Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

A New Rank Metric Codes based Identification Scheme

by Peter Arnaud Kidoudou, Regis F. Babindamana, Benjamin Mampassi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 34
Year of Publication: 2022
Authors: Peter Arnaud Kidoudou, Regis F. Babindamana, Benjamin Mampassi
10.5120/ijca2022922409

Peter Arnaud Kidoudou, Regis F. Babindamana, Benjamin Mampassi . A New Rank Metric Codes based Identification Scheme. International Journal of Computer Applications. 184, 34 ( Oct 2022), 14-17. DOI=10.5120/ijca2022922409

@article{ 10.5120/ijca2022922409,
author = { Peter Arnaud Kidoudou, Regis F. Babindamana, Benjamin Mampassi },
title = { A New Rank Metric Codes based Identification Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2022 },
volume = { 184 },
number = { 34 },
month = { Oct },
year = { 2022 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number34/32534-2022922409/ },
doi = { 10.5120/ijca2022922409 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:23:08.124218+05:30
%A Peter Arnaud Kidoudou
%A Regis F. Babindamana
%A Benjamin Mampassi
%T A New Rank Metric Codes based Identification Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 34
%P 14-17
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we propose a version of the identification rank metric code-based schemes. This protocol is an improvement of rankbased Véron protocol.It provide smaller public and private key sizes.With the same complexity as the Véron scheme, we make the scheme more secure by hiding the structure of the code used.

References
  1. Aragon, N: Cryptographie à base de codes correcteurs d’erreurs en métriquerang et application. Theses, Université de Limoges (Dec 2020), https://tel.archives-ouvertes.fr/tel-03115370.
  2. Aragon, N., Blazy, O., Gaborit, P., Hauteville, A., Z´emor, G.: Durandal: a rank metric based signature scheme. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. pp. 728–758. Springer (2019.
  3. Baldi, M., Battaglioni, M., Chiaraluce, F., Horlemann-Trautmann, A.L., Persichetti, E., Santini, P., Weger, V.: A new path to code-based signatures via identification schemes with restricted errors. arXiv preprint arXiv:2008.06403 (2020).
  4. Bellini, E., Caullery, F., Hasikos, A., Manzano, M., Mateu, V.: Code-based signature schemes from identification protocols in the rank metric. In: International Conference on Cryptology and Network Security. pp. 277–298. Springer (2018).
  5. Bellini, E., Gaborit, P., Hasikos, A., Mateu, V.: Enhancing code basedzeroknowledgeproofsusingrankmetric. IACRCryptol. ePrintArch. 2020, 1472(2020), https://eprint.iacr.org/2020/1472.
  6. Cayrel, P.L., Alaoui, S.: Dual construction of stern-based signature scheme 63,98–103 (03 2010).
  7. Cayrel, P.L., Véron, P., El YousfiAlaoui, S.M.: A zero-knowledge identification scheme based on the q-ary syndrome decoding problem. In: International Workshop on Selected Areas in Cryptography. pp. 171–186. Springer (2010).
  8. Gabidulin, E.M.: Rank-metric codes and applications. MoscowInst. Phys.Technol., StateUniv., Dolgoprudny, Russia.[Online].Available:http://iitp.ru/upload/content/839/Gabidulin. pdf
  9. Gabidulin, E.M.: Theory of codes with maximum rank distance. ProblemyPeredachiInformatsii 21(1), 3–16 (1985)
  10. Gaborit, P., Ruatta, O., Schrek, J.: On the complexity of the rank syndrome decoding problem. IEEE Transactions on Information Theory 62(2), 1006–1019 (2015)
  11. Loidreau, P.: Etude et optimisation de cryptosystèmes à clé publique fondés sur lathéorie des codes correcteurs. Ph.D. thesis (5 2001)
  12. Melchor, C.A., Gaborit, P., Schrek, J.: A new zero-knowledge code based identification scheme with reduced communication. 2011 IEEE Information Theory Workshop pp. 648–652 (2011)
  13. Moufek, H.: Les codes correcteurs pour la cryptographie. Ph.D. thesis, Faculté d eMathématiques (2017)
  14. Overbeck, R., Sendrier, N.: Code-based cryptography. In: Post-quantum cryptography, pp. 95–145. Springer (2009)
  15. Richmond, T.: Implantation sécurisée de protocoles cryptographiques basés sur les codes correcteurs d’erreurs. (secure implementation of cryptographic protocols based on error-correcting codes) (2016).
  16. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science.pp. 124–134. Ieee (1994)
Index Terms

Computer Science
Information Sciences

Keywords

Codes in rank metric Gabidulin codes error-correcting codes Véron Identification Scheme.