Post-quantum and code-based cryptography—some prospective research directions
C Balamurugan, K Singh, G Ganesan, M Rajarajan - Cryptography, 2021 - mdpi.com
Cryptography has been used from time immemorial for preserving the confidentiality of
data/information in storage or transit. Thus, cryptography research has also been evolving …
data/information in storage or transit. Thus, cryptography research has also been evolving …
Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …
ongoing effort to build a quantum computer urges the cryptography community to develop …
Quantum-safe cryptography: crossroads of coding theory and cryptography
We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum
cryptography (PQC) and information-theoretic security. From a cryptographic point of view …
cryptography (PQC) and information-theoretic security. From a cryptographic point of view …
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
The threat of a coming quantum computer motivates the research for new zero-knowledge
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …
Banquet: short and fast signatures from AES
This work introduces Banquet, a digital signature scheme with post-quantum security,
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
LESS-FM: fine-tuning signatures from the code equivalence problem
Code-based cryptographic schemes are highly regarded among the quantum-safe
alternatives to current standards. Yet, designing code-based signatures using traditional …
alternatives to current standards. Yet, designing code-based signatures using traditional …
[КНИГА][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Short signatures from regular syndrome decoding in the head
We introduce a new candidate post-quantum digital signature scheme from the regular
syndrome decoding (RSD) assumption, an established variant of the syndrome decoding …
syndrome decoding (RSD) assumption, an established variant of the syndrome decoding …
LESS is more: code-based signatures without syndromes
Devising efficient and secure signature schemes based on coding theory is still considered
a challenge by the cryptographic community. In this paper, we construct a signature scheme …
a challenge by the cryptographic community. In this paper, we construct a signature scheme …
Designing a practical code-based signature scheme from zero-knowledge proofs with trusted setup
This paper defines a new practical construction for a code-based signature scheme. We
introduce a new protocol that is designed to follow the recent paradigm known as “Sigma …
introduce a new protocol that is designed to follow the recent paradigm known as “Sigma …