Publication:

Enhanced public key security for the McEliece cryptosystem

Date

Date

Date
2016
Journal Article
Published version

Citations

Citation copied

Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., & Schipani, D. (2016). Enhanced public key security for the McEliece cryptosystem. Journal of Cryptology, 29(1), 1–27. https://doi.org/10.1007/s00145-014-9187-8

Abstract

Abstract

Abstract

This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation equivalent to the secret code. This increases the security level of the public key, thus opening the way for reconsidering the adoption of classical families of codes, like Reed–Solomon codes, that have been longly excluded from the McEliece cryptosystem for security reasons. It is well known that codes of these classes are able to yield a reduction in the key size or, equivalently, an increased level

Additional indexing

Creators (Authors)

  • Baldi, Marco
    affiliation.icon.alt
  • Bianchi, Marco
    affiliation.icon.alt
  • Chiaraluce, Franco
    affiliation.icon.alt
  • Rosenthal, Joachim
    affiliation.icon.alt
  • Schipani, Davide
    affiliation.icon.alt

Journal/Series Title

Journal/Series Title

Journal/Series Title

Volume

Volume

Volume
29

Number

Number

Number
1

Page range/Item number

Page range/Item number

Page range/Item number
1

Page end

Page end

Page end
27

Item Type

Item Type

Item Type
Journal Article

Dewey Decimal Classifikation

Dewey Decimal Classifikation

Dewey Decimal Classifikation

Language

Language

Language
English

Publication date

Publication date

Publication date
2016-01

Date available

Date available

Date available
2016-12-07

Publisher

Publisher

Publisher

ISSN or e-ISSN

ISSN or e-ISSN

ISSN or e-ISSN
0933-2790

OA Status

OA Status

OA Status
Green

Citations

Citation copied

Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., & Schipani, D. (2016). Enhanced public key security for the McEliece cryptosystem. Journal of Cryptology, 29(1), 1–27. https://doi.org/10.1007/s00145-014-9187-8

Green Open Access
Loading...
Thumbnail Image

Files

Files

Files
Files available to download:1

Files

Files

Files
Files available to download:1
Loading...
Thumbnail Image