Enhanced Public Key Security for the McEliece Cryptosystem
Summary (3 min read)
Introduction
- A pressure ulcer (PU) is a chronic nonhealing wound that is caused by the continuous pressure of the body weight on the skin.
- The authors study revealed significant shifts in epidermal cellular composition and gene expression patterns in PU wound edges compared to AW and uninjured skin.
- The authors identified IFNγ in PU wound fluid as a major inducer of MHCII expression in keratinocytes.
Results
- Characterization of epidermal cell composition of human skin and wounds.
- Comparing AW and 8 skin keratinocytes, the authors observed increased frequencies of spinous (KC_1) and granular (KC_3) keratinocytes during wound repair.
- GO analysis revealed that genes involved in neutrophil-mediated immunity [e.g., FABP5 (28), S100A7, S100A8, and S100A9 (29)] were strongly upregulated in PU keratinocytes compared to keratinocytes from AW or uninjured skin.
- Furthermore, the authors showed that the cell-free wound fluid from PU_G1 patients, but not PU_G2 patients, significantly induced keratinocyte expression of CD74 and HLA-DRB (Figure 6D, E, and Figure S8A).
- In line with this, the authors found that MHCII+ keratinocytes were close to T cells in PU wound edges by confocal imaging (Figure 6I).
Discussion
- PU is one of the most frequent causes of death in elderly and wheelchair- or bed-bound individuals (4).
- This cellular composition shift was also reflected in the gene expression profile of PU keratinocytes, revealing their intense inflammatory response.
- In mouse skin, MHCII+ keratinocytes were shown to control homeostatic type one 16 responses to the microbiota (46).
- In rodent models, IFNγ has also been found to inhibit angiogenesis and collagen deposition, thus hampering wound repair (52, 53).
Human wound samples.
- The authors enrolled 25 healthy donors and 18 PU patients at the Karolinska University Hospital (Stockholm, Sweden) (Table S1).
- All the clinical materials were taken after the patients’ consent, and the study was approved by the Stockholm Regional Ethics Committee and conducted according to the Declaration of Helsinki’s principles.
- The local carbocain-adrenalin injection was used for anesthesia while sampling.
- Wound-edge samples and nearby intact skin were collected from patients with grade IV PU (according to the EPUAP classification system) during reconstructive surgery (16).
- The gauzes were soaked in 10 mL phosphate-buffered saline (PBS) and centrifuged for 5 minutes at 10000 rpm.
Single-cell isolation and sequencing.
- Skin and wound samples were incubated in Dulbecco’s Modified Eagle Medium (DMEM) containing 5U/ml Dispase II and 1% Penicillin-Streptomycin (ThermoFisher Scientific) at 4 ℃ overnight.
- After confirming the good quality of total RNA by Nanodrop, 1ng of total RNA per sample was used for library preparation.
- The cDNA libraries were purified by carboxylated magnetic beads, then their quality and quantity were confirmed by using the Agilent 2100 Bioanalyzer.
- Cell types were identified according to canonical and novel markers revealed by differential expression analysis.
Cell-cycle signature in keratinocytes.
- To evaluate keratinocytes' proliferation status, the authors calculated the cell cycle scores of the G1/S and G2/M phases for each cell, as previously described (62).
- This score was defined as the average log2-transformed relative expression of the highly correlated cell-cycle genes (Spearman correlation coefficient > 0.4).
- Using DESeq2 (version 1.22.2 with default parameters), the authors identified the DEGs with an adjusted p-value < 0.05, fold change 2 and expressed in more than 50% cells within each group.
- The group 1 and group 2 PUs were compared with the skin or AW separately, and the DEGs showing up in both comparisons were considered the common DEGs in PUs.
- The differential expression analysis was performed for the keratinocytes from the group 1 and group 2 PUs using the R package “DESeq2” (version 1.22.2) as described above.
Statistics.
- All data were expressed as mean ±s.d. or mean ±s.e.m. and plotted using GraphPad Prism v6.
- Statistical significance was determined by a two-tailed Student’s t-test or Mann-Whitney U Test.
- The correlation between the expressions of different genes in the same sample set was made using Spearman’s correlation test on log-transformed data.
- For all statistical tests, P values < 0.05 were considered to be statistically significant.
- P values and analysis methods are also described in each figure legend.
Data and software availability.
- The raw data and the processed matrices of raw count and RPKM of scRNA-seq analysis have been deposited in the National Center for Biotechnology Information Gene Expression Omnibus (GEO) database (accession no.
- Supplemental Experimental Procedures.
- Table S1.
- Antibodies, primers, Table S2. 25.
ACKNOWLEDGMENTS
- The authors express their gratitude to all the patients and healthy donors who took part in this study.
- The authors thank Dr. Maria Kasper (Karolinska Institutet) and Dr. Stanley Sing Hoi Cheuk (Göteborgs University) for discussion and advice.
- The authors thank Dr. Zhuang Liu, Borislav Ignatov (Karolinska Institutet), Hua Zhang, and Dr. Yonglong Dang (Uppsala University) for technical support.
- The authors thank Madeleine Stenius (Rehab Station Stockholm Academy) for clinical sample collection.
- This work was supported by Swedish Research Council (Vetenskapsradet, 2016-02051 and 2018-02557), Ragnar Söderbergs Foundation (M31/15), Hedlunds Foundation, Welander and Finsens Foundation , Åke Wibergs Foundation, Jeanssons Foundation, Swedish Psoriasis Foundation, Ming Wai Lau Centre for Reparative Medicine, Tore Nilson's Foundation, Lars Hiertas Foundation, and Karolinska Institutet.
Figure Legend
- Figure 1. Characterization of epidermal cell composition of human skin and wounds.
- G, Proportion of proliferating cells (cells in the quadrants I, II, IV of the cell cycle signature plot) in each keratinocyte cluster.
- 35 I, Comparison of gene expression between KC_2 and KC_4: the abundance of a few selected genes are shown in all the keratinocytes analyzed by scRNA-seq.
- H, Spearman’s correlation analysis between IFNG and CD74 expression detected by qRT-PCR in the above samples.
Did you find this useful? Give us your feedback
Citations
77 citations
76 citations
64 citations
50 citations
Cites background from "Enhanced Public Key Security for th..."
...However, this may also compromise the system security, as it occurred with some first McEliece variants based on quasi-cyclic (QC) codes [17], low-density parity-check (LDPC) codes [31] and quasi-cyclic low-density parity-check (QC-LDPC) codes [35], quasi-dyadic (QD) codes [30], convolutional codes [26] and some instances based on generalized Reed-Solomon (GRS) codes [7, 10]....
[...]
49 citations
References
1,541 citations
"Enhanced Public Key Security for th..." refers background in this paper
...In fact, differently from cryptosystems exploiting integer factorization or discrete logarithms, it relies on the hardness of decoding a linear block code without any visible structure [9]....
[...]
926 citations
457 citations
"Enhanced Public Key Security for th..." refers background in this paper
...Classical CCA2-secure conversions work in the random oracle model [22, 28], while the problem of finding efficient CCA2-secure conversions of these cryptosystem in the standard model has been addressed more recently [19, 18, 39, 42, 44]....
[...]
Related Papers (5)
Frequently Asked Questions (15)
Q2. What is the idea of replacing the permutation matrix used in the original McEliece?
The idea in [4] is to replace the permutation matrix used in the original McEliece cryptosystem with a denser transformation matrix.
Q3. What other proposals have been made for increasing key security?
Other proposals for increasing key security have been made in the past, such as using a distortion matrix together with rank codes in the GPT cryptosystem [23] and exploiting the properties of subcodes in variants of the McEliece and the GPT cryptosystems [8].
Q4. What is the reason why an attacker could try to sum two rows of H′?
Note that an attacker could try to sum two rows of H′, hoping that one of them corresponds to a copy of the vector a1 in R and the other to a copy of the vector a2, so that the sum of the two rows might still contain the vector a.
Q5. What is the purpose of the proposed cryptosystem?
A first concern about the proposed cryptosystem is to verify that it is actually able to provide increased key security, with respect to previous variants of the McEliece cryptosystem, in such a way as to allow the use of widespread families of codes (like GRS codes) without incurring in the attacks that have prevented their use up to now.
Q6. What is the reason why the distinguisher is ineffective against the system the authors propose?
this distinguisher is ineffective against the system the authors propose, since:• it is not able to distinguish the public key matrix of the proposed cryptosystem from a randomly generated one, that is, their keys are resistant to this distinguisher since they are not generator matrices of alternant or GRS codes (this is due to the fact that Q is not a permutation matrix);• it does not allow to mount a DAP: the distinguisher cannot work on subspaces of the code, so it is unable to recover the subspace the attacker needs.
Q7. How many rows and columns could have weight equal to 2?
As an example, if m = 1.4, 40% of the rows and columns in T could have weight equal to 2, while the remaining 60% of the rows and columns could have weight equal to 1.
Q8. How can the authors estimate the complexity of the main steps of GRS syndrome decoding?
The complexityof the main steps of GRS syndrome decoding can be estimated [15] in: i) 4t(2t+ 2)M + 2t(2t+ 1)S binary operations for the the key equation solver, ii) n(t− 1)M+ntS binary operations for the Chien search, and iii) (2t2+t)M+t(2t−1)S binary operations for Forney’s formula.
Q9. How many work factor reductions are there for the binary field?
Based on these considerations, the authors assume that, if a generalization of the algorithm in [7] to non-binary fields were found, it would result in a work factor reduction in the order of 29 or less with respect to the algorithm in [40], for the parameters the authors consider.
Q10. What is the effect of the matrix Q on the intentional error vector e?
As the authors will see in the following, for both the McEliece and Niederreiter versions of the cryptosystem it turns out that, during decryption, the matrix Q has a multiplicative effect on the intentional error vector e.
Q11. What is the reason why Stern’s algorithm is generalized to work over larger fields?
In [40], the algorithm is generalized to work over larger fields, and it is shown that the speedups introduced in [11] are mostly efficient on very small fields.
Q12. What makes GRS codes secure against key recovering attacks?
this also makes them secure against key recovering attacks, while the algebraic structure of GRS codes, when exposed in the public key (also in permuted form), makes them insecure against attacks aimed at recovering the secret code, like the Sidelnikov-Shestakov attack [46].
Q13. What is the main element that differentiates the proposed system from the original?
In both cases, the main element that differentiates the proposed solution from the original cryptosystem is the replacement of the permutation matrix P with a dense transformation matrix Q, whose design is described next.
Q14. What is the general attack procedure against the proposed cryptosystem?
The most general attack procedures against code-based cryptosystems, hence against their proposed solution, are those techniques that attempt information set decoding (ISD) on the public code; so the authors estimate the security level of the proposed cryptosystem against this kind of attacks.
Q15. What is the way to find k independent columns in the public generator matrix?
One of the biggest improvements presented in [11] is a smart way to find k independent columns in the public generator matrix at each iteration without performing Gaussian reduction on all such columns.