Flexible Quasi-Dyadic Code-Based Public-Key Encryption and [PDF]

m t n. GBA OISD (p.l) size. Iteration Signature Size. 19 11 524,272 283.6. -. 1,215.5KB 225.3. 209 (234.3) [bits]. 15 12

1 downloads 12 Views 35KB Size

Recommend Stories


Functional Encryption and Property Preserving Encryption
Nothing in nature is unbeautiful. Alfred, Lord Tennyson

Encryption and Anonymity
Don't be satisfied with stories, how things have gone with others. Unfold your own myth. Rumi

Encryption and Law Enforcement
Suffering is a gift. In it is hidden mercy. Rumi

and image encryption
Life isn't about getting and having, it's about giving and being. Kevin Kruse

PDF AMFI Flexible Cord Products
Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will

PDF The Flexible Dieting Cookbook
No amount of guilt can solve the past, and no amount of anxiety can change the future. Anonymous

Encryption Platform
We must be willing to let go of the life we have planned, so as to have the life that is waiting for

Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption
The beauty of a living thing is not the atoms that go into it, but the way those atoms are put together.

Hose and Flexible Tubing
Don't count the days, make the days count. Muhammad Ali

Flexible
How wonderful it is that nobody need wait a single moment before starting to improve the world. Anne

Idea Transcript


Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 10F 1003, Akihabara-Daibiru, 1-18-13, Soto-Kanda, Tiyoda-ku, Tokyo, 101-0021, Japan. kobara [email protected]

Abstract. Drawback of code-based public-key cryptosystems is that their publickey size is lage. It takes some hundreds KB to some MB for typical parameters. While several attempts have been conducted to reduce it, most of them have failed except one, which is Quasi-Dyadic (QD) public-key (for large extention degrees). While an attack has been proposed on QD public-key (for small extension degrees), it can be prevented by making the extension degree m larger, specifically by making q(m(m−1)) large enough where q is the base filed and for a binary code, q = 2. The drawback of QD is, however, it must hold n

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.