TY - GEN

T1 - Zero-knowledge protocols for the McEliece encryption

AU - Morozov, Kirill

AU - Takagi, Tsuyoshi

N1 - Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.

PY - 2012

Y1 - 2012

N2 - We present two zero-knowledge protocols for the code-based McEliece public key encryption scheme in the standard model. Consider a prover who encrypted a plaintext m into a ciphertext c under the public key pk. The first protocol is a proof of plaintext knowledge (PPK), where the prover convinces a polynomially bounded verifier on a joint input (c,pk) that he knows m without actually revealing it. This construction uses code-based Véron's zero-knowledge identification scheme. The second protocol, which builds on the first one, is a verifiable McEliece encryption, were the prover convinces a polynomially bounded verifier on a joint input (c,pk,m) that c is a valid encryption of m, without performing decryption. These protocols are the first PPK and the first verifiable encryption for code-based cryptosystems.

AB - We present two zero-knowledge protocols for the code-based McEliece public key encryption scheme in the standard model. Consider a prover who encrypted a plaintext m into a ciphertext c under the public key pk. The first protocol is a proof of plaintext knowledge (PPK), where the prover convinces a polynomially bounded verifier on a joint input (c,pk) that he knows m without actually revealing it. This construction uses code-based Véron's zero-knowledge identification scheme. The second protocol, which builds on the first one, is a verifiable McEliece encryption, were the prover convinces a polynomially bounded verifier on a joint input (c,pk,m) that c is a valid encryption of m, without performing decryption. These protocols are the first PPK and the first verifiable encryption for code-based cryptosystems.

UR - http://www.scopus.com/inward/record.url?scp=84864803736&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84864803736&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-31448-3_14

DO - 10.1007/978-3-642-31448-3_14

M3 - Conference contribution

AN - SCOPUS:84864803736

SN - 9783642314476

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 180

EP - 193

BT - Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings

T2 - 17th Australasian Conference on Information Security and Privacy, ACISP 2012

Y2 - 9 July 2012 through 11 July 2012

ER -