期刊文献+

基于QC-LDPC码的双公钥Niederreiter密码方案 被引量:6

New QC-LDPC codes based Niederreiter cryptography scheme by using dual public-key
在线阅读 下载PDF
导出
摘要 基于编码的公钥密码体制作为抗量子攻击密码理论的重要研究内容,具有加/解密复杂性低和安全性高的优异特性。针对Niederreiter公钥密码体制进行了研究,利用QC-LDPC码和双公钥的相关知识构造了一种新的Niederreiter加密方案。安全性分析表明,加密方案能抵抗常见攻击方法的同时满足随机预言机模型下的IND-CCA2安全。最后对方案的性能进行分析,较原有Niederreiter密码的公钥量减少63%和信息率提高47%的结论。 As an important research ofpost-quantum cryptography, code-based cryptography had excellent characteristics of low complexity and high security. With the code-based cryptosystem as the core knowledge ,we constructed a new QC-LDPC codes based Niederreiter cryptography scheme by using dual public-key. And the safety analysis shows that the new scheme not only resists the common method of attack, but also meets the IND-CCA2 security. The analysis of performance of the scheme is also given. We can get the conclusions that public key sizes reduce by 63% and the information rate increase by 47%.
作者 李冲 韩益亮
出处 《计算机应用研究》 CSCD 北大核心 2016年第11期3446-3449,3454,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61572521) 陕西省自然科学基础研究计划项目(2015JM6353)
关键词 抗量子攻击密码 QC-LDPC码 双公钥 可证明安全 post-quantum cryptography QC-LDPC codes dual public-key provable security
  • 相关文献

参考文献15

  • 1Shor P W. Polynomial-time algorithms for prime factorization and dis- crete logarithms on a quantum computer[ J ]. SIAM Journal on Com- puting, 1997,26 ( 5 ) : 1484-1509.
  • 2Overbeek R, Sendrier N. Code-based cryptography [ M ]//Post-quan- tum cryptography. Berlin : Springer,2009:95-145.
  • 3Misoczki R, Tillich J P, Sendrier N, et al. MDPC-McEliece : new McE- lieee variants from moderate density parity-check codes [ C ]//Proc of IEEE International Symposium on Information Theory Proceedings. [ S. 1. ] :IEEE Press,2013:2069-2073.
  • 4Niebuhr R, Meziani M, Bulygin S, et al. Selecting parameters for se- cure McEliece-based cryptosystems [ J]. International Journal of In- formation Security ,2012,11 ( 3 ) : 137-147.
  • 5张颖,岳殿武.基于代数几何码的公钥密码体制[J].通信学报,2008,29(6):75-81. 被引量:9
  • 6Mceliece R J. A public-key cryptosystem based on algebraic coding theory [ J ]. DSN Progress Report, 1978,42 (44) : 114-116.
  • 7Niederreiter H. K knapsack-type cryptosystems and algebraic coding theory [ J]. Problems of Control and Information Theory, 1986, 15(2) :159-166.
  • 8Baldi M, Chiaralucc F, Garello R, et al. Quasi-cyclic low-density pari- ty-check codes in the McEliece cryptosystem [ C ]//Proc of ICC. 2007:951-956.
  • 9Baldi M, Bianchi M, Chiaraluce F. Security and complexity of theMcEliece cryptosystem based on quasi-cyclic |ow-density parity-check codes [ J ]. lET Information Security ,2013,7 ( 3 ) :212-220.
  • 10章孝德,许春根.基于最大秩距离码的Niederreiter公钥密码体制的改进[J].武汉大学学报(理学版),2013,59(5):477-480. 被引量:2

二级参考文献36

  • 1李元兴,王新梅.关于Niederreiter代数码公钥密码体制的安全性及参数优化[J].电子学报,1993,21(7):33-36. 被引量:11
  • 2任剑,王新梅,肖国镇.基于矩阵分解的代数几何码的译码[J].通信学报,1996,17(2):27-38. 被引量:2
  • 3Berlekamp E R,McEliece R J,Van Tilborg H C A.On the inherent intractability of certain coding problems[J].IEEE Transactions on Information Theory,1978,24(3):384-386.
  • 4McElience R J.A public-key cryptosystem based on algebraic coding theory[R].USA:Jet Propulsion Lab,1978.
  • 5Niederreiter H.Knapsack-type crypto-systems and algebraic coding theory[J].Problems of Control and Information Theory,1986,15(2):159-166.
  • 6Shigenori Yamakawa,Yang Cui,Kazukuni Kobara,et al.On the key-privacy issue of mceliece public-key encryption[J].Lecture Notes in Computer Science,2007(4851):168-177.
  • 7Yuan Xing Li,Den R H,Xin Mei Wang.On the equivalence of McEliece's and Niederreiter's public-key cryptosystems[J].IEEE Transactions on Information Theory,1994,40(1):271-273.
  • 8Christian Wieschebrink.Cryptanalysis of the Niederreiter public key scheme based on grs subcodes[J].Public Key Cryptography,Lecture Notes in Computer Science,2010(6061):61-72.
  • 9Christian Wieschebrink.An attack on a modified Niederreiter encryption scheme.public key cryptography[J].Lecture Notes in Computer Science,2006(3958):14-26.
  • 10Nicolas Sendrier.Niederreiter encryption scheme[A].Encyclopedia of Cryptography and Security[C].New York:Springer-Verlag Press,2005:413-414.

共引文献17

同被引文献40

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部