{"id":"https://openalex.org/W2018327668","doi":"https://doi.org/10.1145/1128817.1128868","title":"Digitally signed document sanitizing scheme based on bilinear maps","display_name":"Digitally signed document sanitizing scheme based on bilinear maps","publication_year":2006,"publication_date":"2006-03-21","ids":{"openalex":"https://openalex.org/W2018327668","doi":"https://doi.org/10.1145/1128817.1128868","mag":"2018327668"},"language":"en","primary_location":{"id":"doi:10.1145/1128817.1128868","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108724994","display_name":"Kunihiko Miyazaki","orcid":null},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kunihiko Miyazaki","raw_affiliation_strings":["University of Tokyo","university of Tokyo;"],"affiliations":[{"raw_affiliation_string":"University of Tokyo","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"university of Tokyo;","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047836988","display_name":"Goichiro Hanaoka","orcid":"https://orcid.org/0000-0001-6617-2962"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Goichiro Hanaoka","raw_affiliation_strings":["University of Tokyo","university of Tokyo;"],"affiliations":[{"raw_affiliation_string":"University of Tokyo","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"university of Tokyo;","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102059792","display_name":"Hideki Imai","orcid":null},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Imai","raw_affiliation_strings":["University of Tokyo","university of Tokyo;"],"affiliations":[{"raw_affiliation_string":"University of Tokyo","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"university of Tokyo;","institution_ids":["https://openalex.org/I74801974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108724994"],"corresponding_institution_ids":["https://openalex.org/I74801974"],"apc_list":null,"apc_paid":null,"fwci":6.7773,"has_fulltext":false,"cited_by_count":94,"citation_normalized_percentile":{"value":0.96539679,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"343","last_page":"354"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6551830768585205},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6476573944091797},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6186681389808655},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5601060390472412},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5428083539009094},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5230758786201477},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.5217610001564026},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.504046618938446},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.484094500541687},{"id":"https://openalex.org/keywords/information-protection-policy","display_name":"Information protection policy","score":0.43682989478111267},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4219139516353607},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3361535370349884},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12658405303955078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6551830768585205},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6476573944091797},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6186681389808655},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5601060390472412},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5428083539009094},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5230758786201477},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.5217610001564026},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.504046618938446},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.484094500541687},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.43682989478111267},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4219139516353607},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3361535370349884},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12658405303955078},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1128817.1128868","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W104938420","https://openalex.org/W1495420427","https://openalex.org/W1534388293","https://openalex.org/W1575180522","https://openalex.org/W1589034595","https://openalex.org/W1594668186","https://openalex.org/W1595153681","https://openalex.org/W1599846125","https://openalex.org/W1607933920","https://openalex.org/W1610688607","https://openalex.org/W1788452017","https://openalex.org/W2054847439","https://openalex.org/W2056579313","https://openalex.org/W2095708839","https://openalex.org/W2096472369","https://openalex.org/W2108834246","https://openalex.org/W2147104527","https://openalex.org/W2148509425","https://openalex.org/W2151413173","https://openalex.org/W2152924492","https://openalex.org/W2162653919","https://openalex.org/W2915032814","https://openalex.org/W3154896280","https://openalex.org/W4210300416"],"related_works":["https://openalex.org/W3095664371","https://openalex.org/W4288075818","https://openalex.org/W189451467","https://openalex.org/W2352435628","https://openalex.org/W3200138464","https://openalex.org/W2077568170","https://openalex.org/W4312820970","https://openalex.org/W2143793665","https://openalex.org/W193795775","https://openalex.org/W4312048544"],"abstract_inverted_index":{"A":[0],"digital":[1,88,129],"signature":[2,89,179],"does":[3],"not":[4],"allow":[5],"any":[6],"alteration":[7,17],"of":[8,18,35,41,107,112,121,162],"the":[9,33,36,39,86,91,95,105,119,128,153,160,177],"document":[10,60,130,143,168],"to":[11,103],"which":[12],"it":[13,72,99],"is":[14,55,61,73,81,115,126,174],"attached.":[15],"Appropriate":[16],"some":[19],"signed":[20,142,167],"documents,":[21],"however,":[22],"should":[23],"be":[24,69],"allowed":[25],"because":[26,98],"there":[27],"are":[28],"security":[29],"requirements":[30],"other":[31],"than":[32],"integrity":[34,120],"document.":[37],"In":[38],"disclosure":[40,80,147,156],"official":[42,59,113],"information,":[43,123],"for":[44],"example,":[45],"sensitive":[46,108],"information":[47,51,67,97,114],"such":[48,135],"as":[49,136],"personal":[50],"or":[52,158],"national":[53],"secrets":[54],"masked":[56],"when":[57,71],"an":[58],"sanitized":[62,163],"so":[63],"that":[64,122],"its":[65],"nonsensitive":[66],"can":[68,150,185],"disclosed":[70,96],"requested":[74],"by":[75,84],"a":[76],"citizen.":[77],"If":[78],"this":[79,125],"done":[82],"digitally":[83,141,166],"using":[85],"current":[87],"schemes,":[90],"citizen":[92],"cannot":[93],"verify":[94],"has":[100],"been":[101],"altered":[102],"prevent":[104],"leakage":[106],"information.":[109],"The":[110,165],"confidentiality":[111],"thus":[116],"incompatible":[117],"with":[118,146],"and":[124,140,184],"called":[127],"sanitizing":[131,144,169],"problem.":[132],"Conventional":[133],"solutions":[134],"content":[137],"extraction":[138],"signatures":[139],"schemes":[145],"condition":[148],"control":[149],"either":[151],"let":[152],"sanitizer":[154],"assign":[155],"conditions":[157],"hide":[159],"number":[161],"portions.":[164],"scheme":[170],"we":[171],"propose":[172],"here":[173],"based":[175],"on":[176],"aggregate":[178],"derived":[180],"from":[181],"bilinear":[182],"maps":[183],"do":[186],"both.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
