loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Partha Sarathi Roy 1 ; Kirill Morozov 2 ; Kazuhide Fukushima 1 ; Shinsaku Kiyomoto 1 and Tsuyoshi Takagi 3

Affiliations: 1 Information Security Laboratory, KDDI Research, Inc., 2-1-15 Ohara, Fujimino-shi, Saitama 356-8502 and Japan ; 2 Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207 and U.S.A. ; 3 Department of Mathematical Informatics, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 and Japan

Keyword(s): Post-quantum Cryptography, Code-based Cryptography, Signature Scheme, Fiat-Shamir Transformation, Identification Scheme.

Abstract: In this paper, we derive code-based signature schemes using Fiat-Shamir transformation on code-based zero-knowledge identification schemes, namely the Stern scheme, the Jain-Krenn-Pietrzak-Tentes scheme, and the Cayrel-Veron-El Yousfi scheme. We analyze the security of these code-based signature schemes and derive the security parameters to achieve the 128-bit level security. Furthermore, we implement these signature schemes and compare their performance on a PC.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.238.62.124

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Roy, P.; Morozov, K.; Fukushima, K.; Kiyomoto, S. and Takagi, T. (2019). Security Analysis and Efficient Implementation of Code-based Signature Schemes. In Proceedings of the 5th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-359-9; ISSN 2184-4356, SciTePress, pages 213-220. DOI: 10.5220/0007259102130220

@conference{icissp19,
author={Partha Sarathi Roy. and Kirill Morozov. and Kazuhide Fukushima. and Shinsaku Kiyomoto. and Tsuyoshi Takagi.},
title={Security Analysis and Efficient Implementation of Code-based Signature Schemes},
booktitle={Proceedings of the 5th International Conference on Information Systems Security and Privacy - ICISSP},
year={2019},
pages={213-220},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007259102130220},
isbn={978-989-758-359-9},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Information Systems Security and Privacy - ICISSP
TI - Security Analysis and Efficient Implementation of Code-based Signature Schemes
SN - 978-989-758-359-9
IS - 2184-4356
AU - Roy, P.
AU - Morozov, K.
AU - Fukushima, K.
AU - Kiyomoto, S.
AU - Takagi, T.
PY - 2019
SP - 213
EP - 220
DO - 10.5220/0007259102130220
PB - SciTePress