RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2022 Number 57, Pages 67–90 (Mi pdm777)

This article is cited in 4 papers

Mathematical Methods of Cryptography

The security of the code-based signature scheme based on the Stern identification protocol

V. V. Vysotskayaab, I. V. Chizhovabc

a JSC “NPK Kryptonite”, Moscow, Russia
b Lomonosov Moscow State University, Moscow, Russia
c Federal Research Center “Informatics and Control” of Russian Academy of Science, Moscow, Russia

Abstract: The paper provides a complete description of the digital signature scheme based on the Stern identification protocol. We also present the proof of the existential unforgeability of the scheme under the chosen message attack (EUF-CMA) in the random oracle model (ROM). Finally, we discuss the choice of the signature parameters, in particular providing 70-bit security.

Keywords: post-quantum cryptography, code-based cryptography, digital signature, Stern's scheme, Fiat-Shamir transform, provable security, EUF-CMA security.

UDC: 519.719.2

Language: English

DOI: 10.17223/20710410/57/5



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024