New code-based cryptosystems via the IKKR framework

Terry Shue Chien Lau*, Fedor Ivanov, Muhammad Rezal Kamel Ariffin, Ji Jian Chin, Timothy Tzen Vun Yap

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

One main construct for code-based public key cryptosystems is the McEliece framework that hedges upon the hardness of decoding arbitrary linear codes. Based on Goppa codes, the original McEliece cryptosystem however, suffers from having very large public keys. To alleviate this problem, we define a new IKKR problem that is NP-complete and use this assumption of the intractability of the decisional IKKR problem to construct a IND-CCA2-secure code-based public key encryption scheme. We consider generalized Reed–Solomon codes in our public-key cryptosystem and show that it resists Sidelnikov and Shestakov's key recovery attack. Our generalized Reed–Solomon code encryption scheme achieves optimal public key size when compared with other PKE or key encapsulation mechanisms with deterministic decryption or decapsulation, as it requires only 88.1 kilobytes to store public key for schemes achieving 128-bit security level and 399.69 kilobytes to store public key for schemes achieving 256-bit security level. A public key size reduction of nearly 92% is obtained as compared to the classic McEliece PKE, and nearly 53% compared to the Reed–Solomon code-based PKE.

Original languageEnglish
Article number103530
JournalJournal of Information Security and Applications
Volume76
Early online date15 Jun 2023
DOIs
Publication statusPublished - Aug 2023

Keywords

  • Code-based cryptography
  • McEliece framework
  • Post-quantum cryptography
  • Public-key encryption
  • Reed–Solomon codes
  • Syndrome Decoding problem

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'New code-based cryptosystems via the IKKR framework'. Together they form a unique fingerprint.

Cite this