The security of the code-based signature scheme based on the Stern identification protocol
From MaRDI portal
Publication:5871430
DOI10.17223/20710410/57/5zbMath1506.94086OpenAlexW3203390756MaRDI QIDQ5871430
Viktoriya V. Vysotskaya, Ivan V. Chizhov
Publication date: 19 January 2023
Published in: Prikladnaya Diskretnaya Matematika (Search for Journal in Brave)
Full work available at URL: http://mathnet.ru/eng/pdm777
digital signatureprovable securitycode-based cryptographypost-quantum cryptographyFiat-Shamir transformEUF-CMA securityStern's scheme
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Two attacks on rank metric code-based schemes: RankSign and an IBE scheme
- Decoding linear codes with high error rate and its impact for LPN security
- Wave: a new family of trapdoor one-way preimage sampleable functions based on codes
- Durandal: a rank metric based signature scheme
- Security Proofs for Signature Schemes
- Lattice Signatures without Trapdoors
- Code-based cryptography
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- On the inherent intractability of certain coding problems (Corresp.)
- A new identification scheme based on syndrome decoding
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- A digital signature scheme based on random error-correcting codes
- Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
- On Kabatianskii-Krouk-Smeets Signatures
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
This page was built for publication: The security of the code-based signature scheme based on the Stern identification protocol