Quasi-cyclic Linear Error-Block Code-based Post-quantum Signature
- URL: http://arxiv.org/abs/2503.23405v1
- Date: Sun, 30 Mar 2025 11:36:05 GMT
- Title: Quasi-cyclic Linear Error-Block Code-based Post-quantum Signature
- Authors: I. Cherkaoui, S. Belabssir, J. Horgan, I. Dey,
- Abstract summary: We introduce a signature based on a family of linear error-block codes (LEB) with strong algebraic properties.<n>It is the family of quasi-cyclic LEB codes that we do define algebraically during this work.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Shor algorithm led to the discovery of multiple vulnerabilities in a number of cryptosystems. As a result, post-quantum cryptography attempts to provide cryptographic solutions that can face these attacks, ensuring the security of sensitive data in a future where quantum computers are assumed to exist. Error correcting codes are a source for efficiency when it comes to signatures, especially random ones described in this paper, being quantum-resistant and reaching the Gilbert-Varshamov bound, thus offering a good trade-off between rate and distance. In the light of this discussion, we introduce a signature based on a family of linear error-block codes (LEB), with strong algebraic properties: it is the family of quasi-cyclic LEB codes that we do define algebraically during this work.
Related papers
- Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives [0.6749750044497732]
Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it.
Most of the current PQHE algorithms are secured by lattice-based problems.
Code-based encryption is a novel way to diversify post-quantum algorithms.
arXiv Detail & Related papers (2025-03-28T06:49:22Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems [3.277820036565198]
Post-quantum cryptography has gained attention due to the need for secure cryptographic systems in the face of quantum computing.
We consider a generic Lee metric based McEliece type cryptosystem and evaluate its security against lattice-based attacks.
arXiv Detail & Related papers (2024-09-24T12:21:33Z) - Error correctable efficient quantum homomorphic encryption using Calderbank-Shor-Steane codes [0.0]
We develop an efficient quantum homomorphic encryption scheme based on quantum error correction codes.
By using a longer quantum error correction code, both the security and error-correction capabilities of the scheme are improved.
arXiv Detail & Related papers (2024-01-16T02:30:06Z) - Fault-Tolerant Computing with Single Qudit Encoding [49.89725935672549]
We discuss stabilizer quantum-error correction codes implemented in a single multi-level qudit.
These codes can be customized to the specific physical errors on the qudit, effectively suppressing them.
We demonstrate a Fault-Tolerant implementation on molecular spin qudits, showcasing nearly exponential error suppression with only linear qudit size growth.
arXiv Detail & Related papers (2023-07-20T10:51:23Z) - Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [5.497441137435869]
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem.
The derived class of NTRU-GKP codes has the additional property that decoding for a displacement noise model is equivalent to decrypting the NTRU cryptosystem.
This construction highlights how the GKP code bridges aspects of classical error correction, quantum error correction as well as post-quantum cryptography.
arXiv Detail & Related papers (2023-03-04T14:39:20Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Neural Belief Propagation Decoding of Quantum LDPC Codes Using
Overcomplete Check Matrices [60.02503434201552]
We propose to decode QLDPC codes based on a check matrix with redundant rows, generated from linear combinations of the rows in the original check matrix.
This approach yields a significant improvement in decoding performance with the additional advantage of very low decoding latency.
arXiv Detail & Related papers (2022-12-20T13:41:27Z) - Quantum Error Correction via Noise Guessing Decoding [0.0]
Quantum error correction codes (QECCs) play a central role in both quantum communications and quantum computation.
This paper shows that it is possible to both construct and decode QECCs that can attain the maximum performance of the finite blocklength regime.
arXiv Detail & Related papers (2022-08-04T16:18:20Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.