{"title":"Code-Based Butterfly Key Expansion for Pseudonymous Certificates","authors":"Abel C. H. Chen","doi":"10.23919/comex.2025XBL0066","DOIUrl":null,"url":null,"abstract":"As quantum computing technology continues to advance, Shor's quantum algorithm poses a significant threat to mainstream cryptographic methods, including RSA and elliptic curve cryptography. Consequently, post-quantum cryptography (PQC) has emerged as an inevitable trend for the future. Among PQC approaches, lattice-based cryptography and hash-based cryptography have already been standardized, while code-based cryptography remains a candidate for standardization. In light of these developments, this study proposes a Code-based Butterfly Key Expansion (CBKE) mechanism, built on code-based cryptography principles. The proposed method enables a registration authority (RA) to expand an original code-based caterpillar public key into a code-based cocoon public key, achieving anonymity for entities other than the RA. Subsequently, a certificate authority further expands the code-based cocoon public key into a code-based butterfly public key, which is then embedded in a pseudonymous certificate as the public key for the end entity. This approach ensures anonymity for both the RA and other entities. To enhance computational efficiency, the study proposes a random invertible matrix generation algorithm with a time complexity of O(n). This algorithm achieves high efficiency and anonymity without increasing the key length, thereby addressing the computational demands of the proposed method effectively.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"14 7","pages":"296-299"},"PeriodicalIF":0.3000,"publicationDate":"2025-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11005705","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEICE Communications Express","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/11005705/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
As quantum computing technology continues to advance, Shor's quantum algorithm poses a significant threat to mainstream cryptographic methods, including RSA and elliptic curve cryptography. Consequently, post-quantum cryptography (PQC) has emerged as an inevitable trend for the future. Among PQC approaches, lattice-based cryptography and hash-based cryptography have already been standardized, while code-based cryptography remains a candidate for standardization. In light of these developments, this study proposes a Code-based Butterfly Key Expansion (CBKE) mechanism, built on code-based cryptography principles. The proposed method enables a registration authority (RA) to expand an original code-based caterpillar public key into a code-based cocoon public key, achieving anonymity for entities other than the RA. Subsequently, a certificate authority further expands the code-based cocoon public key into a code-based butterfly public key, which is then embedded in a pseudonymous certificate as the public key for the end entity. This approach ensures anonymity for both the RA and other entities. To enhance computational efficiency, the study proposes a random invertible matrix generation algorithm with a time complexity of O(n). This algorithm achieves high efficiency and anonymity without increasing the key length, thereby addressing the computational demands of the proposed method effectively.