Abstract
We propose a rank metric codes based encryption based on the hard problem of rank syndrome decoding problem. We propose a new encryption with a public key matrix by considering the adding of a random distortion matrix over of full column rank n. We show that IND-CPA security is achievable for our encryption under assumption of the Decisional Rank Syndrome Decoding problem. Furthermore, we also prove some bounds for the number of matrices of a fixed rank with entries over a finite field. Our proposal allows the choice of the error terms with rank up to , where r is the error-correcting capability of a code. Our encryption based on Gabidulin codes has public key size of KB, which is 82 times smaller than the public key size of McEliece Cryptosystem based on Goppa codes. For similar post-quantum security level of bits, our encryption scheme has a smaller public key size than the key size suggested by LOI17 Encryption.
1. Introduction
1.1. Background and Motivations
In 1978, McEliece [] proposed a public-key cryptosystem based on Goppa codes in Hamming metric. A message is encrypted with the public key , where G is a generator matrix of Goppa code, S is some random invertible matrix and P is a permutation matrix which S and P hide the structure of matrix G. The ciphertext is computed by adding the codeword with an error of Hamming weight less than or equal to r, where r is the error correcting capability of Goppa code. By decoding with respect to the Goppa code, can be obtained and thus retrieve . Although the original McEliece cryptosystem is still considered secured today, the large key size of Goppa codes (approximately 1 MB) is less practical in application. Many variants based on alternative families of codes were proposed to tackle this problem, yet many of them were proved to be insecure (for instance, [,]).
As an alternative for the Hamming metric, in 1985, Gabidulin introduced the rank metric and the Gabidulin codes [] over a finite field with elements, . Later, in 1991, Gabidulin et al. [] proposed the first rank code based cryptosystem, namely the GPT cryptosystem that employs the similar idea as a McEliece cryptosystem to distort the public key matrix. They considered , where S is a random invertible matrix over , G is a generator matrix of Gabidulin codes, and X is a random matrix over with column rank . However, the GPT cryptosystem is shown to be insecure against Gibson’s attack []. Since then, reparations on GPT were proposed (for instances, GPT [], modified GPT [,], GGPT []); however, due to the weakness of Gabidulin codes containing huge vector space invariant under Frobenius automorphism, these cryptosystems were proved to be insecure by Overbeck’s attack []. Then, proposals such as Gabidulin’s General Reparation [], Gabidulin, Rashwan and Honary [], GPT with more general column scrambler [], Loidreau’s GGPT [], and Smart Approach [] that claimed to resist Overbeck’s attack were proposed. The entries in need to be chosen over and over in a certain pattern so that the rank of will be less than or equal to r. However, proposals with P of such pattern are proved to be insecure as they could be reduced into GGPT form by attacks proposed by [,]. In addition, some general rank syndrome decoding attacks on Gabidulin codes (for instances [,,]) are able to attack the variants above with their suggested parameters in polynomial time.
In 2017, two new research papers about rank metric encryption scheme were presented. The first one is proposed by Gaborit et al. [], namely RankPKE in their construction of a code-based identity-based encryption scheme. The second attempt is a McEliece type encryption proposed by Loidreau (LOI17) [] that considers a scrambler matrix P with its inverse over V, a -dimensional subspace of . The term has error with of rank t. In other words, the matrix amplifies the rank of , and this leads to larger public key size as t has to be times smaller than r.
1.2. Contributions
In this paper, we propose an encryption scheme based on the hard problem of rank syndrome decoding problem. Our construction hides the structure of the generator matrix of the code by adding a distortion matrix of column rank n, with an error of rank larger than r being added into the ciphertext. In particular, let of rank n, a message is encrypted by
where S is a random matrix in , G is a generator matrix for a code with error-correcting capability r, is a k-partial circulant matrix (refer to Definition 5 for formal definition), T is a random matrix in , is a random vector in and is a random vector in with rank . Note that the term could be chosen such that the term in has rank larger than (which is greater than r).
The term is included in the ciphertext, where is a random vector in with rank . Decryption could be performed by decoding with respect to the code whenever rank of is less than or equal to r.
Advantages of Our Proposal. Our proposal has the following advantages:
- i.
- The distortion matrix is of column rank n, which hides the generator matrix G since T is random over .
- ii.
- The error term has rank at least . The adversary is not able to decode the ciphertext correctly since the generator matrix G is remained unknown and rank of is greater than r.
- iii.
- For the case in LOI17 Encryption and other Gabidulin codes based cryptosystem, the multiplication of into often amplifies the rank of the error term, resulting in a choice of error term with smaller rank in the ciphertext. Similarly, the rank of the error term in RankPKE has to be times smaller than r. On the contrary, in our proposal, we have freedom for the choice of and with rank and , respectively.
We show that our encryption scheme has IND-CPA security under assumption of a Decisional Rank Syndrome Decoding problem. We propose Gabidulin codes as a choice of decodable code in our encryption. Furthermore, for similar post quantum security level of bits, our encryption scheme has smaller public key size as compared to key size suggested by LOI17 Encryption [].
This paper is organized as follows: we review some preliminaries for rank metric and circulant matrix in Section 2. We also introduce the hard problems that our encryption is based on and name the known best attacks on the problem. In Section 3, we prove some bounds for the number of matrices of a fixed rank over a finite field and some related results. In Section 4, we describe our proposed cryptosystem and provide proofs for its advantages. In Section 5, we prove that our encryption scheme has IND-CPA security under assumption of Decisional Rank Syndrome Decoding problem. In Section 6, we propose the use of Gabidulin codes as a choice for the decodable code in our encryption, and analyze its security. We also provide some parameters for the proposal based on the Gabidulin codes. Finally, we give our considerations of this paper in Section 7.
2. Preliminaries
In this section, we recall the definition of rank metric, which is the core of rank metric code based cryptosystems. We also introduce the Decisional Rank Syndrome Decoding problem, a hard problem in coding theory for our encryption scheme. We name the known best generic attacks on the Rank Syndrome Decoding problem.
2.1. Rank Metric
Let be a finite field with elements where q is a power of prime. In addition, let be a basis of over the base field .
Definition 1.
Alinear codeof length n and dimension k is a linear subspace of the vector space .
Given a matrix M with coefficients in a field , the rank of M, is the dimension of the row span of M as a vector space over . We denote the row span of a matrix M over by , or when the context is clear. We now define the rank metric of a vector on :
Definition 2.
Let . The rank of in , denoted by is the rank of the matrix where .
Equivalently, the rank of is the dimension over of the subspace of which is spanned by the coordinates of . Note that the rank of a vector is a norm and is independent of the chosen basis. Similarly, we have the following definition of column rank for a matrix in :
Definition 3.
Let . The column rank of M over , denoted by is the maximum number of linearly independent columns over .
We now state a few results related to the rank metric which are important prerequisites for results in later sections.
Lemma 1.
Let such that , then there exists with and with such that . This decomposition is unique up to -operation between and U [].
Definition 4.
Let with and decomposition as in Lemma 1. We call U a Grassman support matrix for and the Grassman support of .
Lemma 2.
Let and []. Then, there exists with and K an invertible matrix over such that
2.2. Circulant and Partial Circulant Matrix
As mentioned in Section 1, we use a k-partial circulant matrix as the distortion matrix for the code with an efficient decoding algorithm. Here, we give the definition of the circulant matrix and k-partial circulant matrix induced by a random vector, .
Definition 5.
Let . The circulant matrix induced by is defined as
The k-partial circulant matrix, induced by is the first k rows of .
In fact, a k-partial circulant matrix induced by has column rank depending on rank of . We have the following result, which helps us to ensure that the distortion matrix that we choose has column rank as desired:
Lemma 3.
Let with ; then, .
Proof.
Suppose to the contrary that ; then, there exists at most columns of that are linearly independent over . Consider the first row of : ; then, at most elements in are linearly independent over . In other words, , which is a contradiction to . □
2.3. Hard Problems in Coding Theory
We describe the hard problems which our cryptosystem is based on.
Definition 6.
Rank Syndrome Decoding Problem (RSD). Let H be a full rank matrix over , and w an integer. The Rank Syndrome Decoding Problem RSD(q,m,n,k,w) needs to determine such that and .
The RSD problem is analogous to the classical syndrome decoding problem with Hamming metric. Recently, the RSD problem has been proven to be hard with probabilistic reduction to the Hamming setting [].
Given a full rank parity-check matrix of H in an RSD problem and . Then, the dual version of is to determine and such that and .
Notation.
If X is a finite set, we write to denote assignment to of an element randomly sampled from the distribution on X.
We now give the definition of Decisional version of RSD problem in its dual form:
Definition 7.
Decisional RSD Problem (DRSD). Let G be a full rank matrix over , and of rank r. The Decisional RSD Problem needs to distinguish the pair from where .
It was proved that DRSD is hard in the worst case []. Therefore, DRSD is eligible to be a candidate of hard problems in coding theory. The hardness of our cryptosystem relies on the DRSD problem (refer to Section 5).
2.4. Generic Attacks on RSD
There are generally two types of generic attacks on the RSD problem, namely the combinatorial attack and algebraic attack.
Combinatorial Attack. The combinatorial approach depends on counting the number of possible supports of size r for a rank code of length n over , which corresponds to the number of subspaces of dimension r in . We summarize the best combinatorial attacks with their conditions and complexities in Table 1.
Table 1.
Best combinatorial attacks on RSD with their conditions and complexities.
Algebraic Attack. The nature of the rank metric favors algebraic attacks using Gröbner bases, as they are largely independent of the value q. These attacks became efficient when q increases. We summarize the complexity of algebraic attacks in Table 2.
Table 2.
Best Algebraic Attacks on RSD with their conditions and complexities.
3. Rank of Matrix
The following are some results related to the rank of a matrix over a finite field, which is crucial for the construction of our encryption. We provide some bounds for the number of matrices over of rank .
Proposition 1.
Denote as the number of matrices over of rank r; then, where [,].
We need the following lemma to give some bounds for .
Lemma 4.
For , if , then
Proof.
Expand ; it suffices for us to show that . Since , we have , and thus
which implies that
Since , then and . Adding these inequalities gives us
We have
which implies that
This completes the proof for the inequalities. □
Now, we prove an upper bound and a lower bound for :
Proposition 2.
Let ; then, the number of matrices over of rank r is bounded by
Proof.
Assuming that , recall that , and we have
By Lemma 4,
For , the statement could be proved by switching the term m and n in the statement and in Lemma 4. □
Proposition 3.
Assuming that , then .
Proof.
Recalling Proposition 1,
This completes the statement. □
4. A New Encryption Scheme
In this section, we propose our new encryption scheme which consists of a public matrix distorted by a matrix of column rank n. We will discuss some strengths of this encryption after the description of the scheme.
Presentation of the Encryption Scheme,PE.
generates global parameters , and . The plaintext space is . Output parameters .
Generate invertible matrix . Generate a generator matrix of a linear code with an efficient decoding algorithm able to correct error up to rank r. Generate vector such that . Generate invertible matrix . Output public key and private key .
Let be the message to be encrypted. Generate random satisfying . Generate random such that and . Compute and . Output as the ciphertext.
Returns .
Remark 1.
By Proposition 2, the number of that can be chosen is at least , which is at least . Similarly, the number of that can be chosen is at least , which is at least
Correctness. The correctness of our encryption scheme relies on the decoding capability of the code . Using the private keys, we have . Since , then the decoding algorithm can decode correctly and retrieve . Finally, compute to recover .
Strengths of the Proposed Encryption.
Recall from Section 1 that there are currently two approaches in constructing a rank metric code based encryption scheme. The idea of the first approach is to scramble the generator matrix G so that the matrix for encryption will appear to be random. As a result, the adversary is not able to decode it correctly. Therefore, the error chosen to encrypt the message in LOI17 Encryption must have rank times smaller than r. Nevertheless, in our construction, we can choose and with rank and respectively. Furthermore, the matrix G in our encryption is scrambled by adding a matrix X, i.e., , where with column rank n as proved in the following:
Corollary 1.
Let such that . Then, for any invertible , the column rank of , .
Proof.
It suffices to show that . Since by Lemma 3, and , then . □
By Corollary 1, our chosen has column rank n instead of . This will make the reduction of X into the form (as in Lemma 2) impossible, where K is an invertible matrix over .
On the other hand, the second approach in constructing rank metric code based encryption is to make the generator matrix G publicly known, and introduces an error with big rank (greater than r) into the ciphertext to ensure the decoding for retrieval of plaintext is hard, i.e., and .
In fact, in our encryption scheme, the error term in the ciphertext has error larger than r, i.e., :
Proposition 4.
Let such that . Given such that . Then, for any such that , we have .
Proof.
Given and , then, for any such that ,
since is invertible. □
By Proposition 4, we have . The adversary is not able to recover the plaintext from even if he knows the structure of the generator matrix G. However, in practicality, G remains unknown to the adversary.
5. IND-CPA Secure Encryption
The desired security property of a public-key encryption scheme is indistinguishability under chosen plaintext attack (IND-CPA). This is normally defined by a security game that is interacting between a challenger and an adversary . The security game is described as follows:
| Set up: Given a security parameter, the challenger first runs the key generation algorithm and send to . Challenge: chooses two equal length plaintexts and ; and sends these to the challenger. Encrypt challenge messages: The challenger chooses a random , computes a challenge ciphertext and returns to . Guess: outputs a bit . wins if . |
The advantage of an adversary is defined as
A secure public-key encryption scheme against chosen plaintext attack is formally defined as follows:
Definition 8.
A public-key encryption scheme is -IND-CPAsecure if, for any probabilistic t-polynomial time, the adversary has the advantage less than ϵ, that is, .
Lemma 5.
Let , and be events. Suppose the event occurs if and only if occurs, then (Difference Lemma []).
We have the following result which is important in our encryption.
Lemma 6.
Given , , and . Let , then there exists with such that and .
Proof.
Let such that and . We prove the statement by consider different cases for a and b.
Case 1 ( and ): Let be any element in such that . Then . Similarly, .
Case 2 ( and ): Since , by Lemma 1, , where are linearly independent and A is an matrix over of rank a. Let , consider a basis of such that and let . Note that . Then, we can form of rank by choosing elements from , and we have since elements in are linearly independent with elements in . With this , we have .
Case 3 ( and ): This case follows the proof of Case 2 by interchanging the term a with b, and with .
Case 4 ( and ): Since , by Lemma 1, , where are linearly independent and A is an matrix over of rank a. Similarly, since , by Lemma 1, , where are linearly independent and B is an matrix over of rank b. Let and , consider a basis of such that and let .
If , since and , then . We can form of rank by choosing elements from . Thus, we have since elements in are linearly independent with elements in , and since elements in are linearly independent with elements in .
If , then we further break this case into the following subcases:
: WLOG, assume that , then . We can form of rank by choosing elements from . Thus, we have since elements in are linearly independent with elements in , and since elements in are linearly independent with elements in .
: WLOG, assume that . If , then . We can form of rank by choosing elements from . Thus, we have since elements in are linearly independent with elements in , and since elements in are linearly independent with elements in . If , let and . Let , , and , pick v elements and another v elements . Then, considering , we have . We can form of rank by choosing elements from (with at least one element from ), and the elements picked will only decrease the rank of and at most by and , respectively. Therefore, we have and . □
Now, suppose the challenger adversary chooses two equal length plaintexts and sends these to the challenger. By the following lemma, the challenger is able to choose a random , such that the conditions (2)–(7) are satisfied:
Lemma 7.
Given and , there exists such that
Proof.
Let and , and . Then, apply Lemma 6 accordingly. □
Therefore, without knowing any information on , is not able to distinguish between and , between and , as , are chosen such that Labels (2)–(7) are satisfied. For convenience sake, we have the following notation:
Notation.
We now state the assumptions for which our encryption is based on:
The Decisional Rank Syndrome Decoding (DRSD) assumption. Let be a distinguishing algorithm that takes as input a vector in and a matrix , and outputs a bit. The DRSD advantage of is defined as
where . The DRSD assumption is the assumption that the advantage is negligible for any , i.e., .
Now, we prove that our encryption is IND-CPA secure under DRSD and DRSD assumptions.
Theorem 1.
Under the DRSD and DRSD assumptions, the proposed public-key encryption schemePEisIND-CPAsecure.
Proof.
To prove the security of the scheme, we are using a sequence of games.
Game : This is the real IND-CPA attack game against an adversary in the definition of semantic security. We run the following attack game algorithm:
| , , , , , , , , , if then return 1 else return 0 |
Denote the event that wins in Game . Then,
Game : We now make one small change to . In this game, we pick a random vector and replace in for by :
| , , , , , , , , if then return 1 else return 0 |
We denote the event that wins in Game . Under the DRSD assumption, the two games and are indistinguishable with .
Game : We now make one small change to . In this game, we pick a random vector and replace in for by :
| , , , , , , , , , , if then return 1 else return 0 |
We denote the event that wins in Game . Under the DRSD assumption, the two games and are indistinguishable with .
As the ciphertext challenge is perfectly random, b is hidden to any adversary without any advantage; therefore, . We have
Therefore, under the DRSD and DRSD assumption, the proposed public-key encryption scheme PE is IND-CPA secure. □
6. Our Encryption Based on Gabidulin Codes
We propose Gabidulin code as the decodable code in our encryption. We analyze the security of the scheme by considering possible structural attacks to cryptanalyze the system based on Gabidulin code. We also give some parameters for our proposal using Gabidulin codes.
6.1. Gabidulin Codes
First, we give the definition for Moore matrix and Gabidulin codes.
Definition 9.
A matrix is called aMoore matrixinduced by if there exists a vector such that ith row of G is equal to for , i.e., G is in the form of
where is the ith Frobenius power. Similarly, we define . In addition, for any set , we denote .
Definition 10.
Let with . The -Gabidulin code over of dimension k and generator vector is the code generated by a Moore matrix G induced by .
The error-correcting capability of is . There exist efficient decoding algorithms for Gabidulin codes up to the rank error correcting capability (for example, []).
6.2. Structural Attack on Gabidulin Code
We examine some common existing attacks against Gabidulin codes and argue that our proposal resists these attacks.
Frobenius Weak Attack. The principle of the Frobenius weak attack (for more details, please refer to []) is to form an extension code from the code generated by and the error term in the ciphertext. In particular,
where and . One of the necessary conditions for the complexity of solving the RSD for to be polynomial time, via the proposed method is . Although in our system our error terms and both have ranks of , due to the structure of , we have when is chosen to be generated by , which makes the system secure against this attack.
Key Recovery Attack. Consider the structure of :
Note that the above linear system has equations, with unknown variables over and linear variables over . Now, consider :
This new linear system has equations, with new unknown variables over . Then, the linear systems have a total of equations with a total of unknown variables over and unknown variables over . However, note that solving the equations in is equivalent to solving a multivariant quadratic problem.
Reduction Attack. Otmani, Kalachi, and Ndjeya [] show that a matrix of the form where X is a random matrix over with column rank could be reduced into the form
where is some random matrix over , Q is an invertible matrix over and is a generator matrix of a -Gabidulin code generated by some . By applying Lemma 2, this reduction is possible due to the structure of X which can be written into the form of where and K is an invertible matrix over . These columns of zeroes enable the adversary to decompose into random components, and a Moore matrix component, . The adversary can then apply Overbeck’s attack [] and cryptanalyze the system.
However, in our encryption system, . By Corollary 1, has column rank n, thus the adversary is not able to rewrite in the form of Label (1) which has columns of zero. Therefore, could not be reduced into components of random matrix and Moore matrix of the form (9). Overbeck’s attack cannot be applied in our case.
Moore Decomposition Attack. The Moore Decomposition attack on GPT cryptosystem is the extension of the Overbeck attack []. Therefore, it suffices for us to show that a cryptosystem is resistant to the Moore Decomposition attack. We now briefly present the idea of Moore Decomposition attack in the following (for more details, please refer to Section 3 and Section 4 []):
Consider , since , we have . Consider a minimal column rank Moore decomposition for , where is a Moore matrix and Z is a non-Moore component which has the lowest possible column rank. Denote . Since , by Corollary 3.12 in [], all the elements of rank one in belong to the Grassman support of X. The adversary is able to find a full rank matrix for such that and compute , a parity check matrix for . By Theorem 4.1 in [], the adversary can recover in polynomial time.
In our encryption system, has column rank n by Corollary 1. Consider a minimal column rank Moore decomposition for where W is a non-Moore component which has the lowest possible column rank s. Note that, in our case, , thus we have . As it requires to apply Corollary 3.12 in [], this condition is not satisfied in our case, thus Theorem 4.1 in [] could not be used to recover the encrypted message.
6.3. Proposed Parameters
We propose some parameters for our encryption scheme. We consider and . Denote the post-quantum complexity for combinatorial and algebraic attacks as “Comb” and “Alg”, respectively. We use the complexities in Section 2.4 as the lower bound of the complexity by replacing in the calculation. Following Loidreau’s application [] of Grover’s algorithm, the exponential term in the decoding complexity should be square rooted []. The public key size is bytes. Table 3 is the parameters for and bits post-quantum security.
Table 3.
Parameters of our cryptosystem for and bits post-quantum security.
Comparison with LOI17 Encryption for similar post-quantum decoding complexity (at ) []. We include the formula in the lower bounds as it was used in [] to evaluate the complexities of the attack on RSD. Table 4 is the comparison for our encryption PCir and LOI17 encryption.
Table 4.
Comparison of parameters between our cryptosystem and LOI17 Encryption.
Our encryption has the following strengths:
- i.
- Our encryption has larger rank of error and .
- ii.
- At similar security, our key size ( KB) is smaller than the key size of LOI17 Encryption ( KB). Our encryption scheme can provide better post quantum security with smaller key size.
7. Conclusions
This paper has proposed a new rank metric encryption based on the difficulty of the Rank Syndrome Decoding problem. We modify the original GPT cryptosystem with different considerations for the public matrix. The public matrix is distorted by adding of column rank n. Our encryption scheme has IND-CPA security under the DRSD and DRSD assumptions. Our proposal allows the choice for rank of errors to be . Moreover, for similar post-quantum security level of bits, our encryption using Gabidulin codes has smaller public key size ( KB) than the key size suggested by LOI17 Encryption ( KB). Our encryption provides better security with smaller key size.
Author Contributions
Conceptualization, T.S.C.L. and C.H.T.; Formal Analysis, T.S.C.L. and C.H.T.; Writing—Original Draft Preparation, T.S.C.L.; Writing—Review and Editing, C.H.T.; Project Administration, C.H.T.; Funding Acquisition, C.H.T.
Conflicts of Interest
The authors declare no conflict of interest.
References
- McEliece, R.J. A public-key cryptosystem based on algebraic coding theory. Coding Thv. 1978, 4244, 114–116. [Google Scholar]
- Sidelnikov, V.M.; Shestakov, S.O. On insecurity of cryptosystems based on generalied Reed-Solomon codes. Discret. Math. Appl. 1992, 2, 439–444. [Google Scholar] [CrossRef]
- Baldi, M.; Chiaraluce, F. Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes. In Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24–29 June 2007; pp. 2591–2595. [Google Scholar]
- Gabidulin, E.M. Theory of codes with maximum rank distance. Probl. Pereda. Inf. 1985, 21, 3–16. [Google Scholar]
- Gabidulin, E.M.; Paramonov, A.V.; Tretjakov, O.V. Ideals over a non-commutative ring and their application in cryptology. In Proceedings of the Worshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, 8–11 April 1991; pp. 482–489. [Google Scholar]
- Gibson, J.K. Severely denting the Gabidulin version of the McEliece public-key cryptosystem. Des. Codes Cryptogr. 1995, 6, 37–45. [Google Scholar] [CrossRef]
- Gabidulin, E.M.; Ourivski, A.V. Modified GPT PKC with right scrambler. Electron. Notes Discret. Math. 2001, 6, 168–177. [Google Scholar] [CrossRef]
- Ourivski, A.V.; Gabidulin, E.M. Column Scrambler for the GPT cryptosystem. Discret. Appl. Math. 2003, 128, 207–221. [Google Scholar] [CrossRef]
- Overbeck, R. Extending Gibson’s attacks on the GPT cryptosystem. In Proceedings of the International Workshop on Coding and Cryptography, Bergen, Norway, 14–18 March 2005; pp. 178–188. [Google Scholar]
- Overbeck, R. Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 2008, 21, 280–301. [Google Scholar] [CrossRef]
- Gabidulin, E.M. Attacks and counter-attacks on the GPT public key cryptosystem. Des. Codes Cryptogr. 2008, 48, 171–177. [Google Scholar] [CrossRef]
- Gabidulin, E.M.; Rashwan, H.; Honary, B. On improving security of GPT cryptosystems. In Proceedings of the IEEE International Symposium on Information Theory, Seoul, South Korea, 28 June–3 July 2009; pp. 1110–1114. [Google Scholar]
- Loidreau, P. Designing a rank metric based McEliece cryptosystem. In Proceedings of the 3rd International Workshop on Post-Quantum Cryptography, Darmstadt, Germany, 25–28 May 2010; pp. 142–152. [Google Scholar]
- Rashwan, H.; Gabidulin, E.M.; Honary, B. A smart approach for GPT cryptosystem based on rank codes. In Proceedings of the IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010; pp. 2463–2467. [Google Scholar]
- Horlemann-Trautmann, A.; Marshall, K.; Rosenthal, J. Extension of Overbeck’s Attack for Gabidulin Based Cryptosystems. Des. Codes Cryptogr. 2018, 86, 319–340. [Google Scholar] [CrossRef]
- Otmani, A.; Kalachi, H.T.; Ndjeya, S. Improved Cryptanalysis of Rank Metric Schemes Based on Gabidulin Codes. Des. Codes Cryptogr. 2018, 86, 1983–1996. [Google Scholar] [CrossRef]
- Gaborit, P.; Ruatta, O.; Schrek, J. On the complexity of the rank syndrome decoding problem. IEEE Trans. Inf. Theor. 2016, 62, 1006–1019. [Google Scholar] [CrossRef]
- Horlemann-Trautmann, A.; Marshall, K.; Rosenthal, J. Considerations for Rank-based Cryptosystems. In Proceedings of the IEEE International Symposium on Information Theory, Barcelona, Spain, 10–15 July 2016; pp. 2544–2548. [Google Scholar]
- Ourivski, A.V.; Johansson, T. New technique for decoding codes in the rank metric and its cryptography applications. Probl. Inf. Transm. 2002, 38, 237–246. [Google Scholar] [CrossRef]
- Gaborit, P.; Hauteville, A.; Phan, D.H.; Tillich, J.P. Identity-based Encryption from Codes with Rank Metric. In Proceedings of the 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; pp. 194–224. [Google Scholar]
- Loidreau, P. A New Rank Metric Codes Based Encryption Scheme. In Proceedings of the 8th International Workshop on Post-Quantum Cryptography, Utrecht, The Netherlands, 26–28 June 2017; pp. 3–17. [Google Scholar]
- Gaborit, P.; Zémor, G. On the hardness of the decoding and the minimum distance problems for rank codes. IEEE Trans. Inf. Theor. 2016, 62, 7245–7252. [Google Scholar] [CrossRef]
- Aragon, A.; Gaborit, P.; Hauteville, A.; Tillich, J.P. A New Algorithm for Solving the Rank Syndrome Decoding Problem. In Proceedings of the 2018 IEEE International Symposium on Information Theory, Vail, CO, USA, 17–22 June 2018; pp. 2421–2425. [Google Scholar]
- Goubin, L.; Courtois, N.T. Cryptanalysis of the TTM cryptosystem. In Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, 3–7 December 2000; pp. 44–57. [Google Scholar]
- Landsberg, G. Über eine Azahibestimmung und eine damit zusammengängende Reihe. J. Reine Angew. Math. 1893, 111, 87–88. [Google Scholar]
- Laksov, D.; Thorup, A. Counting Matrices with Coordinates in Finite Fields and of Fixed Rank. Math. Scand. 1994, 74, 19–33. [Google Scholar] [CrossRef]
- Shoup, V. Sequences of Games: A Tool for Taming Complexity in Security Proofs. Available online: http://www.shoup.net/papers/games.pdf (accessed on 7 October 2018).
- Bernstein, D.J. Grover vs. McEliece. In Proceedings of the 3rd International Workshop on Post-Quantum Cryptography, Darmstadt, Germany, 25–28 May 2010; pp. 73–80. [Google Scholar]
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).