{"id":"https://openalex.org/W4402178785","doi":"https://doi.org/10.1587/transfun.2024tap0003","title":"Efficient Reconstruction in Key Recovery Attack on the QC-MDPC McEliece Cryptosystems","display_name":"Efficient Reconstruction in Key Recovery Attack on the QC-MDPC McEliece Cryptosystems","publication_year":2024,"publication_date":"2024-09-03","ids":{"openalex":"https://openalex.org/W4402178785","doi":"https://doi.org/10.1587/transfun.2024tap0003"},"language":"en","primary_location":{"id":"doi:10.1587/transfun.2024tap0003","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transfun.2024tap0003","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E108.A/3/E108.A_2024TAP0003/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.jstage.jst.go.jp/article/transfun/E108.A/3/E108.A_2024TAP0003/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109633878","display_name":"M Ohtsuka","orcid":null},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Motonari OHTSUKA","raw_affiliation_strings":["Dept. of Computer Science, National Defense Academy of Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, National Defense Academy of Japan","institution_ids":["https://openalex.org/I443798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108463860","display_name":"Takahiro ISHIMARU","orcid":null},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takahiro ISHIMARU","raw_affiliation_strings":["Dept. of Computer Science, National Defense Academy of Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, National Defense Academy of Japan","institution_ids":["https://openalex.org/I443798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092812398","display_name":"Yuta Tsukie","orcid":"https://orcid.org/0000-0001-8175-8136"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuta TSUKIE","raw_affiliation_strings":["Japan Air Self-Defense Force"],"affiliations":[{"raw_affiliation_string":"Japan Air Self-Defense Force","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042347272","display_name":"Shingo Kukita","orcid":"https://orcid.org/0000-0003-1526-4570"},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shingo KUKITA","raw_affiliation_strings":["Dept. of Computer Science, National Defense Academy of Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, National Defense Academy of Japan","institution_ids":["https://openalex.org/I443798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070748497","display_name":"Kohtaro Watanabe","orcid":"https://orcid.org/0000-0001-9674-0924"},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kohtaro WATANABE","raw_affiliation_strings":["Dept. of Computer Science, National Defense Academy of Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, National Defense Academy of Japan","institution_ids":["https://openalex.org/I443798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5109633878"],"corresponding_institution_ids":["https://openalex.org/I443798"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13647036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"E108.A","issue":"3","first_page":"414","last_page":"422"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.9475175142288208},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6749910116195679},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6325849890708923},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5049660801887512},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.37571588158607483},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.29251086711883545},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26434001326560974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25118231773376465},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20091450214385986}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.9475175142288208},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6749910116195679},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6325849890708923},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5049660801887512},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.37571588158607483},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.29251086711883545},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26434001326560974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25118231773376465},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20091450214385986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transfun.2024tap0003","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transfun.2024tap0003","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E108.A/3/E108.A_2024TAP0003/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transfun.2024tap0003","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transfun.2024tap0003","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E108.A/3/E108.A_2024TAP0003/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3459562248","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4874944895","display_name":null,"funder_award_id":"-in-Aid","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G7253762887","display_name":null,"funder_award_id":"18K03387","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G8430481527","display_name":null,"funder_award_id":"Number","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402178785.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1520077026","https://openalex.org/W1965275036","https://openalex.org/W2035929826","https://openalex.org/W2043250695","https://openalex.org/W2168676717","https://openalex.org/W2566251362","https://openalex.org/W2621357008","https://openalex.org/W2778213072","https://openalex.org/W2784049966","https://openalex.org/W2795083828","https://openalex.org/W2894310774","https://openalex.org/W2897128759","https://openalex.org/W2949110138","https://openalex.org/W2976357433","https://openalex.org/W2986959318","https://openalex.org/W3004081457","https://openalex.org/W3172256485","https://openalex.org/W4289713186","https://openalex.org/W4312932172","https://openalex.org/W4386232518"],"related_works":["https://openalex.org/W2212229713","https://openalex.org/W2973501904","https://openalex.org/W4389313746","https://openalex.org/W2150802958","https://openalex.org/W4390438323","https://openalex.org/W2567184113","https://openalex.org/W1597779806","https://openalex.org/W1694516557","https://openalex.org/W3150242960","https://openalex.org/W4281771232"],"abstract_inverted_index":{"Realization":[0],"of":[1,11,17,49,53,106,123,130,164,171,213],"large":[2,39],"quantum":[3,40],"computers":[4,41],"is":[5,35,77,116,147,155],"believed":[6],"to":[7,109,150,157,160,200,230,246],"jeopardize":[8],"the":[9,88,111,120,124,136,140,152,161,168,172,175,202,206,211,224,247,257,266],"security":[10],"cryptosystems":[12],"relying":[13],"on":[14,71,87,210],"computational":[15],"complexity":[16],"some":[18],"mathematical":[19],"problems,":[20],"such":[21],"as":[22],"prime":[23],"factorization":[24],"and":[25,55,133],"discrete":[26],"logarithm":[27],"problem.":[28],"In":[29,193],"this":[30,82,165,191,194],"light,":[31],"post-quantum":[32,64],"cryptography,":[33],"which":[34,146],"secure":[36],"even":[37],"after":[38],"are":[42],"realized,":[43],"has":[44],"been":[45,94],"getting":[46],"a":[47,60,78,214,231,242],"lot":[48],"attention.":[50],"National":[51],"Institute":[52],"Standards":[54],"Technology":[56],"(NIST)":[57],"recently":[58],"started":[59],"standardization":[61],"process":[62],"for":[63],"cryptosystems.":[65],"The":[66,96,143],"McEliece":[67,90],"public-key":[68],"cryptosystem":[69],"based":[70],"quasi-cyclic":[72],"moderate-density":[73],"parity-check":[74],"(QC-MDPC)":[75],"codes":[76],"promising":[79],"candidate":[80],"in":[81,174,190,234,265],"NIST":[83],"standardization.":[84],"Recently,":[85],"attacks":[86],"QC-MDPC":[89,153],"scheme":[91],"have":[92],"extensively":[93],"investigated.":[95],"one":[97],"proposed":[98,216,270],"by":[99,178,217,271],"Guo":[100,179,272],"et":[101,180,219,273],"al.":[102,181,220,274],"exploits":[103],"statistical":[104,128],"information":[105,129],"decoding":[107,131],"errors":[108],"reconstruct":[110,201],"secret":[112,125,137,203,258],"key.":[113],"This":[114],"attack":[115,173],"twofold:":[117],"(1)":[118],"obtaining":[119],"distance":[121,141,208],"spectrum":[122,209],"key":[126,138,204,225,248,259,268],"from":[127,139,205],"errors,":[132],"(2)":[134],"reconstructing":[135],"spectrum.":[142],"bit-flipping":[144],"decoding,":[145],"commonly":[148],"used":[149],"decode":[151],"scheme,":[154],"considered":[156],"be":[158,228],"vulnerable":[159],"first":[162],"part":[163,170],"attack.":[166],"Meanwhile":[167],"second":[169],"original":[176,267],"version":[177],"requires":[182],"considerable":[183],"time":[184],"because":[185],"they":[186],"use":[187],"recursive":[188,263],"search":[189,244,264],"part.":[192],"paper,":[195],"we":[196,240],"propose":[197],"another":[198],"method":[199,215,255],"obtained":[207],"basis":[212],"Fab\u0161i\u010d":[218],"They":[221],"found":[222],"that":[223,253],"construction":[226],"can":[227],"mapped":[229],"clique":[232],"problem":[233],"graph":[235],"theory.":[236],"Using":[237],"their":[238],"observation,":[239],"apply":[241],"breadth-first":[243],"algorithm":[245],"reconstruction.":[249],"Numerical":[250],"experiments":[251],"show":[252],"our":[254],"reconstructs":[256],"more":[260],"efficiently":[261],"than":[262],"reconstruction":[269]},"counts_by_year":[],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
