Secure and Fast Digital Signatures using BCH Codes
نویسندگان
چکیده
Since the introduction of public key cryptography in the 70’s [1], many cryptosystems have been proposed and many cryptographic schemes have been broken. The most used cryptosystems rely on number theory problem like the factorization problem [3] and the discrete logarithm over suitable group [2]. The McEliece cryptosystem [5] and the Neiderreiter variante [6] rely on coding theory, they are ones of the few cryptosystems, which are very secure and which are not broken although they do not rely on number theory. These cryptosystems present many advantages: they are very fast for both encryption and decryption and the best attacks complexity are exponential in the length of the code. These cryptosystems have the drawback to have a large public key which is a generator matrix or a check parity matrix of a long code. Another drawback related to the belief that we can not deduce a digital signature from these public key cryptosystems. In 2001, Courtois, Finiasz and Sendrier [15] introduced the first signature scheme based on McEliece cryptosystem. Firstly, they have presented a scheme based on McEliece cryptosystem using generator matrix. With the proposed secure parameters, this scheme is impractical. Secondly, they have introduced a short practical signature based on the Neiderreiter variant using the parity check matrix as key. This scheme has the drawback to have a slow signature algorithm. In this paper, we introduce new performant digital signature schemes based on coding theory similar to those based on McEliece and Niederreiter cryptosystems. The idea of our schemes consists in considering a chained BCH code. The resulting code will be a secret code which will be scrambled and permuted to obtain the public code.
منابع مشابه
Separating and Intersecting Properties of BCH and Kasami Codes
Separating codes have recently been applied in the construction of collusion secure fingerprinting schemes. They are related to other combinatorial concepts like intersecting codes, superimposed codes, hashing families, and group testing. In this paper we study some good, binary asymptotic constructions of such codes.
متن کاملA Method to determine Partial Weight Enumerator for Linear Block Codes
In this paper we present a fast and efficient method to find partial weight enumerator (PWE) for binary linear block codes by using the error impulse technique and Monte Carlo method. This PWE can be used to compute an upper bound of the error probability for the soft decision maximum likelihood decoder (MLD). As application of this method we give partial weight enumerators and analytical perfo...
متن کاملGeneral Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures"
Strong notions of security for unconditionally secure digital signature schemes (USDS) were recently proposed where security is defined based on notions of security in computationally–secure digital signatures. The traditional area of unconditionally secure authentication, however, is that of “authentication codes” (A–codes). Relations between primitives is central to cryptographic research. To...
متن کاملError Correcting Code Bch
VLSI Architectures for Modern Error-Correcting Codes CRC Press Book. Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) codes, and binary. An important class of multipleerror-correcting linear cyclic codes is the class of BCH codes. In fact, BCH code is a generalization of the cyclic Hamming codes. Error correction codes (ECCs) are deployed in digital communication systems to tion 4 recalls...
متن کاملConstruction of digital nets from BCH-codes
We establish a link between the theory of error-correcting codes and the theory of (t, m, s)-nets. This leads to the fundamental problem of net embeddings of linear codes. Our main result is the construction of four infinite families of digital (t, m, s)-nets based on BCH-codes.
متن کامل