Results 41 to 50 of about 2,437 (198)

Quantum Election Protocol Based on Quantum Public Key Cryptosystem

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
There is no quantum election protocol that can fulfil the eight requirements of an electronic election protocol, i.e., completeness, robustness, privacy, legality, unreusability, fairness, verifiability, and receipt‐freeness. To address this issue, we employ the general construction of quantum digital signature and quantum public key encryption, in ...
Wenhua Gao, Li Yang, Prosanta Gope
wiley   +1 more source

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

Permutation LDPC codes in McEliece cryptosystem [PDF]

open access: yesAIP Conference Proceedings, 2019
This paper gives a first glance at McEliece cryptosystem using permutation Low Density Parity Check (LDPC) code as its private and public keys.
null Irwansyah   +2 more
openaire   +1 more source

Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography

open access: yesCryptography, 2021
The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed for the McEliece cryptosystem, together with the one-Mannheim ...
Johann-Philipp Thiers   +1 more
doaj   +1 more source

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

The Support Splitting Algorithm for Induced Codes

open access: yesМоделирование и анализ информационных систем, 2018
In the paper, the analysis of the stability of the McEliece-type cryptosystem on induced codes for key attacks is examined. In particular, a model is considered when the automorphism group is trivial for the base code C, on the basis of which the induced
Yury V. Kosolapov, Aleksey N. Shigaev
doaj   +1 more source

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

Cryptosystem Based on Induced Group Codes

open access: yesМоделирование и анализ информационных систем, 2016
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj   +1 more source

Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems

open access: yesМоделирование и анализ информационных систем, 2017
For the practical application of code cryptosystems such as McEliece, it is necessary that the code used in the cryptosystem should have a fast decoding algorithm.
Vladimir Mikhailovich Deundyak   +2 more
doaj   +1 more source

A Centralized Key Management Scheme Based on McEliece PKC for Space Network

open access: yesIEEE Access, 2020
Constrained by the limited resource, high-latency and high bit error rate, the existing group key management schemes for the space network are inefficient. To solve this problem, we proposed a centralized and identity-based key management scheme by using
Jie Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy