Filters








131,182 Hits in 4.6 sec

Improved identification schemes based on error-correcting codes

Pascal Véron
1997 Applicable Algebra in Engineering, Communication and Computing  
The security of the proposed scheme depends on an NPcomplete problem from the theory of error correcting codes: the syndrome decoding problem which relies on the hardness of decoding a binary word of given  ...  As it is often the case in public-key cryptography, the first practical identification schemes were based on hard problems from number theory (factoring, discrete logarithms).  ...  Among all these schemes, three of them [9, 12, 18] rely on an NP-complete problem from error correcting codes: the one of Syndrome Decoding ("SD" problem [3] ).  ... 
doi:10.1007/s002000050053 fatcat:jfebsh3ubja3df6dzegn37xtvu

An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes [chapter]

Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhrad Hoffmann, Pascal Véron
2012 Lecture Notes in Computer Science  
@3.00GHz Improved threshold ring signature scheme Conclusion and future work Conclusion and future work We presented a secure threshold ring signature scheme based on error-correcting codes with shorter  ...  The first code-based threshold ring signature was proposed by Aguilar et al. in 2008, it is based on the Stern's identification scheme.  ... 
doi:10.1007/978-3-642-31662-3_4 fatcat:nsw3pjn3hfb23fv3q5hy3w44f4

Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes [chapter]

Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Meziani Mohammed
2011 Communications in Computer and Information Science  
In this paper, we present an improved version of an identity-based identification scheme based on error-correcting codes.  ...  Our scheme combines the Courtois-Finiasz-Sendrier signature scheme using quasi-dyadic codes (QD-CFS) proposed in [2] and the identification scheme by Stern [18] .  ...  Description of the Stern identification scheme At CRYPTO'93, Stern proposed the first identification scheme based on error-correcting codes [18] .  ... 
doi:10.1007/978-3-642-23141-4_14 fatcat:3fgn5cpnxfeitl7qprh42muega

A Survey on Secrete Communication through QR Code Steganography for Military Application

Nikita Bhoskar
2022 International Journal for Research in Applied Science and Engineering Technology  
Keywords: Hashing, partitioning algorithm, error correction capacity, high security, Quick Response code, visual secret sharing scheme  ...  To proposed approach to visual secret sharing scheme to encode a secret QR code into distinct shares.  ...  CONCLUSIONS In this paper, a visual secret sharing scheme for QR code applications, which makes improvement mainly on two aspects: higher security and partitioning techniques based on specific relationships  ... 
doi:10.22214/ijraset.2022.39907 fatcat:wp7apgi4dzdwxhcnleidex2fty

Efficient QR code secret embedding mechanism based on Hamming code

Peng-Cheng Huang, Chin-Chen Chang, Yung-Hui Li, Yanjun Liu
2020 IEEE Access  
THE PROPOSED SCHEME This section presents a secret hiding scheme for QR code based on its error correction capacity.  ...  s scheme is based on the error correction capacity of cover QR code, so the amount of secret payload depends on the fault tolerance of cover QR code.  ... 
doi:10.1109/access.2020.2992694 fatcat:juuwihe34jb7tjwsproqox5cca

Password Hardened Biometric: A Complete Solution of Online Security

Ajay Sharma, Deo Brat Ojha
2013 International Journal of Computer Network and Information Security  
To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to  ...  Here we use the speed of McEliece and its randomness to enhance the fuzzy commitment scheme by using code base cryptosystem which is base on Goppa Code [9] , [10] .  ...  In table I, II and III shows the triple values of (n, k, t), for code base system, where n denotes the codeword length, k denotes the message length and t is the error correcting capability of the code  ... 
doi:10.5815/ijcnis.2013.06.06 fatcat:zz35lcxvpbfvdi54nybqy7yrny

Dual Construction Of Stern-Based Signature Scheme

Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui
2010 Zenodo  
In this paper, we propose a dual version of the first threshold ring signature scheme based on error-correcting code proposed by Aguilar et. al in [1].  ...  Our scheme uses an improvement of Véron zero-knowledge identification scheme, which provide smaller public and private key sizes and better computation complexity than the Stern one.  ...  IDENTIFICATION AND SIGNATURE SCHEMES In this section, we present two identification schemes based on error-correcting codes.  ... 
doi:10.5281/zenodo.1072826 fatcat:etub6ma5k5a5zbkwiqgsj7lmn4

Zero-Knowledge Identification Scheme Using LDPC Codes

Haruka ITO, Masanori HIROTOMO, Youji FUKUTA, Masami MOHRI, Yoshiaki SHIRAISHI
2018 IEICE transactions on information and systems  
In the proposed scheme, the zero-knowledge identification scheme that relies on the binary syndrome decoding problem is improved and the computational cost of identification is reduced by using the sparse  ...  Requirements of authentication for IoT devices are power saving and one-to-many communication. In this paper, we propose a zero-knowledge identification scheme using LDPC codes.  ...  It is a 3-pass code-based identification scheme with a cheating probability of 2/3. Recently, some researchers improved Stern's scheme and proposed code-based ZK identification schemes.  ... 
doi:10.1587/transinf.2017icp0020 fatcat:q3m4r2qorne3lkxnuv5djwuvf4

An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding

Wenbo Qiao, Jian Li, Jian Ren
2011 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011  
The proposed scheme is similar in structure to the existing error-control based schemes.  ...  In this paper, we propose a new scheme that combines the benefits of the existing error-detection and error-correction (EDEC) schemes.  ...  While significantly improving the network throughput and robustness, the computational complexity for pollution identification can be clearly computed based on the underlying error-correction algorithm  ... 
doi:10.1109/glocom.2011.6134039 dblp:conf/globecom/QiaoLR11 fatcat:jsx4s4gazzeoppdfmtqdcgsh2i

Efficient secret sharing scheme with cheater identification based on QR code

2019 KSII Transactions on Internet and Information Systems  
To overcome the weakness, this paper presents an effective secret sharing scheme with the functionality of cheater identification, based on meaningful QR code.  ...  The meaningful QR code pseudo-shares help to reduce the curious of unrelated persons. Some experiments were done to evaluate the performance of proposed scheme.  ...  The encrypted shares embedding strategies of these two schemes are also based on QR code error correction capacity. Huang et al.  ... 
doi:10.3837/tiis.2019.10.018 fatcat:gqahusz2frb47fxc2ltr3ttkhi

Reliability-balanced feature level fusion for fuzzy commitment scheme

Christian Rathge, Andreas Uhl, Peter Wild
2011 2011 International Joint Conference on Biometrics (IJCB)  
The proposed reliabilitybalanced feature level fusion is designed to re-arrange and combine two binary biometric templates in a way that error correction capacities are exploited more effectively within  ...  a fuzzy commitment scheme yielding improvement with respect to key-retrieval rates.  ...  In their scheme 2048-bit iris-codes are applied to bind and retrieve 140-bit cryptographic keys prepared with Hadamard and Reed-Solomon error correction codes.  ... 
doi:10.1109/ijcb.2011.6117535 dblp:conf/icb/RathgebUW11 fatcat:gp3r3rytbvfvnkyq24lheb7qqy

Performance of Wimax Physical Layer with Variations in Channel Coding and Digital Modulation under Realistic Channel Conditions

Md. Ashraful Islam
2012 International Journal of Information Sciences and Techniques  
Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded  ...  ABSTRUCT The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital  ...  Forward error correction techniques use error-correcting codes such as RS, CC, and CRC and so on for dealing with burst error.  ... 
doi:10.5121/ijist.2012.2404 fatcat:apjn4p5j4vg57ibljy3jirg2cu

Performance Analysis of Identification Codes

Sencer Derebeyoğlu, Christian Deppe, Roberto Ferrara
2020 Entropy  
In this paper, we analyze the construction of identification codes. Identification codes are based on the question: "Is the message I have just received the one I am interested in?"  ...  We focus on a special identification code construction based on two concatenated Reed-Solomon codes and have a closer look at its implementation, analyzing the trade-offs of identification with respect  ...  Error-Correction Codes We have seen error-correction codes used for identification.  ... 
doi:10.3390/e22101067 pmid:33286836 fatcat:jpfks47xpjdfbk47kdnvymi5w4

Improved code-based identification scheme [article]

Pierre-Louis Cayrel, Pascal Veron
2010 arXiv   pre-print
We revisit the 3-pass code-based identification scheme proposed by Stern at Crypto'93, and give a new 5-pass protocol for which the probability of the cheater is 1/2 (instead of 2/3 in the original Stern's  ...  The proposed scheme is zero-knowledge and relies on an NP-complete problem coming from coding theory (namely the q-ary Syndrome Decoding problem).  ...  ACKNOWLEDGMENT The authors want to thank Robert Niebuhr and Philippe Gaborit for their comments during the preparation of this paper and Christiane Peters for comments on her code.  ... 
arXiv:1001.3017v1 fatcat:hrhpjkih7nb3bl3jysdqefzlei

Musical Style Identification Using Grammatical Inference: The Encoding Problem [chapter]

Pedro P. Cruz-Alcázar, Enrique Vidal-Ruiz, Juan C. Pérez-Cortés
2003 Lecture Notes in Computer Science  
A very important issue in this case is the use of a proper music coding scheme, so different coding schemes are presented and compared, achieving a 3 % classification error rate.  ...  A Musical Style Identification model based on Grammatical Inference (GI) is presented. Under this model, regular grammars are used for modeling Musical Style.  ...  Conclusions and Future Works A Musical Style Identification (MSI) model based on Grammatical Inference is presented.  ... 
doi:10.1007/978-3-540-24586-5_46 fatcat:kzcgpklktrhdvl5f665l3qfid4
« Previous Showing results 1 — 15 out of 131,182 results