ML p(r)ior | Using Reed-Solomon codes in the $\left( U\mid U+V\right)$ construction and an application to cryptography

### Using Reed-Solomon codes in the $\left( U\mid U+V\right)$ construction and an application to cryptography

2016-01-29
1601.08227 | cs.CR
In this paper we present a modification of Reed-Solomon codes that beats the Guruwami-Sudan $1-\sqrt{R}$ decoding radius of Reed-Solomon codes at low rates $R$. The idea is to choose Reed-Solomon codes $U$ and $V$ with appropriate rates in a $\left( U\mid U+V\right)$ construction and to decode them with the Koetter-Vardy soft information decoder. We suggest to use a slightly more general version of these codes (but which has the same decoding performances as the $\left( U\mid U+V\right)$-construction) for code-based cryptography, namely to build a McEliece scheme. The point is here that these codes not only perform nearly as well (or even better in the low rate regime) as Reed-Solomon codes, their structure seems to avoid the Sidelnikov-Shestakov attack which broke a previous McEliece proposal based on generalized Reed-Solomon codes.

Highlights - Most important sentences from the article

# Related Articles

2019-05-31
1905.13685 | cs.IT

We show that polynomial codes (and some related codes) used for distributed matrix multiplication ar… show more

Highlights - Most important sentences from the article

2019-04-27
1904.12215 | cs.IT

In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-chec… show more

Highlights - Most important sentences from the article

2019-02-04
1902.01470 | cs.IT

We propose a new class of efficient decoding algorithms for Reed-Muller (RM) codes over binary-input… show more

Highlights - Most important sentences from the article

2019-04-18
1904.08774 | cs.IT

This paper presents an algorithm for decoding homogeneous interleaved codes of high interleaving ord… show more

Highlights - Most important sentences from the article

2018-12-20
1812.08562 | cs.IT

The design of block codes for short information blocks (e.g., a thousand or less information bits) i… show more

Highlights - Most important sentences from the article

2019-01-29
1901.10202 | cs.IT

Goppa Codes are a well-known class of codes with, among others, applications in code-based cryptogra… show more

Highlights - Most important sentences from the article

2019-03-13
1903.05494 | cs.IT

The component-wise or Schur product $C*C'$ of two linear error correcting codes $C$ and $C'$ over ce… show more

Highlights - Most important sentences from the article

2019-04-11
1904.05623 | cs.IT

We consider error decoding of locally repairable codes (LRC) and partial MDS (PMDS) codes through in… show more

Highlights - Most important sentences from the article

2019-04-04
1904.02703 | quant-ph

We study the performance of small and medium length quantum LDPC (QLDPC) codes in the depolarizing c… show more

Highlights - Most important sentences from the article

2017-12-21
1712.08201 | cs.IT

Lattice codes are elegant and powerful structures that not only can achieve the capacity of the AWGN… show more

Highlights - Most important sentences from the article

2017-01-24
1701.06969 | cs.IT

Highlights - Most important sentences from the article

2018-09-05
1809.01515 | cs.IT

In this paper upper bounds on the probability of decoding failure under maximum likelihood decoding … show more

Highlights - Most important sentences from the article

2018-08-30
1808.10262 | cs.IT

Motivated by applications in distributed storage, the notion of a locally recoverable code (LRC) was… show more

Highlights - Most important sentences from the article

2018-11-15
1811.06246 | cs.CR

With increasing advancements in technology, it is expected that the emergence of a quantum computer … show more

Highlights - Most important sentences from the article

2015-08-10
1508.02284 | cs.MM

We introduce a new family of binary linear codes suitable for steganographic matrix embedding. The m… show more

Highlights - Most important sentences from the article

2019-06-23
1906.09645 | cs.IT

The $q$-ary block codes with two distances $d$ and $d+1$ are considered. Several constructions of su… show more

Highlights - Most important sentences from the article