About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. 6th International Conference, SPNCE 2023, Guangzhou, China, November 25–26, 2023, Proceedings

Research Article

A Novel Polar Code-Based Key Encapsulation Mechanism with Non-permutation Equivalent Public Key

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-73699-5_13,
        author={Huiling Zhang and Zhiqiang Lin and Jingang Liu and Haixiong Zhou},
        title={A Novel Polar Code-Based Key Encapsulation Mechanism with Non-permutation Equivalent Public Key},
        proceedings={Security and Privacy in New Computing Environments. 6th International Conference, SPNCE 2023, Guangzhou, China, November 25--26, 2023, Proceedings},
        proceedings_a={SPNCE},
        year={2025},
        month={1},
        keywords={Public-key cryptography Post-quantum cryptography Polar code Key encapsulation mechanism},
        doi={10.1007/978-3-031-73699-5_13}
    }
    
  • Huiling Zhang
    Zhiqiang Lin
    Jingang Liu
    Haixiong Zhou
    Year: 2025
    A Novel Polar Code-Based Key Encapsulation Mechanism with Non-permutation Equivalent Public Key
    SPNCE
    Springer
    DOI: 10.1007/978-3-031-73699-5_13
Huiling Zhang1, Zhiqiang Lin1, Jingang Liu2,*, Haixiong Zhou3
  • 1: School of Mathematics and Information Science, Guangzhou University
  • 2: School of Mathematics and Systems Science, Guangdong Normal University of Technology
  • 3: Guangzhou Chinagdn Security Technology Co., Ltd.
*Contact email: liujingang@gpnu.edu.cn

Abstract

Code-based cryptography is one of the post-quantum cryptography techniques which is able to resist attacks from quantum computers. This paper proposes a novel key encapsulation mechanism (KEM) based on polar codes. As the basic technology of 5G communication, polar codes have efficient encoding and decoding procedures, thus can improve the efficiency of a code-based cryptosystem. We apply polar codes to a variant of the McEliece public-key encryption scheme in which the codes of the public key and secret key are non-permutation equivalent. Then we construct the KEM protocol by Fujisaki-Okamoto transformation method. This KEM is indistinguishably secure from a chosen ciphertext attack. The public key size of the proposed KEM is smaller than that of the Classic McEliece KEM in NIST PQC standardization process, under the same security level.

Keywords
Public-key cryptography Post-quantum cryptography Polar code Key encapsulation mechanism
Published
2025-01-01
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-73699-5_13
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL