A new identification scheme based on syndrome decoding

From MaRDI portal
Publication:4341729

DOI10.1007/3-540-48329-2_2zbMath0876.94035OpenAlexW1527005907MaRDI QIDQ4341729

Jacques Stern

Publication date: 1 December 1997

Published in: Advances in Cryptology — CRYPTO’ 93 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-48329-2_2




Related Items (71)

SoK: how (not) to design and implement post-quantum cryptographyCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsSubtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over latticesA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsCryptography from Learning Parity with NoiseLattice-based zero-knowledge arguments for additive and multiplicative relationsEfficient lattice-based polynomial evaluation and batch ZK argumentsNot enough less: an improved algorithm for solving code equivalence problems over \(\mathbb{F}_q\)LESS is More: Code-Based Signatures Without SyndromesA Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesImproved identification schemes based on error-correcting codesMore efficient amortization of exact zero-knowledge proofs for LWEGeneralization of the Ball-Collision AlgorithmA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryA correction to a code-based blind signature schemeNaor-Yung paradigm with shared randomness and applicationsConceptual, computational and inferential benefits of the missing data perspective in applied and theoretical statistical problemsIdentity based identification from algebraic coding theoryCompact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problemsAttack on a code-based signature scheme from QC-LDPC codesRevisiting algebraic attacks on MinRank and on the rank decoding problemA new key recovery attack on a code-based signature from the Lyubashevsky frameworkFrom 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based SignaturesOn the hardness of the Lee syndrome decoding problemA lightweight identification protocol based on latticesDisjunctive delimited controlLattice-based zero-knowledge proofs and applications: shorter, simpler, and more generalOn codes and learning with errors over function fieldsSyndrome decoding in the head: shorter signatures from zero-knowledge proofsCode-Based Signature Schemes from Identification Protocols in the Rank MetricA code-based signature scheme from the Lyubashevsky frameworkRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsAn algorithm for generalized syndrome decoding problemChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextOn the (in)security of optimized Stern-like signature schemesImproved information set decoding algorithms over Galois ring in the Lee metricZero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejectionNon-interactive secure computation of inner-product from LPN and LWEAnamorphic signatures: secrecy from a dictator who only permits authentication!Lattice-based inner product argumentMR-DSS -- smaller MinRank-based (ring-)signaturesTernary forking lemma and its application to the analysis of one code-based signatureA code-based hybrid signcryption schemeStatistical decoding 2.0: reducing decoding to LPNEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsPractical exact proofs from lattices: new techniques to exploit fully-splitting ringsStatistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledgeHow traveling salespersons prove their identityA new algorithm for finding minimum-weight words in large linear codesShared permutation for syndrome decoding: new zero-knowledge protocol and code-based signatureA New Efficient Threshold Ring Signature Scheme Based on Coding TheorySpeeding-up verification of digital signaturesCryptanalysis of a code-based full-time signatureA code-based group signature schemeOne-Shot Verifiable Encryption from LatticesA NP-Complete Problem in Coding Theory with Application to Code Based CryptographyA fuzzy vault schemeCode-Based Public-Key Cryptosystems and Their ApplicationsImproved Zero-Knowledge Identification with LatticesExtended security arguments for signature schemesA Secure and Efficient Code-Based Signature SchemePost-Quantum Cryptography: State of the Art\(k\)-critical graphs in \(P_5\)-free graphsA Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding ProblemSigma protocols for MQ, PKP and SIS, and fishy signature schemesShorter lattice-based zero-knowledge proofs via one-time commitmentsFull Cryptanalysis of the Chen Identification ProtocolDecoding One Out of ManyA new identification algorithmA Practical Group Signature Scheme Based on Rank MetricThe security of the code-based signature scheme based on the Stern identification protocol




This page was built for publication: A new identification scheme based on syndrome decoding