Header menu link for other important links
X
Efficient code based hybrid and deterministic encryptions in the standard model
K. Preetha Mathew, Chandrasekharan Pandu Rangan
Published in Springer Verlag
2014
Volume: 8565
   
Pages: 517 - 535
Abstract
In this paper, we propose an IND-CCA2 secure Key-Encapsulation (KEM) in the standard model using the Niederreiter Encryption scheme. Also, we propose a PRIV-1CCA secure deterministic variant of the Niederreiter encryption scheme in the standard model. The security of these constructions are reduced to the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. To the best of our knowledge, the proposed constructions are the first of its kind under coding-based assumption in the standard model that do not use the к-repetition paradigm initiated by Rosen and Segev at Theory of Cryptography Conference (TCC), 2009. © Springer International Publishing Switzerland 2014.
About the journal
JournalData powered by TypesetLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherData powered by TypesetSpringer Verlag
ISSN03029743
Open AccessNo
Concepts (11)
  •  related image
    Codes (symbols)
  •  related image
    Decoding
  •  related image
    Network security
  •  related image
    Security of data
  •  related image
    DETERMINISTIC ENCRYPTIONS
  •  related image
    INDISTINGUISHABILITY
  •  related image
    KEM-DEM
  •  related image
    NEIDERREITER CRYPTOSYSTEM
  •  related image
    Standard model
  •  related image
    SYNDROME DECODING
  •  related image
    Cryptography