loading
Documents

Research.Publish.Connect.

Paper

Authors: Partha Roy 1 ; Kirill Morozov 2 ; Kazuhide Fukushima 1 ; Shinsaku Kiyomoto 1 and Tsuyoshi Takagi 3

Affiliations: 1 Information Security Laboratory, KDDI Research, Inc., 2-1-15 Ohara, Fujimino-shi, Saitama 356-8502, Japan ; 2 Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207, U.S.A. ; 3 Department of Mathematical Informatics, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan

ISBN: 978-989-758-359-9

Keyword(s): Post-quantum Cryptography, Code-based Cryptography, Signature Scheme, Fiat-Shamir Transformation, Identification Scheme.

Abstract: In this paper, we derive code-based signature schemes using Fiat-Shamir transformation on code-based zero-knowledge identification schemes, namely the Stern scheme, the Jain-Krenn-Pietrzak-Tentes scheme, and the Cayrel-Veron-El Yousfi scheme. We analyze the security of these code-based signature schemes and derive the security parameters to achieve the 128-bit level security. Furthermore, we implement these signature schemes and compare their performance on a PC.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.205.176.100

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Roy, P.; Morozov, K.; Fukushima, K.; Kiyomoto, S. and Takagi, T. (2019). Security Analysis and Efficient Implementation of Code-based Signature Schemes.In Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-359-9, pages 213-220. DOI: 10.5220/0007259102130220

@conference{icissp19,
author={Roy, P. and Kirill Morozov. and Kazuhide Fukushima. and Shinsaku Kiyomoto. and Tsuyoshi Takagi.},
title={Security Analysis and Efficient Implementation of Code-based Signature Schemes},
booktitle={Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2019},
pages={213-220},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007259102130220},
isbn={978-989-758-359-9},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Security Analysis and Efficient Implementation of Code-based Signature Schemes
SN - 978-989-758-359-9
AU - Roy, P.
AU - Morozov, K.
AU - Fukushima, K.
AU - Kiyomoto, S.
AU - Takagi, T.
PY - 2019
SP - 213
EP - 220
DO - 10.5220/0007259102130220

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.