{"id":"https://openalex.org/W7123336074","doi":"https://doi.org/10.1109/candarw68385.2025.00058","title":"Proposal of an Identity Verification System Using Trusted Execution Environment in the Japan\u2019s Digital Authentication App","display_name":"Proposal of an Identity Verification System Using Trusted Execution Environment in the Japan\u2019s Digital Authentication App","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W7123336074","doi":"https://doi.org/10.1109/candarw68385.2025.00058"},"language":null,"primary_location":{"id":"doi:10.1109/candarw68385.2025.00058","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw68385.2025.00058","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111185976","display_name":"Tomoki Yasui","orcid":null},"institutions":[{"id":"https://openalex.org/I113306721","display_name":"Hiroshima University","ror":"https://ror.org/03t78wx29","country_code":"JP","type":"education","lineage":["https://openalex.org/I113306721"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tomoki Yasui","raw_affiliation_strings":["Hiroshima University,Graduate School of Advanced Science and Engineering,Hiroshima,Japan"],"affiliations":[{"raw_affiliation_string":"Hiroshima University,Graduate School of Advanced Science and Engineering,Hiroshima,Japan","institution_ids":["https://openalex.org/I113306721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112133332","display_name":"H. Watanabe","orcid":null},"institutions":[{"id":"https://openalex.org/I113306721","display_name":"Hiroshima University","ror":"https://ror.org/03t78wx29","country_code":"JP","type":"education","lineage":["https://openalex.org/I113306721"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hidenobu Watanabe","raw_affiliation_strings":["Hiroshima University,Information Media Center,Hiroshima,Japan"],"affiliations":[{"raw_affiliation_string":"Hiroshima University,Information Media Center,Hiroshima,Japan","institution_ids":["https://openalex.org/I113306721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111185976"],"corresponding_institution_ids":["https://openalex.org/I113306721"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8235911,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"308","last_page":"313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.2305999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.2305999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.11060000211000443,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.09749999642372131,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.607699990272522},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5812000036239624},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4814000129699707},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.47760000824928284},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.45159998536109924},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.4413999915122986},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.4348999857902527},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4115000069141388},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.38199999928474426},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.37220001220703125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7387999892234802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6978999972343445},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.607699990272522},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5812000036239624},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4814000129699707},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.47760000824928284},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.45159998536109924},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.4413999915122986},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.4348999857902527},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4115000069141388},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.38199999928474426},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.37220001220703125},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.36959999799728394},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.33009999990463257},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.32580000162124634},{"id":"https://openalex.org/C80958533","wikidata":"https://www.wikidata.org/wiki/Q1047174","display_name":"Audit trail","level":3,"score":0.3199000060558319},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3172000050544739},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.3127000033855438},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3124000132083893},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3066999912261963},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.28839999437332153},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2874000072479248},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.27730000019073486},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.27090001106262207},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.26109999418258667},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C2780814629","wikidata":"https://www.wikidata.org/wiki/Q327353","display_name":"System administrator","level":2,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/candarw68385.2025.00058","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw68385.2025.00058","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41189971566200256,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"digital":[1,56,185,207],"identity":[2,68],"systems":[3],"continue":[4],"to":[5,82,203],"evolve,":[6],"ensuring":[7],"the":[8,18,71,87,92,96,110,123,126,137,211],"secure":[9,97],"handling":[10],"of":[11,49,99,125],"personal":[12,41],"data":[13],"and":[14,47,51,75,115,164,175,187,193,200],"authentication":[15,208],"tokens":[16],"on":[17],"service":[19,80,212],"provider":[20],"side":[21],"has":[22],"become":[23],"increasingly":[24,53],"critical.":[25],"Japan\u2019s":[26,63,152],"My":[27,72],"Number":[28,73],"Card":[29,74],"is":[30,52,128],"a":[31,146,198],"national":[32],"identification":[33],"card":[34],"that":[35,78,113,122,141],"contains":[36],"an":[37,129],"IC":[38],"chip":[39],"storing":[40],"information":[42,85,166],"such":[43,100],"as":[44],"name,":[45],"address,":[46],"date":[48],"birth,":[50],"used":[54],"for":[55,109],"services.":[57],"Digital":[58,64,93,153],"Authentication":[59,154],"App":[60,155],"provided":[61],"by":[62],"Agency":[65,94],"enables":[66],"online":[67],"verification":[69],"using":[70],"provides":[76],"APIs":[77],"allow":[79],"providers":[81],"access":[83,167],"user":[84,165],"with":[86,151,184],"user\u2019s":[88],"consent.":[89],"However,":[90],"while":[91],"mandates":[95],"management":[98],"data,":[101],"it":[102],"does":[103],"not":[104],"prescribe":[105],"concrete":[106],"technical":[107],"countermeasures":[108,127],"server-side":[111,139],"environments":[112],"process":[114],"store":[116],"this":[117,133],"sensitive":[118],"information.":[119],"We":[120],"think":[121],"lack":[124],"issue.":[130],"To":[131],"address":[132],"issue,":[134],"we":[135],"propose":[136],"first":[138],"architecture":[140,196],"integrates":[142],"AWS":[143],"Nitro":[144],"Enclaves,":[145],"Trusted":[147],"Execution":[148],"Environment":[149],"(TEE),":[150],"APIs.":[156],"Our":[157],"system":[158],"confines":[159],"OpenID":[160],"Connect(OIDC)":[161],"token":[162],"validation":[163],"entirely":[168],"within":[169],"TEE,":[170],"thereby":[171],"resisting":[172],"insider":[173],"threats":[174],"compromised":[176],"operating":[177],"systems.":[178],"Furthermore,":[179],"audit":[180],"logs":[181],"are":[182],"protected":[183],"signatures":[186],"hash":[188],"chaining,":[189],"enabling":[190],"verifiable":[191],"integrity":[192],"non-repudiation.":[194],"This":[195],"demonstrates":[197],"practical":[199],"scalable":[201],"approach":[202],"strengthening":[204],"trust":[205],"in":[206],"services":[209],"from":[210],"provider\u2019s":[213],"perspective.":[214]},"counts_by_year":[],"updated_date":"2026-01-14T00:46:21.520733","created_date":"2026-01-14T00:00:00"}
