The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined.Baldi, Marcodoi:10.1007/978-3-319-02556-8Marco BaldiSpringer International PublishingMARCO B. QC-LDPC code-based cryptography[M]. [S.l.]: Springer, 2014: 23-64...
parity-checkmatrices, whose storage size increases linearlyinthe code length. Unfor- tunately, as we will see next, the sparse character of these matrices must be renounced in the public keys in order to achieve a sufficient security level. M. Baldi, QC-LDPC Code-Based Cryptography, 91 ...
(QC-MDPC)code based McEliece public key cryptography (PKC)has good performance characteristics:both the key size and the algorithm complexity of the scheme are low. However,a keyrecovery attack can crack the scheme against its security. The attacker can collect reaction information of the ...
reduction of public key size in the same security level , lower complexity in both of encryption and decryption and high security, since it resists the dual code attack and information set decoding attack. Key Words: quantum compute; code-based theory; QC-LDPC; BF; post-quantum cryptography ...
Abstract:Code-based public key cryptography can resist the attack of quantum algorithms.Aiming at the large amount of key in classical CFS signature scheme,this paper proposed a kind of CFS signature scheme based on QC-LDPC codes.This scheme improves the traditional CFS signature scheme based on ...
There are still other schemes based on integer factorization such as EPOC or HIME. Code-based PKE. Code-based public key cryptography (Code-based PKE) has attracted wide attention due to its fast operation efficiency and high security guarantee, and hence becomes one of the most potential post...
1.A method, applied to a processor of a computer, the method comprising:providing a base matrix of an irregular Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) code for encoding or decoding a sequence of information bits, wherein providing the base matrix comprises:determining one or more fir...
Performance analysis of WS-EWC coded optical CDMA networks with/without LDPC codes One extended Welch-Costas (EWC) code family for the wavelength-division-multiplexing/spectral-amplitude coding (WDM/SAC; WS) optical code-division multiple... CM Huang,JF Huang,CC Yang - 《Optical Fiber Technology...
【摘要】As an important research ofpost-quantum cryptography,codebased cryptography had excellent characteristics of low complexity and high security.With the code-based cryptosystem as the core knowledge,we constructed a new QC-LDPC codes based Niederreiter cryptography scheme by using dual public-key....
these public key cryptosystems based on discrete logarithm problems and factorization in a short time.Therefore,the post-quantum cryptography algorithm which can resist quantum computation has become a research hotspot in the field of cryptography.The McEliece system based on error correction code is ...