Skip to main content

Showing 1–33 of 33 results for author: Gaborit, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.15720  [pdf, other

    math.RA cs.IT cs.SC

    Linearized Polynomial Chinese remainder codes

    Authors: Philippe Gaborit, Camille Garnier, Olivier Ruatta

    Abstract: In this paper, we introduce a new family of codes relevent for rank and sum-rank metrics. These codes are based on an effective Chinese remainders theorem for linearized polynomials over finite fields. We propose a decoding algorithm for some instances of these codes.

    Submitted 21 May, 2025; originally announced May 2025.

    Comments: 26 pages, 7 figures

    MSC Class: 94B05; 94B35; 94B70; 11T71; 11T55 ACM Class: G.2; H.1.1; E.4

  2. arXiv:2504.18360  [pdf, ps, other

    cs.IT

    On the Generalization of Kitaev Codes as Generalized Bicycle Codes

    Authors: François Arnault, Philippe Gaborit, Nicolas Saussay

    Abstract: Surface codes have historically been the dominant choice for quantum error correction due to their superior error threshold performance. However, recently, a new class of Generalized Bicycle (GB) codes, constructed from binary circulant matrices with three non-zero elements per row, achieved comparable performance with fewer physical qubits and higher encoding efficiency. In this article, we foc… ▽ More

    Submitted 25 April, 2025; originally announced April 2025.

  3. arXiv:2502.04995  [pdf, ps, other

    quant-ph cs.IT

    A Variant of the Bravyi-Terhal Bound for Arbitrary Boundary Conditions

    Authors: François Arnault, Philippe Gaborit, Wouter Rozendaal, Nicolas Saussay, Gilles Zémor

    Abstract: We present a modified version of the Bravyi-Terhal bound that applies to quantum codes defined by local parity-check constraints on a $D$-dimensional lattice quotient. Specifically, we consider a quotient $\mathbb{Z}^D/Λ$ of $\mathbb{Z}^D$ of cardinality $n$, where $Λ$ is some $D$-dimensional sublattice of $\mathbb{Z}^D$: we suppose that every vertex of this quotient indexes $m$ qubits of a stabil… ▽ More

    Submitted 10 February, 2025; v1 submitted 7 February, 2025; originally announced February 2025.

  4. arXiv:2501.19125  [pdf, ps, other

    cs.IT

    Upper Bounds on the Minimum Distance of Structured LDPC Codes

    Authors: François Arnault, Philippe Gaborit, Wouter Rozendaal, Nicolas Saussay, Gilles Zémor

    Abstract: We investigate the minimum distance of structured binary Low-Density Parity-Check (LDPC) codes whose parity-check matrices are of the form $[\mathbf{C} \vert \mathbf{M}]$ where $\mathbf{C}$ is circulant and of column weight $2$, and $\mathbf{M}$ has fixed column weight $r \geq 3$ and row weight at least $1$. These codes are of interest because they are LDPC codes which come with a natural linear-t… ▽ More

    Submitted 31 January, 2025; originally announced January 2025.

  5. arXiv:2405.16539  [pdf, ps, other

    cs.CR

    MinRank Gabidulin encryption scheme on matrix codes

    Authors: Nicolas Aragon, Alain Couvreur, Victor Dyseryn, Philippe Gaborit, Adrien Vinçotte

    Abstract: The McEliece scheme is a generic frame which allows to use any error correcting code of which there exists an efficient decoding algorithm to design an encryption scheme by hiding the generator matrix code. Similarly, the Niederreiter frame is the dual version of the McEliece scheme, and achieves smaller ciphertexts. We propose a generalization of the McEliece frame and the Niederreiter frame to m… ▽ More

    Submitted 17 October, 2024; v1 submitted 26 May, 2024; originally announced May 2024.

  6. arXiv:2310.08962  [pdf, ps, other

    cs.CR

    Injective Rank Metric Trapdoor Functions with Homogeneous Errors

    Authors: Étienne Burle, Philippe Gaborit, Younes Hatri, Ayoub Otmani

    Abstract: In rank-metric cryptography, a vector from a finite dimensional linear space over a finite field is viewed as the linear space spanned by its entries. The rank decoding problem which is the analogue of the problem of decoding a random linear code consists in recovering a basis of a random noise vector that was used to perturb a set of random linear equations sharing a secret solution. Assuming the… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  7. arXiv:2307.08726  [pdf, ps, other

    cs.CR

    RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm

    Authors: Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte

    Abstract: We present a signature scheme based on the Syndrome-Decoding problem in rank metric. It is a construction from multi-party computation (MPC), using a MPC protocol which is a slight improvement of the linearized-polynomial protocol used in [Fen22], allowing to obtain a zero-knowledge proof thanks to the MPCitH paradigm. We design two different zero-knowledge proofs exploiting this paradigm: the fir… ▽ More

    Submitted 6 December, 2023; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2307.08575

  8. arXiv:2307.08575  [pdf, ps, other

    cs.CR

    MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm

    Authors: Nicolas Aragon, Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain

    Abstract: We exploit the idea of [Fen22] which proposes to build an efficient signature scheme based on a zero-knowledge proof of knowledge of a solution of a MinRank instance. The scheme uses the MPCitH paradigm, which is an efficient way to build ZK proofs. We combine this idea with another idea, the hypercube technique introduced in [AMGH+22], which leads to more efficient MPCitH-based scheme. This new a… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  9. arXiv:2305.02053  [pdf, ps, other

    cs.IT

    Generalized LRPC codes

    Authors: Ermes Franch, Philippe Gaborit, Chunlei Li

    Abstract: In this paper we generalize the notion of low-rank parity check (LRPC) codes by introducing a bilinear product over F^m q based on a generic 3-tensor in Fq^mxmxm, where Fq is the finite field with q elements. The generalized LRPC codes are Fq -linear codes in general and a particular choice of the 3-tensor corresponds to the original Fqm -linear LRPC codes. For the generalized LRPC codes, we propo… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: A shorter version of this paper was presented in ITW 2023

    MSC Class: article

  10. arXiv:2208.05471  [pdf, ps, other

    cs.CR

    Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem

    Authors: Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich

    Abstract: The Rank Decoding problem (RD) is at the core of rank-based cryptography. This problem can also be seen as a structured version of MinRank, which is ubiquitous in multivariate cryptography. Recently, \cite{BBBGNRT20,BBCGPSTV20} proposed attacks based on two new algebraic modelings, namely the MaxMinors modeling which is specific to RD and the Support-Minors modeling which applies to MinRank in gen… ▽ More

    Submitted 14 June, 2023; v1 submitted 10 August, 2022; originally announced August 2022.

  11. arXiv:2207.01410  [pdf, ps, other

    cs.CR

    RQC revisited and more cryptanalysis for Rank-based Cryptography

    Authors: Loïc Bidoux, Pierre Briaud, Maxime Bros, Philippe Gaborit

    Abstract: We propose two main contributions: first, we revisit the encryption scheme Rank Quasi-Cyclic (RQC) by introducing new efficient variations, in particular, a new class of codes, the Augmented Gabidulin codes; second, we propose new attacks against the Rank Support Learning (RSL), the Non-Homogeneous Rank Decoding (NHRSD), and the Non-Homogeneous Rank Support Learning (NHRSL) problems. RSL is primor… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

  12. arXiv:2206.11961  [pdf, ps, other

    cs.CR

    LRPC codes with multiple syndromes: near ideal-size KEMs without ideals

    Authors: Carlos Aguilar-Melchor, Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Gilles Zémor

    Abstract: We introduce a new rank-based key encapsulation mechanism (KEM) with public key and ciphertext sizes around 3.5 Kbytes each, for 128 bits of security, without using ideal structures. Such structures allow to compress objects, but give reductions to specific problems whose security is potentially weaker than for unstructured problems. To the best of our knowledge, our scheme improves in size all th… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: 31 pages

  13. arXiv:2204.02915  [pdf, ps, other

    cs.CR

    Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems

    Authors: Loïc Bidoux, Philippe Gaborit

    Abstract: The MPC-in-the-head introduced in [IKOS07] has established itself as an important paradigm to design efficient digital signatures. It has been leveraged in the Picnic scheme [CDG+ 20] that reached the third round of the NIST PQC Standardization process. It has also been used in [Beu20] to introduce the Proof of Knowledge (PoK) with Helper paradigm. This construction permits to design shorter signa… ▽ More

    Submitted 17 October, 2022; v1 submitted 6 April, 2022; originally announced April 2022.

  14. arXiv:2201.05403  [pdf, ps, other

    cs.CR

    Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem

    Authors: Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni, Victor Mateu

    Abstract: In this paper, we study code-based signatures constructed from Proof of Knowledge (PoK). This line of work can be traced back to Stern who introduces the first efficient PoK for the syndrome decoding problem in 1993. Afterward, different variations were proposed in order to reduce signature's size. In practice, obtaining a smaller signature size relies on the interaction of two main considerations… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  15. arXiv:2110.05005  [pdf, ps, other

    cs.CR

    Quasi-Cyclic Stern Proof of Knowledge

    Authors: Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni, Nicolas Sendrier

    Abstract: The ongoing NIST standardization process has shown that Proof of Knowledge (PoK) based signatures have become an important type of possible post-quantum signatures. Regarding code-based cryptography, the original approach for PoK based signatures is the Stern protocol which allows to prove the knowledge of a small weight vector solving a given instance of the Syndrome Decoding (SD) problem over F2… ▽ More

    Submitted 4 February, 2022; v1 submitted 11 October, 2021; originally announced October 2021.

  16. arXiv:2011.04611  [pdf, ps, other

    cs.IT cs.CG math.RA

    On the hardness of code equivalence problems in rank metric

    Authors: Alain Couvreur, Thomas Debris-Alazard, Philippe Gaborit

    Abstract: In the recent years, the notion of rank metric in the context of coding theory has known many interesting developments in terms of applications such as space time coding, network coding or public key cryptography. These applications raised the interest of the community for theoretical properties of this type of codes, such as the hardness of decoding in rank metric. Among classical problems associ… ▽ More

    Submitted 10 June, 2021; v1 submitted 9 November, 2020; originally announced November 2020.

  17. arXiv:2005.10741  [pdf, other

    cs.CR cs.IT

    HQC-RMRS, an instantiation of the HQC encryption framework with a more efficient auxiliary error-correcting code

    Authors: Nicolas Aragon, Philippe Gaborit, Gilles Zémor

    Abstract: The HQC encryption framework is a general code-based encryption scheme for which decryption returns a noisy version of the plaintext. Any instantiation of the scheme will therefore use an error-correcting procedure relying on a fixed auxiliary code. Unlike the McEliece encryption framework whose security is directly related to how well one can hide the structure of an error-correcting code, the se… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

  18. Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems

    Authors: Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier Verbel

    Abstract: Rank Decoding (RD) is the main underlying problem in rank-based cryptography. Based on this problem and quasi-cyclic versions of it, very efficient schemes have been proposed recently, such as those in the ROLLO and RQC submissions, which have reached the second round of the NIST Post-Quantum competition. Two main approaches have been studied to solve RD: combinatorial ones and algebraic ones. Whi… ▽ More

    Submitted 9 February, 2021; v1 submitted 14 February, 2020; originally announced February 2020.

  19. An Algebraic Attack on Rank Metric Code-Based Cryptosystems

    Authors: Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Vincent Neiger, Olivier Ruatta, Jean-Pierre Tillich

    Abstract: The Rank metric decoding problem is the main problem considered in cryptography based on codes in the rank metric. Very efficient schemes based on this problem or quasi-cyclic versions of it have been proposed recently, such as those in the submissions ROLLO and RQC currently at the second round of the NIST Post-Quantum Cryptography Standardization Process. While combinatorial attacks on this prob… ▽ More

    Submitted 23 February, 2020; v1 submitted 2 October, 2019; originally announced October 2019.

    Comments: Eurocrypt 2020

  20. arXiv:1904.00357  [pdf, other

    cs.IT cs.CR

    Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography

    Authors: Nicolas Aragon, Philippe Gaborit, Adrien Hauteville, Olivier Ruatta, Gilles Zémor

    Abstract: We introduce a new family of rank metric codes: Low Rank Parity Check codes (LRPC), for which we propose an efficient probabilistic decoding algorithm. This family of codes can be seen as the equivalent of classical LDPC codes for the rank metric. We then use these codes to design cryptosystems à la McEliece: more precisely we propose two schemes for key encapsulation mechanism (KEM) and public ke… ▽ More

    Submitted 31 March, 2019; originally announced April 2019.

    Comments: submitted to Transactions on Information Theory

  21. arXiv:1903.10212  [pdf, ps, other

    cs.IT

    Improved Veron Identification and Signature Schemes in the Rank Metric

    Authors: Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Victor Mateu

    Abstract: It is notably challenging to design an efficient and secure signature scheme based on error-correcting codes. An approach to build such signature schemes is to derive it from an identification protocol through the Fiat-Shamir transform. All such protocols based on codes must be run several rounds, since each run of the protocol allows a cheating probability of either 2/3 or 1/2. The resulting sign… ▽ More

    Submitted 19 April, 2019; v1 submitted 25 March, 2019; originally announced March 2019.

  22. arXiv:1612.05572  [pdf, ps, other

    cs.CR cs.IT

    Efficient Encryption from Random Quasi-Cyclic Codes

    Authors: Carlos Aguilar, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor

    Abstract: We propose a framework for constructing efficient code-based encryption schemes from codes that do not hide any structure in their public matrix. The framework is in the spirit of the schemes first proposed by Alekhnovich in 2003 and based on the difficulty of decoding random linear codes from random errors of low weight. We depart somewhat from Aleknovich's approach and propose an encryption sche… ▽ More

    Submitted 16 December, 2016; originally announced December 2016.

  23. arXiv:1606.07760  [pdf, ps, other

    cs.CR

    Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes

    Authors: Philippe Gaborit, Ayoub Otmani, Hervé Talé Kalachi

    Abstract: Encryption schemes based on the rank metric lead to small public key sizes of order of few thousands bytes which represents a very attractive feature compared to Hamming metric-based encryption schemes where public key sizes are of order of hundreds of thousands bytes even with additional structures like the cyclicity. The main tool for building public key encryption schemes in rank metric is the… ▽ More

    Submitted 14 April, 2017; v1 submitted 24 June, 2016; originally announced June 2016.

    Comments: To appear in Designs, Codes and Cryptography Journal

    MSC Class: 11T71; 14G50

  24. arXiv:1606.00629  [pdf, ps, other

    cs.CR cs.IT

    RankSign: an efficient signature algorithm based on the rank metric

    Authors: Philippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor

    Abstract: In this paper we propose a new approach to code-based signatures that makes use in particular of rank metric codes. When the classical approach consists in finding the unique preimage of a syndrome through a decoding algorithm, we propose to introduce the notion of mixed decoding of erasures and errors for building signature schemes. In that case the difficult problem becomes, as is the case in la… ▽ More

    Submitted 26 May, 2017; v1 submitted 2 June, 2016; originally announced June 2016.

    Comments: extended version of PQCrypto conference

  25. arXiv:1603.05128  [pdf, ps, other

    cs.CR

    RankSynd a PRNG Based on Rank Metric

    Authors: Philippe Gaborit, Adrien Hauteville, Jean-Pierre Tillich

    Abstract: In this paper, we consider a pseudo-random generator based on the difficulty of the syndrome decoding problem for rank metric codes. We also study the resistance of this problem against a quantum computer. Our results show that with rank metric it is possible to obtain fast PRNG with small public data, without considering additional structure for public matrices like quasi-cyclicity for Hamming di… ▽ More

    Submitted 16 March, 2016; originally announced March 2016.

    Journal ref: published with minor modifications in the proceedings Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, LNCS 9606, p18-28

  26. Scheduling rules to minimize total tardiness in a parallel machine problem with setup and calendar constraints

    Authors: Jacques Lamothe, François Marmier, Matthieu Dupuy, Paul Gaborit, Lionel Dupont

    Abstract: Quality control lead times are one of most significant causes of loss of time in the pharmaceutical and cosmetics industries. This is partly due to the organization of laboratories that feature parallel multipurpose machines for chromatographic analyses. The testing process requires long setup times and operators are needed to launch the process. The various controls are non-preemptive and are cha… ▽ More

    Submitted 7 September, 2015; originally announced September 2015.

    Journal ref: Computers and Operations Research, 2012, 39 (6), pp.1236-1244.

  27. arXiv:1307.6458  [pdf, ps, other

    cs.CR cs.IT

    Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes

    Authors: Alain Couvreur, Philippe Gaborit, Valérie Gauthier-Umaña, Ayoub Otmani, Jean-Pierre Tillich

    Abstract: Because of their interesting algebraic properties, several authors promote the use of generalized Reed-Solomon codes in cryptography. Niederreiter was the first to suggest an instantiation of his cryptosystem with them but Sidelnikov and Shestakov showed that this choice is insecure. Wieschebrink proposed a variant of the McEliece cryptosystem which consists in concatenating a few random columns t… ▽ More

    Submitted 28 March, 2014; v1 submitted 24 July, 2013; originally announced July 2013.

    Comments: A short version appeared in the proceedings of the workshop on Coding and Cryptography 2013 (WCC' 2013). This paper supersedes arXiv:1203.6686 [cs.CR] and arXiv:1204.6459 [cs.CR]

    MSC Class: 11T71; 94B40

  28. arXiv:1301.1026  [pdf, ps, other

    cs.CR

    On the complexity of the Rank Syndrome Decoding problem

    Authors: Philippe Gaborit, Olivier Ruatta, Julien Schrek

    Abstract: In this paper we propose two new generic attacks on the Rank Syndrome Decoding (RSD) problem Let $C$ be a random $[n,k]$ rank code over $GF(q^m)$ and let $y=x+e$ be a received word such that $x \in C$ and the $Rank(e)=r$. The first attack is combinatorial and permits to recover an error $e$ of rank weight $r$ in… ▽ More

    Submitted 6 January, 2013; originally announced January 2013.

  29. arXiv:1111.1644  [pdf, ps, other

    cs.CR

    A new zero-knowledge code based identification scheme with reduced communication

    Authors: Carlos Aguilar, Philippe Gaborit, Julien Schrek

    Abstract: In this paper we present a new 5-pass identification scheme with asymptotic cheating probability 1/2 based on the syndrome decoding problem. Our protocol is related to the Stern identification scheme but has a reduced communication cost compared to previous code-based zero-knowledge schemes, moreover our scheme permits to obtain a very low size of public key and secret key. The contribution of thi… ▽ More

    Submitted 7 November, 2011; originally announced November 2011.

  30. arXiv:1111.0228  [pdf, ps, other

    cs.DM

    Classification of extremal and $s$-extremal binary self-dual codes of length 38

    Authors: Carlos Aguilar-Melchor, Philippe Gaborit, Jon-Lark Kim, Lin Sok, Patrick Solé

    Abstract: In this paper we classify all extremal and $s$-extremal binary self-dual codes of length 38. There are exactly 2744 extremal $[38,19,8]$ self-dual codes, two $s$-extremal $[38,19,6]$ codes, and 1730 $s$-extremal $[38,19,8]$ codes. We obtain our results from the use of a recursive algorithm used in the recent classification of all extremal self-dual codes of length 36, and from a generalization of… ▽ More

    Submitted 1 November, 2011; originally announced November 2011.

    Comments: revised version - paper submitted (4/4/2011) to IEEE trans. Information and accepted 20/10/2011

  31. A new class of codes for Boolean masking of cryptographic computations

    Authors: Claude Carlet, Philippe Gaborit, Jon-Lark Kim, Patrick Solé

    Abstract: We introduce a new class of rate one-half binary codes: {\bf complementary information set codes.} A binary linear code of length $2n$ and dimension $n$ is called a complementary information set code (CIS code for short) if it has two disjoint information sets. This class of codes contains self-dual codes as a subclass. It is connected to graph correlation immune Boolean functions of use in the se… ▽ More

    Submitted 4 April, 2012; v1 submitted 6 October, 2011; originally announced October 2011.

    Comments: 19 pages. IEEE Trans. on Information Theory, to appear

  32. arXiv:0903.0069  [pdf, ps, other

    cs.CR

    Improved identity-based identification using correcting codes

    Authors: Pierre-Louis Cayrel, Philippe Gaborit, David Galindo, Marc Girault

    Abstract: In this paper, a new identity-based identification scheme based on error-correcting codes is proposed. Two well known code-based schemes are combined : the signature scheme by Courtois, Finiasz and Sendrier and an identification scheme by Stern. A proof of security for the scheme in the Random Oracle Model is given.

    Submitted 28 February, 2009; originally announced March 2009.

    Comments: 9 pages

  33. Asymptotic improvement of the Gilbert-Varshamov bound for linear codes

    Authors: Philippe Gaborit, Gilles Zemor

    Abstract: The Gilbert-Varshamov bound states that the maximum size A_2(n,d) of a binary code of length n and minimum distance d satisfies A_2(n,d) >= 2^n/V(n,d-1) where V(n,d) stands for the volume of a Hamming ball of radius d. Recently Jiang and Vardy showed that for binary non-linear codes this bound can be improved to A_2(n,d) >= cn2^n/V(n,d-1) for c a constant and d/n <= 0.499. In this paper we show… ▽ More

    Submitted 30 August, 2007; originally announced August 2007.

    Comments: Submitted to IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, IT-54, No. 9 (2008) pp. 3865--3872.