Efficient Digital Signatures From Coding Theory
نویسنده
چکیده
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following a framework introduced by Lyubashevsky to construct a digital signature scheme from an identification scheme. The scheme is based on quasi-cyclic codes and, while security relies on the ring algebra that is associated with them, the proposal benefits from the quasi-cyclic structure in reducing key and signature sizes.
منابع مشابه
A new signature scheme based on $(U|U+V)$ codes
We present here a new code-based digital signature scheme. This scheme uses (U |U + V ) codes, where both U and V are random. We prove that the scheme achieves existential unforgeability under adaptive chosen message attacks under two assumptions from coding theory, both strongly related to the hardness of decoding in a random linear code. The proof imposes a uniform distribution on the produce...
متن کاملHow to Achieve a McEliece-Based Digital Signature Scheme
McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. It is widely believed that code-based cryptosystems like McEliece do not allow practical digital signatures. In the present paper we disprove this belief and show a way to build a practical signature scheme based on coding theor...
متن کاملA provably secure code-based concurrent signature scheme
Concurrent signatures allow two entities to generate two signatures in such a way that both signatures are ambiguous till some information is revealed by one of the parties. This kind of signature is useful in auction protocols and a wide range of scenarios in which involving participants are mutually distrustful. In this paper, to have quantum-attack-resistant concurrent signatures as recommen...
متن کاملA Provably Secure Short Signature Scheme from Coding Theory
Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are useful where bandwidth is one of the crucial concern and especially in case of signing short messages in applications such as time stamping, certified email services and identitybased cryptosystems. In this paper, to have quantum-attackresistant short signature...
متن کاملHomomorphic signatures for Network Coding
Network coding allows intermediate nodes to mix data in order to achieve higher throughput and better reliability. Hence, nodes combine multiple packets into a single packet before forwarding it. Such scheme needs efficient authentication and integrity mechanisms in order to prevent pollution attacks whereby an attacker injects bogus messages into the system instead of network coded blocks. Suc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017