{"created":"2025-01-19T01:04:47.176450+00:00","updated":"2025-01-19T20:59:38.188054+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00201525","sets":["581:9633:9645"]},"path":["9645"],"owner":"33195","recid":"201525","title":["Helping Johnny to Search: Usable Encrypted Search on Webmail System "],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-12-15"},"_buckets":{"deposit":"61f1b281-eca7-4f09-b6f6-0d1ab0a854c5"},"_deposit":{"id":"201525","pid":{"type":"depid","value":"201525","revision_id":0},"owners":[33195],"status":"published","created_by":33195},"item_title":"Helping Johnny to Search: Usable Encrypted Search on Webmail System ","author_link":["493247","493242","493244","493245","493246","493243"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Helping Johnny to Search: Usable Encrypted Search on Webmail System "},{"subitem_title":"Helping Johnny to Search: Usable Encrypted Search on Webmail System ","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:ユーザブルセキュリティ] usable security, e-mail encryption, searchable encryption, encrypted search","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2019-12-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Toho University"},{"subitem_text_value":"Toho University"},{"subitem_text_value":"Toho University"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Toho University","subitem_text_language":"en"},{"subitem_text_value":"Toho University","subitem_text_language":"en"},{"subitem_text_value":"Toho University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/201525/files/IPSJ-JNL6012008.pdf","label":"IPSJ-JNL6012008.pdf"},"date":[{"dateType":"Available","dateValue":"2021-12-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6012008.pdf","filesize":[{"value":"610.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f1e607b1-b5d3-4a83-b264-bd05c9ebff60","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tatsuya, Midorikawa"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akihiro, Tachikawa"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Kanaoka"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tatsuya, Midorikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akihiro, Tachikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Kanaoka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"End-to-end encryption is becoming common in messaging applications. E-mail that is the one of most popular a messaging application has several standards and systems in its encryption. However, it is hard to say that e-mail encryption has spread enough. It has been pointed out that there are usability problems in message encryption. Even though various studies on message encryption and usability have been made, there is no study discussing utility function such as searching and sorting. In this paper, the search function is focused. We aim to investigate the usability problems on encrypted search. Therefore, a method that applies encrypted search transparently is proposed at first. The implementation of the proposed method is achieved using Google Chrome Extension for Gmail, and evaluation both performance and usability is conducted. We found that participants do not mind whether the search function is encrypted or not if both have almost identical UI and encrypted search operates at high speed.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.27(2019) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.27.763\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"End-to-end encryption is becoming common in messaging applications. E-mail that is the one of most popular a messaging application has several standards and systems in its encryption. However, it is hard to say that e-mail encryption has spread enough. It has been pointed out that there are usability problems in message encryption. Even though various studies on message encryption and usability have been made, there is no study discussing utility function such as searching and sorting. In this paper, the search function is focused. We aim to investigate the usability problems on encrypted search. Therefore, a method that applies encrypted search transparently is proposed at first. The implementation of the proposed method is achieved using Google Chrome Extension for Gmail, and evaluation both performance and usability is conducted. We found that participants do not mind whether the search function is encrypted or not if both have almost identical UI and encrypted search operates at high speed.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.27(2019) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.27.763\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2019-12-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"60"}]},"relation_version_is_last":true,"weko_creator_id":"33195"},"id":201525,"links":{}}