A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improved identification schemes based on error-correcting codes
1997
Applicable Algebra in Engineering, Communication and Computing
The security of the proposed scheme depends on an NPcomplete problem from the theory of error correcting codes: the syndrome decoding problem which relies on the hardness of decoding a binary word of given ...
As it is often the case in public-key cryptography, the first practical identification schemes were based on hard problems from number theory (factoring, discrete logarithms). ...
Among all these schemes, three of them [9, 12, 18] rely on an NP-complete problem from error correcting codes: the one of Syndrome Decoding ("SD" problem [3] ). ...
doi:10.1007/s002000050053
fatcat:jfebsh3ubja3df6dzegn37xtvu
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes
[chapter]
2012
Lecture Notes in Computer Science
@3.00GHz Improved threshold ring signature scheme Conclusion and future work Conclusion and future work We presented a secure threshold ring signature scheme based on error-correcting codes with shorter ...
The first code-based threshold ring signature was proposed by Aguilar et al. in 2008, it is based on the Stern's identification scheme. ...
doi:10.1007/978-3-642-31662-3_4
fatcat:nsw3pjn3hfb23fv3q5hy3w44f4
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes
[chapter]
2011
Communications in Computer and Information Science
In this paper, we present an improved version of an identity-based identification scheme based on error-correcting codes. ...
Our scheme combines the Courtois-Finiasz-Sendrier signature scheme using quasi-dyadic codes (QD-CFS) proposed in [2] and the identification scheme by Stern [18] . ...
Description of the Stern identification scheme At CRYPTO'93, Stern proposed the first identification scheme based on error-correcting codes [18] . ...
doi:10.1007/978-3-642-23141-4_14
fatcat:3fgn5cpnxfeitl7qprh42muega
A Survey on Secrete Communication through QR Code Steganography for Military Application
2022
International Journal for Research in Applied Science and Engineering Technology
Keywords: Hashing, partitioning algorithm, error correction capacity, high security, Quick Response code, visual secret sharing scheme ...
To proposed approach to visual secret sharing scheme to encode a secret QR code into distinct shares. ...
CONCLUSIONS In this paper, a visual secret sharing scheme for QR code applications, which makes improvement mainly on two aspects: higher security and partitioning techniques based on specific relationships ...
doi:10.22214/ijraset.2022.39907
fatcat:wp7apgi4dzdwxhcnleidex2fty
Efficient QR code secret embedding mechanism based on Hamming code
2020
IEEE Access
THE PROPOSED SCHEME This section presents a secret hiding scheme for QR code based on its error correction capacity. ...
s scheme is based on the error correction capacity of cover QR code, so the amount of secret payload depends on the fault tolerance of cover QR code. ...
doi:10.1109/access.2020.2992694
fatcat:juuwihe34jb7tjwsproqox5cca
Password Hardened Biometric: A Complete Solution of Online Security
2013
International Journal of Computer Network and Information Security
To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to ...
Here we use the speed of McEliece and its randomness to enhance the fuzzy commitment scheme by using code base cryptosystem which is base on Goppa Code [9] , [10] . ...
In table I, II and III shows the triple values of (n, k, t), for code base system, where n denotes the codeword length, k denotes the message length and t is the error correcting capability of the code ...
doi:10.5815/ijcnis.2013.06.06
fatcat:zz35lcxvpbfvdi54nybqy7yrny
Dual Construction Of Stern-Based Signature Scheme
2010
Zenodo
In this paper, we propose a dual version of the first threshold ring signature scheme based on error-correcting code proposed by Aguilar et. al in [1]. ...
Our scheme uses an improvement of Véron zero-knowledge identification scheme, which provide smaller public and private key sizes and better computation complexity than the Stern one. ...
IDENTIFICATION AND SIGNATURE SCHEMES In this section, we present two identification schemes based on error-correcting codes. ...
doi:10.5281/zenodo.1072826
fatcat:etub6ma5k5a5zbkwiqgsj7lmn4
Zero-Knowledge Identification Scheme Using LDPC Codes
2018
IEICE transactions on information and systems
In the proposed scheme, the zero-knowledge identification scheme that relies on the binary syndrome decoding problem is improved and the computational cost of identification is reduced by using the sparse ...
Requirements of authentication for IoT devices are power saving and one-to-many communication. In this paper, we propose a zero-knowledge identification scheme using LDPC codes. ...
It is a 3-pass code-based identification scheme with a cheating probability of 2/3. Recently, some researchers improved Stern's scheme and proposed code-based ZK identification schemes. ...
doi:10.1587/transinf.2017icp0020
fatcat:q3m4r2qorne3lkxnuv5djwuvf4
An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding
2011
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
The proposed scheme is similar in structure to the existing error-control based schemes. ...
In this paper, we propose a new scheme that combines the benefits of the existing error-detection and error-correction (EDEC) schemes. ...
While significantly improving the network throughput and robustness, the computational complexity for pollution identification can be clearly computed based on the underlying error-correction algorithm ...
doi:10.1109/glocom.2011.6134039
dblp:conf/globecom/QiaoLR11
fatcat:jsx4s4gazzeoppdfmtqdcgsh2i
Efficient secret sharing scheme with cheater identification based on QR code
2019
KSII Transactions on Internet and Information Systems
To overcome the weakness, this paper presents an effective secret sharing scheme with the functionality of cheater identification, based on meaningful QR code. ...
The meaningful QR code pseudo-shares help to reduce the curious of unrelated persons. Some experiments were done to evaluate the performance of proposed scheme. ...
The encrypted shares embedding strategies of these two schemes are also based on QR code error correction capacity. Huang et al. ...
doi:10.3837/tiis.2019.10.018
fatcat:gqahusz2frb47fxc2ltr3ttkhi
Reliability-balanced feature level fusion for fuzzy commitment scheme
2011
2011 International Joint Conference on Biometrics (IJCB)
The proposed reliabilitybalanced feature level fusion is designed to re-arrange and combine two binary biometric templates in a way that error correction capacities are exploited more effectively within ...
a fuzzy commitment scheme yielding improvement with respect to key-retrieval rates. ...
In their scheme 2048-bit iris-codes are applied to bind and retrieve 140-bit cryptographic keys prepared with Hadamard and Reed-Solomon error correction codes. ...
doi:10.1109/ijcb.2011.6117535
dblp:conf/icb/RathgebUW11
fatcat:gp3r3rytbvfvnkyq24lheb7qqy
Performance of Wimax Physical Layer with Variations in Channel Coding and Digital Modulation under Realistic Channel Conditions
2012
International Journal of Information Sciences and Techniques
Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded ...
ABSTRUCT The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital ...
Forward error correction techniques use error-correcting codes such as RS, CC, and CRC and so on for dealing with burst error. ...
doi:10.5121/ijist.2012.2404
fatcat:apjn4p5j4vg57ibljy3jirg2cu
Performance Analysis of Identification Codes
2020
Entropy
In this paper, we analyze the construction of identification codes. Identification codes are based on the question: "Is the message I have just received the one I am interested in?" ...
We focus on a special identification code construction based on two concatenated Reed-Solomon codes and have a closer look at its implementation, analyzing the trade-offs of identification with respect ...
Error-Correction Codes We have seen error-correction codes used for identification. ...
doi:10.3390/e22101067
pmid:33286836
fatcat:jpfks47xpjdfbk47kdnvymi5w4
Improved code-based identification scheme
[article]
2010
arXiv
pre-print
We revisit the 3-pass code-based identification scheme proposed by Stern at Crypto'93, and give a new 5-pass protocol for which the probability of the cheater is 1/2 (instead of 2/3 in the original Stern's ...
The proposed scheme is zero-knowledge and relies on an NP-complete problem coming from coding theory (namely the q-ary Syndrome Decoding problem). ...
ACKNOWLEDGMENT The authors want to thank Robert Niebuhr and Philippe Gaborit for their comments during the preparation of this paper and Christiane Peters for comments on her code. ...
arXiv:1001.3017v1
fatcat:hrhpjkih7nb3bl3jysdqefzlei
Musical Style Identification Using Grammatical Inference: The Encoding Problem
[chapter]
2003
Lecture Notes in Computer Science
A very important issue in this case is the use of a proper music coding scheme, so different coding schemes are presented and compared, achieving a 3 % classification error rate. ...
A Musical Style Identification model based on Grammatical Inference (GI) is presented. Under this model, regular grammars are used for modeling Musical Style. ...
Conclusions and Future Works A Musical Style Identification (MSI) model based on Grammatical Inference is presented. ...
doi:10.1007/978-3-540-24586-5_46
fatcat:kzcgpklktrhdvl5f665l3qfid4
« Previous
Showing results 1 — 15 out of 131,182 results