{"id":"https://openalex.org/W4407097985","doi":"https://doi.org/10.23919/isita60732.2024.10858272","title":"Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification","display_name":"Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification","publication_year":2024,"publication_date":"2024-11-10","ids":{"openalex":"https://openalex.org/W4407097985","doi":"https://doi.org/10.23919/isita60732.2024.10858272"},"language":"en","primary_location":{"id":"doi:10.23919/isita60732.2024.10858272","is_oa":false,"landing_page_url":"https://doi.org/10.23919/isita60732.2024.10858272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Information Theory and Its Applications (ISITA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037312211","display_name":"Atsushi Fujioka","orcid":"https://orcid.org/0000-0001-8442-8116"},"institutions":[{"id":"https://openalex.org/I41802502","display_name":"Kanagawa University","ror":"https://ror.org/02j6c0d67","country_code":"JP","type":"education","lineage":["https://openalex.org/I41802502"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Atsushi Fujioka","raw_affiliation_strings":["Kanagawa University,Faculty of Informatics,Yokohama,Japan"],"affiliations":[{"raw_affiliation_string":"Kanagawa University,Faculty of Informatics,Yokohama,Japan","institution_ids":["https://openalex.org/I41802502"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023470018","display_name":"Keisuke Saito","orcid":"https://orcid.org/0000-0002-2293-9743"},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keisuke Saito","raw_affiliation_strings":["Graduate School of Engineering, Tokyo Denki University,Tokyo,Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Tokyo Denki University,Tokyo,Japan","institution_ids":["https://openalex.org/I165522056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053688793","display_name":"Taiichi Saito","orcid":"https://orcid.org/0000-0002-5016-9619"},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Taiichi Saito","raw_affiliation_strings":["Tokyo Denki University,Faculty of Engineering,Tokyo,Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Denki University,Faculty of Engineering,Tokyo,Japan","institution_ids":["https://openalex.org/I165522056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004419438","display_name":"Keita Xagawa","orcid":"https://orcid.org/0000-0002-6832-9940"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Keita Xagawa","raw_affiliation_strings":["Cryptography Research Center, Technology Innovation Institute,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Cryptography Research Center, Technology Innovation Institute,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I4210087059"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037312211"],"corresponding_institution_ids":["https://openalex.org/I41802502"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24588363,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"260","last_page":"265"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9190000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9190000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.662388801574707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6211632490158081},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5421025156974792},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34275197982788086},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.0743778645992279},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06488615274429321}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.662388801574707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6211632490158081},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5421025156974792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34275197982788086},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0743778645992279},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06488615274429321},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/isita60732.2024.10858272","is_oa":false,"landing_page_url":"https://doi.org/10.23919/isita60732.2024.10858272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Information Theory and Its Applications (ISITA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W81277724","https://openalex.org/W1519095911","https://openalex.org/W1565474650","https://openalex.org/W2067809562","https://openalex.org/W2069351704","https://openalex.org/W2142968417","https://openalex.org/W2167496998","https://openalex.org/W2193292528"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2348876715"],"abstract_inverted_index":{"This":[0],"paper":[1],"examines":[2],"a":[3,8,17,44,86,89],"security":[4,24],"enhancement":[5,25],"technique":[6,39,103],"from":[7],"passively":[9],"secure":[10,19],"hierarchical":[11],"identity-based":[12],"identification":[13,29],"(HIBI)":[14],"protocol":[15],"to":[16],"concurrently":[18],"one.":[20],"Two":[21],"types":[22],"of":[23,70],"techniques":[26],"for":[27],"the":[28,37,41,56,63,97,101],"protocols":[30],"have":[31],"been":[32,51,60,81],"proposed:":[33],"one":[34],"based":[35,99],"on":[36,100],"OR-proof":[38,102],"and":[40,66,76,93,106],"other":[42],"using":[43,88],"chameleon":[45,90],"hash":[46,91],"function.":[47],"The":[48],"former":[49],"has":[50,58,79],"examined":[52],"in":[53,62,73,104],"detail,":[54],"while":[55],"latter":[57],"not":[59,80],"formulated":[61],"HIBI":[64],"protocol,":[65],"its":[67],"close":[68],"evaluation":[69],"applicability,":[71],"especially":[72],"identity-selecting":[74],"settings,":[75],"reduction":[77,107],"efficiency":[78],"made":[82],"public.":[83],"We":[84],"describe":[85],"transformation":[87],"function":[92],"compare":[94],"it":[95],"with":[96],"others":[98],"applicability":[105],"efficiency.":[108]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
