Two New Module-Code-Based KEMs with Rank Metric

LP Wang, J Hu - Information Security and Privacy: 24th Australasian …, 2019 - Springer
LP Wang, J Hu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019Springer
In this paper, we use a class of module codes to construct a suite of code-based public-key
schemes—Piglet, which includes a new IND-CPA-secure public-key encryption scheme
Piglet-1. CPAPKE and an IND-CCA-secure key encapsulation mechanism (KEM for short)
Piglet-1. CCAKEM by applying the KEM variant of Fujisaki-Okamoto transform to Piglet-1.
CPAPKE. We also put a new IND-CPA-secure KEM Piglet-2. CPAKEM into Piglet. Then, we
present the parameters comparison between our schemes and some code-based NIST …
Abstract
In this paper, we use a class of module codes to construct a suite of code-based public-key schemes—Piglet, which includes a new IND-CPA-secure public-key encryption scheme Piglet-1.CPAPKE and an IND-CCA-secure key encapsulation mechanism (KEM for short) Piglet-1.CCAKEM by applying the KEM variant of Fujisaki-Okamoto transform to Piglet-1.CPAPKE. We also put a new IND-CPA-secure KEM Piglet-2.CPAKEM into Piglet. Then, we present the parameters comparison between our schemes and some code-based NIST submissions. The results show that our schemes are good long-term-secure candidates for post-quantum cryptography.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果