Efficient Digital Signatures From Coding Theory

نویسنده

  • Edoardo Persichetti
چکیده

The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following a framework introduced by Lyubashevsky to construct a digital signature scheme from an identification scheme. The scheme is based on quasi-cyclic codes and, while security relies on the ring algebra that is associated with them, the proposal benefits from the quasi-cyclic structure in reducing key and signature sizes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new signature scheme based on $(U|U+V)$ codes

We present here a new code-based digital signature scheme. This scheme uses (U |U + V ) codes, where both U and V are random. We prove that the scheme achieves existential unforgeability under adaptive chosen message attacks under two assumptions from coding theory, both strongly related to the hardness of decoding in a random linear code. The proof imposes a uniform distribution on the produce...

متن کامل

How to Achieve a McEliece-Based Digital Signature Scheme

McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. It is widely believed that code-based cryptosystems like McEliece do not allow practical digital signatures. In the present paper we disprove this belief and show a way to build a practical signature scheme based on coding theor...

متن کامل

A provably secure code-based concurrent signature scheme

Concurrent signatures allow two entities to generate two signatures in such a way that both signatures are ambiguous till some information is revealed by one of the parties. This kind of signature is useful in auction protocols and a wide range of scenarios in which involving participants are mutually distrustful. In this paper, to have quantum-attack-resistant concurrent signatures as recommen...

متن کامل

A Provably Secure Short Signature Scheme from Coding Theory

Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are useful where bandwidth is one of the crucial concern and especially in case of signing short messages in applications such as time stamping, certified email services and identitybased cryptosystems. In this paper, to have quantum-attackresistant short signature...

متن کامل

Homomorphic signatures for Network Coding

Network coding allows intermediate nodes to mix data in order to achieve higher throughput and better reliability. Hence, nodes combine multiple packets into a single packet before forwarding it. Such scheme needs efficient authentication and integrity mechanisms in order to prevent pollution attacks whereby an attacker injects bogus messages into the system instead of network coded blocks. Suc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017