Code-Based Identification and Signature Schemes in Software - Security Engineering and Intelligence Informatics Access content directly
Conference Papers Year : 2013

Code-Based Identification and Signature Schemes in Software

Abstract

In this paper we present efficient implementations of several code-based identification schemes, namely the Stern scheme, the Véron scheme and the Cayrel-Véron-El Yousfi scheme. We also explain how to derive and implement signature schemes from the previous identification schemes using the Fiat-Shamir transformation. For a security of 80 bits and a document to be signed of size 1 kByte, we reach a signature in about 4 ms on a standard CPU.
Fichier principal
Vignette du fichier
2013_-_Code-based_identification_and_signature_schemes_in_software.pdf (184.8 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-00864936 , version 1 (24-09-2013)

Identifiers

  • HAL Id : hal-00864936 , version 1

Cite

Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann. Code-Based Identification and Signature Schemes in Software. 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136. ⟨hal-00864936⟩
297 View
448 Download

Share

Gmail Facebook X LinkedIn More