Cryptology ePrint Archive: Report 2010/465
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
Abstract: While it is generally believed that due to their large public
key sizes code based public key schemes cannot be conveniently used
when memory-constrained devices are involved, we propose an approach
for Public Key Infrastructure (PKI) scenarios which totally eliminates
the need to store public keys of communication partners. Instead, all the
necessary computation steps are performed during the transmission of
the key. We show the feasibility of the approach through an example
implementation and give arguments that it will be possible for a smart
card controller to carry out the associated computations to sustain the
transmission rates of possible future high speed contactless interfaces.
Category / Keywords: public-key cryptography / post-quantum cryptography, code-based cryptography, public key encryption scheme, efficient implementation, embedded devices
Date: received 2 Sep 2010, last revised 20 Apr 2012
Contact author: strenzke at flexsecure de
Available format(s): PDF | BibTeX Citation
Note: An actual implementation of the proposed approach was made and is now included in the paper.
Version: 20120420:173627 (All versions of this report)
Short URL: ia.cr/2010/465
[ Cryptology ePrint archive ]