{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:18:20Z","timestamp":1761621500443},"reference-count":31,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transinf.2019inp0004","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T17:10:00Z","timestamp":1580490600000},"page":"188-195","source":"Crossref","is-referenced-by-count":19,"title":["White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Yudi","family":"ZHANG","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University"},{"name":"State Key Laboratory of Cryptology"}]},{"given":"Debiao","family":"HE","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University"},{"name":"State Key Laboratory of Cryptology"}]},{"given":"Xinyi","family":"HUANG","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University"},{"name":"Fujian Provincial Key Laboratory of Network Security and Cryptology"}]},{"given":"Ding","family":"WANG","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology"},{"name":"School of Electronics Engineering and Computer Science, Peking University"}]},{"given":"Kim-Kwang Raymond","family":"CHOO","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security and the Department of Electrical and Computer Engineering, The University of Texas at San Antonio"}]},{"given":"Jing","family":"WANG","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University"},{"name":"State Key Laboratory of Cryptology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S. Chow, P. Eisen, H. Johnson, and P.C. Van Oorschot, \u201cA white-box des implementation for drm applications,\u201d ACM Workshop on Digital Rights Management, vol.2696, pp.1-15, Springer, 2002. 10.1007\/978-3-540-44993-5_1","DOI":"10.1007\/978-3-540-44993-5_1"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] S. Chow, P. Eisen, H. Johnson, and P.C. Van Oorschot, \u201cWhite-box cryptography and an aes implementation,\u201d International Workshop on Selected Areas in Cryptography, vol.2595, pp.250-270, Springer, 2002. 10.1007\/3-540-36492-7_17","DOI":"10.1007\/3-540-36492-7_17"},{"key":"3","unstructured":"[3] J. Bringer, H. Chabanne, and E. Dottax, \u201cWhite box cryptography: Another attempt,\u201d IACR Cryptology ePrint Archive, vol.2006, no.2006, p.468, 2006."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Karroumi, \u201cProtecting white-box aes with dual ciphers,\u201d International Conference on Information Security and Cryptology, vol.6829, pp.278-291, Springer, 2010. 10.1007\/978-3-642-24209-0_19","DOI":"10.1007\/978-3-642-24209-0_19"},{"key":"5","unstructured":"[5] A. Orlowski, \u201ciTunes DRM cracked wide open for GNU\/Linux. seriously.\u201d https:\/\/www.theregister.co.uk\/2004\/01\/05\/itunes_drm_cracked_wide_open\/. Jan 5, 2004."},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] C. D&apos;Orazio and K.-K.R. Choo, \u201cAn adversary model to evaluate drm protection of video contents on ios devices,\u201d Computers &amp; Security, vol.56, pp.94-110, 2016. 10.1016\/j.cose.2015.06.009","DOI":"10.1016\/j.cose.2015.06.009"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE transactions on information theory, vol.31, no.4, pp.469-472, 1985. 10.1109\/tit.1985.1057074","DOI":"10.1109\/TIT.1985.1057074"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] M. Abdalla and L. Reyzin, \u201cA new forward-secure digital signature scheme,\u201d International Conference on the Theory and Application of Cryptology and Information Security, vol.1976, pp.116-129, Springer, 2000. 10.1007\/3-540-44448-3_10","DOI":"10.1007\/3-540-44448-3_10"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] D. Johnson, A. Menezes, and S. Vanstone, \u201cThe elliptic curve digital signature algorithm (ecdsa),\u201d International journal of information security, vol.1, no.1, pp.36-63, 2001. 10.1007\/s102070100002","DOI":"10.1007\/s102070100002"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] A. Shamir, \u201cIdentity-based cryptosystems and signature schemes,\u201d Workshop on the theory and application of cryptographic techniques, vol.196, pp.47-53, Springer, 1984. 10.1007\/3-540-39568-7_5","DOI":"10.1007\/3-540-39568-7_5"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] F. Hess, \u201cEfficient identity based signature schemes based on pairings,\u201d International Workshop on Selected Areas in Cryptography, vol.2595, pp.310-324, Springer, 2002. 10.1007\/3-540-36492-7_20","DOI":"10.1007\/3-540-36492-7_20"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] J.C. Choon and J.H. Cheon, \u201cAn identity-based signature from gap diffie-hellman groups,\u201d International workshop on public key cryptography, vol.2567, pp.18-30, Springer, 2003. 10.1007\/3-540-36288-6_2","DOI":"10.1007\/3-540-36288-6_2"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.-J. Quisquater, \u201cEfficient and provably-secure identity-based signatures and signcryption from bilinear maps,\u201d International conference on the theory and application of cryptology and information security, vol.3788, pp.515-532, Springer, 2005. 10.1007\/11593447_28","DOI":"10.1007\/11593447_28"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] M. Zhang, Y. Zhang, Y. Jiang, and J. Shen, \u201cObfuscating eves algorithm and its application in fair electronic transactions in public clouds,\u201d IEEE Systems Journal, vol.13, no.2, pp.1478-1486, June 2019. 10.1109\/jsyst.2019.2900723","DOI":"10.1109\/JSYST.2019.2900723"},{"key":"15","unstructured":"[15] IEEE Standards Association, \u201cIEEE 1363-2000-IEEE standard specifications for public-key cryptography,\u201d https:\/\/standards.ieee.org\/standard\/1363-2000.html, 2000."},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] O. Billet, H. Gilbert, and C. Ech-Chatbi, \u201cCryptanalysis of a white box aes implementation,\u201d International Workshop on Selected Areas in Cryptography, vol.3357, pp.227-240, Springer, 2004. 10.1007\/978-3-540-30564-4_16","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] B. Wyseur, W. Michiels, P. Gorissen, and B. Preneel, \u201cCryptanalysis of white-box des implementations with arbitrary external encodings,\u201d International Workshop on Selected Areas in Cryptography, vol.4876 pp.264-277, Springer, 2007. 10.1007\/978-3-540-77360-3_17","DOI":"10.1007\/978-3-540-77360-3_17"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] T. Lepoint, M. Rivain, Y. De Mulder, P. Roelse, and B. Preneel, \u201cTwo attacks on a white-box aes implementation,\u201d International Conference on Selected Areas in Cryptography, vol.8282, pp.265-285, Springer, 2013. 10.1007\/978-3-662-43414-7_14","DOI":"10.1007\/978-3-662-43414-7_14"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] A. Biryukov, C. Bouillaguet, and D. Khovratovich, \u201cCryptographic schemes based on the asasa structure: Black-box, white-box, and public-key (Extended Abstract),\u201d International Conference on the Theory and Application of Cryptology and Information Security, pp.63-84, Springer, 2014. 10.1007\/978-3-662-45611-8_4","DOI":"10.1007\/978-3-662-45611-8_4"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] W. Michiels, P. Gorissen, and H.D.L. Hollmann, \u201cCryptanalysis of a generic class of white-box implementations,\u201d International Workshop on Selected Areas in Cryptography, vol.5381, pp.414-428, Springer, 2008. 10.1007\/978-3-642-04159-4_27","DOI":"10.1007\/978-3-642-04159-4_27"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] A. Biryukov and A. Shamir, \u201cStructural cryptanalysis of sasas,\u201d Journal of cryptology, vol.23, no.4, pp.505-518, 2010. 10.1007\/s00145-010-9062-1","DOI":"10.1007\/s00145-010-9062-1"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] J. Borghoff, L.R. Knudsen, G. Leander, and S.S. Thomsen,\u201cSlender-set differential cryptanalysis,\u201d Journal of cryptology, vol.26, no.1, pp.11-38, 2013. 10.1007\/s00145-011-9111-4","DOI":"10.1007\/s00145-011-9111-4"},{"key":"23","unstructured":"[23] A. Biryukov and D. Khovratovich, \u201cDecomposition attack on SASASASAS,\u201d IACR Cryptology ePrint Archive, p.646, 2015."},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] C. Delerabl\u00e9e, T. Lepoint, P. Paillier, and M. Rivain, \u201cWhite-box security notions for symmetric encryption schemes,\u201d International Conference on Selected Areas in Cryptography, vol.8282, pp.247-264, Springer, 2013. 10.1007\/978-3-662-43414-7_13","DOI":"10.1007\/978-3-662-43414-7_13"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] A. Bogdanov and T. Isobe, \u201cWhite-box cryptography revisited: Space-hard ciphers,\u201d Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1058-1069, ACM, 2015. 10.1145\/2810103.2813699","DOI":"10.1145\/2810103.2813699"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] M. Bellare, D. Kane, and P. Rogaway, \u201cBig-key symmetric encryption: Resisting key exfiltration,\u201d Annual Cryptology Conference, vol.9814, pp.373-402, Springer, 2016. 10.1007\/978-3-662-53018-4_14","DOI":"10.1007\/978-3-662-53018-4_14"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] P.-A. Fouque, P. Karpman, P. Kirchner, and B. Minaud, \u201cEfficient and provable white-box primitives,\u201d International Conference on the Theory and Application of Cryptology and Information Security, vol.10031, pp.159-188, Springer, 2016. 10.1007\/978-3-662-53887-6_6","DOI":"10.1007\/978-3-662-53887-6_6"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] H.E. Link and W.D. Neumann, \u201cClarifying obfuscation: improving the security of white-box des,\u201d International Conference on Information Technology: Coding and Computing (ITCC&apos;05)-Volume II, pp.679-684, IEEE, 2005. 10.1109\/itcc.2005.100","DOI":"10.1109\/ITCC.2005.100"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] M. Bellare, C. Namprempre, and G. Neven, \u201cSecurity proofs for identity-based identification and signature schemes,\u201d Journal of Cryptology, vol.22, no.1, pp.1-61, 2009. 10.1007\/s00145-008-9028-8","DOI":"10.1007\/s00145-008-9028-8"},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] D. Pointcheval and J. Stern, \u201cSecurity arguments for digital signatures and blind signatures,\u201d Journal of cryptology, vol.13, no.3, pp.361-396, 2000. 10.1007\/s001450010003","DOI":"10.1007\/s001450010003"},{"key":"31","unstructured":"[31] Miracl, \u201cMiracl library,\u201d https:\/\/www.miracl.com\/, 2017."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0004\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:27:18Z","timestamp":1580509638000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0004\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019inp0004","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}