scispace - formally typeset
Proceedings ArticleDOI

On unconditionally binding code-based commitment schemes

TLDR
This work constructs a dual version of statistically binding commitment scheme by Jain et al. (Asiacrypt 2012) with shorter commitment size under hardness of syndrome decoding, and observes that perfect binding requires exact knowledge of minimal distance of the underlying code.
Abstract
In this work, we construct a dual version of statistically binding commitment scheme by Jain et al. (Asiacrypt 2012) with shorter commitment size under hardness of syndrome decoding. Then, we point out that perfectly binding variants of the above schemes follow directly from the Randomized McEliece and Niederreiter public key encryption schemes, assuming indistinguishability of permuted Goppa codes, as well as hardness of the exact learning parity with noise (xLPN) problem (for the McEliece scheme) and hardness of syndrome decoding (for the Niederreiter scheme). Our key observation here is that perfect binding (as opposed to statistical binding) requires exact knowledge of minimal distance of the underlying code. Finally, we provide security evaluation of our proposals, and compare their performance with that of existing schemes.

read more

Citations
More filters
References
More filters
Book

Foundations of Cryptography: Basic Tools

TL;DR: This book presents a rigorous and systematic treatment of the foundational issues of cryptography: defining cryptographic tasks and solving new cryptographic problems using existing tools, focusing on the basic mathematical tools: computational difficulty, pseudorandomness and zero-knowledge proofs.
Book

Introduction to Coding Theory

TL;DR: In this article, the theoretical foundations of error-correcting codes are discussed, with an emphasis on Reed-Solomon codes and their derivative codes, including cyclic codes, MDS codes, graph codes and codes in the Lee metric.
Journal ArticleDOI

Semantic security for the McEliece cryptosystem without random oracles

TL;DR: It is formally proved that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and its dual, the Niederreiter) cryptosystems under the standard assumptions.
Book ChapterDOI

An efficient pseudo-random generator provably as secure as syndrome decoding

TL;DR: A simple and efficient construction of a pseudo-random generator based on the intractability of an NP-complete problem from the area of error-correcting codes that generates a linear amount of bits in only quadratic computing time is shown.
Related Papers (5)