217 research outputs found
Iterative List-Decoding of Gabidulin Codes via Gr\"obner Based Interpolation
We show how Gabidulin codes can be list decoded by using an iterative
parametrization approach. For a given received word, our decoding algorithm
processes its entries one by one, constructing four polynomials at each step.
This then yields a parametrization of interpolating solutions for the data so
far. From the final result a list of all codewords that are closest to the
received word with respect to the rank metric is obtained.Comment: Submitted to IEEE Information Theory Workshop 2014 in Hobart,
Australi
Bounds on List Decoding of Rank-Metric Codes
So far, there is no polynomial-time list decoding algorithm (beyond half the
minimum distance) for Gabidulin codes. These codes can be seen as the
rank-metric equivalent of Reed--Solomon codes. In this paper, we provide bounds
on the list size of rank-metric codes in order to understand whether
polynomial-time list decoding is possible or whether it works only with
exponential time complexity. Three bounds on the list size are proven. The
first one is a lower exponential bound for Gabidulin codes and shows that for
these codes no polynomial-time list decoding beyond the Johnson radius exists.
Second, an exponential upper bound is derived, which holds for any rank-metric
code of length and minimum rank distance . The third bound proves that
there exists a rank-metric code over \Fqm of length such that the
list size is exponential in the length for any radius greater than half the
minimum rank distance. This implies that there cannot exist a polynomial upper
bound depending only on and similar to the Johnson bound in Hamming
metric. All three rank-metric bounds reveal significant differences to bounds
for codes in Hamming metric.Comment: 10 pages, 2 figures, submitted to IEEE Transactions on Information
Theory, short version presented at ISIT 201
A Smart Approach for GPT Cryptosystem Based on Rank Codes
The concept of Public- key cryptosystem was innovated by McEliece's
cryptosystem. The public key cryptosystem based on rank codes was presented in
1991 by Gabidulin -Paramonov-Trejtakov(GPT). The use of rank codes in
cryptographic applications is advantageous since it is practically impossible
to utilize combinatoric decoding. This has enabled using public keys of a
smaller size. Respective structural attacks against this system were proposed
by Gibson and recently by Overbeck. Overbeck's attacks break many versions of
the GPT cryptosystem and are turned out to be either polynomial or exponential
depending on parameters of the cryptosystem. In this paper, we introduce a new
approach, called the Smart approach, which is based on a proper choice of the
distortion matrix X. The Smart approach allows for withstanding all known
attacks even if the column scrambler matrix P over the base field Fq.Comment: 5 pages. to appear in Proceedings of IEEE ISIT201
On improving security of GPT cryptosystems
The public key cryptosystem based on rank error correcting codes (the GPT
cryptosystem) was proposed in 1991. Use of rank codes in cryptographic
applications is advantageous since it is practically impossible to utilize
combinatoric decoding. This enabled using public keys of a smaller size.
Several attacks against this system were published, including Gibson's attacks
and more recently Overbeck's attacks. A few modifications were proposed
withstanding Gibson's attack but at least one of them was broken by the
stronger attacks by Overbeck. A tool to prevent Overbeck's attack is presented
in [12]. In this paper, we apply this approach to other variants of the GPT
cryptosystem.Comment: 5 pages. submitted ISIT 2009.Processed on IEEE ISIT201
List-Decoding Gabidulin Codes via Interpolation and the Euclidean Algorithm
We show how Gabidulin codes can be list decoded by using a parametrization
approach. For this we consider a certain module in the ring of linearized
polynomials and find a minimal basis for this module using the Euclidean
algorithm with respect to composition of polynomials. For a given received
word, our decoding algorithm computes a list of all codewords that are closest
to the received word with respect to the rank metric.Comment: Submitted to ISITA 2014, IEICE copyright upon acceptanc
A decoding algorithm for Twisted Gabidulin codes
In this work, we modify the decoding algorithm for subspace codes by Koetter
and Kschischang to get a decoding algorithm for (generalized) twisted Gabidulin
codes. The decoding algorithm we present applies to cases where the code is
linear over the base field but not linear over
.Comment: This paper was submitted to ISIT 201
- …