On the Security of Subspace Subcodes of Reed–Solomon Codes for Public Key Encryption
نویسندگان
چکیده
This article discusses the security of McEliece-like encryption schemes using subspace subcodes Reed–Solomon codes, i.e. codes over ${\mathbb {F}_{q^{m}}}$ whose entries lie in a fixed collection {F}_{q}}$ –subspaces . These appear to be natural generalisation Goppa and alternant provide broader flexibility designing code based schemes. For analysis, we introduce new operation on called xmlns:xlink="http://www.w3.org/1999/xlink">twisted product which yields polynomial time distinguisher such as soon chosen have dimension larger than notation="LaTeX">$m/2$ From this distinguisher, build an efficient attack particular breaks some parameters recent proposal due Khathuria, Rosenthal Weger.
منابع مشابه
the impact of e-readiness on ec success in public sector in iran the impact of e-readiness on ec success in public sector in iran
acknowledge the importance of e-commerce to their countries and to survival of their businesses and in creating and encouraging an atmosphere for the wide adoption and success of e-commerce in the long term. the investment for implementing e-commerce in the public sector is one of the areas which is focused in government‘s action plan for cross-disciplinary it development and e-readiness in go...
Subspace Subcodes of Reed-Solomon Codes
space subcode of a Reed-Solomon (SSRS) code Over GF(2"') is the set of RS codewords, whose components all lie in a particular GF(2)subspace of GF(2"). SSRS codes include both generalized B C H codes and "trace-shortened" Rs codes [2][3] as special casea. In this paper we present an explicit formula for t h e dimension of an arbitrary RS subspace subcode. Using this formula, we And that in many ...
متن کاملOn the Security Notions for Public-Key Encryption Schemes
In this paper, we revisit the security notions for public-key encryption, and namely indistinguishability. We indeed achieve the surprising result that no decryption query before receiving the challenge ciphertext can be replaced by queries (whatever the number is) after having received the challenge, and vice-versa. This remark leads to a stricter and more complex hierarchy for security notion...
متن کاملOn the Security of Williams Based Public Key Encryption Scheme
In 1984, H.C. Williams introduced a public key cryptosystem whose security is as intractable as factorization. Motivated by some strong and interesting cryptographic properties of the intrinsic structure of this scheme, we present a practical modification thereof that has very strong security properties. We establish, and prove, a generalization of the “sole-samplability” paradigm of Zheng-Sebe...
متن کاملOn the Security of a Certificateless Public-Key Encryption
Certificateless public-key cryptosystem is a recently proposed attractive paradigm using public key cryptosystem, which avoids the key escrow inherent in identity-based public-key cryptosystems, and does not need certificates to generate trust in public keys. Recently, Al-Riyami and Paterson proposed a new certificateless public-key encryption scheme [2, 3] and proved its security in the random...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2022
ISSN: ['0018-9448', '1557-9654']
DOI: https://doi.org/10.1109/tit.2021.3120440