{"id":"https://openalex.org/W2068655481","doi":"https://doi.org/10.1002/scj.4690200909","title":"A Cryptographic Key Distribution Mechanism Using Double Encryption for Secret Communications","display_name":"A Cryptographic Key Distribution Mechanism Using Double Encryption for Secret Communications","publication_year":1989,"publication_date":"1989-01-01","ids":{"openalex":"https://openalex.org/W2068655481","doi":"https://doi.org/10.1002/scj.4690200909","mag":"2068655481"},"language":"en","primary_location":{"id":"doi:10.1002/scj.4690200909","is_oa":false,"landing_page_url":"https://doi.org/10.1002/scj.4690200909","pdf_url":null,"source":{"id":"https://openalex.org/S58208175","display_name":"Systems and Computers in Japan","issn_l":"0882-1666","issn":["0882-1666","1520-684X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Systems and Computers in Japan","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067030910","display_name":"Tetsuji Kobayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]},{"id":"https://openalex.org/I4387930200","display_name":"Information Processing Society of Japan","ror":"https://ror.org/02v970d04","country_code":null,"type":"nonprofit","lineage":["https://openalex.org/I4387930200"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tetsuji Kobayashi","raw_affiliation_strings":["NTT Communications and Information Processing Laboratories, Yokosuka, Japan 238","Tetsuji Kobayashi received B.E. and M.E. degrees from Waseda University, Tokyo, Japan, in 1970 and 1972, respectively. Since joining Nippon Telegraph and Telephone Corporation (NTT) in 1972, he has been engaged in the research and development of computer operating systems, communication protocols, and communication security technology. Mr. Kobayashi is a member of the Institute of Electronics, Information and Communication Engineers of Japan; Information Processing Society of Japan; IEEE; and ACM","Tetsuji Kobayashi received B.E. and M.E. degrees from Waseda University, Tokyo, Japan, in 1970 and 1972, respectively. Since joining Nippon Telegraph and Telephone Corporation (NTT) in 1972, he has been engaged in the research and development of computer operating systems, communication protocols, and communication security technology. Mr. Kobayashi is a member of the Institute of Electronics, Information and Communication Engineers of Japan","Information Processing Society of Japan"],"affiliations":[{"raw_affiliation_string":"NTT Communications and Information Processing Laboratories, Yokosuka, Japan 238","institution_ids":["https://openalex.org/I2251713219"]},{"raw_affiliation_string":"Tetsuji Kobayashi received B.E. and M.E. degrees from Waseda University, Tokyo, Japan, in 1970 and 1972, respectively. Since joining Nippon Telegraph and Telephone Corporation (NTT) in 1972, he has been engaged in the research and development of computer operating systems, communication protocols, and communication security technology. Mr. Kobayashi is a member of the Institute of Electronics, Information and Communication Engineers of Japan; Information Processing Society of Japan; IEEE; and ACM","institution_ids":[]},{"raw_affiliation_string":"Tetsuji Kobayashi received B.E. and M.E. degrees from Waseda University, Tokyo, Japan, in 1970 and 1972, respectively. Since joining Nippon Telegraph and Telephone Corporation (NTT) in 1972, he has been engaged in the research and development of computer operating systems, communication protocols, and communication security technology. Mr. Kobayashi is a member of the Institute of Electronics, Information and Communication Engineers of Japan","institution_ids":["https://openalex.org/I2251713219"]},{"raw_affiliation_string":"Information Processing Society of Japan","institution_ids":["https://openalex.org/I4387930200"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5067030910"],"corresponding_institution_ids":["https://openalex.org/I2251713219","https://openalex.org/I4387930200"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.23384876,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"20","issue":"9","first_page":"89","last_page":"99"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9609000086784363,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.8483154773712158},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.645497739315033},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.628490686416626},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5959300994873047},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5682342648506165},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5545823574066162},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5417149662971497},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4966204762458801},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.4190746247768402},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4029543399810791},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3906469941139221},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3566519021987915},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.294173002243042}],"concepts":[{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.8483154773712158},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.645497739315033},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.628490686416626},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5959300994873047},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5682342648506165},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5545823574066162},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5417149662971497},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4966204762458801},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.4190746247768402},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4029543399810791},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3906469941139221},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3566519021987915},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.294173002243042}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/scj.4690200909","is_oa":false,"landing_page_url":"https://doi.org/10.1002/scj.4690200909","pdf_url":null,"source":{"id":"https://openalex.org/S58208175","display_name":"Systems and Computers in Japan","issn_l":"0882-1666","issn":["0882-1666","1520-684X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Systems and Computers in Japan","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1939815730","https://openalex.org/W1981455414","https://openalex.org/W1996360405","https://openalex.org/W2083013860","https://openalex.org/W2088091599","https://openalex.org/W2156186849","https://openalex.org/W2203317094","https://openalex.org/W2320115120","https://openalex.org/W4232836212","https://openalex.org/W4232883777"],"related_works":["https://openalex.org/W2350007300","https://openalex.org/W4229602839","https://openalex.org/W2241715175","https://openalex.org/W783558444","https://openalex.org/W2089253004","https://openalex.org/W2114712434","https://openalex.org/W3094714434","https://openalex.org/W2075972269","https://openalex.org/W2952781863","https://openalex.org/W2113976983"],"abstract_inverted_index":{"Abstract":[0],"Cryptographic":[1],"key":[2,37,40,49,51,60,66,77,87,93,103,124,134,149,155,177],"distribution":[3,20,41,61,78,88,104,125,135,150],"is":[4,14,71,98,116,127,180],"one":[5],"of":[6,131],"the":[7,48,83,123,132,165,171,187],"important":[8],"problems":[9],"when":[10],"a":[11,28,35,44,64,76,91,100,117,153],"conventional":[12,29,45],"cipher":[13,30,46],"used":[15],"for":[16,122,170,182],"secret":[17],"communications.":[18],"Key":[19],"methods":[21,42,62,89,151],"can":[22,161],"be":[23,53],"categorized":[24],"as":[25,86,138],"those":[26,33],"using":[27,34,43,63,90,152],"system":[31],"and":[32,106,142,163,167],"public":[36,65,92,154],"system.":[38,94,156],"In":[39,59],"system,":[47,67],"encryption":[50,102,166],"should":[52],"sent":[54],"secretly":[55],"by":[56],"manual":[57,69],"operation.":[58],"no":[68],"operation":[70],"necessary.":[72],"This":[73],"paper":[74],"proposes":[75],"method":[79,97,105,126,136],"(mechanism)":[80],"which":[81],"has":[82],"same":[84],"functions":[85],"The":[95,119,129],"proposed":[96,133],"called":[99],"double":[101],"uses":[107],"modular":[108,172],"exponential":[109,173],"computation":[110],"in":[111,175],"GF(p)":[112],",":[113],"where":[114],"p":[115],"prime.":[118],"authentication":[120],"scheme":[121],"shown.":[128],"advantages":[130],"are":[137,144],"follows.":[139],"Functions,":[140],"performance":[141],"security":[143],"almost":[145],"equal":[146],"to":[147,185],"main":[148],"Additionally,":[157],"since":[158],"each":[159,176,183],"node":[160,184],"generate":[162],"delete":[164],"decryption":[168],"keys":[169],"function":[174],"distribution,":[178],"it":[179],"unnecessary":[181],"keep":[186],"keys.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
