Filters








6 Hits in 1.3 sec

Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE Scheme [chapter]

Thomas Debris-Alazard, Jean-Pierre Tillich
2018 Lecture Notes in Computer Science  
RankSign [29] is a code-based signature scheme proposed to the NIST competition for quantum-safe cryptography [5] and, moreover, is a fundamental building block of a new Identity-Based-Encryption (IBE)  ...  Finally, we have also shown that if one replaces the rank metric in the [25] IBE scheme by the Hamming metric, then a devastating attack can be found.  ...  A code-based signature scheme whose security relies on decoding codes with respect to the rank metric has been proposed there. It is called RankSign.  ... 
doi:10.1007/978-3-030-03326-2_3 fatcat:zh2tgmo7ivhkto3omjcmkulfke

Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme [article]

Thomas Debris-Alazard, Jean-Pierre Tillich
2018 arXiv   pre-print
RankSign [GRSZ14a] is a code-based signature scheme proposed to the NIST competition for quantum-safe cryptography [AGHRZ17] and, moreover, is a fundamental building block of a new Identity-Based-Encryption  ...  Finally, we have also shown that if one replaces the rank metric in the [GHPT17a] IBE scheme by the Hamming metric, then a devastating attack can be found.  ...  A code-based signature scheme whose security relies on decoding codes with respect to the rank metric has been proposed there. It is called RankSign.  ... 
arXiv:1804.02556v2 fatcat:bypwdkfv5zhizgigg7lir574fq

Revocable Identity-Based Encryption from Codes with Rank Metric [chapter]

Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
2018 Lecture Notes in Computer Science  
Recently, in Crypto 2017, Gaborit et al. proposed a first identity-based encryption scheme from codes with rank metric, called RankIBE.  ...  To extract the decryption key from any public identity, they constructed a trapdoor function which relies on RankSign, a signature scheme proposed by Gaborit et al. in PQCrypto 2014.  ...  In particular, our proposed revocable identity-based encryption scheme relies on hard problems from codes with rank metric. Code-based Cryptography.  ... 
doi:10.1007/978-3-319-76953-0_23 fatcat:feppnvzs4vh2dixqswhwlggcqa

Improved Veron Identification and Signature Schemes in the Rank Metric [article]

Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Victor Mateu
2019 arXiv   pre-print
We present a signature scheme based on double circulant codes in the rank metric, derived from an identification protocol with cheating probability of 2/3.  ...  We provide a security proof in the Random Oracle Model, implementation performances, and a comparison with the parameters of the most important code-based signature schemes.  ...  .: RankSign: an efficient signature algorithm based on the rank metric. In: International Workshop on Post-Quantum Cryptography. pp. 88-107 (2014) 23.  ... 
arXiv:1903.10212v2 fatcat:yd4ymcfcrjd6xcyu74nazco4sm

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan
2021 Cryptography  
Some potential research directions that are yet to be explored in code-based cryptography research from the perspective of codes is a key contribution of this paper.  ...  arithmetic ciphers could be solved in polynomial time.  ...  A comparison of the latter three signature schemes is provided in Table 6 [89] . In addition to these works, a signature scheme with the name RankSign in the rank metric setting was proposed [90] .  ... 
doi:10.3390/cryptography5040038 fatcat:wkb43zunwjagbnljc6brfou4ty

Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes [article]

Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2019 arXiv   pre-print
We present here a new family of trapdoor one-way Preimage Sampleable Functions (PSF) based on codes, the Wave-PSF family.  ...  We instantiate the new Wave-PSF family with ternary generalized (U,U+V)-codes to design a "hash-and-sign" signature scheme which achieves existential unforgeability under adaptive chosen message attacks  ...  Other signature schemes based on codes were also given in the literature such as for instance the KKS scheme [KKS97, KKS05] , its variants [BMS11, GS12] or the RaCoSS proposal [FRX + 17] to the NIST  ... 
arXiv:1810.07554v2 fatcat:7cxwckxrergffcwcccx22odc7q