๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Code-Based Cryptography: 11th International Workshop, CBCrypto 2023, Lyon, France, April 22โ€“23, 2023, Revised Selected Papers (Lecture Notes in Computer Science)

โœ Scribed by Andre Esser (editor), Paolo Santini (editor)


Publisher
Springer
Year
2023
Tongue
English
Leaves
183
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22โ€“23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.

โœฆ Table of Contents


Preface
Organization
Contents
An Analysis of the RankSign Signature Scheme with Rank Multipliers
1 Introduction
2 Rank Metric Properties and Bounds
2.1 The Rank Metric
2.2 Bounds in the Rank Metric
2.3 A Difficult Problem in the Rank Metric
3 LRPC Codes
3.1 Erasure Decoder for LRPC Codes
4 The RankSign Signature Scheme
4.1 KeyGen
4.2 Sign
4.3 Verify
5 Attack by Debris-Alazard and Tillich
6 Repairing RankSign
6.1 KeyGen
6.2 Sign
6.3 Verify
6.4 Key and Signature Size
6.5 Discussion of Parameters
7 Conclusion
References
Fast Gao-Like Decoding of Horizontally Interleaved Linearized Reedโ€“Solomon Codes
1 Introduction
2 Preliminaries
2.1 Skew-Polynomial Rings
2.2 The Sum-Rank Metric and the Corresponding Interleaved Channel Model
2.3 Horizontally Interleaved Linearized Reedโ€“Solomon (HILRS) Codes
3 A Gao-Like Decoder for HILRS Codes
4 A Fast Variant of the Gao-Like Decoder for HILRS Codes
4.1 Minimal Approximant Bases
4.2 Solving the Gao-Like Key Equation via Minimal Approximant Bases
5 Conclusion
References
Theoretical Analysis of Decoding Failure Rate of Nonโ€“binary QCโ€“MDPC Codes
1 Introduction
2 Analysis of Guaranteed Errorโ€“correction Capability of Nonโ€“binary QC-MDPC Codes
2.1 Oneโ€“Step Majority Logic Decoding
3 Plausibility Analysis of 1โ€“iteration Parallel Symbol Flipping Decoder
3.1 Distribution of Counters
3.2 Analysis of Parallel Symbol-Flipping Decoder
4 Choice of Cryptosystem Parameters
5 Conclusion
References
FuLeeca: A Lee-Based Signature Scheme
1 Introduction
2 Preliminaries
2.1 Notation
2.2 Basic Cryptographic Tools
2.3 Lee-Metric Codes
3 System Description
3.1 Key Generation
3.2 Signature Generation
3.3 Signature Verification
3.4 Encoding and Decoding
4 Security Analysis
4.1 Hardness of Underlying Problem and Generic Solvers
4.2 Analysis of the Algorithm with Respect to Known Attacks
4.3 Lattice-Based Attacks
5 Efficiency and Performance
5.1 Parameters
5.2 Reason for Choice of Parameters
5.3 Detailed Performance Analysis
6 Preliminary Attack on FuLeeca
7 Conclusion
References
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem
1 Introduction
2 Preliminaries
3 Previous Algorithms for Solving ATFE
3.1 Graph-Theoretic Algorithm of Bouillaguet et al. ch5BFV12
3.2 Graph-Theoretic Algorithm of Beullens ch5Beu22
4 A Coding Theory Perspective of ATFE
5 Algebraic Algorithms for Solving ATFE
5.1 Direct Modelling
5.2 Improved Matrix-Code Modelling
5.3 Removing Invalid Solutions
6 Complexity Analysis
6.1 Non-trivial Syzygies
6.2 Hilbert Series and the Solving Degree
7 Experimental Results
7.1 Computing Syzygies
7.2 Running Grรถbner Basis Computations
References
Modeling Noise-Accepting Key Exchange
1 Introduction
1.1 Our Contributions
1.2 Related Work
2 Prerequisites
3 Key Exchange over Unreliable Networks
3.1 Modeling Noise
3.2 Noisy Matching Conversations
4 The Validity of Our Model
4.1 Secure in a Noise-Free Environment
4.2 Canonical Extension to a Noisy Environment
5 Tools for Constructing Noisy Key Exchange
5.1 Other Error-Resistant Security Notions
5.2 Error Tolerant FO-Transform
5.3 Error-Resistant KEA Construction
6 Existence of Error-Resistant PKE
A Proof of Modified FO-transform Theorem 2
References
Generic Error SDP and Generic Error CVE
1 Introduction
2 Preliminaries
3 Generic Error Sets
3.1 Error Detectability and Correctability
3.2 Generic Gilbert-Varshamov Bound
3.3 Density of Codes Correcting a Generic Error Set
4 Generic Error SDP
5 Generic Error CVE
5.1 Completeness
5.2 Soundness
5.3 Zero-Knowledge
6 On Polynomial Instances of GE-SDP
6.1 Vulnerability of R-SDP and R-CVE
7 Conclusions
References
PALOMA: Binary Separable Goppa-Based KEM
1 Introduction
1.1 Trapdoor
1.2 KEM Structure
1.3 Parameter Sets
2 Specification
2.1 Parameter Sets
2.2 Key Generation
2.3 Encryption and Decryption
2.4 Encapsulation and Decapsulation
3 Performance Analysis
3.1 Description of C Implementation
3.2 Data Size
3.3 Speed
4 Security
4.1 OW-CPA-secure PKE=(GenKey, Encrypt, Decrypt)
4.2 IND-CCA2-Secure KEM= (GenKey, Encap, Decap)
5 Conclusion
A Mathematical Background
A.1 Syndrome Decoding Problem
A.2 Binary Separable Goppa Code
A.3 Extended Patterson for Binary Separable Goppa code
B Pseudo codes for PALOMA
References
Author Index


๐Ÿ“œ SIMILAR VOLUMES


Code-Based Cryptography: 9th Internation
โœ Antonia Wachter-Zeh (editor), Hannes Bartz (editor), Gianluigi Liva (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021. The workshop was initially planned to take place in Munich, Germany, but changed to an online event due to the COVID-19 pandemic. The 6 pap

Code-Based Cryptography: 10th Internatio
โœ Jean-Christophe Deneuville ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.<br>The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions

Code-Based Cryptography: 8th Internation
โœ Marco Baldi, Edoardo Persichetti, Paolo Santini ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Springer International Publishing;Springer ๐ŸŒ English

<p>This book constitutes the refereed and revised post-conference proceedings of the 8th International Workshop on Code-Based Cryptography, CBCrypto 2020, held in Zagreb, Croatia, in May 2020.*<p>The seven papers presented in this book were carefully reviewed and selected from numerous submissions.

Code-Based Cryptography: 10th Internatio
โœ Jean-Christophe Deneuville ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer Nature ๐ŸŒ English

This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway. The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all

Security Protocols: 11th International W
โœ Bruce Christianson (editor), Bruno Crispo (editor), James A. Malcolm (editor), M ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<span>Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was โ€œWhere have all the Protocols gone?โ€ Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in appl