{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,7]],"date-time":"2024-04-07T00:33:54Z","timestamp":1712450034714},"reference-count":31,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2024,4,1]]},"DOI":"10.1587\/transfun.2023ssp0002","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T22:28:53Z","timestamp":1696890533000},"page":"619-633","source":"Crossref","is-referenced-by-count":0,"title":["Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality"],"prefix":"10.1587","volume":"E107.A","author":[{"given":"Ryu","family":"ISHII","sequence":"first","affiliation":[{"name":"The University of Tokyo"},{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Kyosuke","family":"YAMASHITA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"},{"name":"Osaka University"}]},{"given":"Zihao","family":"SONG","sequence":"additional","affiliation":[{"name":"Yokohama National University"}]},{"given":"Yusuke","family":"SAKAI","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Tadanori","family":"TERUYA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Takahiro","family":"MATSUDA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Goichiro","family":"HANAOKA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Kanta","family":"MATSUURA","sequence":"additional","affiliation":[{"name":"The University of Tokyo"}]},{"given":"Tsutomu","family":"MATSUMOTO","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"},{"name":"Yokohama National University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] R. Ishii, K. Yamashita, Z. Song, Y. Sakai, T. Teruya, G. Hanaoka, K. Matsuura, and T. Matsumoto, \u201cConstraints and evaluations on signature transmission interval for aggregate signatures with interactive tracing functionality,\u201d ESORICS 2022 Workshop on ADIoT, pp.51-71, 2022. 10.1007\/978-3-031-21311-3_3","DOI":"10.1007\/978-3-031-21311-3_3"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, \u201cAggregate and verifiably encrypted signatures from bilinear maps,\u201d EUROCRYPT 2003, pp.416-432, 2003. 10.1007\/3-540-39200-9_26","DOI":"10.1007\/3-540-39200-9_26"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham, \u201cSequential aggregate signatures from trapdoor permutations,\u201d EUROCRYPT 2004, pp.74-90, 2004. 10.1007\/978-3-540-24676-3_5","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] C. Gentry and Z. Ramzan, \u201cIdentity-based aggregate signatures,\u201d PKC 2006, Lecture Notes in Computer Science, vol.3958, pp.257-273, Springer, 2006. 10.1007\/11745853_17","DOI":"10.1007\/11745853_17"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] J.H. Ahn, M. Green, and S. Hohenberger, \u201cSynchronized aggregate signatures: New definitions, constructions and applications,\u201d CCS 2010, pp.473-484, ACM, 2010. 10.1145\/1866307.1866360","DOI":"10.1145\/1866307.1866360"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] G. Hartung, B. Kaidel, A. Koch, J. Koch, and A. Rupp, \u201cFault-tolerant aggregate signatures,\u201d PKC 2016, pp.331-356, 2016. 10.1007\/978-3-662-49384-7_13","DOI":"10.1007\/978-3-662-49384-7_13"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] W.H. Kautz and R.C. Singleton, \u201cNonrandom binary superimposed codes,\u201d IEEE Trans. Inf. Theory, vol.10, no.4, pp.363-377, 1964. 10.1109\/tit.1964.1053689","DOI":"10.1109\/TIT.1964.1053689"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] R. Kumar, S. Rajagopalan, and A. Sahai, \u201cCoding constructions for blacklisting problems without computational assumptions,\u201d CRYPTO&apos;99, pp.609-623, 1999. 10.1007\/3-540-48405-1_38","DOI":"10.1007\/3-540-48405-1_38"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] G.M. Zaverucha and D.R. Stinson, \u201cGroup testing and batch verification,\u201d ICITS 2009, pp.140-157, 2009. 10.1007\/978-3-642-14496-7_12","DOI":"10.1007\/978-3-642-14496-7_12"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] D. Du, F.K. Hwang, and F. Hwang, Combinatorial Group Testing and Its Applications, World Scientific, 2000. 10.1142\/4252","DOI":"10.1142\/9789812798107"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] D. Eppstein, M.T. Goodrich, and D.S. Hirschberg, \u201cImproved combinatorial group testing algorithms for real-world problem sizes,\u201d SIAM J. Comput., vol.36, no.5, pp.1360-1375, 2007. 10.1137\/050631847","DOI":"10.1137\/050631847"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] R. Ishii, K. Yamashita, Y. Sakai, T. Matsuda, T. Teruya, G. Hanaoka, K. Matsuura, and T. Matsumoto, \u201cAggregate signature with traceability of devices dynamically generating invalid signatures,\u201d ACNS 2021 Satellite Workshop on SCI, pp.378-396, 2021. 10.1007\/978-3-030-81645-2_22","DOI":"10.1007\/978-3-030-81645-2_22"},{"key":"13","unstructured":"[13] J. Shikata, T. Matsumoto, and ECSEC, \u201cDigital signature system and digital signature method,\u201d 2021. JP, 2021-077961, A, 2021-5-20 (In Japanese)."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] A. Fiat and T. Tassa, \u201cDynamic traitor tracing,\u201d CRYPTO&apos;99, pp.354-371, 1999. 10.1007\/3-540-48405-1_23","DOI":"10.1007\/3-540-48405-1_23"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] S. Suryavansh, A. Benna, C. Guest, and S. Chaterji, \u201cA data-driven approach to increasing the lifetime of iot sensor nodes,\u201d Sci. Rep., vol.11, no.1, pp.1-12, 2021. 10.1038\/s41598-021-01431-y","DOI":"10.1038\/s41598-021-01431-y"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] S. Tak and S. Choi, \u201cSafety monitoring system of CAVs considering the trade-off between sampling interval and data reliability,\u201d Sensors, vol.22, no.10, 3611, 2022. 10.3390\/s22103611","DOI":"10.3390\/s22103611"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] R. Safavi-Naini and Y. Wang, \u201cSequential traitor tracing,\u201d IEEE Trans. Inf. Theory, vol.49, no.5, pp.1319-1326, 2003. 10.1109\/tit.2003.810629","DOI":"10.1109\/TIT.2003.810629"},{"key":"18","unstructured":"[18] S. Sato, J. Shikata, and T. Matsumoto, \u201cAggregate signature with detecting functionality from group testing,\u201d IACR Cryptol. ePrint Arch., vol.2020, p.1219, 2020."},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] D. Boneh, B. Lynn, and H. Shacham, \u201cShort signatures from the weil pairing,\u201d ASIACRYPT 2001, pp.514-532, 2001. 10.1007\/3-540-45682-1_30","DOI":"10.1007\/3-540-45682-1_30"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] S. Hohenberger, A. Sahai, and B. Waters, \u201cFull domain hash from (leveled) multilinear maps and identity-based aggregate signatures,\u201d CRYPTO 2013, LNCS, vol.8042, pp.494-512, Springer, 2013. 10.1007\/978-3-642-40041-4_27","DOI":"10.1007\/978-3-642-40041-4_27"},{"key":"21","unstructured":"[21] S. Sato and J. Shikata, \u201cInteractive aggregate message authentication equipped with detecting functionality from adaptive group testing,\u201d IACR Cryptol. ePrint Arch., vol.2020, p.1218, 2020."},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] G. Neven, \u201cEfficient sequential aggregate signed data,\u201d EUROCRYPT 2008, N.P. Smart, ed., LNCS, vol.4965, pp.52-69, Springer, 2008. 10.1007\/978-3-540-78967-3_4","DOI":"10.1007\/978-3-540-78967-3_4"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] M. Gerbush, A.B. Lewko, A. O&apos;Neill, and B. Waters, \u201cDual form signatures: An approach for proving security from static assumptions,\u201d ASIACRYPT 2012, pp.25-42, 2012. 10.1007\/978-3-642-34961-4_4","DOI":"10.1007\/978-3-642-34961-4_4"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters, \u201cSequential aggregate signatures and multisignatures without random oracles,\u201d EUROCRYPT 2006, pp.465-485, 2006. 10.1007\/11761679_28","DOI":"10.1007\/11761679_28"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] K. Lee, D.H. Lee, and M. Yung, \u201cSequential aggregate signatures with short public keys without random oracles,\u201d Theor. Comput. Sci., vol.579, pp.100-125, 2015. 10.1016\/j.tcs.2015.02.019","DOI":"10.1016\/j.tcs.2015.02.019"},{"key":"26","unstructured":"[26] Z. Song, R. Anzai, J. Sakamoto, N. Yoshida, and T. Matsumoto, \u201cProposal and prototype implementation of a cloud-based simulator for traceable aggregate signature protocol,\u201d SCIS 2022, 2022 (in Japanese)."},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] M. Pandey, S. Dhanoriya, and A. Bhagat, \u201cFast and efficient data acquisition in radiation affected large wsn by predicting transfaulty nodes,\u201d International Conference on Next Generation Computing Technologies, pp.246-262, Springer, 2017. 10.1007\/978-981-10-8660-1_19","DOI":"10.1007\/978-981-10-8660-1_19"},{"key":"28","unstructured":"[28] S. Mitsunari, \u201cmcl-a portable and fast pairing-based cryptography library,\u201d https:\/\/github.com\/herumi\/mcl, 2016."},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] P.S.L.M. Barreto and M. Naehrig, \u201cPairing-friendly elliptic curves of prime order,\u201d SAC 2005, LNCS, vol.3897, pp.319-331, Springer, 2005. 10.1007\/11693383_22","DOI":"10.1007\/11693383_22"},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] A. Lavric and V. Popa, \u201cPerformance evaluation of lorawan communication scalability in large-scale wireless sensor networks,\u201d Wireless Communications and Mobile Computing, vol.2018, 2018. 10.1155\/2018\/6730719","DOI":"10.1155\/2018\/6730719"},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] M.P.R.S. Kiran and P. Rajalakshmi, \u201cPerformance analysis of CSMA\/CA and PCA for time critical industrial iot applications,\u201d IEEE Trans. Ind. Inform., vol.14, no.5, pp.2281-2293, 2018. 10.1109\/tii.2018.2802497","DOI":"10.1109\/TII.2018.2802497"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E107.A\/4\/E107.A_2023SSP0002\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,6]],"date-time":"2024-04-06T03:27:16Z","timestamp":1712374036000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E107.A\/4\/E107.A_2023SSP0002\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,1]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2023ssp0002","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,1]]},"article-number":"2023SSP0002"}}