{"id":"https://openalex.org/W4386066437","doi":"https://doi.org/10.1109/isit54713.2023.10206812","title":"Information-theoretically secure equality-testing protocol with dispute resolution","display_name":"Information-theoretically secure equality-testing protocol with dispute resolution","publication_year":2023,"publication_date":"2023-06-25","ids":{"openalex":"https://openalex.org/W4386066437","doi":"https://doi.org/10.1109/isit54713.2023.10206812"},"language":"en","primary_location":{"id":"doi:10.1109/isit54713.2023.10206812","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isit54713.2023.10206812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012318496","display_name":"Go Kato","orcid":"https://orcid.org/0000-0001-5030-5230"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Go Kato","raw_affiliation_strings":["National Institute of Information and Communications Technology (NICT),Tokyo,Japan,184-8795"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology (NICT),Tokyo,Japan,184-8795","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088879964","display_name":"Mikio Fujiwara","orcid":"https://orcid.org/0000-0003-1553-0154"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mikio Fujiwara","raw_affiliation_strings":["National Institute of Information and Communications Technology (NICT),Tokyo,Japan,184-8795"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology (NICT),Tokyo,Japan,184-8795","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044733765","display_name":"Toyohiro Tsurumaru","orcid":"https://orcid.org/0000-0002-3768-0455"},"institutions":[{"id":"https://openalex.org/I4210133125","display_name":"Mitsubishi Electric (Japan)","ror":"https://ror.org/033y26782","country_code":"JP","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toyohiro Tsurumaru","raw_affiliation_strings":["Mitsubishi Electric Corporation,Information Technology R&amp;D Center,Kanagawa,Japan,247-8501"],"affiliations":[{"raw_affiliation_string":"Mitsubishi Electric Corporation,Information Technology R&amp;D Center,Kanagawa,Japan,247-8501","institution_ids":["https://openalex.org/I4210133125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012318496"],"corresponding_institution_ids":["https://openalex.org/I90023481"],"apc_list":null,"apc_paid":null,"fwci":0.1746,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55217438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"472","last_page":"476"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7640625834465027},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6470266580581665},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5813608765602112},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.5160698294639587},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.48464900255203247},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44994276762008667},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38806983828544617}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7640625834465027},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6470266580581665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5813608765602112},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.5160698294639587},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.48464900255203247},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44994276762008667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38806983828544617},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit54713.2023.10206812","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isit54713.2023.10206812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1517010141","https://openalex.org/W1544221491","https://openalex.org/W1555086428","https://openalex.org/W1559913718","https://openalex.org/W1576564521","https://openalex.org/W2003762972","https://openalex.org/W2096470138","https://openalex.org/W2562444902","https://openalex.org/W4206042935","https://openalex.org/W4386066437"],"related_works":["https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2730112582","https://openalex.org/W2389700813","https://openalex.org/W2355463992","https://openalex.org/W2347377877","https://openalex.org/W2386248637","https://openalex.org/W2373409667","https://openalex.org/W2378698089","https://openalex.org/W2388515576"],"abstract_inverted_index":{"There":[0],"are":[1],"often":[2],"situations":[3],"where":[4,42,54],"two":[5,33,81],"remote":[6,64],"users":[7,82],"each":[8],"have":[9,56],"data,":[10,20,74],"and":[11,21,60,66,127,164,203],"wish":[12],"to":[13,45,84,91,136],"(i)":[14],"verify":[15],"the":[16,32,80,147,165,175,184,187],"equality":[17,185],"of":[18,31,79,177,186],"their":[19,73],"(ii)":[22],"whenever":[23,67],"a":[24,57,68,154,178],"discrepancy":[25,69],"is":[26,41,53,70,83,89,113,171,200],"found":[27,71],"afterwards,":[28],"determine":[29,77],"which":[30,78],"modified":[34],"his":[35],"data.":[36,188],"The":[37,157],"most":[38,158],"common":[39],"example":[40,52],"they":[43,48,55,75],"want":[44],"authenticate":[46],"messages":[47],"exchange.":[49],"Another":[50],"possible":[51],"huge":[58],"database":[59],"its":[61],"mirror":[62],"in":[63],"places,":[65],"between":[72,161],"can":[76,97],"blame.Of":[85],"course,":[86],"if":[87,107],"one":[88,108],"allowed":[90],"use":[92],"computational":[93],"assumptions,":[94],"this":[95,119,138,190],"function":[96,120,139],"be":[98],"realized":[99],"readily,":[100],"e.g.,":[101],"by":[102],"using":[103],"digital":[104],"signatures.":[105],"However,":[106],"needs":[109],"information-theoretic":[110,142],"security,":[111,143],"there":[112],"no":[114],"known":[115],"method":[116],"that":[117,172,199],"realizes":[118],"efficiently,":[121],"i.e.,":[122],"with":[123,141,150,168],"secret":[124],"key,":[125],"communication,":[126],"trusted":[128,179],"third":[129,180],"parties":[130],"all":[131],"being":[132],"sufficiently":[133],"small.In":[134],"order":[135],"realize":[137],"efficiently":[140],"we":[144,173,193],"here":[145],"define":[146],"\"equality-testing":[148],"protocol":[149,163,198],"dispute":[151],"resolution\"":[152],"as":[153],"new":[155,191],"framework.":[156],"significant":[159],"difference":[160],"our":[162],"previous":[166],"methods":[167],"similar":[169],"functions":[170],"allow":[174],"intervention":[176],"party":[181],"when":[182],"checking":[183],"In":[189],"framework,":[192],"also":[194],"present":[195],"an":[196],"explicit":[197],"information-theoretically":[201],"secure":[202],"efficient.":[204]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
