Skip to main content

Showing 1–11 of 11 results for author: Khathuria, K

.
  1. arXiv:2205.12903  [pdf, ps, other

    cs.IT cs.CR

    Information Set Decoding for Lee-Metric Codes using Restricted Balls

    Authors: Jessica Bariffi, Karan Khathuria, Violetta Weger

    Abstract: The Lee metric syndrome decoding problem is an NP-hard problem and several generic decoders have been proposed. The observation that such decoders come with a larger cost than their Hamming metric counterparts make the Lee metric a promising alternative for classical code-based cryptography. Unlike in the Hamming metric, an error vector that is chosen uniform at random of a given Lee weight is exp… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

  2. arXiv:2110.07421  [pdf, ps, other

    cs.IT math.CO

    On some batch code properties of the simplex code

    Authors: Henk D. L. Hollmann, Karan Khathuria, Ago-Erik Riet, Vitaly Skachek

    Abstract: The binary $k$-dimensional simplex code is known to be a $2^{k-1}$-batch code and is conjectured to be a $2^{k-1}$-functional batch code. Here, we offer a simple, constructive proof of a result that is "in between" these two properties. Our approach is to relate these properties to certain (old and new) additive problems in finite abelian groups. We also formulate a conjecture for finite abelian g… ▽ More

    Submitted 22 January, 2023; v1 submitted 14 October, 2021; originally announced October 2021.

  3. arXiv:2107.14214  [pdf, other

    math.CO

    On Cyclic Matroids and their Applications

    Authors: Gianira N. Alfarano, Karan Khathuria, Simran Tinani

    Abstract: A matroid is a combinatorial structure that captures and generalizes the algebraic concept of linear independence under a broader and more abstract framework. Matroids are closely related with many other topics in discrete mathematics, such as graphs, matrices, codes and projective geometries. In this work, we define cyclic matroids as matroids over a ground set of size $n$ whose automorphism grou… ▽ More

    Submitted 15 March, 2022; v1 submitted 29 July, 2021; originally announced July 2021.

  4. arXiv:2106.09403  [pdf, ps, other

    cs.IT math.CO

    Density of Free Modules over Finite Chain Rings

    Authors: Eimear Byrne, Anna-Lena Horlemann, Karan Khathuria, Violetta Weger

    Abstract: In this paper we focus on modules over a finite chain ring $\mathcal{R}$ of size $q^s$. We compute the density of free modules of $\mathcal{R}^n$, where we separately treat the asymptotics in $n,q$ and $s$. In particular, we focus on two cases: one where we fix the length of the module and one where we fix the rank of the module. In both cases, the density results can be bounded by the Andrews-Gor… ▽ More

    Submitted 8 February, 2022; v1 submitted 17 June, 2021; originally announced June 2021.

    MSC Class: 13C10; 11T71; 11P84

  5. arXiv:2011.08326  [pdf, ps, other

    cs.CR

    Cryptanalysis of a code-based full-time signature

    Authors: Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville, Karan Khathuria, Edoardo Persichetti, Paolo Santini

    Abstract: We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in the SHMWW scheme contains columns coming in part from an identity matrix and in part from a random matrix. The existence of two types of columns leads to a strong bias in the distribution of set bits in produced signatu… ▽ More

    Submitted 6 July, 2021; v1 submitted 16 November, 2020; originally announced November 2020.

    Comments: 18 pages, to appear in DCC

    MSC Class: 94A60; 11T71; 14G50

  6. arXiv:2008.11927  [pdf, ps, other

    cs.IT cs.CR math.RA

    Galois ring isomorphism problem

    Authors: Karan Khathuria

    Abstract: Recently, Doröz et al. (2017) proposed a new hard problem, called the finite field isomorphism problem, and constructed a fully homomorphic encryption scheme based on this problem. In this paper, we generalize the problem to the case of Galois rings, resulting in the Galois ring isomorphism problem. The generalization is achieved by lifting the isomorphism between the corresponding residue fields.… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

    MSC Class: 13M10; 94A60

  7. arXiv:2008.06417  [pdf, ps, other

    cs.IT

    On single server private information retrieval in a coding theory perspective

    Authors: Gianira N. Alfarano, Karan Khathuria, Violetta Weger

    Abstract: In this paper, we present a new perspective of single server private information retrieval (PIR) schemes by using the notion of linear error-correcting codes. Many of the known single server schemes are based on taking linear combinations between database elements and the query elements. Using the theory of linear codes, we develop a generic framework that formalizes all such PIR schemes. Further,… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    MSC Class: 68P20; 94B99

  8. arXiv:2002.12785  [pdf, other

    cs.IT cs.CR

    On the Hardness of the Lee Syndrome Decoding Problem

    Authors: Violetta Weger, Karan Khathuria, Anna-Lena Horlemann, Massimo Battaglioni, Paolo Santini, Edoardo Persichetti

    Abstract: In this paper we study the hardness of the syndrome decoding problem over finite rings endowed with the Lee metric. We first prove that the decisional version of the problem is NP-complete, by a reduction from the $3$-dimensional matching problem. Then, we study the complexity of solving the problem, by translating the best known solvers in the Hamming metric over finite fields to the Lee metric o… ▽ More

    Submitted 1 April, 2022; v1 submitted 27 February, 2020; originally announced February 2020.

    Comments: Part of this work appeared as preliminary results in arXiv:2001.08425

  9. Encryption Scheme Based on Expanded Reed-Solomon Codes

    Authors: Karan Khathuria, Joachim Rosenthal, Violetta Weger

    Abstract: We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by considering its shortened expanded code over the base field. Considering shortened expanded codes provides a safeguard against distinguisher attacks based on the Schur product. Moreover, without using a cyclic or a quasi-cyclic structure we obtain a key siz… ▽ More

    Submitted 26 November, 2019; v1 submitted 3 June, 2019; originally announced June 2019.

    MSC Class: 14G50; 94A60; 11T71

  10. arXiv:1812.10955  [pdf, ps, other

    cs.IT cs.CR

    Generalization of the Ball-Collision Algorithm

    Authors: Carmelo Interlando, Karan Khathuria, Nicole Rohrer, Joachim Rosenthal, Violetta Weger

    Abstract: In this paper we generalize the Ball-Collision Algorithm by Bernstein, Lange, Peters from the binary field to a general finite field. We also provide a complexity analysis and compare the asymptotic complexity to other generalized information set decoding algorithms.

    Submitted 28 December, 2018; originally announced December 2018.

  11. On the algebraic structure of $E_p^{(m)}$ and applications to cryptography

    Authors: Karan Khathuria, Giacomo Micheli, Violetta Weger

    Abstract: In this paper we show that the $\mathbb Z/p^{m}\mathbb Z$-module structure of the ring $E_p^{(m)}$ is isomorphic to a $\mathbb Z/p^{m}\mathbb Z$-submodule of the matrix ring over $\mathbb Z/p^{m}\mathbb Z$. Using this intrinsic structure of $E_p^{(m)}$, solving a linear system over $E_p^{(m)}$ becomes computationally equivalent to solving a linear system over $\mathbb Z/p^{m}\mathbb Z$. As an appl… ▽ More

    Submitted 14 December, 2019; v1 submitted 6 October, 2018; originally announced October 2018.

    Comments: To appear in Applicable Algebra in Engineering, Communication and Computing