首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Efficient information-theoretic distributed point functions with general output groups 具有一般输出群的高效信息论分布点函数
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-16 DOI: 10.1007/s10623-024-01562-z
Junru Li, Pengzhen Ke, Liang Feng Zhang

An n-server information-theoretic Distributed Point Function (DPF) allows a client to secret-share a point function (f_{alpha ,beta }(x)) with domain [N] and output group (mathbb {G}) among n servers such that each server learns no information about the function from its share (called a key) but can compute an additive share of (f_{alpha ,beta }(x)) for any x. DPFs with small key sizes and general output groups are preferred. In this paper, we propose a new transformation from share conversions to information-theoretic DPFs. By applying it to the share conversions from Efremenko’s PIR and Dvir–Gopi PIR, we obtain both an 8-server DPF with key size ( O(2^{10sqrt{log Nlog log N}}+log p)) and output group (mathbb {Z}_p) and a 4-server DPF with key size (O(tau cdot 2^{6sqrt{log Nlog log N}})) and output group (mathbb {Z}_{2^tau }). The former allows us to partially answer an open question by Boyle, Gilboa, Ishai, and Kolobov (ITC 2022) and the latter allows us to build the first DPFs that may take any finite Abelian groups as output groups. We also discuss how to further reduce the key sizes by using different PIRs, how to reduce the number of servers by resorting to statistical security or using nice integers, and how to obtain DPFs with t-security. We show the applications of the new DPFs by constructing new efficient PIR protocols with result verification.

一个有N个服务器的信息论分布式点函数(DPF)允许客户端在N个服务器中秘密共享一个点函数(f_{alpha ,beta }(x)),域[N]和输出组(mathbb {G}),这样每个服务器都不会从它的共享(称为密钥)中学习到关于该函数的信息,但可以为任何x计算一个附加的共享(f_{alpha ,beta }(x))。具有小密钥大小和一般输出组的DPF是首选的。本文提出了一种从共享转换到信息论dpf的新方法。通过将其应用于Efremenko的PIR和dvr - gopi PIR的共享转换,我们获得了密钥大小为( O(2^{10sqrt{log Nlog log N}}+log p))和输出组(mathbb {Z}_p)的8服务器DPF和密钥大小为(O(tau cdot 2^{6sqrt{log Nlog log N}}))和输出组(mathbb {Z}_{2^tau })的4服务器DPF。前者允许我们部分回答Boyle, Gilboa, Ishai和Kolobov (ITC 2022)提出的开放性问题,后者允许我们构建第一个dpf,可以将任何有限阿贝尔群作为输出群。我们还讨论了如何通过使用不同的pir来进一步减小密钥大小,如何通过统计安全性或使用良好的整数来减少服务器数量,以及如何使用t-security获得dpf。我们通过构造新的高效PIR协议来展示新的dpf的应用,并对结果进行了验证。
{"title":"Efficient information-theoretic distributed point functions with general output groups","authors":"Junru Li, Pengzhen Ke, Liang Feng Zhang","doi":"10.1007/s10623-024-01562-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01562-z","url":null,"abstract":"<p>An <i>n</i>-server information-theoretic <i>Distributed Point Function</i> (DPF) allows a client to secret-share a point function <span>(f_{alpha ,beta }(x))</span> with domain [<i>N</i>] and output group <span>(mathbb {G})</span> among <i>n</i> servers such that each server learns no information about the function from its share (called a <i>key</i>) but can compute an additive share of <span>(f_{alpha ,beta }(x))</span> for any <i>x</i>. DPFs with small key sizes and general output groups are preferred. In this paper, we propose a new transformation from share conversions to information-theoretic DPFs. By applying it to the share conversions from Efremenko’s PIR and Dvir–Gopi PIR, we obtain both an 8-server DPF with key size <span>( O(2^{10sqrt{log Nlog log N}}+log p))</span> and output group <span>(mathbb {Z}_p)</span> and a 4-server DPF with key size <span>(O(tau cdot 2^{6sqrt{log Nlog log N}}))</span> and output group <span>(mathbb {Z}_{2^tau })</span>. The former allows us to partially answer an open question by Boyle, Gilboa, Ishai, and Kolobov (ITC 2022) and the latter allows us to build the first DPFs that may take any finite Abelian groups as output groups. We also discuss how to further reduce the key sizes by using different PIRs, how to reduce the number of servers by resorting to statistical security or using nice integers, and how to obtain DPFs with <i>t</i>-security. We show the applications of the new DPFs by constructing new efficient PIR protocols with result verification.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"29 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rate-improved multi-permutation codes for correcting a single burst of stable deletions 用于校正单个稳定缺失的速率改进的多排列码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-16 DOI: 10.1007/s10623-025-01564-5
Xiang Wang, Fang-Wei Fu

Permutation and multi-permutation codes have been widely studied due to their potential applications in communications and storage systems, especially in flash memory. In this paper, we consider balanced multi-permutation codes correcting a single burst of stable deletions of length t and length at most t, respectively. Based on the properties of burst stable deletions and stabilizer permutation subgroups, we propose two constructions of multi-permutation codes correcting a single burst of stable deletions of length up to some parameter. The multi-permutation codes can achieve larger rates than available codes while maintaining simple interleaving structures. Moreover, the decoding methods are given in proofs and verified by examples.

排列码和多排列码由于其在通信和存储系统特别是闪存中的潜在应用而受到广泛的研究。在本文中,我们考虑平衡多排列码分别校正长度为t和最长为t的稳定缺失。基于突发稳定缺失和稳定器置换子群的性质,提出了两种多置换码的构造,对长度不超过某个参数的单个突发稳定缺失进行校正。多置换码在保持简单交错结构的同时,可以获得比现有码更高的码率。并给出了译码方法的证明和实例验证。
{"title":"Rate-improved multi-permutation codes for correcting a single burst of stable deletions","authors":"Xiang Wang, Fang-Wei Fu","doi":"10.1007/s10623-025-01564-5","DOIUrl":"https://doi.org/10.1007/s10623-025-01564-5","url":null,"abstract":"<p>Permutation and multi-permutation codes have been widely studied due to their potential applications in communications and storage systems, especially in flash memory. In this paper, we consider balanced multi-permutation codes correcting a single burst of stable deletions of length <i>t</i> and length at most <i>t</i>, respectively. Based on the properties of burst stable deletions and stabilizer permutation subgroups, we propose two constructions of multi-permutation codes correcting a single burst of stable deletions of length up to some parameter. The multi-permutation codes can achieve larger rates than available codes while maintaining simple interleaving structures. Moreover, the decoding methods are given in proofs and verified by examples.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"6 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additive twisted codes: new distance bounds and infinite families of quantum codes 加性扭曲码:新的距离边界和量子码的无限族
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-16 DOI: 10.1007/s10623-024-01552-1
Reza Dastbasteh, Petr Lisoněk

We provide a new construction of quantum codes that enables integration of a broader class of classical codes into the mathematical framework of quantum stabilizer codes. Next, we present new connections between twisted codes and linear cyclic codes and provide novel bounds for the minimum distance of twisted codes. We show that classical tools such as the Hartmann–Tzeng minimum distance bound are applicable to twisted codes. This enabled us to discover five new infinite families and many other examples of record-breaking, and sometimes optimal, binary quantum codes. We also discuss the role of the (gamma ) value on the parameters of twisted codes and present new results regarding the construction of twisted codes with different (gamma ) values but identical parameters. Finally, we list many new record-breaking binary quantum codes that we obtained from additive twisted, linear cyclic, and constacyclic codes.

我们提供了一种新的量子码结构,可以将更广泛的经典码集成到量子稳定码的数学框架中。在此基础上,提出了双扭码与线性循环码之间的新联系,并给出了双扭码最小距离的新界限。我们证明了Hartmann-Tzeng最小距离界等经典工具适用于扭曲码。这使我们发现了五个新的无限族和许多其他破纪录的例子,有时是最佳的,二进制量子代码。我们还讨论了(gamma )值对扭曲码参数的作用,并给出了关于(gamma )值不同但参数相同的扭曲码的构造的新结果。最后,我们列举了从加性扭曲码、线性循环码和恒循环码中获得的许多新的破纪录二进制量子码。
{"title":"Additive twisted codes: new distance bounds and infinite families of quantum codes","authors":"Reza Dastbasteh, Petr Lisoněk","doi":"10.1007/s10623-024-01552-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01552-1","url":null,"abstract":"<p>We provide a new construction of quantum codes that enables integration of a broader class of classical codes into the mathematical framework of quantum stabilizer codes. Next, we present new connections between twisted codes and linear cyclic codes and provide novel bounds for the minimum distance of twisted codes. We show that classical tools such as the Hartmann–Tzeng minimum distance bound are applicable to twisted codes. This enabled us to discover five new infinite families and many other examples of record-breaking, and sometimes optimal, binary quantum codes. We also discuss the role of the <span>(gamma )</span> value on the parameters of twisted codes and present new results regarding the construction of twisted codes with different <span>(gamma )</span> values but identical parameters. Finally, we list many new record-breaking binary quantum codes that we obtained from additive twisted, linear cyclic, and constacyclic codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"77 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On LCD skew group codes 液晶显示器上的偏斜组代码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-13 DOI: 10.1007/s10623-024-01561-0
Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir

In this paper we study skew group codes as left ideals in some skew group rings. We have constructed a large class of LCD codes and a class of an LCD MDS codes. An important interest is given to the construction of idempotents generators of these codes.

本文研究了一些斜群环上作为左理想的斜群码。我们构造了一个大的LCD代码类和一个LCD MDS代码类。我们对这些码的幂等元生成器的构造非常感兴趣。
{"title":"On LCD skew group codes","authors":"Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir","doi":"10.1007/s10623-024-01561-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01561-0","url":null,"abstract":"<p>In this paper we study skew group codes as left ideals in some skew group rings. We have constructed a large class of LCD codes and a class of an LCD MDS codes. An important interest is given to the construction of idempotents generators of these codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"76 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142974807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designer of codes: a tribute to Jennifer Key 代码设计师:向Jennifer Key致敬
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-12 DOI: 10.1007/s10623-024-01517-4
Vassili C. Mavron, Harold N. Ward

We offer this tribute to our friend and colleague, Jenny Key. After describing her education and career, we comment on her areas of research. The paper concludes with a complete list of her publications.

我们向我们的朋友和同事珍妮·基致敬。在描述了她的教育和职业之后,我们对她的研究领域进行了评论。这篇论文最后列出了她发表的作品的完整清单。
{"title":"Designer of codes: a tribute to Jennifer Key","authors":"Vassili C. Mavron, Harold N. Ward","doi":"10.1007/s10623-024-01517-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01517-4","url":null,"abstract":"<p>We offer this tribute to our friend and colleague, Jenny Key. After describing her education and career, we comment on her areas of research. The paper concludes with a complete list of her publications.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"36 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142967962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Somewhat homomorphic encryption based on random codes 基于随机码的某种同态加密
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-06 DOI: 10.1007/s10623-024-01555-y
Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit

We present a secret-key encryption scheme based on random rank metric ideal linear codes with a simple decryption circuit. It supports unlimited homomorphic additions and plaintext multiplications (i.e. the homomorphic multiplication of a clear plaintext with a ciphertext) as well as a fixed arbitrary number of homomorphic multiplications. We study a candidate bootstrapping algorithm that requires no multiplication but additions and plaintext multiplications only. This latter operation is therefore very efficient in our scheme, whereas bootstrapping is usually the main reason which penalizes the performance of other fully homomorphic encryption schemes. However, the security reduction of our scheme restricts the number of independent ciphertexts that can be published. In particular, this prevents to securely evaluate the bootstrapping algorithm as the number of ciphertexts in the key switching material is too large. Our scheme is nonetheless the first somewhat homomorphic encryption scheme based on random ideal codes and a first step towards full homomorphism. Random ideal codes give stronger security guarantees as opposed to existing constructions based on highly structured codes. We give concrete parameters for our scheme that shows that it achieves competitive sizes and performance, with a key size of 3.7 kB and a ciphertext size of 0.9 kB when a single multiplication is allowed.

提出了一种基于随机秩度量理想线性码的密钥加密方案,该方案具有简单的解密电路。它支持无限同态加法和明文乘法(即明文与密文的同态乘法)以及固定任意数量的同态乘法。我们研究了一种候选的自举算法,它不需要乘法,只需要加法和明文乘法。因此,后一种操作在我们的方案中非常有效,而自启动通常是影响其他完全同态加密方案性能的主要原因。然而,我们方案的安全性降低限制了可以发布的独立密文的数量。特别是,当密钥交换材料中的密文数量太大时,这会阻止安全评估自举算法。尽管如此,我们的方案是第一个基于随机理想码的多少同态加密方案,也是迈向完全同态的第一步。相对于基于高度结构化代码的现有结构,随机理想代码提供了更强的安全性保证。我们为我们的方案给出了具体的参数,表明它实现了具有竞争力的大小和性能,当允许一次乘法时,密钥大小为3.7 kB,密文大小为0.9 kB。
{"title":"Somewhat homomorphic encryption based on random codes","authors":"Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit","doi":"10.1007/s10623-024-01555-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01555-y","url":null,"abstract":"<p>We present a secret-key encryption scheme based on random rank metric ideal linear codes with a simple decryption circuit. It supports unlimited homomorphic additions and plaintext multiplications (i.e. the homomorphic multiplication of a clear plaintext with a ciphertext) as well as a fixed arbitrary number of homomorphic multiplications. We study a candidate bootstrapping algorithm that requires no multiplication but additions and plaintext multiplications only. This latter operation is therefore very efficient in our scheme, whereas bootstrapping is usually the main reason which penalizes the performance of other fully homomorphic encryption schemes. However, the security reduction of our scheme restricts the number of independent ciphertexts that can be published. In particular, this prevents to securely evaluate the bootstrapping algorithm as the number of ciphertexts in the key switching material is too large. Our scheme is nonetheless the first somewhat homomorphic encryption scheme based on random ideal codes and a first step towards full homomorphism. Random ideal codes give stronger security guarantees as opposed to existing constructions based on highly structured codes. We give concrete parameters for our scheme that shows that it achieves competitive sizes and performance, with a key size of 3.7 kB and a ciphertext size of 0.9 kB when a single multiplication is allowed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"28 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142934919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ternary isodual codes and 3-designs 三进制单码和3-设计
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-06 DOI: 10.1007/s10623-024-01558-9
Minjia Shi, Ruowen Liu, Dean Crnković, Patrick Solé, Andrea Švob

Ternary isodual codes and their duals are shown to support 3-designs under mild symmetry conditions. These designs are held invariant by a double cover of the permutation part of the automorphism group of the code. Examples of interest include extended quadratic residues (QR) codes of lengths 14 and 38 whose automorphism groups are PSL(2, 13) and PSL(2, 37), respectively. We also consider Generalized Quadratic Residue (GQR) codes in the sense of Lint and MacWiliams (IEEE Trans Inf Theory 24(6): 730-737,1978). These codes are the abelian generalizations of the Quadratic Residue (QR) codes which are cyclic. We construct them as row span of a Jacobsthal matrix. In lengths 50 and 26 we obtain 3-designs invariant under a double cover of (P{Sigma }L(2,49),) and (P{Sigma }L(2,25),) respectively. In addition, from block orbits of these 3-designs we construct a number of other 3-designs and 2-designs. Finally, we apply the same construction to the binary extended GQR code of length 82.

在温和对称条件下,证明了三元等偶码及其对偶码支持3-设计。这些设计通过代码的自同构群的置换部分的双重覆盖保持不变。我们感兴趣的例子包括长度为14和38的扩展二次残码,它们的自同态群分别是PSL(2,13)和PSL(2,37)。我们还考虑了Lint和macwilliams意义上的广义二次残差(GQR)码(IEEE Trans Inf Theory 24(6): 730-737,1978)。这些码是循环二次残数码的阿贝尔推广。我们把它们构造成雅各布矩阵的行张成的空间。在长度50和26中,我们分别在(P{Sigma }L(2,49),)和(P{Sigma }L(2,25),)的双盖下获得了3种设计不变。此外,从这些3-设计的块轨道中,我们构建了许多其他3-设计和2-设计。最后,我们将相同的结构应用于长度为82的二进制扩展GQR码。
{"title":"Ternary isodual codes and 3-designs","authors":"Minjia Shi, Ruowen Liu, Dean Crnković, Patrick Solé, Andrea Švob","doi":"10.1007/s10623-024-01558-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01558-9","url":null,"abstract":"<p>Ternary isodual codes and their duals are shown to support 3-designs under mild symmetry conditions. These designs are held invariant by a double cover of the permutation part of the automorphism group of the code. Examples of interest include extended quadratic residues (QR) codes of lengths 14 and 38 whose automorphism groups are <i>PSL</i>(2, 13) and <i>PSL</i>(2, 37), respectively. We also consider Generalized Quadratic Residue (GQR) codes in the sense of Lint and MacWiliams (IEEE Trans Inf Theory 24(6): 730-737,1978). These codes are the abelian generalizations of the Quadratic Residue (QR) codes which are cyclic. We construct them as row span of a Jacobsthal matrix. In lengths 50 and 26 we obtain 3-designs invariant under a double cover of <span>(P{Sigma }L(2,49),)</span> and <span>(P{Sigma }L(2,25),)</span> respectively. In addition, from block orbits of these 3-designs we construct a number of other 3-designs and 2-designs. Finally, we apply the same construction to the binary extended GQR code of length 82.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142935023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm RYDE:一个基于MPC-in-the-Head范式的秩证解码问题的数字签名方案
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-04 DOI: 10.1007/s10623-024-01544-1
Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte

We present a signature scheme based on the syndrome decoding (SD) problem in rank metric. It is a construction from Multi-Party Computation (MPC), using a MPC protocol which is a slight improvement of the linearized polynomial protocol used in Feneuil (Cryptology ePrint Archive, Report 2022/1512, 2022), allowing to obtain a zero-knowledge proof thanks to the MPCitH (MPC-in-the-Head) paradigm. We design two different zero-knowledge proofs exploiting this paradigm: the first, which reaches the lower communication costs, relies on additive secret sharing and uses the hypercube technique (Aguilar-Melchor et al., in: Cryptology ePrint Archive, Report 2022/1645, 2022); and the second relies on low-threshold linear secret sharing as proposed in Feneuil (Cryptology ePrint Archive, Report 2022/1512, 2022). These proofs of knowledge are transformed to signature schemes thanks to the Fiat–Shamir transform (Fiat and Shamir, in: International Cryptology Conference (CRYPTO), 1986) and the resulting schemes have signatures of size less than 6 kB. These performances prompted us to propose this signature scheme to the post-quantum cryptography standardization process organized by NIST.

提出了一种基于秩度量中的综合征解码(SD)问题的签名方案。它是多方计算(MPC)的结构,使用MPC协议,该协议是Feneuil(密码学电子打印档案,报告2022/1512,2022)中使用的线性化多项式协议的稍微改进,允许通过MPCitH (MPC-in-the- head)范式获得零知识证明。我们利用这种范式设计了两种不同的零知识证明:第一种,达到较低的通信成本,依赖于加性秘密共享并使用超立方体技术(Aguilar-Melchor等人,in: crypology ePrint Archive, Report 2022/1645, 2022);第二种依赖于Feneuil (cryptoology ePrint Archive, Report 2022/1512, 2022)中提出的低阈值线性秘密共享。由于Fiat - Shamir转换(Fiat和Shamir, in: International crypology Conference (CRYPTO), 1986)),这些知识证明被转换为签名方案,并且所得到的方案的签名大小小于6 kB。这些性能促使我们向NIST组织的后量子加密标准化过程提出该签名方案。
{"title":"RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm","authors":"Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte","doi":"10.1007/s10623-024-01544-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01544-1","url":null,"abstract":"<p>We present a signature scheme based on the syndrome decoding (SD) problem in rank metric. It is a construction from Multi-Party Computation (MPC), using a MPC protocol which is a slight improvement of the linearized polynomial protocol used in Feneuil (Cryptology ePrint Archive, Report 2022/1512, 2022), allowing to obtain a zero-knowledge proof thanks to the MPCitH (MPC-in-the-Head) paradigm. We design two different zero-knowledge proofs exploiting this paradigm: the first, which reaches the lower communication costs, relies on additive secret sharing and uses the hypercube technique (Aguilar-Melchor et al., in: Cryptology ePrint Archive, Report 2022/1645, 2022); and the second relies on low-threshold linear secret sharing as proposed in Feneuil (Cryptology ePrint Archive, Report 2022/1512, 2022). These proofs of knowledge are transformed to signature schemes thanks to the Fiat–Shamir transform (Fiat and Shamir, in: International Cryptology Conference (CRYPTO), 1986) and the resulting schemes have signatures of size less than 6 kB. These performances prompted us to propose this signature scheme to the post-quantum cryptography standardization process organized by NIST.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142924654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully selective opening secure IBE from LWE 完全选择性打开安全IBE从LWE
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-03 DOI: 10.1007/s10623-024-01560-1
Dingding Jia, Haiyang Xue, Bao Li

Selective opening security ensures that, when an adversary is given multiple ciphertexts and corrupts a subset of the senders (thereby obtaining the plaintexts and the senders’ randomness), the privacy of the remaining ciphertexts is still preserved. Previous selective opening secure IBE schemes encrypt messages bit-by-bit, or only achieve selective-id security. In this paper, we present the first adaptive-id, selective opening secure identity-based encryption (IBE) tightly from LWE. To achieve this, we introduce a new primitive called delegatable all-but-many lossy trapdoor functions (DABM-LTDF) and provide a generic construction that converts DABM-LTDF into an adaptive-id, selective opening secure IBE through a tight security reduction. Finally, we construct a concrete DABM-LTDF from the LWE assumption, resulting in the first adaptive-id, selective opening secure IBE from LWE.

选择性打开安全性确保,当攻击者获得多个密文并破坏发送者的一个子集(从而获得明文和发送者的随机性)时,仍然保留剩余密文的隐私。以前的选择性打开安全IBE方案对消息进行逐位加密,或者只实现选择性id安全性。在本文中,我们提出了第一个紧密基于LWE的自适应id、选择性开放的安全身份加密(IBE)。为了实现这一目标,我们引入了一种新的原语,称为可委派的所有但有许多损耗的陷门函数(ddab - ltdf),并提供了一种通用结构,通过严格的安全性降低,将ddab - ltdf转换为自适应id、选择性打开的安全IBE。最后,我们根据LWE假设构建了一个具体的dbm - ltdf,从而得到了第一个自适应id、选择性开放的LWE安全IBE。
{"title":"Fully selective opening secure IBE from LWE","authors":"Dingding Jia, Haiyang Xue, Bao Li","doi":"10.1007/s10623-024-01560-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01560-1","url":null,"abstract":"<p>Selective opening security ensures that, when an adversary is given multiple ciphertexts and corrupts a subset of the senders (thereby obtaining the plaintexts and the senders’ randomness), the privacy of the remaining ciphertexts is still preserved. Previous selective opening secure IBE schemes encrypt messages bit-by-bit, or only achieve selective-id security. In this paper, we present the first adaptive-id, selective opening secure identity-based encryption (IBE) tightly from LWE. To achieve this, we introduce a new primitive called delegatable all-but-many lossy trapdoor functions (DABM-LTDF) and provide a generic construction that converts DABM-LTDF into an adaptive-id, selective opening secure IBE through a tight security reduction. Finally, we construct a concrete DABM-LTDF from the LWE assumption, resulting in the first adaptive-id, selective opening secure IBE from LWE.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"17 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142916897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum sieving for code-based cryptanalysis and its limitations for ISD 基于码的密码分析的量子筛分及其在ISD中的局限性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-02 DOI: 10.1007/s10623-024-01545-0
Lynn Engelberts, Simona Etinski, Johanna Loyer

Sieving using near-neighbor search techniques is a well-known method in lattice-based cryptanalysis, yielding the current best runtime for the shortest vector problem in both the classical and quantum setting. Recently, sieving has also become an important tool in code-based cryptanalysis. Specifically, a variant of the information-set decoding (ISD) framework, commonly used for attacking cryptographically relevant instances of the decoding problem, has been introduced that involves a sieving subroutine. The resulting sieving-based ISD framework yields complexities close to the best-performing classical algorithms for the decoding problem. It is therefore natural to ask how well quantum versions perform. In this work, we introduce the first quantum algorithms for code sieving by designing quantum variants of the aforementioned sieving subroutine. In particular, using quantum-walk techniques, we provide a speed-up over classical code sieving and over a variant using Grover’s algorithm. Our quantum-walk algorithm exploits the structure of the underlying search problem by adding a layer of locality sensitive filtering, inspired by a quantum-walk algorithm for lattice sieving. We complement our asymptotic analysis of the quantum algorithms with numerical results, and observe that our quantum speed-ups for code sieving behave similarly as those observed in lattice sieving. In addition, we show that a natural quantum analog of the sieving-based ISD framework does not provide any speed-up over the first quantum ISD algorithm. Our analysis highlights that the framework should be adapted in order to outperform state-of-the-art quantum ISD algorithms.

在基于格的密码分析中,使用近邻搜索技术进行筛分是一种众所周知的方法,它在经典和量子环境下都能产生最短向量问题的当前最佳运行时间。近年来,筛分也成为基于代码的密码分析的重要工具。具体地说,介绍了信息集解码(ISD)框架的一种变体,该框架通常用于攻击解码问题的密码学相关实例,它涉及筛选子例程。由此产生的基于筛选的ISD框架产生的复杂性接近于解码问题中性能最好的经典算法。因此,人们自然会问量子版本的表现有多好。在这项工作中,我们通过设计上述筛选子程序的量子变体,引入了第一个用于代码筛选的量子算法。特别是,使用量子行走技术,我们提供了比经典代码筛选和使用Grover算法的变体更快的速度。我们的量子行走算法通过添加一层局部性敏感滤波来利用底层搜索问题的结构,其灵感来自于用于晶格筛选的量子行走算法。我们用数值结果补充了量子算法的渐近分析,并观察到我们的代码筛选的量子加速行为与在晶格筛选中观察到的相似。此外,我们证明了基于筛选的ISD框架的自然量子模拟并不比第一种量子ISD算法提供任何加速。我们的分析强调,为了超越最先进的量子ISD算法,应该对框架进行调整。
{"title":"Quantum sieving for code-based cryptanalysis and its limitations for ISD","authors":"Lynn Engelberts, Simona Etinski, Johanna Loyer","doi":"10.1007/s10623-024-01545-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01545-0","url":null,"abstract":"<p>Sieving using near-neighbor search techniques is a well-known method in lattice-based cryptanalysis, yielding the current best runtime for the shortest vector problem in both the classical and quantum setting. Recently, sieving has also become an important tool in code-based cryptanalysis. Specifically, a variant of the information-set decoding (ISD) framework, commonly used for attacking cryptographically relevant instances of the decoding problem, has been introduced that involves a sieving subroutine. The resulting sieving-based ISD framework yields complexities close to the best-performing classical algorithms for the decoding problem. It is therefore natural to ask how well quantum versions perform. In this work, we introduce the first quantum algorithms for code sieving by designing quantum variants of the aforementioned sieving subroutine. In particular, using quantum-walk techniques, we provide a speed-up over classical code sieving and over a variant using Grover’s algorithm. Our quantum-walk algorithm exploits the structure of the underlying search problem by adding a layer of locality sensitive filtering, inspired by a quantum-walk algorithm for lattice sieving. We complement our asymptotic analysis of the quantum algorithms with numerical results, and observe that our quantum speed-ups for code sieving behave similarly as those observed in lattice sieving. In addition, we show that a natural quantum analog of the sieving-based ISD framework does not provide any speed-up over the first quantum ISD algorithm. Our analysis highlights that the framework should be adapted in order to outperform state-of-the-art quantum ISD algorithms.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142916896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1