411 research outputs found
Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
Reed-Muller codes are among the most important classes of locally correctable
codes. Currently local decoding of Reed-Muller codes is based on decoding on
lines or quadratic curves to recover one single coordinate. To recover multiple
coordinates simultaneously, the naive way is to repeat the local decoding for
recovery of a single coordinate. This decoding algorithm might be more
expensive, i.e., require higher query complexity. In this paper, we focus on
Reed-Muller codes with usual parameter regime, namely, the total degree of
evaluation polynomials is , where is the code alphabet size
(in fact, can be as big as in our setting). By introducing a novel
variation of codex, i.e., interleaved codex (the concept of codex has been used
for arithmetic secret sharing \cite{C11,CCX12}), we are able to locally recover
arbitrarily large number of coordinates of a Reed-Muller code
simultaneously at the cost of querying coordinates. It turns out that
our local decoding of Reed-Muller codes shows ({\it perhaps surprisingly}) that
accessing locations is in fact cheaper than repeating the procedure for
accessing a single location for times. Our estimation of success error
probability is based on error probability bound for -wise linearly
independent variables given in \cite{BR94}
07381 Abstracts Collection -- Cryptography
From 16.09.2007 to 21.09.2007 the Dagstuhl Seminar 07381 ``Cryptography\u27\u27 was held
in the International Conference and Research Center (IBFI), Schloss Dagstuhl.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
07381 Executive Summary - Cryptography
The topics covered in the seminar spanned most areas of cryptography,
in one way or another, both in terms of the types of schemes
(public-key cryptography, symmetric cryptography, hash functions and
other cryptographic functions, multi-party protocols, etc.) and in terms of the
mathematical methods and techniques used (algebra, number theory,
elliptic curves, probability theory, information theory,
combinatorics, quantum theory, etc.). The range of applications
addressed in the various talks was broad, ranging from secure
communication, key management, authentication, digital signatures and
payment systems to e-voting and Internet security.
While the initial plan had been to focus more exclusively on public-key
cryptography, it turned out that this sub-topic branches out into
many other areas of cryptography and therefore the organizers
decided to expand the scope, emphasizing quality rather than
close adherence to public-key cryptography. This decision turned
out to be a wise one.
What was common to almost all the talks is that rigorous mathematical
proofs for the security of the presented schemes were given. In fact,
a central topic of many of the talks were proof methodologies for
various contexts
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
The Ihara limit (or -constant) has been a central problem of study in
the asymptotic theory of global function fields (or equivalently, algebraic
curves over finite fields). It addresses global function fields with many
rational points and, so far, most applications of this theory do not require
additional properties. Motivated by recent applications, we require global
function fields with the additional property that their zero class divisor
groups contain at most a small number of -torsion points. We capture this by
the torsion limit, a new asymptotic quantity for global function fields. It
seems that it is even harder to determine values of this new quantity than the
Ihara constant. Nevertheless, some non-trivial lower- and upper bounds are
derived. Apart from this new asymptotic quantity and bounds on it, we also
introduce Riemann-Roch systems of equations. It turns out that this type of
equation system plays an important role in the study of several other problems
in areas such as coding theory, arithmetic secret sharing and multiplication
complexity of finite fields etc. Finally, we show how our new asymptotic
quantity, our bounds on it and Riemann-Roch systems can be used to improve
results in these areas.Comment: Accepted for publication in IEEE Transactions on Information Theory.
This is an extended version of our paper in Proceedings of 31st Annual IACR
CRYPTO, Santa Barbara, Ca., USA, 2011. The results in Sections 5 and 6 did
not appear in that paper. A first version of this paper has been widely
circulated since November 200
New generation of secure and practical RSA-based signatures
For most digital signature schemes used in practice, such as ISO9796/RSA or DSA, it has only been shown that certain plausible cryptographic assumptions, such as the difficulty of factoring integers, computing discrete logarithms or the collision-intractability of certain hash-functions are necessary for the security of the scheme, while their sufficiency is, strictly speaking, an open question. A clear advantage of such schemes over many signature schemes with security proven relative to such common cryptographic assumptions, is their efficiency: as a result of their relatively weak requirements regarding computation, bandwidth and storage, these schemes have so far beaten proven secure schemes in practice. Our aim is to contribute to the bridging of the gap that seems to exist between the theory and practice of digital signature schemes. We present a digital signature that offers both proven security and practical value. More precisely, under an appropriate assumption about RSA, the scheme is proven to be not existentially forgeable under adaptively chosen message attacks. Furthermore, we identify some electronic devices where our scheme can be conveniently implemented using dedicated smartcards that are available today
- …