Explore chapters and articles related to this topic
A Quantum Resistant Chameleon Hashing and Signature Scheme
Published in IETE Journal of Research, 2022
P. Thanalakshmi, R. Anitha
It is described by the following algorithms: Setup: Select parameters m and t such that the t decoding in a Goppa code of length of dimension k = n−tm has complexity at least .Key Generation: Pick a random parity check matrix H of a - binary Goppa code C decoding t errors. This code remains secret. Choose a random permutation matrix P of order and a random non-singular matrix V of order and a hash function . The hash key is and the trapdoor key is . The hash function is modelled as random oracle.Hashing Computation: On input the hash key , the algorithm chooses an element such that , and a message and computes chameleon hash as follows:
Output .Collision computation: On input the hash key , the collision algorithm F computes a collision on a valid hash value h using the trapdoor key as follows. It chooses a message and and computes
Output Note that,