2014
DOI: 10.1007/978-3-319-06734-6_1
|View full text |Cite
|
Sign up to set email alerts
|

New Results for Rank-Based Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(41 citation statements)
references
References 20 publications
0
41
0
Order By: Relevance
“…There has been some recent progress in this area for another metric, namely the rank metric. A hash and sign signature scheme was proposed, RankSign [GRSZ14], that enjoys remarkably small key sizes, but it got broken too in [DT18]. On the other hand, following the Schnorr-Lyubashevsky [Lyu09a] approach, a new scheme was recently proposed, namely Durandal [ABG + 18].…”
Section: Introductionmentioning
confidence: 99%
“…There has been some recent progress in this area for another metric, namely the rank metric. A hash and sign signature scheme was proposed, RankSign [GRSZ14], that enjoys remarkably small key sizes, but it got broken too in [DT18]. On the other hand, following the Schnorr-Lyubashevsky [Lyu09a] approach, a new scheme was recently proposed, namely Durandal [ABG + 18].…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that unlike the syndrome decoding problem in the Hamming metric, the rank syndrome decoding problem is not known to be NP-hard. Other related work has been done in improving algorithms for the rank syndrome decoding problem [7], and also designing rank-metric based cryptosystems which do not rely on Gabidulin codes [8].…”
Section: Introductionmentioning
confidence: 99%
“…If dim(E * V) = tλ a basis for E can be recovered with an estimated error probability of 2 −(n−k+1−tλ) , [GRSZ14].…”
Section: Probabilistic Decoding Based Cryptosystemsmentioning
confidence: 99%
“…Table 2 proposes some parameters for an expected security, and with a ciphertext expansion between 1.6 and 1.8. Since the parameters on can consider to decrease the key-size by increasing the expansion factor, but the designer has to note that case other types of decoding attacks can occur and should be taken into account, [GRSZ14].…”
Section: Security Argumentsmentioning
confidence: 99%
See 1 more Smart Citation