4.4 Article

Code-based signatures from new proofs of knowledge for the syndrome decoding problem

期刊

DESIGNS CODES AND CRYPTOGRAPHY
卷 91, 期 2, 页码 497-544

出版社

SPRINGER
DOI: 10.1007/s10623-022-01114-3

关键词

Code-based cryptography; Signature; Proof of knowledge

向作者/读者索取更多资源

This paper studies code-based signatures constructed from Proofs of Knowledge. It traces back to Stern's efficient PoK for the syndrome decoding problem in 1993. Different variations have been proposed to reduce the signature's size. The length of the signature depends on the underlying protocol, possible optimizations, and implementation cost. The paper proposes three new schemes with different trade-offs and provides extensive comparisons with previous schemes.
In this paper, we study code-based signatures constructed from Proofs of Knowledge (PoK). This line of work can be traced back to Stern who introduced the first efficient PoK for the syndrome decoding problem in 1993 (Stern in A new identification scheme based on syndrome decoding. In: International cryptology conference (CRYPTO), 1993). Afterwards, different variations were proposed in order to reduce signature's size. In practice, obtaining a smaller signature size relies on the interaction of two main considerations: (i) the underlying protocol and its soundness error and (ii) the types of optimizations which are compatible with a given protocol. In particular, optimizations related to the possibility of using random seeds instead of long vectors have a great impact on the final signature length. Over the years, different variations were proposed to improve the Stern scheme such as the Veron scheme (with public key as a noisy codeword rather than a syndrome) (Veron in Appl Algebra Eng Commun Comput 8(1):57-69, 1997), the AGS scheme which is a 5-pass protocol with soundness error asymptotically equal to 1/2 (Aguilar et al. in A new zero-knowledge code based identification scheme with reduced communication. In: IEEE information theory workshop, 2011) and more recently the FJR approach which permits to decrease the soundness probability to 1/N but induces a performance overhead (Feneuil et al. in Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. Cryptology ePrint archive, report 2021/1576, 2021). Overall the length of the signature depends on a trade-off between: the scheme in itself, the possible optimizations and the cost of the implementation. For instance, depending on the application one may prefer a 30% shorter signature at the cost of a ten times slower implementation rather than a longer signature but a faster implementation. The recent approaches which increase the cost of the implementation open the door to many different types of trade-offs. In this paper we propose three new schemes and different trade-offs, which are all interesting in themselves, since depending on potential future optimizations a scheme may eventually become more efficient than another. All the schemes we propose use a trusted helper: the first scheme permits to get a soundness error of 1/2, the second scheme permits to decrease the soundness error to 1/N but with a different approach than the recent FJR scheme and at last the third scheme proposes a Veron-like adaptation of the FJR scheme in which the public key is a noisy codeword rather than a syndrome. We provide extensive comparison which lists various trade-offs between our schemes and previous ones. The table highlights the benefits of our constructions for certain types of trade-offs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

A hybrid approach to vector-based homomorphic tallying remote voting

Victor Mateu, Josep M. Miret, Francesc Sebe

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2016)

Article Computer Science, Hardware & Architecture

Constructing credential-based E-voting systems from offline E-coin protocols

Victor Mateu, Francesc Sebe, Magda Valls

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Chemistry, Analytical

Simulation Analysis and Comparison of New Hybrid TLI-μTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions

Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, Yousof Al-Hammadi

Summary: The evolution of 5G and 6G networks has enhanced the capabilities of IoT devices, but current authentication protocols lack the ability to achieve immediate and continuous authentication, scalability, and cybersecurity. This paper proposes a new hybrid protocol called Hybrid TLI-mu TESLA, which combines the advantages of previous protocols and solves various authentication problems. Simulation analysis and comparisons demonstrate the superiority of the proposed protocol in terms of authentication, scalability, cybersecurity, and compatibility with 5G and 6G IoT generations.

SENSORS (2022)

Article Computer Science, Information Systems

Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices

Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, Yousof Al-Hammadi

Summary: This paper presents a novel continuous and low-overhead broadcast authentication protocol, enhanced Inf-TESLA, which outperforms the original TESLA protocol in terms of time complexity and critical authentication processes.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications

Sanjay Deshpande, Santos Merino del Pozo, Victor Mateu, Marc Manzano, Najwa Aaraj, Jakub Szefer

Summary: This paper presents the first FPGA-based hardware design for computing the multiplicative inverse using a fast constant-time GCD algorithm. The proposed designs are compact, parameterizable, and outperform existing software and hardware implementations, making them more appealing for designing new cryptosystems.

2021 31ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2021) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Advances and Challenges of Rank Metric Cryptography Implementations

Emanuele Bellini, Florian Caullery, Rusydi Makarim, Marc Manzano, Chiara Marcolla, Victor Mateu

2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019) (2019)

Proceedings Paper Computer Science, Information Systems

Improved Veron Identification and Signature Schemes in the Rank Metric

Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Victor Mateu

2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2019)

Proceedings Paper Computer Science, Information Systems

Cast as Intended Verifiability for Mixed Array Ballots

Victor Mateu, Magda Valls

ELECTRONIC GOVERNMENT AND THE INFORMATION SYSTEMS PERSPECTIVE (EGOVIS 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Blind certificates for secure electronic voting

Victor Mateu, Francesc Sebe, Magda Valls

PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (2013)

暂无数据