB - There are substantial variants of McEliece cryptosystem from coding theory. In general, these attempts always utilize two basic ways to enhance performance of the original cryptosystem: reducing the public key size and improving the efficiency and ability of decoding algorithms. Meanwhile, security level is the goal that has always been pursued. Sometimes we need to sacrifice some advantage to get other claims. Recently, Baldi et al. proposed a novel scheme (BBCRS scheme for short) in which the public code is no longer permutation equivalent to the secret code and this distinctly increases the security level. In this paper, we propose a new construction of public key following the idea of BBCRS scheme. The improvement enhances the correction capability and results in a better protection of the secret code. We also discuss some known attacks in detail as in BBCRS scheme which shows that our new scheme is secure under the current means of attack.
KW - Code-based cryptography
KW - McEliece cryptosystem
KW - Post-quantum cryptography
KW - Public key encryption
UR - https://www.scopus.com/pages/publications/85070695798
U2 - 10.1007/978-3-030-25128-4_118
DO - 10.1007/978-3-030-25128-4_118
M3 - 会议稿件
AN - SCOPUS:85070695798
SN - 9783030251277
T3 - Advances in Intelligent Systems and Computing
SP - 959
EP - 968
BT - International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 - Applications and Techniques in Cyber Intelligence
A2 - Abawajy, Jemal H.
A2 - Choo, Kim-Kwang Raymond
A2 - Islam, Rafiqul
A2 - Xu, Zheng
A2 - Atiquzzaman, Mohammed
PB - Springer Verlag
T2 - International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2019
Y2 - 22 June 2019 through 24 June 2019
ER -