University of Mary Washington
Recently, a few Chosen Ciphertext Attacks secure (CCA2-secure) variants of the McEliece Public-Key Encryption (PKE) scheme in the standard model were introduced. All the proposed schemes are based on encryption repetition paradigm and use general transformation from CPA-secure scheme to a CCA2- secure one. Therefore, the resulting encryption scheme needs separate encryption and has large key size compared to the original scheme, which complex public key size problem in the code-based PKE schemes. Thus, the proposed schemes are not sufficiently efficient to be used in practice.