-
arXiv:1807.06127 [pdf, ps, other]
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes
Abstract: In this paper we consider a post-quantum digital signature scheme based on low-density generator matrix codes and propose efficient algorithmic solutions for its implementation. We also review all known attacks against this scheme and derive closed-form estimates of their complexity when running over both classical and quantum computers. Based on these estimates, we propose new parametrization for… ▽ More
Submitted 16 July, 2018; originally announced July 2018.
Comments: 40 pages, 4 tables
-
arXiv:1703.03235 [pdf, ps, other]
Fuzzy Authentication using Rank Distance
Abstract: Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can th… ▽ More
Submitted 9 March, 2017; originally announced March 2017.
Comments: to appear in Cryptography and Physical Layer Security, Lecture Notes in Electrical Engineering, Springer
-
arXiv:1610.09244 [pdf, ps, other]
An Application of Group Theory in Confidential Network Communications
Abstract: A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.
Submitted 28 October, 2016; originally announced October 2016.
Comments: to appear in Mathematical Methods in the Applied Sciences
-
arXiv:1609.01212 [pdf, ps, other]
Involutions, Trace Maps, and Pseudorandom Numbers
Abstract: Interesting properties of the partitions of a finite field $\mathbb F_q$ induced by the combination of involutions and trace maps are studied. The special features of involutions of the form $\frac{u}{z}$, $u$ being a fixed element of $\mathbb F_q$, are exploited to generate pseudorandom numbers, the randomness resting on the uniform distribution of the images of zero-trace elements among the sets… ▽ More
Submitted 27 September, 2016; v1 submitted 5 September, 2016; originally announced September 2016.
Comments: minor changes
-
arXiv:1603.01215 [pdf, ps, other]
Remarks on Frankl's conjecture
Abstract: First a few reformulations of Frankl's conjecture are given, in terms of reduced families or matrices, or analogously in terms of lattices. These lead naturally to a stronger conjecture with a neat formulation which might be easier to attack than Frankl's. To this end we prove an inequality which might help in proving the stronger conjecture.
Submitted 3 March, 2016; originally announced March 2016.
-
arXiv:1509.01081 [pdf, ps, other]
An Active Attack on a Multiparty Key Exchange Protocol
Abstract: The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.
Submitted 3 September, 2015; originally announced September 2015.
-
arXiv:1509.01075 [pdf, ps, other]
Group key management based on semigroup actions
Abstract: In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. Examples are provided that may in some cases enhance the security level and communication overheads of previous existing protocols. Security against passive attacks is considered and depends on the hardness of the semigrou… ▽ More
Submitted 28 July, 2016; v1 submitted 3 September, 2015; originally announced September 2015.
Comments: accepted for publication in Journal of algebra and its applications
-
arXiv:1305.5436 [pdf, ps, other]
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures
Abstract: In this paper, we address the problem of achieving efficient code-based digital signatures with small public keys. The solution we propose exploits sparse syndromes and randomly designed low-density generator matrix codes. Based on our evaluations, the proposed scheme is able to outperform existing solutions, permitting to achieve considerable security levels with very small public keys.
Submitted 23 May, 2013; originally announced May 2013.
Comments: 16 pages. The final publication is available at springerlink.com
-
arXiv:1210.7190 [pdf, ps, other]
Subspace Fuzzy Vault
Abstract: Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative constructio… ▽ More
Submitted 16 April, 2015; v1 submitted 26 October, 2012; originally announced October 2012.
Comments: to appear in Springer Lecture Notes in Electrical Engineering
-
arXiv:1205.5148 [pdf, ps, other]
On Burst Error Correction and Storage Security of Noisy Data
Abstract: Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions.
Submitted 23 May, 2012; originally announced May 2012.
Comments: to be presented at MTNS 2012
-
arXiv:1111.3602 [pdf, ps, other]
On the Rabin signature
Abstract: Some Rabin signature schemes may be exposed to forgery; several variants are here described to counter this vulnerability. Blind Rabin signatures are also discussed.
Submitted 17 December, 2011; v1 submitted 10 November, 2011; originally announced November 2011.
Comments: General revision; new section on blind signatures
-
arXiv:1108.5935 [pdf, ps, other]
The Rabin cryptosystem revisited
Abstract: The Rabin public-key cryptosystem is revisited with a focus on the problem of identifying the encrypted message unambiguously for any pair of primes. In particular, a deterministic scheme using quartic reciprocity is described that works for primes congruent 5 modulo 8, a case that was still open. Both theoretical and practical solutions are presented. The Rabin signature is also reconsidered and… ▽ More
Submitted 3 November, 2013; v1 submitted 30 August, 2011; originally announced August 2011.
Comments: minor review + introduction of a deterministic scheme using quartic reciprocity that works for primes congruent 5 modulo 8
-
arXiv:1108.2462 [pdf, ps, other]
Enhanced public key security for the McEliece cryptosystem
Abstract: This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code. This increases the security level of the public key, thus opening the way for reconsidering the adoption of classical families of codes, like Reed-Solomon codes, that have been longly excluded from the McEliece cryptosystem for securi… ▽ More
Submitted 20 May, 2014; v1 submitted 11 August, 2011; originally announced August 2011.
Comments: 31 pages, 1 figure. Accepted for publication in the Journal of Cryptology
-
arXiv:1107.1600 [pdf, ps, other]
On fuzzy syndrome hashing with LDPC coding
Abstract: The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e.g. for the purpose of biometric authentication. Among these, the syndrome fuzzy hashing construction allows to securely store biometric data and to perform user authentication without the need of sharing any secret key. This paper analyzes this model, showing that it offers a suitable protection ag… ▽ More
Submitted 31 October, 2011; v1 submitted 8 July, 2011; originally announced July 2011.
Comments: in Proceedings 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), ACM 2011. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution
-
arXiv:1107.0586 [pdf, ps, other]
Managing key multicasting through orthogonal systems
Abstract: In this paper we propose a new protocol to manage multicast key distribution. The protocol is based on the use of orthogonal systems in vector spaces. The main advantage in comparison to other existing multicast key management protocols is that the length and the number of the messages which have to be sent are considerably smaller. This makes the protocol especially attractive when the number of… ▽ More
Submitted 1 January, 2015; v1 submitted 4 July, 2011; originally announced July 2011.
-
arXiv:1102.4772 [pdf, ps, other]
Polynomial evaluation over finite fields: new algorithms and complexity bounds
Abstract: An efficient evaluation method is described for polynomials in finite fields. Its complexity is shown to be lower than that of standard techniques when the degree of the polynomial is large enough. Applications to the syndrome computation in the decoding of Reed-Solomon codes are highlighted.
Submitted 6 December, 2011; v1 submitted 16 February, 2011; originally announced February 2011.
Comments: accepted for publication in Applicable Algebra in Engineering, Communication and Computing. The final publication will be available at springerlink.com. DOI: 10.1007/s00200-011-0160-6
-
arXiv:1102.4771 [pdf, ps, other]
Efficient evaluation of polynomials over finite fields
Abstract: A method is described which allows to evaluate efficiently a polynomial in a (possibly trivial) extension of the finite field of its coefficients. Its complexity is shown to be lower than that of standard techniques when the degree of the polynomial is large with respect to the base field. Applications to the syndrome computation in the decoding of cyclic codes, Reed-Solomon codes in particular, a… ▽ More
Submitted 16 February, 2011; originally announced February 2011.
Comments: presented at AusCTW 2011
-
arXiv:1102.2939 [pdf, ps, other]
On the Decoding Complexity of Cyclic Codes Up to the BCH Bound
Abstract: The standard algebraic decoding algorithm of cyclic codes $[n,k,d]$ up to the BCH bound $t$ is very efficient and practical for relatively small $n$ while it becomes unpractical for large $n$ as its computational complexity is $O(nt)$. Aim of this paper is to show how to make this algebraic decoding computationally more efficient: in the case of binary codes, for example, the complexity of the syn… ▽ More
Submitted 27 May, 2011; v1 submitted 14 February, 2011; originally announced February 2011.
Comments: accepted for publication in Proceedings ISIT 2011. IEEE copyright
-
arXiv:cs/0701102 [pdf, ps, other]
Coding Solutions for the Secure Biometric Storage Problem
Abstract: The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a scheme where similar input strings will be accepted as the same biometric. In the same time nothing could be learned from the stored data. They called their scheme a "fuzzy commitment scheme". In this paper we will revisit the… ▽ More
Submitted 30 August, 2011; v1 submitted 16 January, 2007; originally announced January 2007.
Comments: the final version appeared in Proceedings Information Theory Workshop (ITW) 2010, IEEE copyright