Abstract
Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as ”key escrow” in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Stern, J.: A new identification scheme based on syndrome decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13–21. Springer, Heidelberg (1994)
Alabbadi, M., Wicker, S.B.: A digital signature scheme based on linear error-correcting block codes. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 238–248. Springer, Heidelberg (1995)
Augot, D., Finiasz, M., Sendreir, N.: A family of fast syndrome based cryptographic hash functions. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 64–83. Springer, Heidelberg (2005)
Fischer, J.B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245–255. Springer, Heidelberg (1996)
Berlekamp, E.R., McEliece, J.R., van Tilborg, H.: On the Inherent Intractability of Certain Coding Problems. IEEE Trans. Information Theory IT-24, 384–386 (1978)
McEliece, R.J.: A Public-Key Cryptosystem Based on Algebraic Coding Theory, Deep Space Network Progress Report 42-44, Jet Propulsion Laboratory, California Institute of Technology, pp. 114–116 (1978)
Goppa, V.D.: A new class of linear error-correcting codes. Probl Peredach. Information 6(3), 24–30 (1970)
McWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)
Gabidulin, E.M., Paramonov, A.V., Tretjakov, O.V.: Ideals over a Non-Commutative Ring and their Applications in Cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547. Springer, Heidelberg (1991)
Engelbert, D., Overbeck, R., Schmidt, A.: A Summary of McEliece-Type Cryptosystems and their Security, TU-Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group, May 10 (2006) (preprint)
van Tilburg, J. : Security-analysis of a class of cryptosystems based on linear error-correcting codes”, Technische Universiteit Eindhoven, Dissertation (1994)
van Tilborg, H.C.A.: Fundamentals Of Cryptology, A Professional Reference and Interactive Tutorial. The Kluwer International Series In Engineering And Computer Science, Eindhoven University of Technology. Kluwer Academic Publishers, Dordrecht (2002), eBook ISBN: 0-306-47053-5
Canteaut, A., Chabaud, F.: A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece’s Cryptosystem and to Narrow-Sense BCH Codes of Length 511. IEEE Trans. Information Theory 44(1), 367–378 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tavallaei, S.E., Falahati, A. (2010). Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-15717-2_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15716-5
Online ISBN: 978-3-642-15717-2
eBook Packages: Computer ScienceComputer Science (R0)