TY - JOUR
T1 - New code-based cryptosystems via the IKKR framework
AU - Lau, Terry Shue Chien
AU - Ivanov, Fedor
AU - Ariffin, Muhammad Rezal Kamel
AU - Chin, Ji Jian
AU - Yap, Timothy Tzen Vun
PY - 2023/8
Y1 - 2023/8
N2 - One main construct for code-based public key cryptosystems is the McEliece framework that hedges upon the hardness of decoding arbitrary linear codes. Based on Goppa codes, the original McEliece cryptosystem however, suffers from having very large public keys. To alleviate this problem, we define a new
problem that is NP-complete and use this assumption of the intractability of the decisional
problem to construct a IND-CCA2-secure code-based public key encryption scheme. We consider generalized Reed–Solomon codes in our public-key cryptosystem and show that it resists Sidelnikov and Shestakov’s key recovery attack. Our generalized Reed–Solomon code encryption scheme achieves optimal public key size when compared with other PKE or key encapsulation mechanisms with deterministic decryption or decapsulation, as it requires only 88.1 kilobytes to store public key for schemes achieving 128-bit security level and 399.69 kilobytes to store public key for schemes achieving 256-bit security level. A public key size reduction of nearly 92% is obtained as compared to the classic McEliece PKE, and nearly 53% compared to the Reed–Solomon code-based PKE.
AB - One main construct for code-based public key cryptosystems is the McEliece framework that hedges upon the hardness of decoding arbitrary linear codes. Based on Goppa codes, the original McEliece cryptosystem however, suffers from having very large public keys. To alleviate this problem, we define a new
problem that is NP-complete and use this assumption of the intractability of the decisional
problem to construct a IND-CCA2-secure code-based public key encryption scheme. We consider generalized Reed–Solomon codes in our public-key cryptosystem and show that it resists Sidelnikov and Shestakov’s key recovery attack. Our generalized Reed–Solomon code encryption scheme achieves optimal public key size when compared with other PKE or key encapsulation mechanisms with deterministic decryption or decapsulation, as it requires only 88.1 kilobytes to store public key for schemes achieving 128-bit security level and 399.69 kilobytes to store public key for schemes achieving 256-bit security level. A public key size reduction of nearly 92% is obtained as compared to the classic McEliece PKE, and nearly 53% compared to the Reed–Solomon code-based PKE.
UR - https://pearl.plymouth.ac.uk/context/secam-research/article/1797/viewcontent/JISAS_D_22_01293_R1.pdf
U2 - 10.1016/j.jisa.2023.103530
DO - 10.1016/j.jisa.2023.103530
M3 - Article
SN - 2214-2134
VL - 76
JO - Journal of Information Security and Applications
JF - Journal of Information Security and Applications
IS - 0
ER -