{"created":"2023-07-27T06:25:38.455105+00:00","id":9019,"links":{},"metadata":{"_buckets":{"deposit":"937d0694-af9e-4a06-a5b3-61c3a7d84907"},"_deposit":{"created_by":3,"id":"9019","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"9019"},"status":"published"},"_oai":{"id":"oai:kanazawa-u.repo.nii.ac.jp:00009019","sets":["934:935:936"]},"author_link":["12812","12814","12813","12811"],"item_4_biblio_info_8":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2014-01-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicPageEnd":"375","bibliographicPageStart":"366","bibliographicVolumeNumber":"22","bibliographic_titles":[{"bibliographic_title":"Journal of Information Processing"}]}]},"item_4_description_21":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Ordered multisignature scheme is a signature scheme to guarantee both validity of an electronic document and its signing order. Although the security of most of such schemes has been proven in the random oracle model, the difficulty of implementation of the random oracle implies that the security should be proven without random oracles, i.e., in the standard model. A straightforward way to construct such schemes in the standard model is to apply aggregate signature schemes. However, the existing schemes based on the CDH problem are inefficient in the sense that the number of computations of the bilinear maps and the length of public keys depend upon the length of (a hash value of) the message. Therefore, in this paper, we propose a CDH-based ordered multisignature scheme which is provably secure in the standard model under a moderate attack model. Its computational cost for the bilinear maps and the size of public key are independent of the length of (a hash value of) the message. More specifically, in comparison with the existing schemes, the public key length is reduced to three group elements from 512 group elements while the computational cost is reduced to 0.85 msec from 1.6 msec. © 2014 Information Processing Society of Japan.","subitem_description_type":"Abstract"}]},"item_4_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Information Processing Society of Japan = 情報処理学会"}]},"item_4_relation_12":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.2197/ipsjjip.22.366","subitem_relation_type_select":"DOI"}}]},"item_4_relation_28":{"attribute_name":"関連URI","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://www.jstage.jst.go.jp/browse/ipsjjip","subitem_relation_type_select":"URI"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://www.ipsj.or.jp/","subitem_relation_type_select":"URI"}}]},"item_4_rights_23":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright © 2014 by the Information Processing Society of Japan"}]},"item_4_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-6652","subitem_source_identifier_type":"ISSN"}]},"item_4_version_type_25":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yanai, Naoto"}],"nameIdentifiers":[{"nameIdentifier":"12811","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Chida, Eikoh"}],"nameIdentifiers":[{"nameIdentifier":"12812","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Mambo, Masahiro"}],"nameIdentifiers":[{"nameIdentifier":"12813","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60251972","nameIdentifierScheme":"金沢大学研究者情報","nameIdentifierURI":"http://ridb.kanazawa-u.ac.jp/public/detail.php?kaken=60251972"},{"nameIdentifier":"60251972","nameIdentifierScheme":"研究者番号","nameIdentifierURI":"https://nrid.nii.ac.jp/nrid/1000060251972"}]},{"creatorNames":[{"creatorName":"Okamoto, Eiji"}],"nameIdentifiers":[{"nameIdentifier":"12814","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-10-03"}],"displaytype":"detail","filename":"TE-PR-MAMBO-M-366.pdf","filesize":[{"value":"434.8 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"TE-PR-MAMBO-M-366.pdf","url":"https://kanazawa-u.repo.nii.ac.jp/record/9019/files/TE-PR-MAMBO-M-366.pdf"},"version_id":"db0cf9c5-cada-4aa5-93ee-4e76da045243"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"A CDH-based ordered multisignature scheme provably secure without random oracles","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A CDH-based ordered multisignature scheme provably secure without random oracles"}]},"item_type_id":"4","owner":"3","path":["936"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-10-03"},"publish_date":"2017-10-03","publish_status":"0","recid":"9019","relation_version_is_last":true,"title":["A CDH-based ordered multisignature scheme provably secure without random oracles"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-06-20T06:14:57.544934+00:00"}