Abstract
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented. The complexity of the encryption and the decryption processes scale linearly with the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted by Bob, whereas a private-noise added by Alice to a given fraction of the ciphertext of each encrypted plaintext serves to increase the secure channel and is the cornerstone for digital signatures and authentication. Various scenarios are discussed including the possible actions of the opponent Oscar as an eavesdropper or as a disruptor.
Original language | English |
---|---|
Pages (from-to) | 244-250 |
Number of pages | 7 |
Journal | EPL |
Volume | 51 |
Issue number | 2 |
DOIs | |
State | Published - 11 Jul 2000 |