Code-based Ring Signature Scheme
نویسندگان
چکیده
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosystems like McEliece do not allow practical digital signatures. Although X.M. Wang presented a code-based signature scheme in 1990, some authors find that it is not secure. Recently, T.Courtois et al. show a new way to build a practical signature scheme based on coding theory (simply, Courtois et al.s scheme). The security is reduced to the well-known syndrome decoding problem and the distinguishability of permuted binary Goppa codes from a random code. This shows that error correct codes can be used to construct some other cryptosystems. In this paper, we present, for the first time, a code-based ring signature scheme with signature length of 144+ 126l bits (l is the number of ring members), which is one of the most short ring signature among all the presented ring signature schemes up to now.
منابع مشابه
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes
The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently proposed by Cayrel et al. in [14]. Our proposed scheme benefits of a performance gain as a result of the reductio...
متن کاملan Efficient Blind Signature Scheme based on Error Correcting Codes
Cryptography based on the theory of error correcting codes and lattices has received a wide attention in the last years. Shor’s algorithm showed that in a world where quantum computers are assumed to exist, number theoretic cryptosystems are insecure. Therefore, it is important to design suitable, provably secure post-quantum signature schemes. Code-based public key cryptography has the charact...
متن کاملDual Construction of Stern-based Signature Scheme
In this paper, we propose a dual version of the first threshold ring signature scheme based on error-correcting code proposed by Aguilar et. al in [1]. Our scheme uses an improvement of Véron zero-knowledge identification scheme, which provide smaller public and private key sizes and better computation complexity than the Stern one. This scheme is secure in the random oracle model. Keywords—Ste...
متن کاملAn Efficient (n − t)-out-of-n Threshold Ring Signature Scheme
In this paper, we propose an efficient (n − t)-out-of-n threshold ring signature scheme which is efficient when t is small compared with n. Our scheme has a kind of dual structure of the Bresson– Stern–Szydlo threshold ring signature scheme [2], which is infeasible when t is small compared with n. In particular, we modify the trap-door one-way permutations in the ring signature scheme, and use ...
متن کاملEfficient Digital Signatures From Coding Theory
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following a framework introduced by Lyubashevsky to construct a digital signature scheme from an identification scheme. The scheme is based on quasi-cyclic codes and, while security relies on the ring algebra that is associated with them, the prop...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 5 شماره
صفحات -
تاریخ انتشار 2007