{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:30:29Z","timestamp":1761323429652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128868","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"343-354","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["Digitally signed document sanitizing scheme based on bilinear maps"],"prefix":"10.1145","author":[{"given":"Kunihiko","family":"Miyazaki","sequence":"first","affiliation":[{"name":"University of Tokyo"}]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[{"name":"University of Tokyo"}]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[{"name":"University of Tokyo"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_10"},{"key":"e_1_3_2_1_2_1","unstructured":"G.\n      Ateniese\n     and \n      B.\n      de Medeiros \"On the key-exposure problem in chameleon hashes \" In \n      SCN\n     '04 volume \n  3352\n   of \n  LNCS Berlin Springer--\n  Verlag 2004\n  .]]  G. Ateniese and B. de Medeiros \"On the key-exposure problem in chameleon hashes \" In SCN '04 volume 3352 of LNCS Berlin Springer--Verlag 2004.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"M.\n      Bellare\n     and \n      P.\n      Rogaway \"\n  The exact security of digital signatures: How to sign with RSA and Rabin \" In Eurocrypt'96 volume \n  1070\n   of \n  LNCS pp. \n  399\n  --\n  416 Berlin Springer--\n  Verlag 1996\n  .]]  M. Bellare and P. Rogaway \"The exact security of digital signatures: How to sign with RSA and Rabin \" In Eurocrypt'96 volume 1070 of LNCS pp. 399--416 Berlin Springer--Verlag 1996.]]","DOI":"10.1007\/3-540-68339-9_34"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"D.\n      Boneh\n     and \n      M.\n      Franklin \"\n  Identity based encryption from the Weil pairing \" In Crypto\n  2001 volume \n  2139\n   of \n  LNCS pp. \n  213\n  --\n  229 Berlin Springer--\n  Verlag 2001.]]   D. Boneh and M. Franklin \"Identity based encryption from the Weil pairing \" In Crypto 2001 volume 2139 of LNCS pp. 213--229 Berlin Springer--Verlag 2001.]]","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"D.\n      Boneh B.\n      Lynn and \n      H.\n      Shacham \"\n  Short signatures from the Weil pairing \" In Asiacrypt\n  2001 volume \n  2248\n   of \n  LNCS pp. \n  514\n  --\n  532 Berlin Springer--\n  Verlag 2001.]]   D. Boneh B. Lynn and H. Shacham \"Short signatures from the Weil pairing \" In Asiacrypt 2001 volume 2248 of LNCS pp. 514--532 Berlin Springer--Verlag 2001.]]","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D.\n      Boneh C.\n      Gentry B.\n      Lynn and \n      H.\n      Shacham \"\n  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps \" In Eurocrypt\n  2003 volume \n  2656\n   of \n  LNCS pp. \n  416\n  --\n  432 Berlin Springer--\n  Verlag 2003.]]  D. Boneh C. Gentry B. Lynn and H. Shacham \"Aggregate and Verifiably Encrypted Signatures from Bilinear Maps \" In Eurocrypt 2003 volume 2656 of LNCS pp. 416--432 Berlin Springer--Verlag 2003.]]","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"D.\n      Chaum E.\n      van Heijst\n     and \n      B.\n      Pfitzmann \"\n  Cryptographically strong undeniable signatures unconditionally secure for the signer \" In CRYPTO '91 volume \n  576\n   of \n  LNCS pp.\n  470\n  --\n  484 Berlin Springer--\n  Verlag 1992\n  .]]   D. Chaum E. van Heijst and B. Pfitzmann \"Cryptographically strong undeniable signatures unconditionally secure for the signer \" In CRYPTO '91 volume 576 of LNCS pp.470--484 Berlin Springer--Verlag 1992.]]","DOI":"10.1007\/3-540-46766-1_38"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J.\n      Coron\n     and \n      D.\n      Naccache \"\n  Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption \" In Asiacrypt\n  2003 volume \n  2894\n   of \n  LNCS pp. \n  392\n  --\n  397 Berlin Springer--\n  Verlag 2003.]]  J. Coron and D. Naccache \"Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption \" In Asiacrypt 2003 volume 2894 of LNCS pp. 392--397 Berlin Springer--Verlag 2003.]]","DOI":"10.1007\/978-3-540-40061-5_25"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319716"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"T.\n      ElGamal \"\n      A\n     public-key cryptosystem and signature scheme based on discrete logarithms \" In Crypto'84 volume \n  196\n   of \n  LNCS pp. \n  10\n  --\n  18 Berlin Springer--\n  Verlag 1985\n  ]]   T. ElGamal \"A public-key cryptosystem and signature scheme based on discrete logarithms \" In Crypto'84 volume 196 of LNCS pp. 10--18 Berlin Springer--Verlag 1985]]","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_3_2_1_11_1","first-page":"31","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"ElGamal T.","unstructured":"T. ElGamal , \" A public key cryptosystem and a signature scheme based on discrete logarithms ,\" IEEE Transactions on Information Theory , vol. I T- 31 , no. 4, pp. 469--472, July 1985]] T. ElGamal, \"A public key cryptosystem and a signature scheme based on discrete logarithms,\" IEEE Transactions on Information Theory, vol. IT-31, no. 4, pp. 469--472, July 1985]]","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"186","volume-title":"Crypto'86","author":"Fiat A.","year":"1987","unstructured":"A. Fiat and A. Shamir , \" How to prove yourself: Practical solutions to identification and signature problems \", In Crypto'86 , volume 263 of LNCS , pp. 186 -- 194 , Berlin , Springer-- Verlag , 1987 ]] A. Fiat and A. Shamir, \"How to prove yourself: Practical solutions to identification and signature problems\", In Crypto'86, volume 263 of LNCS, pp. 186--194, Berlin, Springer--Verlag, 1987]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"A.\n      Fujioka T.\n      Okamoto and \n      S.\n      Miyaguchi \"\n  ESIGN: An Efficient Digital Signature Implementation for Smart Cards \" In Eurocrypt'91 volume \n  547\n   of \n  LNCS pp.\n  446\n  --\n  457 Berlin Springer--\n  Verlag 1992\n  ]]  A. Fujioka T. Okamoto and S. Miyaguchi \"ESIGN: An Efficient Digital Signature Implementation for Smart Cards \" In Eurocrypt'91 volume 547 of LNCS pp.446--457 Berlin Springer--Verlag 1992]]","DOI":"10.1007\/3-540-46416-6_38"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S.\n      Galbraith\n     and \n      W.\n      Mao \"\n  Invisibility and Anonymity of Undeniable and Confirmer Signatures \" in Topics in Cryptology CTRSA\n  2003 volume \n  2612\n   of \n  LNCS pp. \n  80\n  --\n  97 Berlin Springer--\n  Verlag 2003]]  S. Galbraith and W. Mao \"Invisibility and Anonymity of Undeniable and Confirmer Signatures \" in Topics in Cryptology CTRSA 2003 volume 2612 of LNCS pp. 80--97 Berlin Springer--Verlag 2003]]","DOI":"10.1007\/3-540-36563-X_6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"R.\n      Johnson D.\n      Molnar D.\n      Song and \n      D.\n      Wagner \"\n  Homomorphic Signature Schemes \" In CTRSA\n  2002 volume \n  2271\n   of \n  LNCS pp.\n  244\n  --\n  262 Berlin Springer--\n  Verlag 2002.]]   R. Johnson D. Molnar D. Song and D. Wagner \"Homomorphic Signature Schemes \" In CTRSA 2002 volume 2271 of LNCS pp.244--262 Berlin Springer--Verlag 2002.]]","DOI":"10.1007\/3-540-45760-7_17"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A.\n      Lysyanskaya S.\n      Micali L.\n      Reyzin and \n      H.\n       Shacham \"\n      Sequential Aggregate\n     Signatures from Trapdoor Permutations\" In Eurocrypt 2004 vol. \n  3027\n   of \n  LNCS pages \n  74\n  --\n  90 Berlin Springer--Verlag May 2004.]]  A. Lysyanskaya S. Micali L. Reyzin and H. Shacham \"Sequential Aggregate Signatures from Trapdoor Permutations\" In Eurocrypt 2004 vol. 3027 of LNCS pages 74--90 Berlin Springer--Verlag May 2004.]]","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control","volume":"88","author":"Miyazaki K.","year":"2005","unstructured":"K. Miyazaki , M. Iwamura , T. Matsumoto , R. Sasaki , H. Yoshiura , S. Tezuka , and H. Imai , \" Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control ,\" IEICE Trans Fundamentals , Vol. E88 -A, No. 1 , 2005 .]] K. Miyazaki, M. Iwamura, T. Matsumoto, R. Sasaki, H. Yoshiura, S. Tezuka, and H. Imai, \"Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control,\" IEICE Trans Fundamentals, Vol. E88-A, No.1, 2005.]]","journal-title":"IEICE Trans Fundamentals"},{"key":"e_1_3_2_1_22_1","first-page":"123","volume-title":"IEEE","author":"Okamoto T.","year":"1985","unstructured":"T. Okamoto and A. Shiraishi , \" A Fast Signature Scheme Based on Quadratic Inequalities,\" Proceedings of the Symposium on Security and Privacy , IEEE , pp. 123 -- 132 , 1985 ]] T. Okamoto and A. Shiraishi, \"A Fast Signature Scheme Based on Quadratic Inequalities,\" Proceedings of the Symposium on Security and Privacy, IEEE, pp.123--132, 1985]]"},{"key":"e_1_3_2_1_23_1","volume-title":"Okinawa","author":"Sakai R.","year":"2000","unstructured":"R. Sakai , K. Ohgishi , M. Kasahara , \"Cryptosystems Based on Pairing,\" In the 2000 Sympoium on Cryptography and Information Security , Okinawa , Japan , January 2000]] R. Sakai, K. Ohgishi, M. Kasahara, \"Cryptosystems Based on Pairing,\" In the 2000 Sympoium on Cryptography and Information Security, Okinawa, Japan, January 2000]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"R.\n      Steinfeld L.\n      Bull and \n      Y.\n      Zheng\n  . \"\n  Content Extraction Signatures \" In International Conference on Information Security and Cryptology ICISC\n  2001 volume \n  2288\n   of \n  LNCS pages \n  285\n  --\n  304 Berlin Springer--\n  Verlag 2001.]]   R. Steinfeld L. Bull and Y. Zheng. \"Content Extraction Signatures \" In International Conference on Information Security and Cryptology ICISC 2001 volume 2288 of LNCS pages 285--304 Berlin Springer--Verlag 2001.]]","DOI":"10.1007\/3-540-45861-1_22"},{"key":"e_1_3_2_1_26_1","unstructured":"National Institute of Standards and Technology (NIST) \"Secure Hash Standard (SHS) \" Federal Information Processing Standards Publication 180--2 2002.]]  National Institute of Standards and Technology (NIST) \"Secure Hash Standard (SHS) \" Federal Information Processing Standards Publication 180--2 2002.]]"},{"key":"e_1_3_2_1_27_1","unstructured":"National Institute of Standards and Technology (NIST) \"Digital Signature Standard (DSS) \" Federal Information Processing Standards Publication 186--2 2000.]]  National Institute of Standards and Technology (NIST) \"Digital Signature Standard (DSS) \" Federal Information Processing Standards Publication 186--2 2000.]]"},{"key":"e_1_3_2_1_28_1","unstructured":"\"Gyosei Kikan no Hoyusuru Joho no Kokai ni Kansuru Horitsu (Information Disclosure Law in Japan) \" 1999. http:\/\/law.e-gov.go.jp\/htmldata\/H11\/H11H0042.html]]  \"Gyosei Kikan no Hoyusuru Joho no Kokai ni Kansuru Horitsu (Information Disclosure Law in Japan) \" 1999. http:\/\/law.e-gov.go.jp\/htmldata\/H11\/H11H0042.html]]"},{"key":"e_1_3_2_1_29_1","volume-title":"May","author":"Secure Electronic Transaction Specification SET","year":"1997","unstructured":"MasterCard and Visa, \" SET Secure Electronic Transaction Specification , Book 1: Business Description,\" ver. 1.0 , May 1997 .]] MasterCard and Visa, \"SET Secure Electronic Transaction Specification, Book 1: Business Description,\" ver. 1.0, May 1997.]]"},{"key":"e_1_3_2_1_30_1","volume-title":"May","author":"Secure Electronic Transaction Specification SET","year":"1997","unstructured":"MasterCard and Visa, \" SET Secure Electronic Transaction Specification , Book 2: Programmer's Guide,\" ver. 1.0 , May 1997 .]] MasterCard and Visa, \"SET Secure Electronic Transaction Specification, Book 2: Programmer's Guide,\" ver. 1.0, May 1997.]]"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":29,"alternative-id":["10.1145\/1128817.1128868","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128868","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}