Skip to main content

Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes

  • Conference paper
  • First Online:
Automata, Languages and Programming (ICALP 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2380))

Included in the following conference series:

Abstract

We investigate the decoding problem of Reed-Solomon Codes (aka: the Polynomial Reconstruction Problem - PR) from a cryptographic hardness perspective. Following the standard methodology for constructing cryptographically strong primitives, we formulate a decisional intractability assumption related to the PR problem. Then, based on this assumption we show: (i) hardness of partial information extraction and (ii) pseudorandomness. This lays the theoretical framework for the exploitation of PR as a basic cryptographic tool which, as it turns out, possesses unique properties. One such property is the fact that in PR, the size of the corrupted codeword (which corresponds to the size of a ciphertext and the plaintext) and the size of the index of error locations (which corresponds to the size of the key) are independent and can even be super-polynomially related. We then demonstrate the power of PR-based cryptographic design by constructing a stateful cipher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Elwyn R. Berlekamp, Algebraic Coding Theory. McGraw-Hill, 1968.

    Google Scholar 

  2. Elwyn R. Berlekamp and L. Welch, Error Correction of Algebraic Block Codes. U.S. Patent, Number 4,633,470, 1986.

    Google Scholar 

  3. Daniel Bleichenbacher and Phong Nguyen, Noisy Polynomial Interpolation and Noisy Chinese Remaindering, In Advances in Cryptology — Eurocrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, vol. 1807, pp. 53–69, May 2000.

    Chapter  Google Scholar 

  4. Manuel Blum and Shafi Goldwasser, An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information, In Advances in Cryptology — Crypto 1984, Lecture Notes in Computer Science, Springer-Verlag, vol. 196, pp. 289–302, 1985.

    Google Scholar 

  5. Oded Goldreich, Foundations of Cryptography: Fragments of a Book, manuscript 1998.

    Google Scholar 

  6. Oded Goldreich, Madhu Sudan and Ronitt Rubinfeld, Learning Polynomials with Queries: The Highly Noisy Case, in the Proceedings of the 36th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, pp. 294–303, 1995. (ECCC Technical Report: TR98-060).

    Google Scholar 

  7. Shafi Goldwasser and Silvio Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol. 28(2), pp. 270–299, April 1984.

    Google Scholar 

  8. Venkatesan Guruswami and Madhu Sudan, Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. In the Proceedings of the 39th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, pp. 28–39, 1998.

    Google Scholar 

  9. Aggelos Kiayias and Moti Yung, Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications, ECCC Technical report TR02-017, 2002.

    Google Scholar 

  10. Jonathan Katz and Moti Yung, Complete Characterization of Security Notions for Probabilistic Private-key Encryption, in the Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, ACM, pp. 245–254, 2000.

    Google Scholar 

  11. Michael Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, 1996.

    Google Scholar 

  12. F. J. MacWilliams and N. Sloane, The Theory of Error Correcting Codes. North Holland, Amsterdam, 1977.

    MATH  Google Scholar 

  13. Moni Naor and Benny Pinkas, Oblivious Transfer and Polynomial Evaluation, in the Proceedings of the 31st Annual ACM Symposium on Theory of Computing, ACM, pp. 245–254, 1999. (Full Version Oblivious Polynomial Evaluation, available at http://www.wisdom.weizmann.ac.il/~naor/onpub.html.)

  14. Madhu Sudan, Decoding of Reed Solomon Codes beyond the Error-Correction Bound. Journal of Complexity 13(1), pp. 180–193, 1997.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kiayias, A., Yung, M. (2002). Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. In: Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R., Hennessy, M. (eds) Automata, Languages and Programming. ICALP 2002. Lecture Notes in Computer Science, vol 2380. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45465-9_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-45465-9_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43864-9

  • Online ISBN: 978-3-540-45465-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics