{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:24:18Z","timestamp":1715646258229},"reference-count":26,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1587\/transfun.2022dmp0004","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T22:11:00Z","timestamp":1678140660000},"page":"1164-1176","source":"Crossref","is-referenced-by-count":0,"title":["Forward Secure Message Franking with Updatable Reporting Tags"],"prefix":"10.1587","volume":"E106.A","author":[{"given":"Hiroki","family":"YAMAMURO","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Keisuke","family":"HARA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"},{"name":"Yokohama National University"}]},{"given":"Masayuki","family":"TEZUKA","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Tsuruoka College"}]},{"given":"Yusuke","family":"YOSHIDA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]},{"given":"Keisuke","family":"TANAKA","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] WhatsApp, \u201cWhatsApp Messenger,\u201d https:\/\/www.whatsapp.com"},{"key":"2","unstructured":"[2] Signal Foundation, \u201cSignal,\u201d https:\/\/signal.org"},{"key":"3","unstructured":"[3] Facebook, \u201cFacebook Messenger,\u201d https:\/\/www.messenger.com"},{"key":"4","unstructured":"[4] Facebook, \u201cMessenger Secret Conversations Technical Whitepaper,\u201d 2016."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] P. Grubbs, J. Lu, and T. Ristenpart, \u201cMessage franking via committing authenticated encryption,\u201d Advances in Cryptology-CRYPTO 2017-37th Annual International Cryptology Conference, Santa Barbara, CA, USA, Aug. 2017, Proceedings, Part III, J. Katz and H. Shacham, eds., Lecture Notes in Computer Science, vol.10403, pp.66-97, Springer, 2017. 10.1007\/978-3-319-63697-9_3","DOI":"10.1007\/978-3-319-63697-9_3"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] W. Diffie, P.C. van Oorschot, and M.J. Wiener, \u201cAuthentication and authenticated key exchanges,\u201d Des. Codes Cryptogr., vol.2, no.2, pp.107-125, 1992. 10.1007\/bf00124891","DOI":"10.1007\/BF00124891"},{"key":"7","unstructured":"[7] C.G. G\u00fcnther, \u201cAn identity-based key-exchange protocol,\u201d Advances in Cryptology-EUROCRYPT&apos;89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 1989, Proceedings, J. Quisquater and J. Vandewalle, eds., Lecture Notes in Computer Science, vol.434, pp.29-37, Springer, 1989. 10.1007\/3-540-46885-4_5"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] M. Bellare and S.K. Miner, \u201cA forward-secure digital signature scheme,\u201d Advances in Cryptology-CRYPTO&apos;99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, Aug. 1999, Proceedings, M.J. Wiener, ed., Lecture Notes in Computer Science, vol.1666, pp.431-448, Springer, 1999. 10.1007\/3-540-48405-1_28","DOI":"10.1007\/3-540-48405-1_28"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] M. Bellare and B.S. Yee, \u201cForward-security in private-key cryptography,\u201d Topics in Cryptology-CT-RSA 2003, The Cryptographers&apos; Track at the RSA Conference 2003, San Francisco, CA, USA, April 2003, Proceedings, M. Joye, ed., Lecture Notes in Computer Science, vol.2612, pp.1-18, Springer, 2003. 10.1007\/3-540-36563-x_1","DOI":"10.1007\/3-540-36563-X_1"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] R. Canetti, S. Halevi, and J. Katz, \u201cA forward-secure public-key encryption scheme,\u201d Advances in Cryptology-EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 2003, Proceedings, E. Biham, ed., Lecture Notes in Computer Science, vol.2656, pp.255-271, Springer, 2003. 10.1007\/3-540-39200-9_16","DOI":"10.1007\/3-540-39200-9_16"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] D. Pointcheval and O. Sanders, \u201cForward secure non-interactive key exchange,\u201d Security and Cryptography for Networks-9th International Conference, SCN 2014, Amalfi, Italy, Sept. 2014, Proceedings, M. Abdalla and R.D. Prisco, eds., Lecture Notes in Computer Science, vol.8642, pp.21-39, Springer, 2014. 10.1007\/978-3-319-10879-7_2","DOI":"10.1007\/978-3-319-10879-7_2"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] D. Derler, T. Jager, D. Slamanig, and C. Striecks, \u201cBloom filter encryption and applications to efficient forward-secret 0-RTT key exchange,\u201d Advances in Cryptology-EUROCRYPT 2018-37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April-May 2018 Proceedings, Part III, J.B. Nielsen and V. Rijmen, eds., Lecture Notes in Computer Science, vol.10822, pp.425-455, Springer, 2018. 10.1007\/978-3-319-78372-7_14","DOI":"10.1007\/978-3-319-78372-7_14"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] F. G\u00fcnther, B. Hale, T. Jager, and S. Lauer, \u201c0-RTT key exchange with full forward secrecy,\u201d Advances in Cryptology-EUROCRYPT 2017-36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April-May 2017, Proceedings, Part III, J. Coron and J.B. Nielsen, ed., Lecture Notes in Computer Science, vol.10212, pp.519-548, 2017. 10.1007\/978-3-319-56617-7_18","DOI":"10.1007\/978-3-319-56617-7_18"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] N. Aviram, K. Gellert, and T. Jager, \u201cSession resumption protocols and efficient forward security for TLS 1.3 0-RTT,\u201d Advances in Cryptology-EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 2019, Proceedings, Part II, Y. Ishai and V. Rijmen, eds., Lecture Notes in Computer Science, vol.11477, pp.117-150, Springer, 2019. 10.1007\/978-3-030-17656-3_5","DOI":"10.1007\/978-3-030-17656-3_5"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] J. Alwen, S. Coretti, and Y. Dodis, \u201cThe double ratchet: Security notions, proofs, and modularization for the signal protocol,\u201d Advances in Cryptology-EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 2019, Proceedings, Part I, Y. Ishai and V. Rijmen, eds., Lecture Notes in Computer Science, vol.11476, pp.129-158, Springer, 2019. 10.1007\/978-3-030-17653-2_5","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] K. Cohn-Gordon, C.J.F. Cremers, B. Dowling, L. Garratt, and D. Stebila, \u201cA formal security analysis of the signal messaging protocol,\u201d 2017 IEEE European Symposium on Security and Privacy, EuroS&amp;P 2017, Paris, France, April 2017, pp.451-466, IEEE, 2017. 10.1109\/eurosp.2017.27","DOI":"10.1109\/EuroSP.2017.27"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] V. Cini, S. Ramacher, D. Slamanig, C. Striecks, and E. Tairi, \u201cUpdatable signatures and message authentication codes,\u201d Public-Key Cryptography-PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 2021, Proceedings, Part I, J.A. Garay, ed., Lecture Notes in Computer Science, vol.12710, pp.691-723, Springer, 2021. 10.1007\/978-3-030-75245-3_25","DOI":"10.1007\/978-3-030-75245-3_25"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] Y. Dodis, P. Grubbs, T. Ristenpart, and J. Woodage, \u201cFast message franking: From invisible salamanders to encryptment,\u201d Advances in Cryptology-CRYPTO 2018-38th Annual International Cryptology Conference, Santa Barbara, CA, USA, Aug. 2018, Proceedings, Part I, H. Shacham and A. Boldyreva, eds., Lecture Notes in Computer Science, vol.10991, pp.155-186, Springer, 2018. 10.1007\/978-3-319-96884-1_6","DOI":"10.1007\/978-3-319-96884-1_6"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] S. Hirose, \u201cCompactly committing authenticated encryption using tweakable block cipher,\u201d Network and System Security-14th International Conference, NSS 2020, Melbourne, VIC, Australia, Nov. 2020, Proceedings, M. Kutylowski, J. Zhang, and C. Chen, eds., Lecture Notes in Computer Science, vol.12570, pp.187-206, Springer, 2020. 10.1007\/978-3-030-65745-1_11","DOI":"10.1007\/978-3-030-65745-1_11"},{"key":"20","unstructured":"[20] I. Leontiadis and S. Vaudenay, \u201cPrivate message franking with after opening privacy,\u201d IACR Cryptol. ePrint Arch., vol.2018, p.938, 2018."},{"key":"21","unstructured":"[21] L. Chen and Q. Tang, \u201cPeople who live in glass houses should not throw stones: Targeted opening message franking schemes,\u201d IACR Cryptol. ePrint Arch., vol.2018, p.994, 2018."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] L. Huguenin-Dumittan and I. Leontiadis, \u201cA message franking channel,\u201d Information Security and Cryptology-17th International Conference, Inscrypt 2021, Virtual Event, Aug. 2021, Revised Selected Papers, Y. Yu and M. Yung, eds., Lecture Notes in Computer Science, vol.13007, pp.111-128, Springer, 2021. 10.1007\/978-3-030-88323-2_6","DOI":"10.1007\/978-3-030-88323-2_6"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] N. Tyagi, P. Grubbs, J. Len, I. Miers, and T. Ristenpart, \u201cAsymmetric message franking: Content moderation for metadata-private end-to-end encryption,\u201d Advances in Cryptology-CRYPTO 2019-39th Annual International Cryptology Conference, Santa Barbara, CA, USA, Aug. 2019, Proceedings, Part III, A. Boldyreva and D. Micciancio, eds., Lecture Notes in Computer Science, vol.11694, pp.222-250, Springer, 2019. 10.1007\/978-3-030-26954-8_8","DOI":"10.1007\/978-3-030-26954-8_8"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] H. Yamamuro, K. Hara, M. Tezuka, Y. Yoshida, and K. Tanaka, \u201cForward secure message franking,\u201d Information Security and Cryptology-ICISC 2021-24th International Conference, Seoul, South Korea, Dec. 2021, Revised Selected Papers, J.H. Park and S. Seo, eds., Lecture Notes in Computer Science, vol.13218, pp.339-358, Springer, 2021. 10.1007\/978-3-031-08896-4_18","DOI":"10.1007\/978-3-031-08896-4_18"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] M. Naor, B. Pinkas, and O. Reingold, \u201cDistributed pseudo-random functions and KDCs,\u201d Advances in Cryptology-EUROCRYPT&apos;99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 1999, Proceeding, J. Stern, ed., Lecture Notes in Computer Science, vol.1592, pp.327-346, Springer, 1999. 10.1007\/3-540-48910-x_23","DOI":"10.1007\/3-540-48910-X_23"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] S. Kim, \u201cKey-homomorphic pseudorandom functions from LWE with small modulus,\u201d Advances in Cryptology-EUROCRYPT 2020 -39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 2020, Proceedings, Part II, A. Canteaut and Y. Ishai, eds., Lecture Notes in Computer Science, vol.12106, pp.576-607, Springer, 2020. 10.1007\/978-3-030-45724-2_20","DOI":"10.1007\/978-3-030-45724-2_20"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E106.A\/9\/E106.A_2022DMP0004\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T04:55:25Z","timestamp":1715576125000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E106.A\/9\/E106.A_2022DMP0004\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":26,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2022dmp0004","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]},"article-number":"2022DMP0004"}}