Por favor, use este identificador para citar o enlazar este ítem:http://uvadoc.uva.es/handle/10324/31738
Computational Aspects of Retrieving a Representation of an Algebraic Geometry Code
Año del Documento
Journal of Symbolic Computation. Volume 64, pages 67-87 (2014)
Code-based cryptography is an interesting alternative to classic number-theoretic public key cryptosystem since it is conjectured to be secure against quantum computer attacks. Many families of codes have been proposed for these cryptosystems such as algebraic geometry codes. In [Designs, Codes and Cryptography, pages 1-16, 2012] -for so called very strong algebraic geometry codes $\mathcal C=C_L(\mathcal X, \mathcal P, E)$, where $\mathcal X$ is an algebraic curve over $\mathbb F_q$, $\mathcal P$ is an $n$-tuple of mutually distinct $\mathbb F_q$-rational points of $\mathcal X$ and $E$ is a divisor of $\mathcal X$ with disjoint support from $\mathcal P$ --- it was shown that an equivalent representation $\mathcal C=C_L(\mathcal Y, \mathcal Q, F)$ can be found. The $n$-tuple of points is obtained directly from a generator matrix of $\mathcal C$, where the columns are viewed as homogeneous coordinates of these points. The curve $\mathcal Y$ is given by $I_2(\mathcal Y)$, the homogeneous elements of degree $2$ of the vanishing ideal $I(\mathcal Y)$. Furthermore, it was shown that $I_2(\mathcal Y)$ can be computed efficiently as the kernel of certain linear map. What was not shown was how to get the divisor $F$ and how to obtain efficiently an adequate decoding algorithm for the new representation. The main result of this paper is an efficient computational approach to the first problem, that is getting $F$. The security status of the McEliece public key cryptosystem using algebraic geometry codes is still not completely settled and is left as an open problem
Revisión por pares
This research was partly supported by the Danish National Research Foundation and the National Science Foundation of China (Grant No.\ 11061130539) for the Danish-Chinese Center for Applications of Algebraic Geometry in Coding Theory and Cryptography and by Spanish grants MTM2007-64704, MTM2010-21580-C02-02 and MTM2012-36917-C03-03. Part of the research of the second author is also funded by the Vernon Wilson Endowed Chair at Eastern Kentucky University during his sabbatical leave.
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International