Skip to main content

Extended majority voting and private-key algebraic-code encryptions

  • Conference paper
  • First Online:
Advances in Cryptology — ASIACRYPT '91 (ASIACRYPT 1991)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 739))

Included in the following conference series:

Abstract

In this paper, a private-key cryptosystem equivalent to the private-key cryptosystem proposed by Rao and Nam is analyzed. The main result is that the private-key cryptosystem is vulnerable to a so-called extended majority vote attack. This attack can be averted if one selects the predefined set of error vectors at random. As a consequence, the error vector generating process will become much easier.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Heiman, ‘On the Security of Cryptosystems based on Linear Error-Correcting Codes', M.Sc. Thesis, Feinburg Graduate School, Weizmann Institute of Science, Rehovot, Israel, August 1987.

    Google Scholar 

  2. R.J. McEliece, A Public-Key Cryptosystem Based on Algebraic Coding Theory, DSN Progress Report 42-44, Jet Propulsion Laboratory, Pasadena, pp. 114–116, 1978.

    Google Scholar 

  3. J. Meijers and J. van Tilburg, ‘On the Rao-Nam Private-Key Cryptosystem using Linear Codes', Proceedings 1991 IEEE-ISIT, p. 126, Budapest, Hungary, June 1991.

    Google Scholar 

  4. T.R.N. Rao and K.H. Nam, ‘Private-Key Algebraic-Code Encryptions', IEEE Trans. Inform. Theory, vol. IT-35, no. 4, pp. 829–833, July 1989.

    Article  Google Scholar 

  5. R. Struik and J. van Tilburg, ‘The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack', in: Advances in Cryptology — CRYPTO '87, Carl Pomerance ed., Lecture Notes in Computer Science # 293, Springer-Verlag, pp. 445–457, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hideki Imai Ronald L. Rivest Tsutomu Matsumoto

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Meijers, J., van Tilburg, J. (1993). Extended majority voting and private-key algebraic-code encryptions. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_24

Download citation

  • DOI: https://doi.org/10.1007/3-540-57332-1_24

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57332-6

  • Online ISBN: 978-3-540-48066-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics