Skip to main content

Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

  • Conference paper
Global Security, Safety, and Sustainability (ICGS3 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 92))

  • 1148 Accesses

Abstract

Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as ”key escrow” in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  3. Stern, J.: A new identification scheme based on syndrome decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13–21. Springer, Heidelberg (1994)

    Google Scholar 

  4. Alabbadi, M., Wicker, S.B.: A digital signature scheme based on linear error-correcting block codes. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 238–248. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  5. Augot, D., Finiasz, M., Sendreir, N.: A family of fast syndrome based cryptographic hash functions. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 64–83. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Fischer, J.B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245–255. Springer, Heidelberg (1996)

    Google Scholar 

  7. Berlekamp, E.R., McEliece, J.R., van Tilborg, H.: On the Inherent Intractability of Certain Coding Problems. IEEE Trans. Information Theory IT-24, 384–386 (1978)

    Article  Google Scholar 

  8. McEliece, R.J.: A Public-Key Cryptosystem Based on Algebraic Coding Theory, Deep Space Network Progress Report 42-44, Jet Propulsion Laboratory, California Institute of Technology, pp. 114–116 (1978)

    Google Scholar 

  9. Goppa, V.D.: A new class of linear error-correcting codes. Probl Peredach. Information 6(3), 24–30 (1970)

    MATH  MathSciNet  Google Scholar 

  10. McWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)

    Google Scholar 

  11. Gabidulin, E.M., Paramonov, A.V., Tretjakov, O.V.: Ideals over a Non-Commutative Ring and their Applications in Cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547. Springer, Heidelberg (1991)

    Google Scholar 

  12. Engelbert, D., Overbeck, R., Schmidt, A.: A Summary of McEliece-Type Cryptosystems and their Security, TU-Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group, May 10 (2006) (preprint)

    Google Scholar 

  13. van Tilburg, J. : Security-analysis of a class of cryptosystems based on linear error-correcting codes”, Technische Universiteit Eindhoven, Dissertation (1994)

    Google Scholar 

  14. van Tilborg, H.C.A.: Fundamentals Of Cryptology, A Professional Reference and Interactive Tutorial. The Kluwer International Series In Engineering And Computer Science, Eindhoven University of Technology. Kluwer Academic Publishers, Dordrecht (2002), eBook ISBN: 0-306-47053-5

    Google Scholar 

  15. Canteaut, A., Chabaud, F.: A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece’s Cryptosystem and to Narrow-Sense BCH Codes of Length 511. IEEE Trans. Information Theory 44(1), 367–378 (1998)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tavallaei, S.E., Falahati, A. (2010). Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15717-2_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15716-5

  • Online ISBN: 978-3-642-15717-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics