Post-quantum Cryptography: Code-Based Signatures

@inproceedings{Cayrel2010PostquantumCC,
  title={Post-quantum Cryptography: Code-Based Signatures},
  author={Pierre-Louis Cayrel and Mohammed Meziani},
  booktitle={AST/UCMA/ISA/ACN},
  year={2010}
}
  • Pierre-Louis Cayrel, Mohammed Meziani
  • Published in AST/UCMA/ISA/ACN 2010
  • Computer Science
  • This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures. 

    Tables and Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-8 OF 8 CITATIONS

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 42 REFERENCES

    Provably Secure Code-Based Threshold Ring Signatures

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    A public key cryptosystem based on algebraic coding theory

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL

    and H

    • E. Berlekamp, R. McEliece
    • van Tilborg. On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, 24(3):384–386,
    • 1978
    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    A Step Towards QC Blind Signatures

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    Blind Signatures for Untraceable Payments

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    A New Efficient Threshold Ring Signature Scheme Based on Coding Theory

    VIEW 2 EXCERPTS

    Compact McEliece Keys from Goppa Codes

    VIEW 1 EXCERPT