Abstract
Zero-knowledge identification schemes allow a prover to convince a verifier that a certain fact is true, while not revealing any additional information.
In this paper, we propose a scheme whose security relies on the hardness of the Quasi-Dyadic Subcode Equivalence and the Quasi-dyadic syndrome decoding problems. Our code-based scheme is an improvement of the code-based identification scheme devised by Girault. Our construction uses quasi-dyadic subcode with a cheating probability of 1/2. Using quasi-dyadic subcode allows to reduce matrix size and also the communication cost by sending lower data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aguilar, C., Gaborit, P., Schrek, J.: A new zero-knowledge code-based identification scheme with reduced communication scheme. In: IEEE Information Theory Workshop 2011, pp. 648–652 (2011)
Berger, T., Gueye, C.-T., Klamti, J.-B.: Generalized subspace subcodes with application in cryptology
Berger, T.P., Gueye, C.T., Klamti, J.B.: A NP-complete problem in coding theory with application to code based cryptography. In: El Hajji, S., Nitaj, A., Souidi, E.M. (eds.) C2SI 2017. LNCS, vol. 10194, pp. 230–237. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55589-8_15
Cayrel, P.-L., Lindner, R., Rückert, M., Silva, R.: Improved zero-knowledge identification with lattices. Tatra Mountains Math. Publ. 53(1), 33–63 (2012)
Cayrel, P.-L., Lindner, R., Rückert, M., Silva, R.: A lattice-based threshold ring signature scheme. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 255–272. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14712-8_16
Cayrel, P.-L., Véron, P., El Yousfi Alaoui, S.M.: A zero-knowledge identification scheme based on the q-ary syndrome decoding problem. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 171–186. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19574-7_12
Dambra, A., Gaborit, P., Roussellet, M., Schrek, J., Tafforeau, N.: Improved secure implementation of code-based signature schemes on embedded devices’. In: IACR Cryptology ePrint Archive, p. 163 (2014)
Han, M., Feng, X., Ma, S.: An improved zero-knowledge identification scheme based on quasi-dyadic codes. Int. J. Secur. Appl. 10(10), 181–190 (2016)
Cayrel, P.-L., Diagne, M.K., Gueye, C.T.: NP-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem. IJICoT 4(4), 276–288 (2017)
Lyubashevsky, V.: Lattice-based identification schemes secure under active attacks. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 162–179. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78440-1_10
Sendrier, N., Simos, D.E.: The hardness of code equivalence over \(\mathbb{F}_q\) and its application to code-based cryptography. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 203–216. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38616-9_14
Stern, J.: A new identification scheme based on syndrome decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13–21. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_2
Véron, P.: Improved identification schemes based on error-correcting codes. Appl. Algebra Eng. Commun. Comput. 8(1), 5769 (1996)
Girault, M.: A (non-practical) three-pass identification protocol using coding theory. In: Seberry, J., Pieprzyk, J. (eds.) AUSCRYPT 1990. LNCS, vol. 453, pp. 265–272. Springer, Heidelberg (1990). https://doi.org/10.1007/BFb0030367
Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 77–97. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02384-2_6
Misoczki, R., Barreto, P.S.L.M.: Compact McEliece keys from Goppa codes. In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 376–392. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-05445-7_24
Acknowledgments
This work is supported by CEA-MITIC/Project CBC and the government of Senegal’s Ministry of Higher Education and Research for ISPQ project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Proof of the NP-Completeness of the QD-ES Problem when We Fix the Order
A Proof of the NP-Completeness of the QD-ES Problem when We Fix the Order
1.1 A.1 Definitions
Four Dimensional Matching Problem (FDMP)
Definition 16
-
Input: a subset \(U \subseteq T \times T \times T \times T\) where T is a finite set.
-
Question: Does it exist a set \(W \subseteq U\) such that \(| W |=| T |\) and every two vectors of W have different i-th coordinate, \(i \in \{1, 2, 3, 4\}\)?
The Kronecker Product
Let A be a \(k \times \ell \) matrix, and B be a \(m \times n\) matrix.
Definition 17
The Kronecker product of A and B (denoted \((A \otimes B\)) is the \(km \times \ell n\) matrix:
Note that the Kronecker product of two matrices is another matrix, usually a much larger one.
1.2 A.2 Relation Between ES Problem and FDMP
Through the following illustration, we show the relation between the ES problem and the FDMP.
Let \(T = \{1, 2, 3, 4\}\) and \(U = \{U_1 , U_2 , U_3 , U_4 , U_5 , U_6\}\) with \(U_1 = (1, 2, 3, 4)\);
\(U_2 = (4, 1, 3, 2)\); \(U_3 = (2, 1, 4, 3)\); \(U_4 = (3, 4, 1, 2)\); \(U_5 = (4, 3, 2, 1)\);
\(U_6 = (4, 4, 3, 4)\).
A solution for the FDMP is the set W consisting of the elements \( U_1, U_3, U_4 \) et \(U_5\).
We apply differents transformations \(\mathcal {T}\) to U in order to obtain an \(| U | \times 4| T |\) matrix M:
-
For each \(x =(x_1,x_2,x_3,x_4) \in U\), we give the vector \(l(x) = (y_1 ,\cdots , y_{4n})\) such that \(y_i = 0\) for all i except \(y_{x_1} = y_{n+x_2} = y_{2n+x_3} = y_{3n+x_4} = 1\).
For our example, we obtain:
$$\begin{aligned} \begin{aligned} l((1, 2, 3, 4)) = (1,0,0,0,~1,0,0,0,~1,0,0,0,~1,0,0,0)\\ l((4, 1, 3, 2)) = (0,0,0,1,~1,0,0,0,~0,0,1,0,~0,1,0,0)\\ l((2, 1, 4, 3)) = (0,1,0,0,~1,0,0,0,~0,0,0,1,~0,0,1,0)\\ l((3, 4, 1, 2)) = (0,0,1,0,~0,0,0,1,~1,0,0,0,~1,0,0,0)\\ l((4, 3, 2, 1)) = (0,0,0,1,~0,0,1,0,~0,1,0,0,~1,0,0,0)\\ l((4, 4, 3, 4)) = (0,0,0,1,~0,0,0,1,~0,0,1,0,~0,0,0,1)\\ \end{aligned} \end{aligned}$$ -
We construct the matrix M of size \(| U | \times 4| T |\) by keeping the vectors l(x) of the ordered elements of U as following:
$$M = \left( \begin{array}{cccccccc|cccccccc|cccccccc|cccccccc} 1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 \\ 0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 \\ 0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 \\ 0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 \\ 0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 \\ 0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}1 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}0 &{} &{}1 \end{array} \right) $$
With this new representation of U, a valid FDMP solution corresponds to the existence of |T| rows of M forming a matrix
Since \(M_{sol}\) contains only one 1 on each of its columns, it is equivalent by permutation to a matrix of the form \((I_{4}|I_{4}|I_{4}|I_{4})\).
Now, let consider \(\mathcal {D}\) and \(\mathcal {C}\), linear codes over \(\mathbb {F}_q\) of respective generator matrices \(G_{\mathcal {D}}\) and \(G_{\mathcal {C}}\) defined by:
where \(0_{4 \times 2}\) is the \(4\times 2\) null matrix and \(I_4\) the \(4\times 4\) identity matrix.
So, for the same reasons as before, finding a valid FDMP solution is such as to determine a permutation \(\sigma \) such as \(\sigma (G_{\mathcal {C}})\) is a subcode of \( G_{\mathcal {D}}\). This corresponds to the ES problem.
1.3 A.3 Proof
We make a reduction of FDMP to QD-ES.
-
Let us assume an algorithm \(\gamma \) is able to solve any instance of the QD-ES Problem.
-
Let \(U \subset T \times T \times T \times T\) with T, a finite set of cardinality n. (n, U) is the inputs of FDMP.
-
Let U be a set such that:
$$ U = \{u_1, u_2,\cdots ,u_{r}\} \text { with } r = |U|. $$we apply the transformations \(\mathcal {T}\), view in the previous section, to U and obtain an \(|U|\times 4|T|\) matrix M. Let G be a \(r \times 4r + 4n\) matrix defined as follows:
$$ G = (I_r|I_r|I_r|I_r|M) $$From this matrix G we construct the quasi-dyadic matrix \(\mathbf G _\mathcal {D}\) of size \(2r \times 8r+8n\):
$$ \mathbf G _\mathcal {D} = G \otimes I_2$$(where \(I_2\) the identity matrix of size \( 2 \times 2 \))
Let \(\mathcal {D}\) be the \([8r + 8n, 2r]\) linear code over \(\mathbb {F}_q\) generated by the matrix \(\mathbf G _\mathcal {D}\). \(\mathcal {D}\) is a quasi-dyadic code.
Lemma 1
The minimum distance of \(\mathcal {D}\) is exactly 8. In addition, the minimum codewords are exactly the rows of \(\mathbf G _\mathcal {D}\).
Proof
The rows of \(\mathbf G _\mathcal {D}\) correspond to codewords of weight 8. Since all the rows of M are distinct, it is the same with rows of \(M \otimes I_2\). Then the weight of the sum of two rows of \(\mathbf G _\mathcal {D}\) is at least 10. Finally, the weight of the sum of t distinct rows is at least 4t, which is greater than 12 for \(t \ge 3\).
-
We transform a solution of the QD-ES into a solution of the FDMP. Let \(\mathbf G _\mathcal {C}\) be a \(2n \times 8r + 8n\) quasi-dyadic matrix defined by
$$ \mathbf G _\mathcal {C} = (I_n | 0_{n\times (r- n)}|I_n | 0_{n\times (r- n)}|I_n | 0_{n\times (r-n)} | I_n | 0_{n \times (r-n)} |I_n|I_n|I_n|I_n)\otimes I_2 $$A solution to QD-ES Problem, with \(\mathbf G _\mathcal {D}\) and \(\mathbf G _\mathcal {C}\) as inputs, is a quasi-dyadic permutation \(\sigma \) such that \(\sigma (\mathcal {C})\) be a quasi-dyadic subcode of \(\mathcal {D}\).
The image of any rowgroups of \(\mathbf G _\mathcal {C}\) by \(\sigma \) is rowgroups whose rows are codewords of \(\mathcal {D}\) of weight exactly 8. From Lemma 1, these elements are rows of \(\mathbf G _\mathcal {D}\). Thus, we obtain n distinct row quasi-dyadic block of \(\mathcal {D}\). We choose the first rows of each row quasi-dyadic block and we get n distinct rows with the particularity that no two rows agree on any coordinate. This leads directly to a matching W of U.
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Boidje, B.O., Gueye, C.T., Dione, G.N., Klamti, J.B. (2019). Quasi-Dyadic Girault Identification Scheme. In: Carlet, C., Guilley, S., Nitaj, A., Souidi, E. (eds) Codes, Cryptology and Information Security. C2SI 2019. Lecture Notes in Computer Science(), vol 11445. Springer, Cham. https://doi.org/10.1007/978-3-030-16458-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-16458-4_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16457-7
Online ISBN: 978-3-030-16458-4
eBook Packages: Computer ScienceComputer Science (R0)