{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:24:07Z","timestamp":1752981847001},"reference-count":31,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,6,1]]},"DOI":"10.1587\/transinf.2019edp7163","type":"journal-article","created":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T22:09:45Z","timestamp":1590962985000},"page":"1339-1354","source":"Crossref","is-referenced-by-count":4,"title":["Extended Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Equality Verification Using Homomorphic Encryption"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Yoshihiko","family":"OMORI","sequence":"first","affiliation":[{"name":"NTT Network Service Systems Laboratories, NTT Corporation"}]},{"given":"Takao","family":"YAMASHITA","sequence":"additional","affiliation":[{"name":"NTT Network Service Systems Laboratories, NTT Corporation"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] C.P. Pfleeger, S.L. Pfleeger, and J. Margulies, \u201cSecurity in Computing (Fifth Edition),\u201d Prentice-Hall, 2015."},{"key":"2","unstructured":"[2] FIDO Alliance, https:\/\/fidoalliance.org\/."},{"key":"3","unstructured":"[3] FIDO Alliance, \u201cFIDO UAF Architectural Overview,\u201d https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-overview-v1.1-ps-20170202.pdf"},{"key":"4","unstructured":"[4] GlobalPlatform: htps:\/\/www.globalplatform.org\/"},{"key":"5","unstructured":"[5] Y. Ogata, Y. Omori, T. Yamashita, and T. Iwata, \u201cA Study on an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation,\u201d IEICE Technical Report, vol.115, no.252, pp.13-18, 2015. (in Japanese)"},{"key":"6","unstructured":"[6] Y. Ogata, Y. Omori, T. Yamashita, and T. Iwata, \u201cInvestigation of How to Manage Secret Keys Used for User Authentication in Web-Based Services,\u201d IEICE Society Conference 2016, B-7-9, 2016. (in Japanese)"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] H. Nishimura, Y. Omori, T. Yamashita, and S. Furukawa, \u201cSecure Authentication Key Sharing between Mobile Devices Based on Owner Identity,\u201d Proc. 2018 Fourth International Conference on Mobile and Secure Services, doi: 10.1109\/MOBISECSERV.2018.8311436, 2018. 10.1109\/mobisecserv.2018.8311436","DOI":"10.1109\/MOBISECSERV.2018.8311436"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] H. Nishimura, Y. Omori, and T. Yamashita, \u201cSecure Authentication Key Sharing between Personal Mobile Devices Based on Owner Identity,\u201d Journal of Information Processing, vol.28, pp.292-301, 2020. 10.1109\/mobisecserv.2018.8311436","DOI":"10.2197\/ipsjjip.28.292"},{"key":"9","unstructured":"[9] P.A. Grassi, M.E. Garcia, and J.L. Fenton, \u201cDigital Identity Guidelines,\u201d NIST Special Publication 800-63-3, https:\/\/pages.nist.gov\/800-63-3\/sp800-63-3.html"},{"key":"10","unstructured":"[10] Y. Omori, H. Nishimura, and T. Yamashita, \u201cInter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices,\u201d IEICE Transactions on Communications, vol.J102-B, no.8, pp.631-646, 2019. (in Japanese)"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Horibe and A. Cavoukian, \u201cPrivacy by Design,\u201d Nikkei Business Publications, Inc., 2012. (in Japanese)","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"key":"12","unstructured":"[12] Y. Itakura and M. Togawa, \u201cPersonal Authentication: Principles, Technologies and Applications,\u201d The Institute of Electronics, Information and Communication Engineers (IEICE), 2010. (in Japanese)"},{"key":"13","unstructured":"[13] Gemalto, \u201cNational Mobile ID schemes Volume I,\u201d White Paper, http:\/\/www.gemalto.com\/govt\/coesys\/mobile-id, 2014."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] H. Lipmaa, \u201cVerifiable Homomorphic Oblivious Transfer and Private Equality Test,\u201d In Laih CS. (eds) Advances in Cryptology-ASIACRYPT 2003. ASIACRYPT 2003, vol.2894 of Lecture Notes in Computer Science, pp.416-433, Springer, 2003. 10.1007\/978-3-540-40061-5_27","DOI":"10.1007\/978-3-540-40061-5_27"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] P. Paillier, \u201cPublic-Key Cryptosystems Based on Composite Degree Residuosity Classes,\u201d In Jacques Stern, editor, Advances in Cryptology-EUROCRYPT &apos;99, vol.1592 of Lecture Notes in Computer Science, pp.223-238, Prague, Czech Republic, Springer-Verlag, 2-6 May 1999. 10.1007\/3-540-48910-x_16","DOI":"10.1007\/3-540-48910-X_16"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] J. Kats and Y. Lindell, \u201cIntroduction to Modern Cryptography, Second Edition,\u201d Chapman and Hall\/CRC, 2014.","DOI":"10.1201\/b17668"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] T. Dierks and E. Rescorla, \u201cThe Transport Layer Security (TLS) Protocol Version 1.2,\u201d IETF RFC 5246, 2008.","DOI":"10.17487\/rfc5246"},{"key":"18","unstructured":"[18] M. Nystrom and B. Kaliski, \u201cPKCS#10: Certificate Request Syntax Specification Version 1.7,\u201d IETF RFC 2986, https:\/\/tools.ietf.org\/html\/rfc2986, 2000."},{"key":"19","unstructured":"[19] Symantec Inc., \u201cAn Experimental Study of TLS Forward Secrecy Deployments,\u201d https:\/\/www.symantec.com\/content\/ja\/jp\/enterprise\/white_papers\/wp_forward_secrecy_report.pdf. (in Japanese)"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] L.-S. Huang, S. Adhikarla, D. Boneh, and C. Jackson, \u201cAn Experimental Study of TLS Forward Secrecy Deployments,\u201d IEEE Internet Computing, vol.18, no.6, pp.43-51, 2014. 10.1109\/mic.2014.86","DOI":"10.1109\/MIC.2014.86"},{"key":"21","unstructured":"[21] E. Barker, \u201cRecommendation for Key Management Part 1: General,\u201d NIST Special Publication 800-57 Part 1 Revision 4, https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-57pt1r4.pdf, 2016."},{"key":"22","unstructured":"[22] Information-technology Promotion Agency (IPA), \u201cGuideline for SSL\/TLS Cipher Suite Configuration,\u201d https:\/\/www.ipa.go.jp\/security\/ipg\/documents\/ipa-cryptrec-gl-3001-2.0.pdf, 2018."},{"key":"23","unstructured":"[23] Ministry of Internal Affairs and Communications, Japan, \u201cWhite Paper: Information and Communications in Japan,\u201d http:\/\/www.soumu.go.jp\/johotsusintokei\/whitepaper\/eng\/WP2017\/2017-index.html, 2017."},{"key":"24","unstructured":"[24] C. Jost, H. Lam, A. Maximov, and B. Smeets, \u201cEncryption Performance Improvements of the Paillier Cryptosystem,\u201d IACR Cryptology ePrint Archive 2015: 864, 2015."},{"key":"25","unstructured":"[25] LogMeIn, Inc., \u201cLastPass,\u201d https:\/\/www.lastpass.com\/"},{"key":"26","unstructured":"[26] McAfee, LLC, https:\/\/www.mcafee.com\/en-ca\/index.html"},{"key":"27","unstructured":"[27] Trend Micro, Inc., https:\/\/www.trendmicro.com\/en_us\/business.html"},{"key":"28","unstructured":"[28] Apple, Inc., \u201ciOS Security (iOS 11),\u201d https:\/\/images.apple.com\/business\/docs\/iOS_Security_Guide.pdf, 2018."},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] H. Ferraiolo, D. Cooper, S. Francomacaro, and A. Regenscheid, \u201cGuidelines for Derived Personal Identity Verification (PIV) Credentials,\u201d NIST Special Publication 800-157, https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/nist.sp.800-157.pdf, 2014.","DOI":"10.6028\/NIST.SP.800-157"},{"key":"30","unstructured":"[30] Ministry of Internal Affairs and Communications, \u201cMy Number System,\u201d https:\/\/www.cao.go.jp\/bangouseido\/pdf\/my_number_system.pdf"},{"key":"31","unstructured":"[31] A. Takakuwa, T. Kohno, and A. Czeskis, \u201cThe Transfer Access Protocol-Moving to New Authenticators in the FIDO Ecosystem,\u201d Technical Report UW-CSE-17-06-01, The University of Washington, 2017."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019EDP7163\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T03:25:38Z","timestamp":1591413938000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019EDP7163\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,1]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edp7163","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,1]]}}}