{"id":"https://openalex.org/W2170821409","doi":"https://doi.org/10.1002/scj.4690220901","title":"Construction and evaluation of the identity transformers for cryptographic key distribution","display_name":"Construction and evaluation of the identity transformers for cryptographic key distribution","publication_year":1991,"publication_date":"1991-01-01","ids":{"openalex":"https://openalex.org/W2170821409","doi":"https://doi.org/10.1002/scj.4690220901","mag":"2170821409"},"language":"en","primary_location":{"id":"doi:10.1002/scj.4690220901","is_oa":false,"landing_page_url":"https://doi.org/10.1002/scj.4690220901","pdf_url":null,"source":{"id":"https://openalex.org/S58208175","display_name":"Systems and Computers in Japan","issn_l":"0882-1666","issn":["0882-1666","1520-684X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Systems and Computers in Japan","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108109302","display_name":"Tsutomu Matsumoto","orcid":null},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]},{"id":"https://openalex.org/I4210158551","display_name":"Societ\u00e0 Italiana Trasporti Automobilistici (Italy)","ror":"https://ror.org/04gpr3c11","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210158551"]}],"countries":["CN","IT","JP"],"is_corresponding":true,"raw_author_name":"Tsutomu Matsumoto","raw_affiliation_strings":["Faculty of Engineering, Yokohama National University, Yokohama, Japan 240","Tsutomu Matsumoto obtained a Dr.of Eng.degree in 1986 from the University of Tokyo.Since then he has been affiliated with the Dept.Electronic Inf.,Fac. Eng.,Yokohama Nat.Univesity ,where he is presently an Assoc.Prof.He is interested in general aspects of the algorithm.He is engaged mostly in research on basis of information security (basic theory of cryptography,computational complexity,combinational theory,and cryptography processing hardware ) as well as its applications (IC card,electronic cashing , pay broadcast, and software protection ).Heis a member of ACM;IACR;IEEE;IPSJ;and SITA","Tsutomu Matsumoto obtained a Dr.of Eng.degree in 1986 from the University of Tokyo.Since then he has been affiliated with the Dept.Electronic Inf.,Fac. Eng.,Yokohama Nat.Univesity ,where he is presently an Assoc.Prof.He is interested in general aspects of the algorithm.He is engaged mostly in research on basis of information security (basic theory of cryptography,computational complexity,combinational theory,and cryptography processing hardware ) as well as its applications (IC card,electronic cashing , pay broadcast, and software protection ).Heis a member of ACM","SITA"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Yokohama National University, Yokohama, Japan 240","institution_ids":["https://openalex.org/I180203408"]},{"raw_affiliation_string":"Tsutomu Matsumoto obtained a Dr.of Eng.degree in 1986 from the University of Tokyo.Since then he has been affiliated with the Dept.Electronic Inf.,Fac. Eng.,Yokohama Nat.Univesity ,where he is presently an Assoc.Prof.He is interested in general aspects of the algorithm.He is engaged mostly in research on basis of information security (basic theory of cryptography,computational complexity,combinational theory,and cryptography processing hardware ) as well as its applications (IC card,electronic cashing , pay broadcast, and software protection ).Heis a member of ACM;IACR;IEEE;IPSJ;and SITA","institution_ids":[]},{"raw_affiliation_string":"Tsutomu Matsumoto obtained a Dr.of Eng.degree in 1986 from the University of Tokyo.Since then he has been affiliated with the Dept.Electronic Inf.,Fac. Eng.,Yokohama Nat.Univesity ,where he is presently an Assoc.Prof.He is interested in general aspects of the algorithm.He is engaged mostly in research on basis of information security (basic theory of cryptography,computational complexity,combinational theory,and cryptography processing hardware ) as well as its applications (IC card,electronic cashing , pay broadcast, and software protection ).Heis a member of ACM","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I74801974"]},{"raw_affiliation_string":"SITA","institution_ids":["https://openalex.org/I4210158551"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112602963","display_name":"Youichi Takashima","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Youichi Takashima","raw_affiliation_strings":["Faculty of Engineering, Yokohama National University, Yokohama, Japan 240","Yoichi Takashima graduated in 1985 from the Dept.Inf.Eng., Fac.Eng., Yokohama Nat.Univesity , where he is currently in the doctoral program in Electronic Inf.Eng. He is engaged in research on cryptography processing hardware,basic theory of cryptography and cryptographic protocol. He is a member of the Soc.Inf.Theory and Appl. and of IEEE"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Yokohama National University, Yokohama, Japan 240","institution_ids":["https://openalex.org/I180203408"]},{"raw_affiliation_string":"Yoichi Takashima graduated in 1985 from the Dept.Inf.Eng., Fac.Eng., Yokohama Nat.Univesity , where he is currently in the doctoral program in Electronic Inf.Eng. He is engaged in research on cryptography processing hardware,basic theory of cryptography and cryptographic protocol. He is a member of the Soc.Inf.Theory and Appl. and of IEEE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036130196","display_name":"Hideki Iraai","orcid":null},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]},{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Iraai","raw_affiliation_strings":["Faculty of Engineering, Yokohama National University, Yokohama, Japan 240","Hideki Imai graduated in 1966 from the Dept.Electronic Eng., Fac.Eng.,University of Tokyo,where he obtained a Dr.of Eng.degree in 1971.He was a Lecturer in 1971, Associate Professor in 1972 (Electrical Eng.),and Professor in 1984 in Electrical Inf.,Fac.Eng.,Yokohama Nat.University.He is engaged in research on theory of code and its applications, digital signal processing ,data compression, information security and communication systems.He received the Publ.Award in 1975 from I.E.C.E.,Japan , and is the author of Theory of Code,Theory of Information Code, Information Mathematics and Information Theory. He is a member of IEEJ; Inf. Proc. Soc. Jap.; TV Soc. Jap.; Jap. Soc. Secur. Ma.; Soc. Inf. Theory and Appl.; and IEEE","IEEE","Hideki Imai graduated in 1966 from the Dept.Electronic Eng., Fac.Eng.,University of Tokyo,where he obtained a Dr.of Eng.degree in 1971.He was a Lecturer in 1971, Associate Professor in 1972 (Electrical Eng.),and Professor in 1984 in Electrical Inf.,Fac.Eng.,Yokohama Nat.University.He is engaged in research on theory of code and its applications, digital signal processing ,data compression, information security and communication systems.He received the Publ.Award in 1975 from I.E.C.E.,Japan , and is the author of Theory of Code,Theory of Information Code, Information Mathematics and Information Theory. He is a member of IEEJ","Jap. Soc. Secur. Ma","TV Soc. Jap","Soc. Inf. Theory and Appl","Inf. Proc. Soc. Jap"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Yokohama National University, Yokohama, Japan 240","institution_ids":["https://openalex.org/I180203408"]},{"raw_affiliation_string":"Hideki Imai graduated in 1966 from the Dept.Electronic Eng., Fac.Eng.,University of Tokyo,where he obtained a Dr.of Eng.degree in 1971.He was a Lecturer in 1971, Associate Professor in 1972 (Electrical Eng.),and Professor in 1984 in Electrical Inf.,Fac.Eng.,Yokohama Nat.University.He is engaged in research on theory of code and its applications, digital signal processing ,data compression, information security and communication systems.He received the Publ.Award in 1975 from I.E.C.E.,Japan , and is the author of Theory of Code,Theory of Information Code, Information Mathematics and Information Theory. He is a member of IEEJ; Inf. Proc. Soc. Jap.; TV Soc. Jap.; Jap. Soc. Secur. Ma.; Soc. Inf. Theory and Appl.; and IEEE","institution_ids":[]},{"raw_affiliation_string":"IEEE","institution_ids":[]},{"raw_affiliation_string":"Hideki Imai graduated in 1966 from the Dept.Electronic Eng., Fac.Eng.,University of Tokyo,where he obtained a Dr.of Eng.degree in 1971.He was a Lecturer in 1971, Associate Professor in 1972 (Electrical Eng.),and Professor in 1984 in Electrical Inf.,Fac.Eng.,Yokohama Nat.University.He is engaged in research on theory of code and its applications, digital signal processing ,data compression, information security and communication systems.He received the Publ.Award in 1975 from I.E.C.E.,Japan , and is the author of Theory of Code,Theory of Information Code, Information Mathematics and Information Theory. He is a member of IEEJ","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"Jap. Soc. Secur. Ma","institution_ids":[]},{"raw_affiliation_string":"TV Soc. Jap","institution_ids":[]},{"raw_affiliation_string":"Soc. Inf. Theory and Appl","institution_ids":[]},{"raw_affiliation_string":"Inf. Proc. Soc. Jap","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108109302"],"corresponding_institution_ids":["https://openalex.org/I180203408","https://openalex.org/I4210132990","https://openalex.org/I4210158551","https://openalex.org/I74801974"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28076117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"9","first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6465317010879517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6139885783195496},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.605510413646698},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4987361431121826},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4726402163505554},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4528059959411621},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4465567171573639},{"id":"https://openalex.org/keywords/injective-function","display_name":"Injective function","score":0.41397011280059814},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41389191150665283},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3919408321380615},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2535666823387146},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16971564292907715},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.14141172170639038},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09127569198608398}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6465317010879517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6139885783195496},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.605510413646698},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4987361431121826},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4726402163505554},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4528059959411621},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4465567171573639},{"id":"https://openalex.org/C128107574","wikidata":"https://www.wikidata.org/wiki/Q182003","display_name":"Injective function","level":2,"score":0.41397011280059814},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41389191150665283},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3919408321380615},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2535666823387146},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16971564292907715},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.14141172170639038},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09127569198608398},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/scj.4690220901","is_oa":false,"landing_page_url":"https://doi.org/10.1002/scj.4690220901","pdf_url":null,"source":{"id":"https://openalex.org/S58208175","display_name":"Systems and Computers in Japan","issn_l":"0882-1666","issn":["0882-1666","1520-684X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Systems and Computers in Japan","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1974152067","https://openalex.org/W1996360405","https://openalex.org/W2156186849","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2906312651","https://openalex.org/W4280526795","https://openalex.org/W1980134735","https://openalex.org/W783558444","https://openalex.org/W2554901794","https://openalex.org/W767161385","https://openalex.org/W2108355720","https://openalex.org/W3203834545","https://openalex.org/W2362653998","https://openalex.org/W2992521683"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"paper":[2],"describes":[3],"the":[4,11,32,98,112,124,128,141,148],"key":[5,15],"predistribution":[6],"system":[7],"(KPS)":[8],"which":[9,28,48],"simplifies":[10],"use":[12],"of":[13,34,131,138,140],"public":[14],"cryptography":[16],"in":[17,31,64,90,119],"a":[18,37,50,54,65,75,81,136],"large\u2010scale":[19],"complex":[20],"network.":[21],"The":[22],"identity":[23],"(ID)":[24],"transformer":[25,114],"R":[26,44,61,86,95],",":[27],"is":[29,40,45,58,87,101,109,145,151],"needed":[30],"realization":[33],"KPS":[35],"by":[36,68],"linear":[38],"scheme,":[39],"proposed":[41],"and":[42,72,77,107],"evaluated;":[43],"an":[46,69],"algorithm":[47,115,126],"transforms":[49],"short":[51],"vector":[52],"into":[53],"long":[55],"vector.":[56],"It":[57],"desired":[59],"that":[60,111,147],"be":[62,117],"executed":[63,118],"simple":[66],"way":[67],"IC":[70],"card":[71],"can":[73,116],"realize":[74,84],"one\u2010way":[76,125],"random":[78,149],"injective":[79],"function;":[80],"method":[82],"to":[83],"such":[85],"discussed":[88],"fully":[89],"this":[91],"paper.":[92],"An":[93],"example":[94],"1":[96],"with":[97,127],"specified":[99],"parameters":[100],"realized":[102],"using":[103,123],"8":[104],"bit":[105],"CPU,":[106],"it":[108,144],"verified":[110,146],"ID":[113],"approximately":[120,132],"0.4":[121],"s,":[122],"processing":[129],"speed":[130],"50":[133],"kbit/s.":[134],"As":[135],"result":[137],"evaluation":[139],"statistical":[142],"randomness,":[143],"condition":[150],"satisfied.":[152]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
