{"updated":"2025-01-21T23:22:44.458603+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00070728","sets":["934:989:6006:6192"]},"path":["6192"],"owner":"10","recid":"70728","title":["An Identifiable Yet Unlinkable Authentication System in Multi-service Environment"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-10-25"},"_buckets":{"deposit":"2a86752c-7243-4b7f-84d0-694ff71f1a0b"},"_deposit":{"id":"70728","pid":{"type":"depid","value":"70728","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"An Identifiable Yet Unlinkable Authentication System in Multi-service Environment","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"An Identifiable Yet Unlinkable Authentication System in Multi-service Environment"},{"subitem_title":"An Identifiable Yet Unlinkable Authentication System in Multi-service Environment","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"オリジナル論文","subitem_subject_scheme":"Other"}]},"item_type_id":"3","publish_date":"2010-10-25","item_3_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Electrical Engineering, Kyushu University"},{"subitem_text_value":"Faculty of Information Science and Electrical Engineering, Kyushu University"},{"subitem_text_value":"Faculty of Information Science and Electrical Engineering, Kyushu University"},{"subitem_text_value":"Research and Development Division, Kyushu University Library"},{"subitem_text_value":"Faculty of Information Science and Electrical Engineering, Kyushu University"}]},"item_3_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Research and Development Division, Kyushu University Library","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/70728/files/IPSJ-TOM0303007.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-25"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-TOM0303007.pdf","filesize":[{"value":"664.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"17"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"1646cf91-44b5-49ae-accb-801cb986fd50","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2010 by the Information Processing Society of Japan"}]},"item_3_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Toru, Nakamura"},{"creatorName":"Shunsuke, Inenaga"},{"creatorName":"Daisuke, Ikeda"},{"creatorName":"Kensuke, Baba"},{"creatorName":"Hiroto, Yasuura"}],"nameIdentifiers":[{}]}]},"item_3_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Toru, Nakamura","creatorNameLang":"en"},{"creatorName":"Shunsuke, Inenaga","creatorNameLang":"en"},{"creatorName":"Daisuke, Ikeda","creatorNameLang":"en"},{"creatorName":"Kensuke, Baba","creatorNameLang":"en"},{"creatorName":"Hiroto, Yasuura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_3_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11464803","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_3_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7780","subitem_source_identifier_type":"ISSN"}]},"item_3_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistance against insiders, personalization, weak-unlinkability, and memory efficiency. The proposed system is the first system which satisfies all the properties. In the proposed system, transactions of a user within a single service can be linked (personalization), while transactions of a user among distinct services can not be linked (weak-unlinkability). The proposed system can be used with smart cards since the amount of memory required by the system does not depend on the number of services. First, this paper formalizes the property of weak-unlinkability, which has not been formalized in the literatures. Next, this paper extends an identification scheme with a pseudorandom function in order to realize an authentication system which satisfies all the requirements. This extension can be done with any identificationscheme and any pseudorandom function. Finally, this paper proposes an implementation with the Schnorridentification scheme and a collision-free hash function as an example of the proposed system.","subitem_description_type":"Other"}]},"item_3_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistance against insiders, personalization, weak-unlinkability, and memory efficiency. The proposed system is the first system which satisfies all the properties. In the proposed system, transactions of a user within a single service can be linked (personalization), while transactions of a user among distinct services can not be linked (weak-unlinkability). The proposed system can be used with smart cards since the amount of memory required by the system does not depend on the number of services. First, this paper formalizes the property of weak-unlinkability, which has not been formalized in the literatures. Next, this paper extends an identification scheme with a pseudorandom function in order to realize an authentication system which satisfies all the requirements. This extension can be done with any identificationscheme and any pseudorandom function. Finally, this paper proposes an implementation with the Schnorridentification scheme and a collision-free hash function as an example of the proposed system.","subitem_description_type":"Other"}]},"item_3_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"66","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌数理モデル化と応用(TOM)"}],"bibliographicPageStart":"54","bibliographicIssueDates":{"bibliographicIssueDate":"2010-10-25","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"3"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:29:48.529396+00:00","id":70728,"links":{}}