Proceedings ArticleDOI
On unconditionally binding code-based commitment schemes
Kirill Morozov,Partha Sarathi Roy,Kouichi Sakurai +2 more
- pp 101
TLDR
This work constructs a dual version of statistically binding commitment scheme by Jain et al. (Asiacrypt 2012) with shorter commitment size under hardness of syndrome decoding, and observes that perfect binding requires exact knowledge of minimal distance of the underlying code.Abstract:
In this work, we construct a dual version of statistically binding commitment scheme by Jain et al. (Asiacrypt 2012) with shorter commitment size under hardness of syndrome decoding. Then, we point out that perfectly binding variants of the above schemes follow directly from the Randomized McEliece and Niederreiter public key encryption schemes, assuming indistinguishability of permuted Goppa codes, as well as hardness of the exact learning parity with noise (xLPN) problem (for the McEliece scheme) and hardness of syndrome decoding (for the Niederreiter scheme). Our key observation here is that perfect binding (as opposed to statistical binding) requires exact knowledge of minimal distance of the underlying code. Finally, we provide security evaluation of our proposals, and compare their performance with that of existing schemes.read more
Citations
More filters
Book ChapterDOI
On IND-CCA1 Security of Randomized McEliece Encryption in the Standard Model.
TL;DR: A modification of Nojima et al.
References
More filters
Book
Foundations of Cryptography: Basic Tools
TL;DR: This book presents a rigorous and systematic treatment of the foundational issues of cryptography: defining cryptographic tasks and solving new cryptographic problems using existing tools, focusing on the basic mathematical tools: computational difficulty, pseudorandomness and zero-knowledge proofs.
Book
Introduction to Coding Theory
TL;DR: In this article, the theoretical foundations of error-correcting codes are discussed, with an emphasis on Reed-Solomon codes and their derivative codes, including cyclic codes, MDS codes, graph codes and codes in the Lee metric.
Journal ArticleDOI
Semantic security for the McEliece cryptosystem without random oracles
TL;DR: It is formally proved that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and its dual, the Niederreiter) cryptosystems under the standard assumptions.
Book ChapterDOI
An efficient pseudo-random generator provably as secure as syndrome decoding
TL;DR: A simple and efficient construction of a pseudo-random generator based on the intractability of an NP-complete problem from the area of error-correcting codes that generates a linear amount of bits in only quadratic computing time is shown.
Related Papers (5)
Post-quantum cryptography : third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 ; proceedings
PQCrypto,Nicolas Sendrier +1 more