Abstract
We investigate the decoding problem of Reed-Solomon Codes (aka: the Polynomial Reconstruction Problem - PR) from a cryptographic hardness perspective. Following the standard methodology for constructing cryptographically strong primitives, we formulate a decisional intractability assumption related to the PR problem. Then, based on this assumption we show: (i) hardness of partial information extraction and (ii) pseudorandomness. This lays the theoretical framework for the exploitation of PR as a basic cryptographic tool which, as it turns out, possesses unique properties. One such property is the fact that in PR, the size of the corrupted codeword (which corresponds to the size of a ciphertext and the plaintext) and the size of the index of error locations (which corresponds to the size of the key) are independent and can even be super-polynomially related. We then demonstrate the power of PR-based cryptographic design by constructing a stateful cipher.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Elwyn R. Berlekamp, Algebraic Coding Theory. McGraw-Hill, 1968.
Elwyn R. Berlekamp and L. Welch, Error Correction of Algebraic Block Codes. U.S. Patent, Number 4,633,470, 1986.
Daniel Bleichenbacher and Phong Nguyen, Noisy Polynomial Interpolation and Noisy Chinese Remaindering, In Advances in Cryptology — Eurocrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, vol. 1807, pp. 53–69, May 2000.
Manuel Blum and Shafi Goldwasser, An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information, In Advances in Cryptology — Crypto 1984, Lecture Notes in Computer Science, Springer-Verlag, vol. 196, pp. 289–302, 1985.
Oded Goldreich, Foundations of Cryptography: Fragments of a Book, manuscript 1998.
Oded Goldreich, Madhu Sudan and Ronitt Rubinfeld, Learning Polynomials with Queries: The Highly Noisy Case, in the Proceedings of the 36th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, pp. 294–303, 1995. (ECCC Technical Report: TR98-060).
Shafi Goldwasser and Silvio Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol. 28(2), pp. 270–299, April 1984.
Venkatesan Guruswami and Madhu Sudan, Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. In the Proceedings of the 39th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, pp. 28–39, 1998.
Aggelos Kiayias and Moti Yung, Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications, ECCC Technical report TR02-017, 2002.
Jonathan Katz and Moti Yung, Complete Characterization of Security Notions for Probabilistic Private-key Encryption, in the Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, ACM, pp. 245–254, 2000.
Michael Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, 1996.
F. J. MacWilliams and N. Sloane, The Theory of Error Correcting Codes. North Holland, Amsterdam, 1977.
Moni Naor and Benny Pinkas, Oblivious Transfer and Polynomial Evaluation, in the Proceedings of the 31st Annual ACM Symposium on Theory of Computing, ACM, pp. 245–254, 1999. (Full Version Oblivious Polynomial Evaluation, available at http://www.wisdom.weizmann.ac.il/~naor/onpub.html.)
Madhu Sudan, Decoding of Reed Solomon Codes beyond the Error-Correction Bound. Journal of Complexity 13(1), pp. 180–193, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kiayias, A., Yung, M. (2002). Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. In: Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R., Hennessy, M. (eds) Automata, Languages and Programming. ICALP 2002. Lecture Notes in Computer Science, vol 2380. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45465-9_21
Download citation
DOI: https://doi.org/10.1007/3-540-45465-9_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43864-9
Online ISBN: 978-3-540-45465-6
eBook Packages: Springer Book Archive