Skip to main content

Showing 1–8 of 8 results for author: Lavauzelle, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2006.14489  [pdf, ps, other

    cs.IT math.NT math.RA

    Rank-metric codes over arbitrary Galois extensions and rank analogues of Reed-Muller codes

    Authors: Daniel Augot, Alain Couvreur, Julien Lavauzelle, Alessandro Neri

    Abstract: This paper extends the study of rank-metric codes in extension fields $\mathbb{L}$ equipped with an arbitrary Galois group $G = \mathrm{Gal}(\mathbb{L}/\mathbb{K})$. We propose a framework for studying these codes as subspaces of the group algebra $\mathbb{L}[G]$, and we relate this point of view with usual notions of rank-metric codes in $\mathbb{L}^N$ or in $\mathbb{K}^{N\times N}$, where… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Comments: 26 pages, 1 figure

  2. arXiv:2004.00509  [pdf, ps, other

    cs.CR cs.IT

    On the privacy of a code-based single-server computational PIR scheme

    Authors: Sarah Bordage, Julien Lavauzelle

    Abstract: We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimens… ▽ More

    Submitted 1 April, 2020; originally announced April 2020.

  3. arXiv:1911.13119  [pdf, ps, other

    cs.CR

    RAMESSES, a Rank Metric Encryption Scheme with Short Keys

    Authors: Julien Lavauzelle, Pierre Loidreau, Ba-Duc Pham

    Abstract: We present a rank metric code-based encryption scheme with key and ciphertext sizes comparable to that of isogeny-based cryptography for an equivalent security level. The system also benefits from efficient encryption and decryption algorithms, which rely on linear algebra operations over finite fields of moderate sizes. The security only relies on rank metric decoding problems, and does not requi… ▽ More

    Submitted 29 November, 2019; originally announced November 2019.

  4. Cryptanalysis of a System Based on Twisted Reed-Solomon Codes

    Authors: Julien Lavauzelle, Julian Renner

    Abstract: Twisted Reed-Solomon (TRS) codes are a family of codes that contains a large number of maximum distance separable codes that are non-equivalent to Reed--Solomon codes. TRS codes were recently proposed as an alternative to Goppa codes for the McEliece code-based cryptosystem, resulting in a potential reduction of key sizes. The use of TRS codes in the McEliece cryptosystem has been motivated by the… ▽ More

    Submitted 23 March, 2020; v1 submitted 26 April, 2019; originally announced April 2019.

    Comments: Accepted to Designs, Codes and Cryptography

  5. arXiv:1904.08696  [pdf, other

    cs.IT cs.IR math.AG

    Weighted Lifted Codes: Local Correctabilities and Application to Robust Private Information Retrieval

    Authors: Julien Lavauzelle, Jade Nardi

    Abstract: Low degree Reed-Muller codes are known to satisfy local decoding properties which find applications in private information retrieval (PIR) protocols, for instance. However, their practical instantiation encounters a first barrier due to their poor information rate in the low degree regime. This lead the community to design codes with similar local properties but larger dimension, namely the lifted… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

    MSC Class: 11T71; 94B27; 94B35; 14G50

  6. arXiv:1811.02898  [pdf, other

    cs.IT

    Private Information Retrieval Schemes with Regenerating Codes

    Authors: Julien Lavauzelle, Razane Tajeddine, Ragnar Freij-Hollanti, Camilla Hollanti

    Abstract: A private information retrieval (PIR) scheme allows a user to retrieve a file from a database without revealing any information on the file being requested. As of now, PIR schemes have been proposed for several kinds of storage systems, including replicated and MDS-coded data. In this paper, the problem of constructing a PIR scheme on regenerating codes is considered. A regenerating code is a st… ▽ More

    Submitted 6 December, 2018; v1 submitted 7 November, 2018; originally announced November 2018.

  7. arXiv:1809.00931  [pdf, other

    cs.IT

    Lifted Projective Reed-Solomon Codes

    Authors: Julien Lavauzelle

    Abstract: Lifted Reed-Solomon codes, introduced by Guo, Kopparty and Sudan in 2013, are known as one of the few families of high-rate locally correctable codes. They are built through the evaluation over the affine space of multivariate polynomials whose restriction along any affine line can be interpolated as a low degree univariate polynomial. In this work, we give a formal definition of their analogues… ▽ More

    Submitted 4 September, 2018; originally announced September 2018.

  8. Private Information Retrieval from Transversal Designs

    Authors: Julien Lavauzelle

    Abstract: Private information retrieval (PIR) protocols allow a user to retrieve entries of a database without revealing the index of the desired item. Information-theoretical privacy can be achieved by the use of several servers and specific retrieval algorithms. Most of known PIR protocols focus on decreasing the number of bits exchanged between the client and the server(s) during the retrieval process. O… ▽ More

    Submitted 4 September, 2018; v1 submitted 22 September, 2017; originally announced September 2017.