{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:48:33Z","timestamp":1777985313568,"version":"3.51.4"},"reference-count":68,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,5]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    A key encapsulation mechanism (\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2022-0002_eq_001.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi mathvariant=\"sans-serif\">KEM<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>{\\mathsf{KEM}}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    ) that takes as input an arbitrary string, i.e., a tag, is known as tag-\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2022-0002_eq_002.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi mathvariant=\"sans-serif\">KEM<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>{\\mathsf{KEM}}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , while a scheme that combines signature and encryption is called signcryption. In this article, we present a code-based signcryption tag-\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2022-0002_eq_003.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi mathvariant=\"sans-serif\">KEM<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>{\\mathsf{KEM}}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    scheme. We utilize a code-based signature and an\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2022-0002_eq_004.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi mathvariant=\"sans-serif\">IND<\/m:mi>\n                          <m:mstyle>\n                            <m:mspace width=\"0.1em\"\/>\n                            <m:mtext>-<\/m:mtext>\n                            <m:mspace width=\"0.1em\"\/>\n                          <\/m:mstyle>\n                          <m:mi mathvariant=\"sans-serif\">CCA2<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>{\\mathsf{IND}}\\hspace{0.1em}\\text{-}\\hspace{0.1em}{\\mathsf{CCA2}}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    (adaptive chosen ciphertext attack) secure version of McEliece\u2019s encryption scheme. The proposed scheme uses an equivalent subcode as a public code for the receiver, making the NP-completeness of the subcode equivalence problem be one of our main security assumptions. We then base the signcryption tag-\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2022-0002_eq_005.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi mathvariant=\"sans-serif\">KEM<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>{\\mathsf{KEM}}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    to design a code-based hybrid signcryption scheme. A hybrid scheme deploys asymmetric- as well as symmetric-key encryption. We give security analyses of both our schemes in the standard model and prove that they are secure against\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2022-0002_eq_006.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi mathvariant=\"sans-serif\">IND<\/m:mi>\n                          <m:mstyle>\n                            <m:mspace width=\"0.1em\"\/>\n                            <m:mtext>-<\/m:mtext>\n                            <m:mspace width=\"0.1em\"\/>\n                          <\/m:mstyle>\n                          <m:mi mathvariant=\"sans-serif\">CCA2<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>{\\mathsf{IND}}\\hspace{0.1em}\\text{-}\\hspace{0.1em}{\\mathsf{CCA2}}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    (indistinguishability under adaptive chosen ciphertext attack) and\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2022-0002_eq_007.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi mathvariant=\"sans-serif\">SUF<\/m:mi>\n                          <m:mstyle>\n                            <m:mspace width=\"0.1em\"\/>\n                            <m:mtext>-<\/m:mtext>\n                            <m:mspace width=\"0.1em\"\/>\n                          <\/m:mstyle>\n                          <m:mi mathvariant=\"sans-serif\">CMA<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>{\\mathsf{SUF}}\\hspace{0.1em}\\text{-}\\hspace{0.1em}{\\mathsf{CMA}}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    (strong existential unforgeability under chosen message attack).\n                  <\/jats:p>","DOI":"10.1515\/jmc-2022-0002","type":"journal-article","created":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T11:41:56Z","timestamp":1685965316000},"source":"Crossref","is-referenced-by-count":0,"title":["A code-based hybrid signcryption scheme"],"prefix":"10.1515","volume":"17","author":[{"given":"Jean Belo","family":"Klamti","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo , 200 University Ave W , Waterloo , ON, N2L 3G1 , Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. Anwarul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo , 200 University Ave W , Waterloo , ON, N2L 3G1 , Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"374","published-online":{"date-parts":[[2023,6,5]]},"reference":[{"key":"2025120600280423299_j_jmc-2022-0002_ref_001","doi-asserted-by":"crossref","unstructured":"Zheng Y. Digital signcryption or how to achieve cost (signature & encryption)\u226a cost (signature) + cost (encryption). In: Advances in Cryptology\u2013CRYPTO'97: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17\u201321, 1997 Proceedings. Springer; 1997. p. 165\u201379.","DOI":"10.1007\/BFb0052234"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_002","doi-asserted-by":"crossref","unstructured":"Zheng Y, Imai H. How to construct efficient signcryption schemes on elliptic curves. Inform Process Lett. 1998;68(5):227\u201333.","DOI":"10.1016\/S0020-0190(98)00167-7"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_003","doi-asserted-by":"crossref","unstructured":"Steinfeld R, Zheng Y. A signcryption scheme based on integer factorization. In: Information Security: Third International Workshop, ISW 2000 Wollongong, Australia, December 20\u201321, 2000 Proceedings. Springer; 2000. p. 308\u201322.","DOI":"10.1007\/3-540-44456-4_23"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_004","doi-asserted-by":"crossref","unstructured":"Yang X, Cao H, Li W, Xuan H. Improved lattice-based signcryption in the standard model. IEEE Access. 2019;7:155552\u201362.","DOI":"10.1109\/ACCESS.2019.2949429"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_005","doi-asserted-by":"crossref","unstructured":"Li F, BinMuhaya FT, Khan MK, Takagi T. Lattice-based signcryption. Concurrency Computation Practice Experience. 2013;25(14):2112\u201322.","DOI":"10.1002\/cpe.2826"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_006","doi-asserted-by":"crossref","unstructured":"Barreto PS, Libert B, McCullagh N, Quisquater JJ. Signcryption schemes based on the Diffie-Hellman problem. In: Practical Signcryption. Information Security and Cryptography. Berlin, Heidelberg: Springer; 2010. p. 57\u201369.","DOI":"10.1007\/978-3-540-89411-7_4"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_007","doi-asserted-by":"crossref","unstructured":"Barreto PS, Libert B, McCullagh N, Quisquater JJ. Signcryption schemes based on bilinear maps. In: Practical Signcryption. Information Security and Cryptography. Berlin, Heidelberg: Springer; 2010. p. 71\u201397.","DOI":"10.1007\/978-3-540-89411-7_5"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_008","doi-asserted-by":"crossref","unstructured":"Dent AW, Malone-Lee J. Signcryption schemes based on the RSA problem. In: Practical Signcryption. Berlin, Heidelberg: Springer; 2010. p. 99\u2013117.","DOI":"10.1007\/978-3-540-89411-7_6"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_009","doi-asserted-by":"crossref","unstructured":"Sato S, Shikata J. Lattice-based signcryption without random oracles. In: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9\u201311, 2018, Proceedings. Springer; 2018. p. 331\u201351.","DOI":"10.1007\/978-3-319-79063-3_16"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_010","doi-asserted-by":"crossref","unstructured":"Yan J, Wang L, Wang L, Yang Y, Yao W. Efficient lattice-based signcryption in standard model. Math Problem Eng. 2013;2013:1\u201318.","DOI":"10.1155\/2013\/702539"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_011","doi-asserted-by":"crossref","unstructured":"Le HQ, Duong DH, Roy PS, Susilo W, Fukushima K, Kiyomoto S. Lattice-based signcryption with equality test in standard model. Comput Standard Interfaces. 2021;76:103515.","DOI":"10.1016\/j.csi.2021.103515"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_012","doi-asserted-by":"crossref","unstructured":"Zhao X, Wang X. An efficient identity-based signcryption from lattice. Int J Security Appl. 2014;8(2):363\u201374.","DOI":"10.14257\/ijsia.2014.8.2.37"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_013","unstructured":"Dent AW. Hybrid cryptography. Cryptology ePrint Archive. 2004."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_014","doi-asserted-by":"crossref","unstructured":"Dent AW. Hybrid signcryption schemes with insider security. In: Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4\u20136, 2005. Proceedings 10. Springer; 2005. p. 253\u201366.","DOI":"10.1007\/11506157_22"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_015","doi-asserted-by":"crossref","unstructured":"Dent AW. Hybrid signcryption schemes with outsider security. In: Information Security: 8th International Conference, ISC 2005, Singapore, September 20\u201323, 2005. Proceedings 8. Springer; 2005. p. 203\u201317.","DOI":"10.1007\/11556992_15"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_016","doi-asserted-by":"crossref","unstructured":"Bj\u00f8rstad TE, Dent AW. Building better signcryption schemes with tag-KEMs. In: Public Key Cryptography-PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24\u201326, 2006. Proceedings 9. Springer; 2006. p. 491\u2013507.","DOI":"10.1007\/11745853_32"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_017","doi-asserted-by":"crossref","unstructured":"Yoshida M, Fujiwara T. On the security of tag-KEM for signcryption. Electr Notes Theoret Comput Sci. 2007;171(1):83\u201391.","DOI":"10.1016\/j.entcs.2006.11.011"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_018","unstructured":"Mathew KP, Vasant S, Rangan CP. On provably secure code-based signature and signcryption scheme. IACR Cryptol ePrint Archive. 2012;2012:585."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_019","doi-asserted-by":"crossref","unstructured":"Song Y, Li Z, Li Y, Li J. Attribute-based signcryption scheme based on linear codes. Inform Sci. 2017;417:301\u20139.","DOI":"10.1016\/j.ins.2017.06.033"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_020","doi-asserted-by":"crossref","unstructured":"Banegas G, Barreto PS, Boidje BO, Cayrel PL, Dione GN, Gaj K, et al. DAGS: Key encapsulation using dyadic GS codes. J Math Cryptol. 2018;12(4):221\u201339.","DOI":"10.1515\/jmc-2018-0027"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_021","doi-asserted-by":"crossref","unstructured":"Cayrel PL, Hoffmann G, Persichetti E. Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes. In: Public Key Cryptography-PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21\u201323, 2012. Proceedings 15. Springer; 2012. p. 138\u201355.","DOI":"10.1007\/978-3-642-30057-8_9"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_022","doi-asserted-by":"crossref","unstructured":"Berlekamp E, McEliece R, Van Tilborg H. On the inherent intractability of certain coding problems (corresp.). IEEE Trans Inform Theory. 1978;24(3):384\u20136.","DOI":"10.1109\/TIT.1978.1055873"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_023","doi-asserted-by":"crossref","unstructured":"Johansson T, Jonsson F. On the complexity of some cryptographic problems based on the general decoding problem. IEEE Trans Inform Theory. 2002;48(10):2669\u201378.","DOI":"10.1109\/TIT.2002.802608"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_024","doi-asserted-by":"crossref","unstructured":"Sendrier N. Decoding one out of many. In: Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29\u2013December 2, 2011. Proceedings 4. Springer; 2011. p. 51\u201367.","DOI":"10.1007\/978-3-642-25405-5_4"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_025","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re JC, Gauthier-Umana V, Otmani A, Perret L, Tillich JP. A distinguisher for high-rate McEliece cryptosystems. IEEE Trans Inform Theory. 2013;59(10):6830\u201344.","DOI":"10.1109\/TIT.2013.2272036"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_026","unstructured":"Debris-Alazard T, Sendrier N, Tillich JP. The problem with the SURF scheme. 2017. arXiv: http:\/\/arXiv.org\/abs\/arXiv:170608065."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_027","doi-asserted-by":"crossref","unstructured":"Berger TP, Gueye CT, Klamti JB. A NP-complete problem in coding theory with application to code-based cryptography. In: Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10\u201312, 2017, Proceedings-In Honor of Claude Carlet. Springer; 2017. p. 230\u20137.","DOI":"10.1007\/978-3-319-55589-8_15"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_028","unstructured":"McEliece RJ. Jet Propulsion Laboratory. A public-key cryptosystem based on algebraic coding theory. DSN progress Report. 1978:42\u20134."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_029","doi-asserted-by":"crossref","unstructured":"Berger TP, Loidreau P. How to mask the structure of codes for a cryptographic use. Des Codes Crypt. 2005;35:63\u201379.","DOI":"10.1007\/s10623-003-6151-2"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_030","doi-asserted-by":"crossref","unstructured":"Berger TP, Cayrel PL, Gaborit P, Otmani A. Reducing key length of the McEliece cryptosystem. In: Progress in Cryptology-AFRICACRYPT 2009: Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21\u201325, 2009. Proceedings 2. Springer; 2009. p. 77\u201397.","DOI":"10.1007\/978-3-642-02384-2_6"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_031","doi-asserted-by":"crossref","unstructured":"Misoczki R, Barreto PS. Compact McEliece keys from Goppa codes. In: Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13\u201314, 2009, Revised Selected Papers 16. Springer; 2009. p. 376\u201392.","DOI":"10.1007\/978-3-642-05445-7_24"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_032","doi-asserted-by":"crossref","unstructured":"Misoczki R, Tillich JP, Sendrier N, Barreto PS. MDPC-McEliece: New McEliece variants from moderate density parity-check codes. In: 2013 IEEE International Symposium on Information Theory. IEEE; 2013. p. 2069\u201373.","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_033","doi-asserted-by":"crossref","unstructured":"Barreto PS, Lindner R, Misoczki R. Monoidic codes in cryptography. PQCrypto. 2011;7071:179\u201399.","DOI":"10.1007\/978-3-642-25405-5_12"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_034","doi-asserted-by":"crossref","unstructured":"Persichetti E. Compact McEliece keys based on quasi-dyadic Srivastava codes. J Math Cryptol. 2012;6(2):149\u201369.","DOI":"10.1515\/jmc-2011-0099"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_035","unstructured":"Niederreiter H. Knapsack-type cryptosystems and algebraic coding theory. Prob Control Inf Theory. 1986;15(2):159\u201366."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_036","doi-asserted-by":"crossref","unstructured":"Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput. 2003;33(1):167\u2013226.","DOI":"10.1137\/S0097539702403773"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_037","doi-asserted-by":"crossref","unstructured":"Persichetti E. Secure and anonymous hybrid encryption from coding theory. In: International Workshop on Post-Quantum Cryptography. Springer; 2013. p. 174\u201387.","DOI":"10.1007\/978-3-642-38616-9_12"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_038","doi-asserted-by":"crossref","unstructured":"Cayrel PL, Gueye CT, Mboup EHM, Ndiaye O, Persichetti E. Efficient implementation of hybrid encryption from coding theory. In: Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10\u201312, 2017, Proceedings-In Honor of Claude Carlet 2. Springer; 2017. p. 254\u201364.","DOI":"10.1007\/978-3-319-55589-8_17"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_039","doi-asserted-by":"crossref","unstructured":"Mathew KP, Vasant S, Rangan CP. Efficient Code-based hybrid and deterministic encryptions in the standard model. In: International Conference on Information Security and Cryptology. Springer; 2013. p. 517\u201335.","DOI":"10.1007\/978-3-319-12160-4_31"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_040","doi-asserted-by":"crossref","unstructured":"Courtois NT, Finiasz M, Sendrier N. How to achieve a McEliece-based digital signature scheme. In: Advances in Cryptology-ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9\u201313, 2001 Proceedings 7. Springer; 2001. p. 157\u201374.","DOI":"10.1007\/3-540-45682-1_10"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_041","unstructured":"Debris-Alazard T, Sendrier N, Tillich JP. Wave: A new code-based signature scheme. Cryptology ePrint Archive: Report 2018\/996; 2018. https:\/\/eprint.iacr.org\/2018\/996\/20181022:154324."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_042","unstructured":"Banegas G, Debris-Alazard T, Nedeljkovi\u0107 M, Smith B. Wavelet: Code-based postquantum signatures with fast verification on microcontrollers. 2021. arXiv: http:\/\/arXiv.org\/abs\/arXiv:211013488."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_043","doi-asserted-by":"crossref","unstructured":"Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In: Advances in Cryptology-CRYPTO-86: Proceedings 6. Springer; 1987. p. 186\u201394.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_044","doi-asserted-by":"crossref","unstructured":"Stern J. A new identification scheme based on syndrome decoding. In: Advances in Cryptology\u2013CRYPTO'93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22\u201326, 1993 Proceedings. Springer; 1993. p. 13\u201321.","DOI":"10.1007\/3-540-48329-2_2"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_045","doi-asserted-by":"crossref","unstructured":"Jain A, Krenn S, Pietrzak K, Tentes A. Commitments and efficient zero-knowledge proofs from learning parity with noise. In: Advances in Cryptology-ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2\u20136, 2012. Proceedings 18. Springer; 2012. p. 663\u201380.","DOI":"10.1007\/978-3-642-34961-4_40"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_046","doi-asserted-by":"crossref","unstructured":"Cayrel PL, V\u00e9ron P, Alaoui SMEY. A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem. In: Selected areas in cryptography. vol. 6544. Berlin, Heidelberg: Springer; 2010. p. 171\u201386.","DOI":"10.1007\/978-3-642-19574-7_12"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_047","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V. Fiat-Shamir with aborts: Applications to lattice and factoring-based signatures. In: Advances in Cryptology-ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6\u201310, 2009. Proceedings 15. Springer; 2009. p. 598\u2013616.","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_048","doi-asserted-by":"crossref","unstructured":"Biasse JF, Micheli G, Persichetti E, Santini P. LESS is more: code-based signatures without syndromes. In: Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20\u201322, 2020, Proceedings 12. Springer; 2020. p. 45\u201365.","DOI":"10.1007\/978-3-030-51938-4_3"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_049","doi-asserted-by":"crossref","unstructured":"Persichetti E. Efficient one-time signatures from quasi-cyclic codes: A full treatment. Cryptography. 2018;2(4):30.","DOI":"10.3390\/cryptography2040030"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_050","unstructured":"Persichetti E. Improving the efficiency of code-based cryptography. PhD thesis, University of Auckland; 2012."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_051","unstructured":"Fukushima K, Roy PS, Xu R, Kiyomoto S, Morozov K, Takagi T. Random code-based signature scheme (racoss). First round submission to the NIST post-quantum cryptography call. 2017."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_052","unstructured":"Li Z, Xing C, Yeo SL. A new code based signature scheme without trapdoors. Cryptology ePrint Archive. 2020."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_053","doi-asserted-by":"crossref","unstructured":"Song Y, Huang X, Mu Y, Wu W, Wang H. A code-based signature scheme from the Lyubashevsky framework. Theoret Comput Sci. 2020;835:15\u201330.","DOI":"10.1016\/j.tcs.2020.05.011"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_054","doi-asserted-by":"crossref","unstructured":"Aragon N, Blazy O, Gaborit P, Hauteville A, Z\u00e9mor G. Durandal: a rank metric based signature scheme. In: Advances in Cryptology-EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19\u201323, 2019, Proceedings, Part III 38. Springer; 2019. p. 728\u201358.","DOI":"10.1007\/978-3-030-17659-4_25"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_055","doi-asserted-by":"crossref","unstructured":"Debris-Alazard T, Sendrier N, Tillich JP. Wave: A new family of trapdoor one-way preimage sampleable functions based on codes. In: Advances in Cryptology-ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8\u201312, 2019, Proceedings, Part I. Springer; 2019. p. 21\u201351.","DOI":"10.1007\/978-3-030-34578-5_2"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_056","doi-asserted-by":"crossref","unstructured":"Baek J, Steinfeld R, Zheng Y. Formal proofs for the security of signcryption. In: Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12\u201314, 2002 Proceedings 5. Springer; 2002. p. 80\u201398.","DOI":"10.1007\/3-540-45664-3_6"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_057","unstructured":"Yung M. Practical signcryption. Germany: Springer Science & Business Media; 2010."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_058","doi-asserted-by":"crossref","unstructured":"Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In: Advances in Cryptology-CRYPTO-99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999 Proceedings. Springer; 1999. p. 537\u201354.","DOI":"10.1007\/3-540-48405-1_34"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_059","doi-asserted-by":"crossref","unstructured":"Barelli E, Couvreur A. An efficient structural attack on NIST submission DAGS. In: Advances in Cryptology-ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2\u20136, 2018, Proceedings, Part I 24. Springer; 2018. p. 93\u2013118.","DOI":"10.1007\/978-3-030-03326-2_4"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_060","doi-asserted-by":"crossref","unstructured":"Prange E. The use of information sets in decoding cyclic codes. IEEE Trans Inform Theory. 1962;8(5):5\u20139.","DOI":"10.1109\/TIT.1962.1057777"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_061","unstructured":"Bernstein DJ, Chou T, Lange T, von Maurich I, Misoczki R, Niederhagen R, et al. Classic McEliece: conservative code-based cryptography. NIST submissions. 2017."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_062","doi-asserted-by":"crossref","unstructured":"Pellikaan R, M\u00e1rquez-Corbella I. Error-correcting pairs for a public-key cryptosystem. In: Journal of Physics: Conference Series. vol. 855. IOP Publishing; 2017. p. 012032.","DOI":"10.1088\/1742-6596\/855\/1\/012032"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_063","doi-asserted-by":"crossref","unstructured":"Mora R, Tillich JP. On the dimension and structure of the square of the dual of a Goppa code. Des Codes Cryptogr. 2023;91(4):1351\u201372.","DOI":"10.1007\/s10623-022-01153-w"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_064","unstructured":"Lampe R, Patarin J. Analysis of some natural variants of the PKP algorithm. Cryptology ePrint Archive. 2011."},{"key":"2025120600280423299_j_jmc-2022-0002_ref_065","doi-asserted-by":"crossref","unstructured":"Georgiades J. Some remarks on the security of the identification scheme based on permuted kernels. J Cryptol. 1992;5:133\u20137.","DOI":"10.1007\/BF00193565"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_066","doi-asserted-by":"crossref","unstructured":"Paiva TB, Terada R. Cryptanalysis of the binary permuted kernel problem. In: Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21\u201324, 2021, Proceedings, Part II. Springer; 2021. p. 396\u2013423.","DOI":"10.1007\/978-3-030-78375-4_16"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_067","doi-asserted-by":"crossref","unstructured":"Chiba D, Matsuda T, Schuldt JC, Matsuura K. Efficient generic constructions of signcryption with insider security in the multi-user setting. In: Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7\u201310, 2011. Proceedings. vol. 11. Springer; 2011. p. 220\u201337.","DOI":"10.1007\/978-3-642-21554-4_13"},{"key":"2025120600280423299_j_jmc-2022-0002_ref_068","doi-asserted-by":"crossref","unstructured":"Nakano R, Shikata J. Constructions of signcryption in the multi-user setting from identity-based encryption. In: Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17\u201319, 2013. Proceedings. Springer; 2013. p. 324\u201343.","DOI":"10.1007\/978-3-642-45239-0_19"}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2022-0002\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2022-0002\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:28:18Z","timestamp":1764980898000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2022-0002\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":68,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,6,5]]},"published-print":{"date-parts":[[2023,6,5]]}},"alternative-id":["10.1515\/jmc-2022-0002"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2022-0002","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.17283899","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.17283899.v1","asserted-by":"object"}],"is-supplemented-by":[{"id-type":"doi","id":"10.36227\/techrxiv.17283899","asserted-by":"object"}]},"ISSN":["1862-2984"],"issn-type":[{"value":"1862-2984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,1]]},"article-number":"20220002"}}