Computational aspects of retrieving a representation of an algebraic geometry code (Q2437321): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Progress in Cryptology – Mycrypt 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3613962 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing Key Length of the McEliece Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to mask the structure of codes for a cryptographic use / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking and Defending the McEliece Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Smaller Decoding Exponents: Ball-Collision Decoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symbolic Hamburger-Noether expressions of plane curves and applications to AG codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3418272 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474171 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Two-Point Codes on Hermitian Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3476962 / rank
 
Normal rank
Property / cites work
 
Property / cites work: MicroEliece: McEliece for Embedded Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Distinguisher for High-Rate McEliece Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient computation of zero-dimensional Gröbner bases by change of ordering / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Cryptanalysis of McEliece Variants with Compact Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Bounds for the Design of Code-Based Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the structure of order domains / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3205152 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Arithmetic Theory of Adjoint Plane Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4195061 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved decoding of Reed-Solomon and algebraic-geometry codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4352801 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Effective construction of algebraic geometry codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4509883 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Riemann-Roch spaces in algebraic function fields and related topics. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5386122 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4242017 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the decoding of algebraic-geometric codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient algorithms for the Riemann-Roch problem and for addition in the Jacobian of a curve / rank
 
Normal rank
Property / cites work
 
Property / cites work: McEliece public key cryptosystems using algebraic-geometric codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3797107 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3748196 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithme de Brill-Noether et codes de Goppa / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unique Decoding of Plane AG Codes via Interpolation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3803024 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Weak keys in the McEliece public-key cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiplication matrices and ideals of projective dimension zero / rank
 
Normal rank
Property / cites work
 
Property / cites work: Gröbner bases of ideals defined by functionals with an application to ideals of projective points / rank
 
Normal rank
Property / cites work
 
Property / cites work: The non-gap sequence of a subcode of a generalized Reed-Solomon code / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding a basis of a linear system with pairwise distinct discrete valuations on an algebraic curve / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Sidelnikov Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: The extended \(k\)-tree algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compact McEliece Keys from Goppa Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Varieties Defined by Quadratic Equations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3752293 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Which linear codes are algebraic-geometric? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5642658 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Petri's analysis of the linear system of quadrics through a canonical curve / rank
 
Normal rank
Property / cites work
 
Property / cites work: A standard basis approach to syzygies of canonical curves. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding the permutation between equivalent linear codes: the support splitting algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding irreducible and primitive polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4699468 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public-key cryptosystem based on binary Reed-Muller codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the edge-independence number and edge-covering number for regular graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3835408 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Function Fields and Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side Channels in the McEliece PKC / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Gröbner basis criterion for birational equivalence of affine varieties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3997777 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409125 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes / rank
 
Normal rank

Latest revision as of 10:38, 7 July 2024

scientific article
Language Label Description Also known as
English
Computational aspects of retrieving a representation of an algebraic geometry code
scientific article

    Statements

    Computational aspects of retrieving a representation of an algebraic geometry code (English)
    0 references
    0 references
    0 references
    0 references
    3 March 2014
    0 references
    Since the discovery of a polynomial time algorithm to factor numbers on a quantum computer (Shor algorithm) the interest in cryptographic primitives that are resistent against this algorithm has augmented. One of these so called post-quantum cryptographic primitives comes from coding theory. Two related encryption schemes have been proposed by Niederreiter and McEliece. The underlying trap door function is based on the fact, that decoding of a general linear code is hard, efficient decoding is possible only if the code has some extra structure. So this extra structure is the secret in the scheme. The original paper of McElice uses a \([1024,524,101]\) binary Goppa Code. Several investigations have been made in the meantime to use other Codes. The authors of this paper describe a structural attack against the use of so called very strong algebraic geometric codes, i.e. geometric codes represented by a triple \(({\mathcal X},{\mathcal P}, E)\) where \(\mathcal X\) is a curve over some finite field \(\mathbb{F}_{q}\) of genus \(g\), \(\mathcal P\) are \(n\) distinct rational points and \(E\) is a divisor of degree \(m\) with \(2g+2\leq m < n/2\) or \(n/2+2g-2<m\leq n-4\). A structural attack is one which aims to discover the hidden structure if only the code is given by its generator matrix. Marquez-Corbella et al. show and illustrate their results with two detailed examples how to get a curve \(\mathcal Y\), a collection of rational points \(\mathcal Q\) and a divisor \(F\) out of the generator matrix, such that \(({\mathcal Y}, {\mathcal Q}, F)\) is equivalent to the original \(({\mathcal X}, {\mathcal P}, E)\). The paper contains some trivial typos and in the second example the order of the base elements of the Riemann-Roch space is confused. It should be \(x_1,x_2,x_1^2, x_1x_2,x_2^2,x_1^3,x_1^2x_2,x_1x_2^2,x_2^3\). The construction of the curve \(\mathcal Y\) was developed in [\textit{I. Márquez-Corbella} et al., Des. Codes Cryptography 70, No. 1--2, 215--230 (2014; Zbl 1312.14075)]. The current paper answers mainly the question how to efficiently get the divisor \(F\). Although there are efficient decoding algorithms for AG-Codes it remains open how to get an efficient decoding algorithm for a given triple \(({\mathcal Y}, {\mathcal Q},F)\).
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    public key cryptosystem
    0 references
    code-based cryptography
    0 references
    algebraic geometry codes
    0 references
    Gröbner basis
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references