Skip to main content

A Ring Signature Based on LDGM Codes

  • Conference paper
  • First Online:
Big Data Technology and Applications (BDTA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 590))

Included in the following conference series:

  • 1225 Accesses

Abstract

McEliece cryptosystem is a public key cryptosystem that combines channel coding and encryption, and the oldest PKC that is conjectured to be post-quantum secure. To decrease the key size of the original scheme, alternative codes have been adopted to replace Goppa codes. In this paper, we propose a ring signature using low-density generator-matrix codes. Our new scheme satisfies anonymity and existential unforgeability under chosen message attacks (EUF-CMA). As for efficiency, the number of decoding operations has been reduced largely compared with ZLC ring signature, and the size of the public key is about 0.2 % of the ZLC scheme.

This work is supported by National Natural Science Foundation of China (61572521, 61103231, 61272492), Project funded by China Postdoctoral Science Foundation (2014M562445, 2015T81047), and Natural Science Basic Research Plan in Shanxi Province of China (2015JM6353, 2014JQ8358, 2014JQ8307).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)

    Article  MATH  Google Scholar 

  2. Baldi, M.: QC-LDPC Code-Based Cryptosystem. QC-LDPC Code-Based Cryptography, p. 75. Springer International Publishing, Heidelberg (2014)

    Book  Google Scholar 

  3. Monico, C., Rosenthal, J., Shokrollahi, A.: Using low density parity check codes in the McEliece cryptosystem. In: Proceedings of the IEEE ISIT 2000, Sorrento, Italy, p. 215, June 2000

    Google Scholar 

  4. Baldi, M: Quasi-cyclic low-density parity-check codes and their application to cryptography. Ph.D thesis, Universita Politecnica delle Marche, Ancona, Italy (2006)

    Google Scholar 

  5. Baldi, M., Bambozzi, F., Chiaraluce, F.: On a family of circulant matrices for quasi-cyclic low-density generator matrix codes. IEEE Trans. Inf. Theory 57(9), 6052–6067 (2011)

    Article  MathSciNet  Google Scholar 

  6. Baldi, M., Bianchi, M., Chiaraluce, F.: Security and complexity of the McEliece cryptosystem based on QC-LDPC codes. IET Inf. Secur. 7(3), 212–220 (2013)

    Article  Google Scholar 

  7. Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Using LDGM codes and sparse syndromes to achieve digital signatures. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 1–15. Springer, Heidelberg (2013)

    Google Scholar 

  8. Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157–174. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Zheng, D., Li, X., Chen, K.: Code-based ring signature scheme. Int. J. Netw. Secur. 5(2), 154–157 (2007)

    Google Scholar 

  11. Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 465–480. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Finiasz, M., Sendrier, N.: Security bounds for the design of code-based cryptosystems. In: Proceedings of the ASIACRYPT 2009, Tokyo, Japan, 6–10 December 2009. LNCS, vol. 5912, pp. 88–105. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiliang Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Liu, M., Han, Y., Yang, X. (2016). A Ring Signature Based on LDGM Codes. In: Chen, W., et al. Big Data Technology and Applications. BDTA 2015. Communications in Computer and Information Science, vol 590. Springer, Singapore. https://doi.org/10.1007/978-981-10-0457-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0457-5_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0456-8

  • Online ISBN: 978-981-10-0457-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics