Computational aspects of retrieving a representation of an algebraic geometry code (Q2437321)

From MaRDI portal
Revision as of 22:31, 2 February 2024 by Import240129110113 (talk | contribs) (Added link to MaRDI item.)
scientific article
Language Label Description Also known as
English
Computational aspects of retrieving a representation of an algebraic geometry code
scientific article

    Statements

    Computational aspects of retrieving a representation of an algebraic geometry code (English)
    0 references
    0 references
    0 references
    0 references
    3 March 2014
    0 references
    Since the discovery of a polynomial time algorithm to factor numbers on a quantum computer (Shor algorithm) the interest in cryptographic primitives that are resistent against this algorithm has augmented. One of these so called post-quantum cryptographic primitives comes from coding theory. Two related encryption schemes have been proposed by Niederreiter and McEliece. The underlying trap door function is based on the fact, that decoding of a general linear code is hard, efficient decoding is possible only if the code has some extra structure. So this extra structure is the secret in the scheme. The original paper of McElice uses a \([1024,524,101]\) binary Goppa Code. Several investigations have been made in the meantime to use other Codes. The authors of this paper describe a structural attack against the use of so called very strong algebraic geometric codes, i.e. geometric codes represented by a triple \(({\mathcal X},{\mathcal P}, E)\) where \(\mathcal X\) is a curve over some finite field \(\mathbb{F}_{q}\) of genus \(g\), \(\mathcal P\) are \(n\) distinct rational points and \(E\) is a divisor of degree \(m\) with \(2g+2\leq m < n/2\) or \(n/2+2g-2<m\leq n-4\). A structural attack is one which aims to discover the hidden structure if only the code is given by its generator matrix. Marquez-Corbella et al. show and illustrate their results with two detailed examples how to get a curve \(\mathcal Y\), a collection of rational points \(\mathcal Q\) and a divisor \(F\) out of the generator matrix, such that \(({\mathcal Y}, {\mathcal Q}, F)\) is equivalent to the original \(({\mathcal X}, {\mathcal P}, E)\). The paper contains some trivial typos and in the second example the order of the base elements of the Riemann-Roch space is confused. It should be \(x_1,x_2,x_1^2, x_1x_2,x_2^2,x_1^3,x_1^2x_2,x_1x_2^2,x_2^3\). The construction of the curve \(\mathcal Y\) was developed in [\textit{I. Márquez-Corbella} et al., Des. Codes Cryptography 70, No. 1--2, 215--230 (2014; Zbl 1312.14075)]. The current paper answers mainly the question how to efficiently get the divisor \(F\). Although there are efficient decoding algorithms for AG-Codes it remains open how to get an efficient decoding algorithm for a given triple \(({\mathcal Y}, {\mathcal Q},F)\).
    0 references
    0 references
    public key cryptosystem
    0 references
    code-based cryptography
    0 references
    algebraic geometry codes
    0 references
    Gröbner basis
    0 references

    Identifiers