{"created":"2023-05-15T16:49:26.982023+00:00","id":26910,"links":{},"metadata":{"_buckets":{"deposit":"af6fda6a-d94a-4a4a-92ec-1a67bbdbf8cb"},"_deposit":{"created_by":6,"id":"26910","owners":[6],"pid":{"revision_id":0,"type":"depid","value":"26910"},"status":"published"},"_oai":{"id":"oai:nagasaki-u.repo.nii.ac.jp:00026910","sets":["85:1214"]},"author_link":["119691","119692"],"item_2_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2021-08-31","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicPageEnd":"15","bibliographicPageStart":"1","bibliographicVolumeNumber":"11","bibliographic_titles":[{"bibliographic_title":"Journal of Internet Services and Information Security"}]}]},"item_2_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In authentication protocols, anonymity is for privacy, while deniability is for anti-forensics after completion of the protocols. We propose a syntax and security definitions of an anonymous deniable predicate authentication scheme with revocability (rADPA). This new cryptographic primitive is to attain revocation function and strong privacy guarantee with predicate authentication, where a predicate is a boolean function over attributes of participants. We also give a generic construction of our rADPA scheme. Our approach is to build-in the revocable attribute-based encryption scheme proposed by K.Yamada et al. (ESORICS2017) into the anonymous deniable predicate authentication scheme proposed by S.Yamada et al. (PKC2012). Finally, we discuss how our rADPA scheme can be instantiated by employing concrete building blocks in our generic construction.","subitem_description_type":"Abstract"}]},"item_2_description_63":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"Journal of Internet Services and Information Security, 11(3), pp.1-15; 2021","subitem_description_type":"Other"}]},"item_2_publisher_33":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Innovative Information Science and Technology Research Group"}]},"item_2_relation_12":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.22667/JISIS.2021.08.31.001","subitem_relation_type_select":"DOI"}}]},"item_2_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"c Innovative Information Science and Technology Research Group. This article is an open access article. JISIS follows the BOAI definition of open access as well as the Creative Commons Attribution Non-Commercial License. "}]},"item_2_source_id_7":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2182-2069","subitem_source_identifier_type":"ISSN"}]},"item_2_source_id_8":{"attribute_name":"EISSN","attribute_value_mlt":[{"subitem_source_identifier":"2182-2077","subitem_source_identifier_type":"ISSN"}]},"item_2_version_type_16":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Anada, Hiroaki"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ueshige, Yoshifumi"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2021-12-02"}],"displaytype":"detail","filename":"JISIS11_3_1.pdf","filesize":[{"value":"280.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"JISIS11_3_1.pdf","url":"https://nagasaki-u.repo.nii.ac.jp/record/26910/files/JISIS11_3_1.pdf"},"version_id":"51ea9305-6d64-46d1-b980-8893d405d5fc"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"anonymous authentication","subitem_subject_scheme":"Other"},{"subitem_subject":"attribute","subitem_subject_scheme":"Other"},{"subitem_subject":"deniability","subitem_subject_scheme":"Other"},{"subitem_subject":"revocation","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Anonymous deniable predicate authentication scheme with revocability","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Anonymous deniable predicate authentication scheme with revocability"}]},"item_type_id":"2","owner":"6","path":["1214"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-12-02"},"publish_date":"2021-12-02","publish_status":"0","recid":"26910","relation_version_is_last":true,"title":["Anonymous deniable predicate authentication scheme with revocability"],"weko_creator_id":"6","weko_shared_id":-1},"updated":"2023-05-15T20:06:45.544136+00:00"}