{"created":"2024-07-02T02:24:44.832380+00:00","id":2001036,"links":{},"metadata":{"_buckets":{"deposit":"ef4f6a7b-9c93-4918-8d23-ae87cd12fdbe"},"_deposit":{"created_by":17,"id":"2001036","owner":"17","owners":[17],"pid":{"revision_id":0,"type":"depid","value":"2001036"},"status":"published"},"_oai":{"id":"oai:ynu.repo.nii.ac.jp:02001036","sets":["1006:1009"]},"author_link":[],"control_number":"2001036","item_3_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2024-01-10","bibliographicIssueDateType":"Issued"},"bibliographicNumberOfPages":"12","bibliographicPageEnd":"51","bibliographicPageStart":"40","bibliographic_titles":[{"bibliographic_title":"Information Security Applications : 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers","bibliographic_titleLang":"en"}]}]},"item_3_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"MQ-Sign is a variant of the UOV signature scheme proposed by Shim et al. It has been suggested as a candidate for the standardization of post-quantum cryptography in Republic of Korea (known as KpqC). Recently Aulbach et al. proposed a practical key recovery attack against MQ-Sign-RS and MQ-Sign-SS with a simple secret key S. In this paper, we propose another attack that is valid for the case of a general secret key S.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_3_description_7":{"attribute_name":"会議概要(会議名, 開催地, 会期, 主催者等)","attribute_value_mlt":[{"subitem_description":"Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023,","subitem_description_language":"en","subitem_description_type":"Other"}]},"item_3_publisher_37":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Springer"}]},"item_3_relation_12":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"9789819980246","subitem_relation_type_select":"ISBN"}}]},"item_3_relation_15":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1007/978-981-99-8024-6_4","subitem_relation_type_select":"DOI"}}]},"item_3_rights_17":{"attribute_name":"権利URI","attribute_value_mlt":[{"subitem_rights_language":"en","subitem_rights_resource":"https://www.springernature.com/jp/open-research/policies/book-policies"}]},"item_3_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"embargoed access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_f1cf"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNames":[{"affiliationName":"Institute of Mathematics for Industry, Kyushu University","affiliationNameLang":"en"}]}],"creatorNames":[{"creatorName":"Yasuhiko, Ikematsu","creatorNameLang":"en"}]},{"creatorAffiliations":[{"affiliationNames":[{"affiliationName":"Institute of Advanced Sciences, Yokohama National University","affiliationNameLang":"en"}]}],"creatorNames":[{"creatorName":"Hyungrok, Jo","creatorNameLang":"en"}]},{"creatorAffiliations":[{"affiliationNames":[{"affiliationName":"Institute for the Advancement of Higher Education, Okayama University of Science","affiliationNameLang":"en"}]}],"creatorNames":[{"creatorName":"Takanori, Yasuda","creatorNameLang":"en"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2025-01-12"}],"fileDate":[{"fileDateType":"Issued","fileDateValue":"2024-01-11"}],"filename":"[著者最終稿] A Security Analysis on MQ-Sign -Ikematsu, Yasuhiko, Jo, Hyungrok, Yasuda, Takanori.pdf","filesize":[{"value":"294 KB"}],"format":"application/pdf","mimetype":"application/pdf","url":{"label":"A Security Analysis on MQ-Sign -Ikematsu, Yasuhiko, Jo, Hyungrok, Yasuda, Takanori.pdf","objectType":"fulltext","url":"https://ynu.repo.nii.ac.jp/record/2001036/files/[著者最終稿] A Security Analysis on MQ-Sign -Ikematsu, Yasuhiko, Jo, Hyungrok, Yasuda, Takanori.pdf"},"version_id":"be8aa76a-cf36-4426-9b52-7dac6c5c5f46"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"A Security Analysis on MQ-Sign","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Security Analysis on MQ-Sign","subitem_title_language":"en"}]},"item_type_id":"3","owner":"17","path":["1009"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-07-02"},"publish_date":"2024-07-02","publish_status":"0","recid":"2001036","relation_version_is_last":true,"title":["A Security Analysis on MQ-Sign"],"weko_creator_id":"17","weko_shared_id":-1},"updated":"2024-07-02T02:32:39.415791+00:00"}