TY - GEN
T1 - Zero-knowledge protocols for the McEliece encryption
AU - Morozov, Kirill
AU - Takagi, Tsuyoshi
PY - 2012
Y1 - 2012
N2 - We present two zero-knowledge protocols for the code-based McEliece public key encryption scheme in the standard model. Consider a prover who encrypted a plaintext m into a ciphertext c under the public key pk. The first protocol is a proof of plaintext knowledge (PPK), where the prover convinces a polynomially bounded verifier on a joint input (c,pk) that he knows m without actually revealing it. This construction uses code-based Véron's zero-knowledge identification scheme. The second protocol, which builds on the first one, is a verifiable McEliece encryption, were the prover convinces a polynomially bounded verifier on a joint input (c,pk,m) that c is a valid encryption of m, without performing decryption. These protocols are the first PPK and the first verifiable encryption for code-based cryptosystems.
AB - We present two zero-knowledge protocols for the code-based McEliece public key encryption scheme in the standard model. Consider a prover who encrypted a plaintext m into a ciphertext c under the public key pk. The first protocol is a proof of plaintext knowledge (PPK), where the prover convinces a polynomially bounded verifier on a joint input (c,pk) that he knows m without actually revealing it. This construction uses code-based Véron's zero-knowledge identification scheme. The second protocol, which builds on the first one, is a verifiable McEliece encryption, were the prover convinces a polynomially bounded verifier on a joint input (c,pk,m) that c is a valid encryption of m, without performing decryption. These protocols are the first PPK and the first verifiable encryption for code-based cryptosystems.
UR - http://www.scopus.com/inward/record.url?scp=84864803736&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84864803736&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-31448-3_14
DO - 10.1007/978-3-642-31448-3_14
M3 - Conference contribution
AN - SCOPUS:84864803736
SN - 9783642314476
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 180
EP - 193
BT - Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings
T2 - 17th Australasian Conference on Information Security and Privacy, ACISP 2012
Y2 - 9 July 2012 through 11 July 2012
ER -