One-time signature scheme from syndrome decoding over generic error-correcting codes

2011 ◽  
Vol 84 (2) ◽  
pp. 198-204 ◽  
Author(s):  
Paulo S.L.M. Barreto ◽  
Rafael Misoczki ◽  
Marcos A. Simplicio Jr.
2012 ◽  
Vol 112 (20) ◽  
pp. 783-787 ◽  
Author(s):  
Jaeheung Lee ◽  
Seokhyun Kim ◽  
Yookun Cho ◽  
Yoojin Chung ◽  
Yongsu Park

Mathematics ◽  
2019 ◽  
Vol 8 (1) ◽  
pp. 15
Author(s):  
Lucky Galvez ◽  
Jon-Lark Kim

Practically good error-correcting codes should have good parameters and efficient decoding algorithms. Some algebraically defined good codes, such as cyclic codes, Reed–Solomon codes, and Reed–Muller codes, have nice decoding algorithms. However, many optimal linear codes do not have an efficient decoding algorithm except for the general syndrome decoding which requires a lot of memory. Therefore, a natural question to ask is which optimal linear codes have an efficient decoding. We show that two binary optimal [ 36 , 19 , 8 ] linear codes and two binary optimal [ 40 , 22 , 8 ] codes have an efficient decoding algorithm. There was no known efficient decoding algorithm for the binary optimal [ 36 , 19 , 8 ] and [ 40 , 22 , 8 ] codes. We project them onto the much shorter length linear [ 9 , 5 , 4 ] and [ 10 , 6 , 4 ] codes over G F ( 4 ) , respectively. This decoding algorithm, called projection decoding, can correct errors of weight up to 3. These [ 36 , 19 , 8 ] and [ 40 , 22 , 8 ] codes respectively have more codewords than any optimal self-dual [ 36 , 18 , 8 ] and [ 40 , 20 , 8 ] codes for given length and minimum weight, implying that these codes are more practical.


Author(s):  
Toshiki Tsuchida ◽  
Masanori Hirotomo ◽  
Haruka Ito ◽  
Makoto Takita ◽  
Yoshiaki Shiraishi ◽  
...  

Author(s):  
Jean Belo KLAMTI ◽  
M. Anwar HASAN

An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party create additional adaptor signatures without the original secret. Adaptor signatures help address scalability and interoperabity issues in blockchain. They can also bring some important advantages to cryptocurrencies, such as low on-chain cost, improved transaction fungibility, and less limitations of a blockchain’s scripting language. In this paper, we propose a new two-party adaptor signature scheme that relies on quantum-safe hard problems in coding theory. The proposed scheme uses a hash-and-sign code-based signature scheme introduced by Debris-Alazard et al. and a code-based hard relation defined from the well-known syndrome decoding problem. To achieve all the basic properties of adaptor signatures formalized by Aumayr et al., we introduce further modifications to the aforementioned signature scheme. We also give a security analysis of our scheme and its application to the atomic swap. After providing a set of parameters for our scheme, we show that it has the smallest pre-signature size compared to existing post-quantum adaptor signatures.


2016 ◽  
Vol 5 (1) ◽  
pp. 70-75
Author(s):  
Kening Liu ◽  
Junyao Ye ◽  
Suli Wang ◽  
Yanhong Wang

2010 ◽  
Vol 47 (1) ◽  
pp. 15-29
Author(s):  
Madeline González Muñiz ◽  
Rainer Steinwndt

Abstract In recent years, quite some progress has been made in understand- ing the security of encryption schemes in the presence of key-dependent plaintexts. Here, we motivate and explore the security of a setting, where an adversary against a signature scheme can access signatures on key-dependent messages. We propose a way to formalize the security of signature schemes in the pres- ence of key-dependent signatures (KDS). It turns out that the situation is quite different from key-dependent encryption: already to achieve KDS-security under non-adaptive chosen message attacks, the use of a stateful signing algorithm is inevitable-even in the random oracle model. After discussing the connection be- tween key-dependent signing and forward security, we present a compiler to lift any EUF-CMA secure one-time signature scheme to a forward secure signature scheme offering KDS-CMA security.


Sign in / Sign up

Export Citation Format

Share Document