Redirigiendo al acceso original de articulo en 24 segundos...
ARTÍCULO
TITULO

Problems in the usage of a code hash function for a CFS signature scheme built on Goppa codes

Anastasiya Ilyukhina    

Resumen

In 2001, a CFS signature scheme based on the Niederreiter cryptosystem was proposed. The signature algorithm is based on code cryptography, which makes the signature resistant to post-quantum attacks. However, there are certain difficulties in its implementation. One of them lies in the complexity of constructing a signature due to the low probability of receiving an acceptable syndrome that can be easily decoded. This article considers a known way of modifying the original signature scheme to solve this problem. The paper studies the use of a code hash function to quickly obtain a decodable syndrome. When considering the compression function of the hash function, an error was found in its construction and the insecurity of the signature scheme built on such a hash function was proved.

 Artículos similares

       
 
Vincenzo Benedetto, Francesco Gissi, Gioele Ciaparrone and Luigi Troiano    
Gravitational wave research presents a range of intriguing challenges, each of which has driven significant progress in the field. Key research problems include glitch classification, glitch cancellation, gravitational wave denoising, binary black hole s... ver más
Revista: Applied Sciences

 
Rehna Batool, Nargis Bibi, Nazeer Muhammad and Samah Alhazmi    
Cognitive Radio Network (CRN) is an emerging technology used to solve spectrum shortage problems in wireless communications. In CRN, unlicensed secondary users (SUs) and licensed primary users (PUs) use spectrum resources at the same time by avoiding any... ver más
Revista: Applied Sciences

 
Thi-Thu-Huong Le, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang and Howon Kim    
In recent years, numerous explainable artificial intelligence (XAI) use cases have been developed, to solve numerous real problems in industrial applications while maintaining the explainability level of the used artificial intelligence (AI) models to ju... ver más
Revista: Applied Sciences

 
Chi Gao, Xiaofei Xu, Zhizou Yang, Liwei Lin and Jian Li    
In recent decades, memory-intensive applications have experienced a boom, e.g., machine learning, natural language processing (NLP), and big data analytics. Such applications often experience out-of-memory (OOM) errors, which cause unexpected processes t... ver más
Revista: Applied Sciences

 
Kanza Gulzar, Muhammad Ayoob Memon, Syed Muhammad Mohsin, Sheraz Aslam, Syed Muhammad Abrar Akber and Muhammad Asghar Nadeem    
In the public health sector and the field of medicine, the popularity of data mining and its usage in knowledge discovery and databases (KDD) are rising. The growing popularity of data mining has discovered innovative healthcare links to support decision... ver más
Revista: Information