Take your MEDS: digital signatures from matrix code equivalence

T Chou, R Niederhagen, E Persichetti… - … on cryptology in Africa, 2023 - Springer
In this paper, we show how to use the Matrix Code Equivalence (MCE) problem as a new
basis to construct signature schemes. This extends previous work on using isomorphism …

Threshold computation in the head: Improved framework for post-quantum signatures and zero-knowledge arguments

T Feneuil, M Rivain - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The MPC-in-the-Head paradigm is instrumental in building zero-knowledge proof systems
and post-quantum signatures using techniques from secure multi-party computation. In this …

MR-DSS–smaller MinRank-based (ring-) signatures

E Bellini, A Esser, C Sanna, J Verbel - International Conference on Post …, 2022 - Springer
In the light of NIST's announced reopening of the call for digital signature proposals in 2023
due to lacking diversity, there is a strong need for constructions based on other established …

On the computational hardness of the code equivalence problem in cryptography

A Barenghi, JF Biasse, E Persichetti… - Cryptology ePrint …, 2022 - eprint.iacr.org
Code equivalence is a well-known concept in coding theory. Recently, literature saw an
increased interest in this notion, due to the introduction of protocols based on the hardness …

: a Software Library for Cryptographic Hardness Estimation

A Esser, J Verbel, F Zweydinger, E Bellini - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The estimation of the computational complexity of hard problems is essential for determining
secure parameters for cryptographic systems. To date, those estimations are often …

A new formulation of the linear equivalence problem and shorter less signatures

E Persichetti, P Santini - International Conference on the Theory and …, 2023 - Springer
Abstract The Linear Equivalence Problem (LEP) asks to find a linear isometry between a
given pair of linear codes; in the Hamming weight this is known as a monomial map. LEP …

Cutting the grass: threshold group action signature schemes

M Battagliola, G Borin, A Meneghetti… - Cryptographers' Track at …, 2024 - Springer
Group actions are fundamental mathematical tools, with a long history of use in
cryptography. Indeed, the action of finite groups at the basis of the discrete logarithm …

MPC in the head for isomorphisms and group actions

A Joux - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we take inspiration from an invited talk presented at CBCrypto'23 to design
identification protocols and signature schemes from group actions using the MPC-in-the …

Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants

AK Narayanan, Y Qiao, G Tang - … on the Theory and Applications of …, 2024 - Springer
We devise algorithms for finding equivalences of trilinear forms over finite fields modulo
linear group actions. Our focus is on two problems under this umbrella, Matrix Code …

Trifors: Linkable trilinear forms ring signature

G D'Alconzo, A Gangemi - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Abstract We present TRIFORS (TRIlinear FOrms Ring Signature), a logarithmic post-
quantum (linkable) ring signature based on a novel assumption regarding the equivalence …