{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:25Z","timestamp":1750309525280,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3702359.3702360","type":"proceedings-article","created":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T07:43:51Z","timestamp":1737186231000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of Educational Data Management System with Blockchain and High Functional Digital Signatures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9327-306X","authenticated-orcid":false,"given":"Yudai","family":"Hata","sequence":"first","affiliation":[{"name":"Kyushu University, Kyushu, Japan,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4621-1674","authenticated-orcid":false,"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Kyushu University, Kyushu, Japan,"}]}],"member":"320","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto, \u201cBitcoin: A Peer-to-Peer Electronic Cash System,\u201d https:\/\/bitcoin.org\/bitcoin.pdf, 2008."},{"volume-title":"SCIS2023","author":"Yamashita Junichi","key":"e_1_3_3_1_2_2","unstructured":"Junichi Yamashita, et al. \"Personal Data Protection Considerations in Blockchain-Based Information Management\" SCIS2023, ISEC Lab, In Japanese."},{"volume-title":"Discussion Paper on the Utilization of Education Data (Interim Summary)","year":"2021","key":"e_1_3_3_1_3_2","unstructured":"\u201cDiscussion Paper on the Utilization of Education Data (Interim Summary)\u201d, Expert Council on the Utilization of Education Data, 2021. In Japanese."},{"volume-title":"Convertible undeniable signatures.\" Conference on the Theory and Application of Cryptography","year":"1990","key":"e_1_3_3_1_4_2","unstructured":"Boyar, Joan, et al. \"Convertible undeniable signatures.\" Conference on the Theory and Application of Cryptography, 1990.A\u200b"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Chaum David. \"Designated confirmer signatures.\" Workshop on the Theory and Application of Cryptographic Techniques. 1994.","DOI":"10.1007\/BFb0053427"},{"key":"e_1_3_3_1_6_2","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT","author":"Jakobsson Markus","year":"1996","unstructured":"Markus Jakobsson, et al. \"Designated Verifier Proofs and Their Applications.\" International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 1996."},{"key":"e_1_3_3_1_7_2","volume-title":"ISIT","author":"Tso R.","year":"2008","unstructured":"R. Tso, X. Yi, T. Okamoto and E. Okamoto, \u201cEfficient Convertible Limited Verifier Signatures\u201d ISIT 2008."},{"key":"e_1_3_3_1_8_2","unstructured":"Diffie Hellman. \"New Directions in Cryptography\" IEEE Transactions on Information Theory"},{"key":"e_1_3_3_1_9_2","volume-title":"IEICE Trans","author":"Araki S.","year":"1999","unstructured":"S. Araki, S. Uehara and K. Imamura, \u201cThe limited verifier signature and its application\u201d, IEICE Trans, 1999."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_10"}],"event":{"name":"AIBC '24: 2024 5th International Artificial Intelligence and Blockchain Conference","acronym":"AIBC '24","location":"Tokyo Japan"},"container-title":["Proceedings of the 2024 5th International Artificial Intelligence and Blockchain Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702359.3702360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3702359.3702360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:09Z","timestamp":1750295889000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702359.3702360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":10,"alternative-id":["10.1145\/3702359.3702360","10.1145\/3702359"],"URL":"https:\/\/doi.org\/10.1145\/3702359.3702360","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2025-01-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}