Paper 2014/163

Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices

Arnaud Dambra, Philippe Gaborit, Mylène Roussellet, Julien Schrek, and Nicolas Tafforeau

Abstract

Amongst areas of cryptographic research, there has recently been a widening interest for code-based cryptosystems and their implementations. Besides the {\it a priori} resistance to quantum computer attacks, they represent a real alternative to the currently used cryptographic schemes. In this paper we consider the implementation of the Stern authentication scheme and one recent variation of this scheme by Aguilar {\it et al.}. These two schemes allow public authentication and public signature with public and private keys of only a few hundreds bits. The contributions of this paper are twofold: first, we describe how to implement a code-based signature in a constrained device through the Fiat-Shamir paradigm, in particular we show how to deal with long signatures. Second, we implement and explain new improvements for code-based zero-knowledge signature schemes. We describe implementations for these signature and authentication schemes, secured against side channel attacks, which drastically improve the previous implementation presented at Cardis 2008 by Cayrel {\it et al.}. We obtain a factor 3 reduction of speed and a factor of about 2 for the length of the signature. We also provide an extensive comparison with RSA signatures.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Code-based CryptographyStern's SchemeSignatureAuthentication
Contact author(s)
mylene roussellet @ gmail com
History
2014-03-04: revised
2014-03-03: received
See all versions
Short URL
https://ia.cr/2014/163
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/163,
      author = {Arnaud Dambra and Philippe Gaborit and Mylène Roussellet and Julien Schrek and Nicolas Tafforeau},
      title = {Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/163},
      year = {2014},
      url = {https://eprint.iacr.org/2014/163}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.