**3. The System**

The construction of our public-key cryptosystem is based on [*n*, *k*, 2*t* + <sup>1</sup>]-code over F*q*. The syndrome-decoding procedure is used for decryption. The public-key and private-key are constructed by each user as follows.

