{"id":"https://openalex.org/W2897608435","doi":"https://doi.org/10.3390/cryptography2040032","title":"A New Technique in Rank Metric Code-Based Encryption","display_name":"A New Technique in Rank Metric Code-Based Encryption","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2897608435","doi":"https://doi.org/10.3390/cryptography2040032","mag":"2897608435"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2040032","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040032","pdf_url":"https://www.mdpi.com/2410-387X/2/4/32/pdf?version=1540966812","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/4/32/pdf?version=1540966812","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058176227","display_name":"Terry Shue Chien Lau","orcid":"https://orcid.org/0000-0002-1218-9133"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Terry Lau","raw_affiliation_strings":["Temasek Laboratories, National University of Singapore, T-Lab Building, 5A, Engineering Drive 1, #09-02, Singapore 117411, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-1218-9133","affiliations":[{"raw_affiliation_string":"Temasek Laboratories, National University of Singapore, T-Lab Building, 5A, Engineering Drive 1, #09-02, Singapore 117411, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019993874","display_name":"Chik How Tan","orcid":"https://orcid.org/0000-0001-7550-3890"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chik Tan","raw_affiliation_strings":["Temasek Laboratories, National University of Singapore, T-Lab Building, 5A, Engineering Drive 1, #09-02, Singapore 117411, Singapore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Temasek Laboratories, National University of Singapore, T-Lab Building, 5A, Engineering Drive 1, #09-02, Singapore 117411, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058176227"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.6769,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78183164,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":"4","first_page":"32","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.8175673484802246},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7311408519744873},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.6483665704727173},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5729220509529114},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.571101188659668},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.5156132578849792},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46819576621055603},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4627072811126709},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4297175109386444},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4006316661834717},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.39686116576194763},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.33481115102767944},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.328697144985199},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3177782893180847},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.1711367964744568},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11494362354278564}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.8175673484802246},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7311408519744873},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.6483665704727173},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5729220509529114},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.571101188659668},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.5156132578849792},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46819576621055603},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4627072811126709},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4297175109386444},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4006316661834717},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.39686116576194763},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33481115102767944},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.328697144985199},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3177782893180847},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.1711367964744568},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11494362354278564},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/cryptography2040032","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040032","pdf_url":"https://www.mdpi.com/2410-387X/2/4/32/pdf?version=1540966812","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:scholarbank.nus.edu.sg:10635/209642","is_oa":true,"landing_page_url":"https://scholarbank.nus.edu.sg/handle/10635/209642","pdf_url":null,"source":{"id":"https://openalex.org/S7407052290","display_name":"National University of Singapore","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus OA2018","raw_type":"Article"},{"id":"pmh:oai:doaj.org/article:243c00091c384aae996a2e8c764003d6","is_oa":true,"landing_page_url":"https://doaj.org/article/243c00091c384aae996a2e8c764003d6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 4, p 32 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/4/32/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2040032","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography2040032","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040032","pdf_url":"https://www.mdpi.com/2410-387X/2/4/32/pdf?version=1540966812","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2897608435.pdf","grobid_xml":"https://content.openalex.org/works/W2897608435.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1662906987","https://openalex.org/W1892123666","https://openalex.org/W1942594900","https://openalex.org/W1979345442","https://openalex.org/W1990361074","https://openalex.org/W2011881257","https://openalex.org/W2025108828","https://openalex.org/W2041290864","https://openalex.org/W2081535454","https://openalex.org/W2090010567","https://openalex.org/W2094420277","https://openalex.org/W2113999696","https://openalex.org/W2134427743","https://openalex.org/W2138428646","https://openalex.org/W2289018240","https://openalex.org/W2514405074","https://openalex.org/W2530214632","https://openalex.org/W2604850172","https://openalex.org/W2732751854","https://openalex.org/W2885670388","https://openalex.org/W2963320596","https://openalex.org/W2963379327","https://openalex.org/W2986959318","https://openalex.org/W6634991502","https://openalex.org/W6640263198","https://openalex.org/W6770380337","https://openalex.org/W6785505087"],"related_works":["https://openalex.org/W2212229713","https://openalex.org/W2973501904","https://openalex.org/W4389313746","https://openalex.org/W2150802958","https://openalex.org/W4390438323","https://openalex.org/W4229939163","https://openalex.org/W1694516557","https://openalex.org/W1979345442","https://openalex.org/W2111322244","https://openalex.org/W4285103858"],"abstract_inverted_index":{"We":[0,18,46],"propose":[1,19],"a":[2,20,24,33,77,83,109,156],"rank":[3,14,44,79,96],"metric":[4],"codes":[5,116],"based":[6,8,113,139],"encryption":[7,22,55,112,153],"on":[9,114,140],"the":[10,30,59,72,89,92,105,132,162],"hard":[11],"problem":[12],"of":[13,32,41,58,74,76,91,108,121,136,148],"syndrome":[15],"decoding":[16],"problem.":[17,64],"new":[21],"with":[23,80,95],"public":[25,118,133,158],"key":[26,119,134,159,163],"matrix":[27,36],"by":[28,166],"considering":[29],"adding":[31],"random":[34],"distortion":[35],"over":[37,82],"F":[38],"q":[39],"m":[40],"full":[42],"column":[43],"n.":[45],"show":[47],"that":[48],"IND-CPA":[49],"security":[50,146],"is":[51,104,127],"achievable":[52],"for":[53,71],"our":[54,152],"under":[56],"assumption":[57],"Decisional":[60],"Rank":[61],"Syndrome":[62],"Decoding":[63],"Furthermore,":[65],"we":[66],"also":[67],"prove":[68],"some":[69],"bounds":[70],"number":[73],"matrices":[75],"fixed":[78],"entries":[81],"finite":[84],"field.":[85],"Our":[86,111],"proposal":[87],"allows":[88],"choice":[90],"error":[93],"terms":[94],"up":[97],"to":[98],"r":[99,103],"2":[100,149],",":[101],"where":[102],"error-correcting":[106],"capability":[107],"code.":[110],"Gabidulin":[115],"has":[117,155],"size":[120,135,160,164],"13":[122],".":[123],"68":[124],"KB,":[125],"which":[126],"82":[128],"times":[129],"smaller":[130,157],"than":[131,161],"McEliece":[137],"Cryptosystem":[138],"Goppa":[141],"codes.":[142],"For":[143],"similar":[144],"post-quantum":[145],"level":[147],"140":[150],"bits,":[151],"scheme":[154],"suggested":[165],"LOI17":[167],"Encryption.":[168]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-04T06:10:10.580331","created_date":"2025-10-10T00:00:00"}
