{"id":44610,"updated":"2025-01-22T10:23:48.542554+00:00","links":{},"created":"2025-01-18T23:10:44.751483+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00044610","sets":["1164:3925:3936:3938"]},"path":["3938"],"owner":"1","recid":"44610","title":["An Eflicient Anonymous Password - Authenticated Key EXchange Protocol"],"pubdate":{"attribute_name":"公開日","attribute_value":"2006-07-21"},"_buckets":{"deposit":"1e7fe63b-1135-41aa-9b25-bedf4f050bf6"},"_deposit":{"id":"44610","pid":{"type":"depid","value":"44610","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"An Eflicient Anonymous Password - Authenticated Key EXchange Protocol","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"An Eflicient Anonymous Password - Authenticated Key EXchange Protocol"},{"subitem_title":"An Efficient Anonymous Password-Authenticated Key Exchange Protocol","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2006-07-21","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"産業技術総合研究所情報セキュリティ研究センター"},{"subitem_text_value":"産業技術総合研究所情報セキュリティ研究センター"},{"subitem_text_value":"産業技術総合研究所情報セキュリティ研究センター/中央大学理工学部電気電子通信工学科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Research Center for Information Security, AIST,","subitem_text_language":"en"},{"subitem_text_value":"Research Center for Information Security, AIST,","subitem_text_language":"en"},{"subitem_text_value":"Research Center for Information Security, AIST/Chuo University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/44610/files/IPSJ-CSEC06034046.pdf"},"date":[{"dateType":"Available","dateValue":"2008-07-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC06034046.pdf","filesize":[{"value":"646.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5ab6d91b-7980-484c-b083-cb38d383bc95","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2006 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"辛星漢"},{"creatorName":"古原和邦"},{"creatorName":"今井, 秀樹"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"SeongHan, SHIN","creatorNameLang":"en"},{"creatorName":"Kazukuni, KOBARA","creatorNameLang":"en"},{"creatorName":"Hideki, IMAI","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Recently Viet et aL [21] have proposed an anonymous password-authenticated key exchange (PAKE) protocol against a passive server who follows the protocol honestly but it is curious about identity of client. In this paper we propose an efficient construction for anonymous PAKE protocol (we call it the EAP protocol) which provides semantic security of session keys in the random oracle model with the reduction to the computational Diffie-Hellman problem as well as anonymity against a passive server. Specially the EAP protocol has about 50% reduction (com pared to [21]) in the number of modular exponentiations for both client and server and its communication bandwidth for the modular size of prime p is independent from the number of clients while [21] is not.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, Viet et aL, [21] have proposed an anonymous password-authenticated key exchange (PAKE) protocol against a passive server, who follows the protocol honestly but it is curious about identity of client. In this paper, we propose an efficient construction for anonymous PAKE protocol (we call it the EAP protocol) which provides semantic security of session keys in the random oracle model, with the reduction to the computational Diffie-Hellman problem, as well as anonymity against a passive server. Specially, the EAP protocol has about 50% reduction (com pared to [21]) in the number of modular exponentiations for both client and server, and its communication bandwidth for the modular size of prime p is independent from the number of clients while [21] is not.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"344","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"337","bibliographicIssueDates":{"bibliographicIssueDate":"2006-07-21","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"81(2006-CSEC-034)","bibliographicVolumeNumber":"2006"}]},"relation_version_is_last":true,"weko_creator_id":"1"}}