Skip to main content

Showing 1–19 of 19 results for author: Schipani, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:1807.06127  [pdf, ps, other

    cs.CR cs.IT

    Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes

    Authors: Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani

    Abstract: In this paper we consider a post-quantum digital signature scheme based on low-density generator matrix codes and propose efficient algorithmic solutions for its implementation. We also review all known attacks against this scheme and derive closed-form estimates of their complexity when running over both classical and quantum computers. Based on these estimates, we propose new parametrization for… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: 40 pages, 4 tables

  2. arXiv:1703.03235  [pdf, ps, other

    cs.IT

    Fuzzy Authentication using Rank Distance

    Authors: Alessandro Neri, Joachim Rosenthal, Davide Schipani

    Abstract: Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can th… ▽ More

    Submitted 9 March, 2017; originally announced March 2017.

    Comments: to appear in Cryptography and Physical Layer Security, Lecture Notes in Electrical Engineering, Springer

  3. arXiv:1610.09244  [pdf, ps, other

    cs.IT cs.CR

    An Application of Group Theory in Confidential Network Communications

    Authors: Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani, Reto Schnyder

    Abstract: A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.

    Submitted 28 October, 2016; originally announced October 2016.

    Comments: to appear in Mathematical Methods in the Applied Sciences

  4. arXiv:1609.01212  [pdf, ps, other

    cs.IT math.NT

    Involutions, Trace Maps, and Pseudorandom Numbers

    Authors: Michele Elia, Davide Schipani

    Abstract: Interesting properties of the partitions of a finite field $\mathbb F_q$ induced by the combination of involutions and trace maps are studied. The special features of involutions of the form $\frac{u}{z}$, $u$ being a fixed element of $\mathbb F_q$, are exploited to generate pseudorandom numbers, the randomness resting on the uniform distribution of the images of zero-trace elements among the sets… ▽ More

    Submitted 27 September, 2016; v1 submitted 5 September, 2016; originally announced September 2016.

    Comments: minor changes

  5. arXiv:1603.01215  [pdf, ps, other

    math.CO cs.DM

    Remarks on Frankl's conjecture

    Authors: Francesco Marigo, Davide Schipani

    Abstract: First a few reformulations of Frankl's conjecture are given, in terms of reduced families or matrices, or analogously in terms of lattices. These lead naturally to a stronger conjecture with a neat formulation which might be easier to attack than Frankl's. To this end we prove an inequality which might help in proving the stronger conjecture.

    Submitted 3 March, 2016; originally announced March 2016.

  6. arXiv:1509.01081  [pdf, ps, other

    cs.IT

    An Active Attack on a Multiparty Key Exchange Protocol

    Authors: Reto Schnyder, Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani

    Abstract: The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.

    Submitted 3 September, 2015; originally announced September 2015.

  7. arXiv:1509.01075  [pdf, ps, other

    cs.IT cs.CR

    Group key management based on semigroup actions

    Authors: Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani, Reto Schnyder

    Abstract: In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. Examples are provided that may in some cases enhance the security level and communication overheads of previous existing protocols. Security against passive attacks is considered and depends on the hardness of the semigrou… ▽ More

    Submitted 28 July, 2016; v1 submitted 3 September, 2015; originally announced September 2015.

    Comments: accepted for publication in Journal of algebra and its applications

  8. arXiv:1305.5436  [pdf, ps, other

    cs.CR cs.IT

    Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

    Authors: Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani

    Abstract: In this paper, we address the problem of achieving efficient code-based digital signatures with small public keys. The solution we propose exploits sparse syndromes and randomly designed low-density generator matrix codes. Based on our evaluations, the proposed scheme is able to outperform existing solutions, permitting to achieve considerable security levels with very small public keys.

    Submitted 23 May, 2013; originally announced May 2013.

    Comments: 16 pages. The final publication is available at springerlink.com

  9. arXiv:1210.7190  [pdf, ps, other

    cs.IT cs.CR

    Subspace Fuzzy Vault

    Authors: Kyle Marshall, Davide Schipani, Anna-Lena Trautmann, Joachim Rosenthal

    Abstract: Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative constructio… ▽ More

    Submitted 16 April, 2015; v1 submitted 26 October, 2012; originally announced October 2012.

    Comments: to appear in Springer Lecture Notes in Electrical Engineering

  10. arXiv:1205.5148  [pdf, ps, other

    cs.IT cs.CR

    On Burst Error Correction and Storage Security of Noisy Data

    Authors: Felix Fontein, Kyle Marshall, Joachim Rosenthal, Davide Schipani, Anna-Lena Trautmann

    Abstract: Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions.

    Submitted 23 May, 2012; originally announced May 2012.

    Comments: to be presented at MTNS 2012

  11. arXiv:1111.3602  [pdf, ps, other

    cs.CR cs.IT

    On the Rabin signature

    Authors: Michele Elia, Davide Schipani

    Abstract: Some Rabin signature schemes may be exposed to forgery; several variants are here described to counter this vulnerability. Blind Rabin signatures are also discussed.

    Submitted 17 December, 2011; v1 submitted 10 November, 2011; originally announced November 2011.

    Comments: General revision; new section on blind signatures

  12. arXiv:1108.5935  [pdf, ps, other

    math.NT cs.CR cs.IT

    The Rabin cryptosystem revisited

    Authors: Michele Elia, Matteo Piva, Davide Schipani

    Abstract: The Rabin public-key cryptosystem is revisited with a focus on the problem of identifying the encrypted message unambiguously for any pair of primes. In particular, a deterministic scheme using quartic reciprocity is described that works for primes congruent 5 modulo 8, a case that was still open. Both theoretical and practical solutions are presented. The Rabin signature is also reconsidered and… ▽ More

    Submitted 3 November, 2013; v1 submitted 30 August, 2011; originally announced August 2011.

    Comments: minor review + introduction of a deterministic scheme using quartic reciprocity that works for primes congruent 5 modulo 8

  13. arXiv:1108.2462  [pdf, ps, other

    cs.IT cs.CR

    Enhanced public key security for the McEliece cryptosystem

    Authors: Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani

    Abstract: This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code. This increases the security level of the public key, thus opening the way for reconsidering the adoption of classical families of codes, like Reed-Solomon codes, that have been longly excluded from the McEliece cryptosystem for securi… ▽ More

    Submitted 20 May, 2014; v1 submitted 11 August, 2011; originally announced August 2011.

    Comments: 31 pages, 1 figure. Accepted for publication in the Journal of Cryptology

  14. arXiv:1107.1600  [pdf, ps, other

    cs.IT cs.CR

    On fuzzy syndrome hashing with LDPC coding

    Authors: Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani

    Abstract: The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e.g. for the purpose of biometric authentication. Among these, the syndrome fuzzy hashing construction allows to securely store biometric data and to perform user authentication without the need of sharing any secret key. This paper analyzes this model, showing that it offers a suitable protection ag… ▽ More

    Submitted 31 October, 2011; v1 submitted 8 July, 2011; originally announced July 2011.

    Comments: in Proceedings 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), ACM 2011. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution

  15. arXiv:1107.0586  [pdf, ps, other

    cs.CR

    Managing key multicasting through orthogonal systems

    Authors: Jose' Antonio Alvarez-Bermejo, Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani

    Abstract: In this paper we propose a new protocol to manage multicast key distribution. The protocol is based on the use of orthogonal systems in vector spaces. The main advantage in comparison to other existing multicast key management protocols is that the length and the number of the messages which have to be sent are considerably smaller. This makes the protocol especially attractive when the number of… ▽ More

    Submitted 1 January, 2015; v1 submitted 4 July, 2011; originally announced July 2011.

  16. arXiv:1102.4772  [pdf, ps, other

    cs.IT math.NT

    Polynomial evaluation over finite fields: new algorithms and complexity bounds

    Authors: Michele Elia, Joachim Rosenthal, Davide Schipani

    Abstract: An efficient evaluation method is described for polynomials in finite fields. Its complexity is shown to be lower than that of standard techniques when the degree of the polynomial is large enough. Applications to the syndrome computation in the decoding of Reed-Solomon codes are highlighted.

    Submitted 6 December, 2011; v1 submitted 16 February, 2011; originally announced February 2011.

    Comments: accepted for publication in Applicable Algebra in Engineering, Communication and Computing. The final publication will be available at springerlink.com. DOI: 10.1007/s00200-011-0160-6

  17. arXiv:1102.4771  [pdf, ps, other

    cs.IT math.NT

    Efficient evaluation of polynomials over finite fields

    Authors: Davide Schipani, Michele Elia, Joachim Rosenthal

    Abstract: A method is described which allows to evaluate efficiently a polynomial in a (possibly trivial) extension of the finite field of its coefficients. Its complexity is shown to be lower than that of standard techniques when the degree of the polynomial is large with respect to the base field. Applications to the syndrome computation in the decoding of cyclic codes, Reed-Solomon codes in particular, a… ▽ More

    Submitted 16 February, 2011; originally announced February 2011.

    Comments: presented at AusCTW 2011

  18. On the Decoding Complexity of Cyclic Codes Up to the BCH Bound

    Authors: Davide Schipani, Michele Elia, Joachim Rosenthal

    Abstract: The standard algebraic decoding algorithm of cyclic codes $[n,k,d]$ up to the BCH bound $t$ is very efficient and practical for relatively small $n$ while it becomes unpractical for large $n$ as its computational complexity is $O(nt)$. Aim of this paper is to show how to make this algebraic decoding computationally more efficient: in the case of binary codes, for example, the complexity of the syn… ▽ More

    Submitted 27 May, 2011; v1 submitted 14 February, 2011; originally announced February 2011.

    Comments: accepted for publication in Proceedings ISIT 2011. IEEE copyright

  19. arXiv:cs/0701102  [pdf, ps, other

    cs.IT cs.CR

    Coding Solutions for the Secure Biometric Storage Problem

    Authors: Davide Schipani, Joachim Rosenthal

    Abstract: The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a scheme where similar input strings will be accepted as the same biometric. In the same time nothing could be learned from the stored data. They called their scheme a "fuzzy commitment scheme". In this paper we will revisit the… ▽ More

    Submitted 30 August, 2011; v1 submitted 16 January, 2007; originally announced January 2007.

    Comments: the final version appeared in Proceedings Information Theory Workshop (ITW) 2010, IEEE copyright