Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Davide Schipani is active.

Publication


Featured researches published by Davide Schipani.


Journal of Cryptology | 2016

Enhanced Public Key Security for the McEliece Cryptosystem

Marco Baldi; Marco Bianchi; Franco Chiaraluce; Joachim Rosenthal; Davide Schipani

This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation equivalent to the secret code. This increases the security level of the public key, thus opening the way for reconsidering the adoption of classical families of codes, like Reed–Solomon codes, that have been longly excluded from the McEliece cryptosystem for security reasons. It is well known that codes of these classes are able to yield a reduction in the key size or, equivalently, an increased level of security against information set decoding; so, these are the main advantages of the proposed solution. We also describe possible vulnerabilities and attacks related to the considered system and show what design choices are best suited to avoid them.


international symposium on information theory | 2011

On the decoding complexity of cyclic codes up to the BCH bound

Davide Schipani; Michele Elia; Joachim Rosenthal

The standard algebraic decoding algorithm of cyclic codes [n, k, d] up to the BCH bound δ = 2t + 1 is very efficient and practical for relatively small n while it becomes unpractical for large n as its computational complexity is O(nt). Aim of this paper is to show how to make this algebraic decoding computationally more efficient: in the case of binary codes, for example, the complexity of the syndrome computation drops from O(nt) to O(t√n), while the average complexity of the error location drops from O(nt) to max{O(t√n),O(t log2(t) log log(t) log(n))}.


arXiv: Cryptography and Security | 2013

Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

Marco Baldi; Marco Bianchi; Franco Chiaraluce; Joachim Rosenthal; Davide Schipani

In this paper, we address the problem of achieving efficient code-based digital signatures with small public keys. The solution we propose exploits sparse syndromes and randomly designed low-density generator matrix codes. Based on our evaluations, the proposed scheme is able to outperform existing solutions, permitting to achieve considerable security levels with very small public keys.


information theory workshop | 2010

Coding solutions for the secure biometric storage problem

Davide Schipani; Joachim Rosenthal

The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a scheme where similar input strings will be accepted as the same biometric. In the same time nothing could be learned from the stored data. They called their scheme a fuzzy commitment scheme. In this paper we will revisit the solution of Juels and Wattenberg and we will provide answers to two important questions: what type of error-correcting codes should be used and what happens if biometric templates are not uniformly distributed, i.e. the biometric data come with redundancy. Answering the first question will lead us to the search for low-rate large-minimum distance error-correcting codes which come with efficient decoding algorithms up to the designed distance. In order to answer the second question we relate the rate required with a quantity connected to the “entropy” of the string, trying to estimate a sort of “capacity”, if we want to see a flavor of the converse of Shannons noisy coding theorem. Finally we deal with side-problems arising in a practical implementation and we propose a possible solution to the main one that seems to have so far prevented in many situations real life applications of the fuzzy scheme.


Applicable Algebra in Engineering, Communication and Computing | 2012

Polynomial evaluation over finite fields: new algorithms and complexity bounds

Michele Elia; Joachim Rosenthal; Davide Schipani

An efficient evaluation method is described for polynomials in finite fields. Its complexity is shown to be lower than that of standard techniques, when the degree of the polynomial is large enough compared to the field characteristic. Specifically, if n is the degree of the polynomiaI, the asymptotic complexity is shown to be


Applicable Algebra in Engineering, Communication and Computing | 2015

The Rabin cryptosystem revisited

Michele Elia; Matteo Piva; Davide Schipani


applied sciences on biomedical and communication technologies | 2011

On fuzzy syndrome hashing with LDPC coding

Marco Baldi; Marco Bianchi; Franco Chiaraluce; Joachim Rosenthal; Davide Schipani

{O(\sqrt{n})}


australian communications theory workshop | 2011

Efficient evaluations of polynomials over finite fields

Davide Schipani; Michele Elia; Joachim Rosenthal


Journal of Discrete Mathematical Sciences and Cryptography | 2017

Managing key multicasting through orthogonal systems

José Antonio Álvarez-Bermejo; Juan Antonio López-Ramos; Joachim Rosenthal; Davide Schipani

, versus O(n) of classical algorithms. Applications to the syndrome computation in the decoding of Reed-Solomon codes are highlighted.


Journal of Algebra and Its Applications | 2017

Group key management based on semigroup actions

Juan Antonio López-Ramos; Joachim Rosenthal; Davide Schipani; Reto Schnyder

The Rabin scheme used in public-key cryptosystem is here revisited with a focus limited to a few specific open issues. In particular, message decryption requires one out of four roots of a quadratic equation in a residue ring to be chosen, and a longstanding problem is to identify unambiguously and deterministically the encrypted message at the decryption side by adding the minimum number of extra bits to the cipher-text. While the question has already been solved for pairs of primes of the type

Collaboration


Dive into the Davide Schipani's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Franco Chiaraluce

Marche Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Marco Baldi

Marche Polytechnic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marco Bianchi

Marche Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Franco Chiaraluce

Marche Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Marco Baldi

Marche Polytechnic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge