Abstract
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to convert an identification scheme into a signature scheme which can be used for achieving security purposes and cryptographic purposes, especially for authentication. In this paper, we recall an identification protocol, namely the RankID scheme, and show that the scheme is incorrect and insecure. Then, we proposed a more natural approach to construct the rank version of the AGS identification protocol and show that our construction overcomes the security flaws in the RankID scheme. Our proposal achieves better results when comparing the public key size, secret key size, and signature size with the existing identification schemes, such as Rank RVDC and Rank CVE schemes. Our proposal also achieves 90%, 50%, and 96% reduction for the signature size, secret key size, and public key size when compared to the Rank CVE signature scheme.
Keywords:
public-key cryptography; post-quantum cryptography; code-based cryptography; rank metric; signature scheme; identification scheme MSC:
11T71
1. Introduction
1.1. Literature Review
Cryptography refers to the secure communication techniques that are derived from mathematical concepts and algorithms to transform messages in ways that mean it is hard to retrieve back the message. There are well-known cryptosystems, such as RSA, which have been used until today. Nevertheless, this cryptosystem suffers from a few weaknesses that might lead to the vulnerability of attacks, as we can read in [1,2]. The hard problem of RSA, which is the factorization of large prime numbers, could turn out to be its weakness if there exists a quantum computer. Therefore, it is necessary for cryptographers to construct other cryptographic primitives that resist attacks by quantum computers, which are often coined as post-quantum cryptosystems. One of the most common candidates for post-quantum cryptosystems is built based on code-based cryptography. McEliece cryptosystem [3] is one of the most well-known and the first motivation initiated in code-based cryptosystems almost 40 years ago. Digital signature schemes (DSS) under code-based cryptography are also secure as they are able to achieve three goals of cryptography, including data integrity, authenticity, and non-repudiation.
One can consider the construction of code-based DSS via the hash-and-sign approach, such as the CFS scheme proposed by Courtois et al. [4]. In this scheme, the document is repeatedly hashed to the bit-length r until the output becomes a decryptable ciphertext. However, this was one of the weaknesses of this signature apart from having a very large public key size. On the other hand, one can construct a code-based DSS by considering the zero-knowledge protocol approach (ZKP). More specifically, in a zero-knowledge protocol, one party (named Prover ) needs to prove to the other party (named verifier ) that he or she knows the secret key without revealing the value or any information regarding the secret key. Proof of identity as a means of authentication is the most common and secure application of ZKP. One type of ZKP is the identification protocol which can be converted into a signature scheme via the Fiat–Shamir paradigm. Meanwhile, if the person loses his or her data or key, recovery is difficult to be attempted in ZKP. ZKP also has a large signature size due to a large number of repetitions, and it requires a lot of computations since it needs a large number of interactions between the prover and the verifier.
In 1994, Stern designed an identification protocol [5] that worked in the Hamming metric. In this case, let be a finite field with elements where q is a prime power, and m is an integer. In this scheme, given an error vector e which has weight w and a vector, where H is a parity check matrix over . The prover is needed to convince the verifier that he or she knows the value of e (the secret key). Stern managed to reduce the cheating probability (the probability where a dishonest prover not knowing e can cheat the verifier in the protocol) from to which led to a reduction in the signature size. Later in 1997, Veron [6] proposed a different formulation of the secret key, where the matrix and x are public parameters. Despite the increment of the public key size, Veron succeeded in reducing the communication cost. Since then, various schemes have been invented using different modifications to enhance their schemes from the previous ones. Aguilar, Gaborit, and Schrek [7] proposed a scheme (AGS) utilizing double circulant codes to increase the number of challenges. They also managed to cut down the communication cost in addition to reducing the size of the secret and public keys.
More recently, rank metrics have been considered to construct code-based identification protocols and DSS by extending the constructions from the code-based identification protocols and DSS in the Hamming metric. In 2018, Bellini et al. [8] proposed the rank metric version of the Veron and CVE identification protocols and DSS. However, Lau et al. [9] showed that the rank Veron was insecure, as its secret key could be recovered in polynomial time. Nevertheless, Bellini et al. [10] improved the rank Veron DSS and proposed another scheme, namely the RVDC identification protocol and DSS. Furthermore, in 2019, Ayebie et al. [11] designed a rank metric version of the AGS identification scheme by using random double circulant codes, which is known as the RankID scheme.
1.2. Research Flow
In this paper, we analyzed the RankID scheme. Their construction has errors in correctness, which results in the invalidity of the scheme. The operations defined in the scheme do not ensure the commutativity of the matrices and do not preserve the rank of error vectors. Even if we assume the scheme is correct, we show that the scheme is insecure, as its design leads to the leakage of the secret key. Then, we propose a new rank version of the AGS ID more naturally and show that the new scheme achieves completeness, soundness, and zero-knowledge properties. We also provide parameters achieving 128-bit and 256-bit security levels, the latter is determined by the complexity for solving the Rank Syndrome Decoding (RSD) problem.
1.3. Contribution of This Work
Our Rank AGS scheme parameters can reduce the signature and key size when compared to the Rank CVE [8] and RVDC [10] schemes.
1.4. Paper Organization
This paper is structured as follows: in Section 2, we present the notions and preliminaries that are used throughout the paper. Section 3 provides the analysis of RankID, which shows the errors in RankID that lead to the insecurity of the scheme. Section 4 introduces the explanations and details of our proposed scheme, Rank AGS. Section 5 shows the achievement of our proposed scheme on zero knowledge protocol security properties such as completeness, soundness, and zero knowledge. Additionally, we also provide the signing and verification algorithm of Rank AGS and the comparison of the sizes of the signature, public, and secret key of Rank AGS with the other existing schemes in this section. Furthermore, we also added the percentage of reduction in the key and signatures sizes of Rank AGS with the reference Rank CVE as the original reference. Finally, we finish with a section for the conclusion (Section 6).
2. Preliminaries
In this section, we recall the background on rank metrics and the hard problem used in this paper. We also introduce the specification for AGS and RankID that have been used in [7,11]. Throughout this paper, we will be using the following notations and definitions.
Let q be a prime power and m be an integer. Then, let be a finite field with elements.
Definition 1.
An -linear code C of length n is a linear subspace of with dimension k. A matrix is called a generator matrix of code C if its rows form a basis of C. A matrix H is called a parity check matrix of C if .
Definition 2
(Rank Support). Let . The support of x, is an -vector space spanned by elements .
Definition 3
(Rank Metric). Let ; the rank weight of x is defined as the dimension of the support of x,
Let be a basis for . For each , we can write as an -linear combination of the basis, i.e., there exists such that
When forming an matrix , and we can rewrite x as:
and the rank weight of x also can be defined as the rank of the matrix M, .
Now, let us define a problem that most of the cryptosystem in the rank metric is based on.
Problem 1 (Rank syndrome decoding problem (RSD)). Given a random matrix , the random vectors , and an integer of can be used as an input. The rank syndrome decoding, problem needs to determine the vector such that and .
Gaborit and Zémor [12] showed that the RSD could be probabilistically reduced to the syndrome decoding problem in the Hamming metric, where the syndrome decoding problem is an NP-complete problem. Therefore, RSD is acceptable as a good candidate for code-based cryptography.
The complexity of solving the rank syndrome decoding problem (RSD) is shown below. We list down the combinatorial and algebraic attacks on in Table 1 and Table 2, respectively, from [13] with their corresponding solving complexities.
Table 1.
Combinatorial attacks on RSD.
Table 2.
Algebraic attacks on RSD.
We used the following notation in Table 2 below.
The constant linear algebra is , and the integer is ,
,
,
,
,
,
, and .
Definition 4
(Circulant matrix). A matrix is called a circulant matrix if each row is obtained from the previous one by a cyclic shift from one position to the right. In particular, A is generated by a vector in the form of:
Definition 5
(Double circulant matrix). A -code over is a double circulant code if it is generated by a matrix , where A and B are circulant matrices.
RankID
In this subsection, we first introduce the definitions and operations that have been used in RankID [11]. Then, we identified the errors found in the RankID scheme.
Definition 6.
Let vector and , as defined in Equation (2). We defined the function map from to as . The inverse function, was defined as the mapping for to and we can rewrite it as .
Definition 7
(Asterisk Product). Let , , and β be a basis of over . We define the product by
Let k be an integer such that , to any we associate the symmetric matrix such that:
Definition 8
(Bullet Product). Let α be an element of , k be an integer such that , and (where is the concatenation symbol) be a vector of such that . We define the product as follows:
where is as defined in Equation (1).
The RankID scheme [11] utilizes the double circulant matrix from the AGS ID scheme [7] to generate the generator matrix, G as a public key. The hard problem on which the RankID is based is the RSD problem. They introduced the special multiplication law that has been used in their protocol, as we explained in the previous section in definitions (7) and (8).
Their protocol uses a public (with ) random double circulant matrix G over . This matrix G generates an -linear code over . They considered the matrix of type where is a circulant matrix over and is the identity matrix.
Private key: with with and .
Public key: with , .
3. Analysis of RankID
Here, we provide more details regarding the errors that we encountered in the RankID (Table 3). The authors in [11] claimed that RankID achieved completeness by the following argument.
Table 3.
The identification protocol (RankID).
When , then the verifier can compute:
Equation (2) is incorrect because and are not commutative. Although is symmetric: it does not commute with the matrix . Therefore, .
The second error in the scheme is when , then we obtain . To illustrate , we provide a counterexample here. Since P and Q are invertible over , they preserve the rank of the vector. Therefore, we only require showing that .
Proof.
Let z be a primitive element in and be a basis of over . Let , , where and with .
□
From the above counterexample, we obtain which is greater than . Therefore, .
Security Analysis of RankID
Now, we assumed that RankID was correct even though we found some errors in this scheme. We showed that, based on the information sent through the channels, one could recover the secret of the scheme.
As we know, the adversary can have the public key, which is and other elements from the scheme such as as the adversary can look over the communication channel.
Now, we show how the secret key f was retrieved as follows:
Let and ,
Now, let and look random with the random matrix minus the identity matrix. Therefore, we can have the inverse of the matrix, , so that f can be retrieved.
Then, we can also computed the secret u.
Since we identified , we could successfully retrieve the error vector, e. Therefore, RankID is insecure to be used.
4. New Rank AGS Identification Protocol
In this section, we describe our new zero-lnowledge identification protocol, namely the Rank AGS identification protocol. Our technique implements the double circulant structure in the public matrix, G. Our public key is still the same as . Our secret key is . We modified the secret that would be sent by the verifier to the prover into where and is a circulant matrix generated by a vector .
We introduced a new definition of the product, which is defined below.
Definition 9
(Dot Product,). Let where and let . We define the product of as follows:
4.1. Key Generation
We used the same notation and the same keys as in the scheme of RankID. Our zero-knowledge protocol uses a public () random double circulant matrix G over .
4.1.1. Key Generation
Choose , and r.
- with .
Public Key = , Secret Key = .
4.1.2. Rank AGS ID
In our zero-knowledge protocol, to prove its identity, a prover must prove the knowledge of the secret key by using two blinding techniques. The first one is to Xor a random vector to the secret key f, and the second blinding technique uses the “*” and “” products to multiply the secret e to random values. Moreover, the security of our protocol relies on the hardness of the rank syndrome decoding problem (RSD). We modify the that has been distributed by the verifier to the prover where , where and . Notice that the RankID scheme is insecure due to the extra information sent by the prover to the verifier. As a result, we considered the original AGS scheme in the Hamming metric and constructed the Rank AGS more naturally. Therefore, the key generation and the algorithm of the Rank AGS are still the same except for the commit, , and we removed the response when the challenge was received. The repaired new scheme is shown in Table 4 below:
Table 4.
The identification protocol (Rank AGS).
4.1.3. Algorithm of Rank AGS ID
- A prover randomly chooses . Then, sends to a verifier the commitments and such that: and . Here, h is a hash function.
- A verifier sends to .
- A prover builds and sends to .
- A verifier sends to .
- Two possibilities:
- If : reveals and .
- If : reveals and .
- Verification step, two possibilities:
- If : verifies that have been honestly computed;
- If : verifies that have been honestly computed and .
Now, we provide a simple toy example of the Rank AGS scheme as in Table 5 below. Let . Let z be the primitive element in and be the basis of over .
Table 5.
Example of identification protocol (Rank AGS).
Private key: with with and with .
Public key: with , and .
From the above Rank AGS example, we were able to prove that our Rank AGS scheme works efficiently.
5. Properties and Security of the Rank AGS ID
In this section, we prove the ZK security of our scheme by using the usual zero-knowledge arguments and also consider security properties such as completeness, zero knowledge, and soundness. We also showed that this protocol is zero-knowledge with a cheating probability of around .
5.1. Completeness
We obtained the completeness of Rank AGS that has been described in (Table 4) by showing that if an honest prover and an honest verifier execute our protocol, it always succeeds.
Theorem 1.
If a prover and a verifier honestly execute Rank AGS, we have for any round
Proof.
and are supposed to be honest. We can verify in the case that , can compute:
□
In the case , we can check that . The proof is as below when we consider .
Proof.
Let be the basis for . Let and be the support matrices for and respectively.
Now, we can determine . Let and .
□
Therefore, . The verifier, can execute the protocol correctly.
5.2. Zero Knowledge
We used the classical idea of simulation as presented in [22] to ensure zero knowledge. We need to prove that no information can be deduced in polynomial time from the execution of the Rank AGS protocol.
Theorem 2.
The protocol defined in (Table 4) is a prover-verifier zero-knowledge protocol.
Proof.
Let S and be a simulator using a dishonest verifier and the number of rounds that are taken by an honest identification process to be executed, respectively. We needed to construct a polynomial-time simulator S of the protocol that, by interacting with the verifier V, could provide a transcript indistinguishable from the original protocol. The simulator S should perform the following steps:
If :
S randomly chooses and and solves the equation without necessarily satisfying the condition . Then, the computed and is taken as a random value. S simulates the verifier by applying to obtain . Then, S can compute . Note that , and are indistinguishable from , and .
If :
S randomly chooses and . Now, he randomly chooses and such that . Then, he computes and is taken as a random value. S simulates the verifier by applying to obtain and then S can compute . Note that and are indistinguishable from and . □
Therefore, S generates a communication transcript that is indistinguishable from another communication transcript which exactly looks similar to an honest identification process execution in rounds.
5.3. Soundness
The soundness of our scheme can be proven by starting to show that for each round, a dishonest prover can cheat with a probability that does not exceed . The finite field used is .
- :
- He or she randomly chooses , , , and solves the equation without necessary satisfying the condition where and when receiving as a challenge. Then, he or she computes and sets at random data. Thus, the dishonest prover is able to answer the challenge regardless of the value of chosen by the verifier.
- :
- He or she randomly chooses , , , and generates the couple randomly such that when receiving as a challenge. Then, he or she can compute and set at random data. In this case, the rank of is valid. Thus, the dishonest prover can correctly answer the challenge regardless of the value of .
By trying to guess , the above two strategies can be improved. Let be the guessed value of . Thus, the dishonest prover can compute where .
Since there are only two strategies (), we have . Next, we only have two possibilities of being challenged which are . Therefore, . Meanwhile, the probability of guessing the correct value of depends on its size. We know that where and . Thus, excluding 0, the size of is and the probability of guessing the correct is .
Therefore, the success cheating probability of a strategy for one round is given by:
If a dishonest prover succeeds in cheating with a probability higher than where is the number of rounds, then he or she can solve the rank syndrome decoding problem (RSD).
5.4. Rank AGS Signature Scheme
After this, we investigated the signature scheme based on the Rank AGS ID. As mentioned in the introduction, the Fiat–Shamir transform [23] can turn any zero-knowledge identification scheme into a signature scheme by considering the cryptographic hash functions known as the commit-and-challenge approach. The key generation of our signature scheme is the same as in Rank AGS ID. Now, we present the Rank AGS signing and verification algorithm as shown in the following Algorithms 1 and 2 respectively.
| Algorithm 1: rank AGS signing algorithm |
|
Impersonation attack. An attacker executes the Rank AGS with a prover, , and tries to give answers that the verifier, , will accept. It is impossible to give commitments that can be opened for two values of g. Without the knowledge of the secret key, e, the probability of success is at most .
5.5. Key Size and Signature Size
Here, we report the key and signature bit size for our Rank AGS ID and Rank AGS Signature scheme, respectively. First, we investigate the key size that we need for Rank AGS ID.
- Our public keys are . is a systematic double circulant matrix, which requires only a vector to represent it, . has a size of . Therefore, the public key size is .
- The secret keys are where and . If we have f, then we can compute e from . Therefore, it suffices for us to store only f as a secret key, which contributes to .
- Based on the Rank AGS signature scheme, we can construct the signature size of our signature scheme. The signature consists of two commitments which are and , and have a total length of . Then, the challenge, is having size of and is having size of . The total size of the response, for the commit-challenge, is based on the value of the challenge, which is 0 or 1. The size of is . The signature size is based on the total size of the commitment, challenge, and response which is .
| Algorithm 2: rank AGS verification algorithm |
|
Now, we provide the parameter sets achieving 128-bit and 256-bit security levels as shown in Table 6. These security levels are computed based on the complexity of existing known combinatorial and algebraic attacks on the RSD problem. We set , m to be a prime number, and . The number of rounds needed to decrease the impersonation probability to our needs. Therefore, we fixed the number of rounds, and to reach the desired impersonation probability ( and ) to achieve the security level of 128-bits and 256-bits respectively. The hash value, h, is the same as the value according to the Rank AGS signature scheme.
Table 6.
Public, secret keys and signature bit sizes for 128-bit and 256-bit security levels.
We could achieve the desired security level to solve the rank syndrome decoding problem (RSD) based on the sets of small parameters.
Then, we looked at the key and signature bit sizes for other signature schemes, which are based on rank metrics such as Rank CVE [8] and the double circulant version of Veron (Rank RVDC) [10] identification schemes. Then, we compared the size of public, secret, and signature keys with our Rank AGS as shown in Table 7 and Table 8.
Table 7.
Comparison of keys and signature bit sizes with CVE and RVDC schemes for 128 security level.
Table 8.
Comparison of keys and signature bit sizes with CVE and RVDC schemes for 256 security level.
Based on the comparison above, we could observe that all our public, secret key size, and signature sizes were smaller than other schemes. The percentage of the size reduction in the keys or signature is given below in Table 9 and Table 10 as we consider Rank CVE as the original reference for 128 and 256 security levels.
Table 9.
Percentage of size reduction as we consider Rank CVE as the original reference for the 128 security level.
Table 10.
Percentage of size reduction as we consider Rank CVE as the original reference for the 256 security level.
We used the notation of “- %” to indicate that the key size was, in fact, larger than the ones in Rank CVE. In particular, rank RVDC had a larger secret key size compared to Rank CVE. Moreover, Rank AGS reduces drastically in the size of the signature, public key, and secret key compared to Rank CVE.
6. Conclusions
In this paper, we studied and identified the errors in RankID [11]. The operations chosen in the RankID construction did not ensure the commutativity of the matrix multiplication and preserved the rank of the error vector. Furthermore, even if we assume that RankID is correct, it is still insecure because the secret key can be recovered. Therefore, we propose a new scheme: Rank AGS ID based on the hardness of the rank syndrome decoding problem (RSD) by considering the original AGS ID in hamming metric. We provided the correctness of our Rank AGS ID and proved that the rank of the error vector was preserved. Our scheme also achieved zero-knowledge security properties such as completeness, soundness, and zero knowledge. Finally, we showed how that our scheme has a smaller public, secret, and signature key size when compared with other identification schemes=-based signatures, such as Rank CVE and Rank RVDC, for 128-bit and 256-bit security levels.
Author Contributions
Conceptualization and Methodology, T.S.C.L., V.N. and N.N.H.A.; Formal analysis, V.N., T.S.C.L., N.N.H.A., M.R.K.A., J.-J.C., T.T.V.Y. and S.-C.Y.; Funding acquisition, T.S.C.L., J.-J.C., T.T.V.Y., and S.-C.Y.; Investigation, T.S.C.L., V.N., N.N.H.A. and M.R.K.A.; Writing-original draft preparation, V.N.; Writing-review and editing, T.S.C.L., M.R.K.A., J.-J.C., T.T.V.Y. and S.-C.Y.; Supervision, T.S.C.L. and M.R.K.A.; Validation, M.R.K.A., T.S.C.L. and J.-J.C.; Project administration, M.R.K.A. All authors have read and agreed to the published version of the manuscript.
Funding
The research was supported by the Ministry of Higher Education of Malaysia’s FRGS (FRGS/1/2019/ICT04/MMU/02/5) and the MMU Postdoc (MMUI/220141).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
This paper and the research behind it would not have been possible without the exceptional support from the Institute for Mathematical Research (INSPEM), Universiti Putra Malaysia (UPM) in allowing this research to be conducted. We also extend our endless gratitude to the MYBRAINSC scholarship scheme from the Ministry of Higher Education of Malaysia. Finally, the authors sincerely appreciate the editor and anonymous referees for their careful reading and helpful comments to improve this paper.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Bufalo, M.; Bufalo, D.; Orlando, G. A note on the computation of the modular inverse for cryptography. Axioms 2021, 10, 116. [Google Scholar] [CrossRef]
- Zhang, Y. Bounded gaps between primes. Ann. Math. 2014, 179, 1121–1174. [Google Scholar] [CrossRef]
- McEliece, R.J. A public-key cryptosystem based on algebraic. Coding Thv 1978, 4244, 114–116. [Google Scholar]
- Courtois, N.T.; Finiasz, M.; Sendrier, N. How to achieve a McEliece-based digital signature scheme. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, 9–13 December 2001; pp. 157–174. [Google Scholar]
- Stern, J. Designing Identification schemes with keys of short size. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 21–25 August 1994; pp. 164–173. [Google Scholar]
- Véron, P. Improved Identification schemes based on error-correcting codes. Appl. Algebra Eng. Commun. Comput. 1997, 8, 57–69. [Google Scholar] [CrossRef]
- Aguilar, C.; Gaborit, P.; Schrek, J. A new zero-knowledge code based Identification scheme with reduced communication. In Proceedings of the IEEE Information Theory Workshop, Paraty, Brazil, 16–20 October 2011; pp. 648–652. [Google Scholar]
- Bellini, E.; Caullery, F.; Hasikos, A.; Manzano, M.; Mateu, V. Code-based signature schemes from Identification Protocols in the rank metric. In Cryptology and Network Security. CANS 2018; Springer: Cham, Switzerland, 2018; pp. 277–298. [Google Scholar]
- Lau, T.S.C.; Tan, C.H.; Prabowo, T.F. Key recovery attacks on some rank metric code-based signatures. In Proceedings of the IMA International Conference on Cryptography and Coding, Oxford, UK, 16–18 December 2019; pp. 215–235. [Google Scholar]
- Bellini, E.; Caullery, F.; Gaborit, P.; Manzano, M.; Mateu, V. Improved Veron Identification and signature schemes in the rank metric. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019; pp. 1872–1876. [Google Scholar]
- Ayebie, E.B.; Assidi, H.; Souidi, E.M. An efficient Identification scheme based on rank metric. In Proceedings of the International Symposium on Foundations and Practice of Security, Toulouse, France, 5–7 November 2019; pp. 273–289. [Google Scholar]
- Gaborit, P.; Zémor, G. On the hardness of the decoding and the minimum distance problems for rank codes. IEEE Trans. Inf. Theory 2016, 62, 7245–7252. [Google Scholar] [CrossRef]
- Lau, T.S.C.; Tan, C.H. MURAVE: A new rank code-based signature with multiple rank verification. In Proceedings of the Code-Based Cryptography Workshop, Zagreb, Croatia, 9–10 May 2020; pp. 94–116. [Google Scholar]
- Chabaud, F.; Stern, J. The cryptographic security of the syndrome decoding problem for rank distance codes. In Advances in Cryptology—ASIACRYPT ’96; Springer: Berlin/Heidelberg, Germany, 1996; pp. 368–381. [Google Scholar]
- Gaborit, P.; Ruatta, O.; Schrek, J. On the complexity of the rank syndrome decoding problem. IEEE Trans. Inf. Theory 2016, 62, 106–109. [Google Scholar] [CrossRef]
- Ourivski, A.V.; Johansson, T. New technique for decoding codes in the rank metric and its cryptography applications. Probl. Inf. Transm. 2002, 38, 237–246. [Google Scholar] [CrossRef]
- Aragon, A.; Gaborit, P.; Hauteville, A.; Tillich, J.-P. A new algorithm for solving the rank syndrome decoding problem. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2421–2425. [Google Scholar]
- Faugere, J.-C.; Levy-dit-Vehel, F.; Perret, L. Cryptanalysis of Minrank. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 17–21 August 2008; pp. 280–296. [Google Scholar]
- Goubin, L.; Courtois, N.T. Cryptanalysis of the TTM cryptosystem. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, 3–7 December 2000; pp. 44–57. [Google Scholar]
- Bardet, M.; Briaud, P.; Bros, M.; Gaborit, P.; Neiger, V.; Ruatta, O.; Tillich, J.-P. An algebraic attack on rank metric code-based cryptosystems. In Proceedings of the In Advances in Cryptology (EUROCRYPT 2020), Zagreb, Croatia, 10–14 May 2020; pp. 64–93. [Google Scholar]
- Bardet, M.; Bros, M.; Cabarcas, D.; Gaborit, P.; Perlner, R.; Smith-Tone, D.; Tillich, J.-P.; Verbel, J. Algebraic Attacks for Solving the Rank Decoding and MinRank Problems without Gröbner Basis. 2020. Available online: https://hal.inria.fr/hal-03133479 (accessed on 6 February 2021).
- Goldreich, O. Zero-knowledge twenty years after its invention. IACR Cryptol. EPrint Arch. 2002, 2002, 186. [Google Scholar]
- Fiat, A.; Shamir, A. How to prove yourself: Practical solutions to Identification and signature problems. In Advances in Cryptology—CRYPTO ’86; Springer: Berlin/Heidelberg, Germany, 1986; pp. 186–194. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).