preprint IACR disponible sur https://eprint.iacr.org/2018/996/20181022:154324We present here Wave the first "hash-and-sign" code-based signature scheme which strictly follows the GPV strategy [GPV08]. It uses the family of ternary generalized (U, U + V) codes. We prove that Wave achieves existential unforgeability under adaptive chosen message attacks (EUF-CMA) in the random oracle model (ROM) with a tight reduction to two assumptions from coding theory: one is a distinguishing problem that is related to the trapdoor we insert in our scheme, the other one is DOOM, a multiple target version of syndrome decoding. The algorithm produces uniformly distributed signatures through a suitable rejection sampling. Our scheme enjoys efficient signatur...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
There is a serious problem with one of the assumptions made in the security proof of the SURF scheme...
International audienceIt is known how to transform certain canonical three-pass identification schem...
This paper defines a new practical construction for a code-based signature scheme. We introduce a n...
Wave is a recent digital signature scheme [3]. It is based on a family of trapdoor one-way Preimage ...
International audienceBaldi et al. have introduced in [BBC + 13] a very novel code based signature s...
International audienceWe present here a new family of trapdoor one-way Preimage Sampleable Functions...
International audience—Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. Th...
Devising efficient and secure signature schemes based on coding theory is still considered a challen...
The paper provides a complete description of the digital signature scheme based on the Stern identif...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
Signcryption is a cryptographic protocol that provides uthentication and confidentiality as a single...
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely st...
We present ReSolveD, a new candidate post-quantum signature scheme under the regular syndrome decodi...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
There is a serious problem with one of the assumptions made in the security proof of the SURF scheme...
International audienceIt is known how to transform certain canonical three-pass identification schem...
This paper defines a new practical construction for a code-based signature scheme. We introduce a n...
Wave is a recent digital signature scheme [3]. It is based on a family of trapdoor one-way Preimage ...
International audienceBaldi et al. have introduced in [BBC + 13] a very novel code based signature s...
International audienceWe present here a new family of trapdoor one-way Preimage Sampleable Functions...
International audience—Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. Th...
Devising efficient and secure signature schemes based on coding theory is still considered a challen...
The paper provides a complete description of the digital signature scheme based on the Stern identif...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
Signcryption is a cryptographic protocol that provides uthentication and confidentiality as a single...
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely st...
We present ReSolveD, a new candidate post-quantum signature scheme under the regular syndrome decodi...
In this paper we propose a new hash-and-sign digital signature scheme whose security against existen...
There is a serious problem with one of the assumptions made in the security proof of the SURF scheme...
International audienceIt is known how to transform certain canonical three-pass identification schem...