Security Analysis and Efficient Implementation of Code-based Signature Schemes

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we derive code-based signature schemes using Fiat-Shamir transformation on code-based zero-knowledge identification schemes, namely the Stern scheme, the Jain-Krenn-Pietrzak-Tentes scheme, and the Cayrel-Veron-El Yousfi scheme. We analyze the security of these code-based signature schemes and derive the security parameters to achieve the 128-bit level security. Furthermore, we implement these signature schemes and compare their performance on a PC.

Cite

CITATION STYLE

APA

Roy, P. S., Morozov, K., Fukushima, K., Kiyomoto, S., & Takagi, T. (2019). Security Analysis and Efficient Implementation of Code-based Signature Schemes. In International Conference on Information Systems Security and Privacy (pp. 213–220). Science and Technology Publications, Lda. https://doi.org/10.5220/0007259102130220

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free