{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T04:40:03Z","timestamp":1742013603807,"version":"3.38.0"},"reference-count":39,"publisher":"Information Processing Society of Japan","issue":"0","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Processing"],"published-print":{"date-parts":[[2025]]},"DOI":"10.2197\/ipsjjip.33.185","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T22:15:53Z","timestamp":1741990553000},"page":"185-196","source":"Crossref","is-referenced-by-count":0,"title":["Implementation and Evaluation of an Identity-based Encryption with Security Against the KGC"],"prefix":"10.2197","volume":"33","author":[{"given":"Shuntaro","family":"Ema","sequence":"first","affiliation":[{"name":"Tokai University"}]},{"given":"Yuta","family":"Sato","sequence":"additional","affiliation":[{"name":"Tokai University"}]},{"given":"Hinata","family":"Nishino","sequence":"additional","affiliation":[{"name":"Kanazawa University"}]},{"given":"Keita","family":"Emura","sequence":"additional","affiliation":[{"name":"Kanazawa University"}]},{"given":"Toshihiro","family":"Ohigashi","sequence":"additional","affiliation":[{"name":"Tokai University"}]}],"member":"1012","reference":[{"key":"1","unstructured":"[1] PALISADE-abe: Identity-Based Encryption &amp; Ciphertext-Policy Attribute-Based Encryption Functionality for Use with PALISADE Library, available from &lt;https:\/\/gitlab.com\/palisade\/palisade-abe&gt;."},{"key":"2","unstructured":"[2] PALISADE Homomorphic Encryption Software Library, available from &lt;https:\/\/palisade-crypto.org\/&gt;."},{"key":"3","unstructured":"[3] PALISADE-release: the Stable Version of the PALISADE Lattice Cryptography Library, available from &lt;https:\/\/gitlab.com\/palisade\/palisade-release&gt;."},{"key":"4","unstructured":"[4] PALISADE-signature Digital Signature functionality for Use with PALISADE, available from &lt;https:\/\/gitlab.com\/palisade\/palisade-signature&gt;."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] Anggorojati, B. and Prasad, R.: Securing communication in inter domains Internet of Things using identity-based cryptography, <i>IWBIS<\/i>, pp.137-142, IEEE (2017).","DOI":"10.1109\/IWBIS.2017.8275115"},{"key":"6","unstructured":"[6] Barker, E.: NIST Special Publication 800-57 Part 1 Revision 5 - Recommendation for Key Management: Part 1 - General (2020), available from &lt;https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-57pt1r5.pdf&gt;."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] Barreto, P.S.L.M. and Naehrig, M.: Pairing-Friendly Elliptic Curves of Prime Order, <i>Selected Areas in Cryptography<\/i>, pp.319-331 (2005).","DOI":"10.1007\/11693383_22"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] Blaze, M., Bleumer, G. and Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography, <i>EUROCRYPT<\/i>, pp.127-144 (1998).","DOI":"10.1007\/BFb0054122"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Boldyreva, A.: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, <i>Public Key Cryptography<\/i>, pp.31-46 (2003).","DOI":"10.1007\/3-540-36288-6_3"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Boneh, D. and Franklin, M.K.: Identity-Based Encryption from the Weil Pairing, <i>CRYPTO<\/i>, pp.213-229 (2001).","DOI":"10.1007\/3-540-44647-8_13"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Cheon, J.H., Hopper, N., Kim, Y. and Osipkov, I.: Provably Secure Timed-Release Public Key Encryption, <i>ACM Trans. Information and System Security<\/i>, Vol.11, No.2, pp.4:1-4:44 (2008).","DOI":"10.1145\/1330332.1330336"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Chiku, S., Hara, K. and Shikata, J.: Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities, <i>ISPEC<\/i>, pp.299-314 (2023).","DOI":"10.1007\/978-981-99-7032-2_18"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Chow, S.S.M.: Removing Escrow from Identity-Based Encryption, <i>Public Key Cryptography<\/i>, pp.256-276 (2009).","DOI":"10.1007\/978-3-642-00468-1_15"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] De Caro, A. and Iovino, V.: jPBC: Java pairing based cryptography, <i>ISCC<\/i>, pp.850-855, IEEE (2011) (online), available from &lt;http:\/\/gas.dia.unisa.it\/projects\/jpbc\/&gt;.","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] Ema, S., Sato, Y., Emura, K. and Ohigashi, T.: Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC, <i>WICS<\/i>, pp.320-325, IEEE (2021).","DOI":"10.1109\/CANDARW53999.2021.00061"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] Emura, K., Kanaoka, A., Ohta, S., Omote, K. and Takahashi, T.: Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation, <i>IEEE Trans. Emerg. Top. Comput.<\/i>, Vol.4, No.1, pp.88-101 (2016).","DOI":"10.1109\/TETC.2015.2400131"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] Emura, K., Katsumata, S. and Watanabe, Y.: Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices, <i>ESORICS<\/i>, pp.113-133 (2019).","DOI":"10.1007\/978-3-030-29962-0_6"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] Emura, K., Katsumata, S. and Watanabe, Y.: Identity-based encryption with security against the KGC: A formal model and its instantiations, <i>Theoretical Computer Science<\/i>, Vol.900, pp.97-119 (2022).","DOI":"10.1016\/j.tcs.2021.11.021"},{"key":"19","unstructured":"[19] Focus, M.: Voltage SecureMail, available from &lt;https:\/\/www.microfocus.com\/en-us\/cyberres\/data-privacy-protection\/secure-mail&gt;."},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] Galbraith, S.D., Paterson, K.G. and Smart, N.P.: Pairings for cryptographers, <i>Discret. Appl. Math.<\/i>, Vol.156, No.16, pp.3113-3121 (2008).","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] Gentry, C., Peikert, C. and Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions, <i>ACM STOC<\/i>, pp.197-206 (2008).","DOI":"10.1145\/1374376.1374407"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] G\u00fcr, K.D., Polyakov, Y., Rohloff, K., Ryan, G.W., Sajjadpour, H. and Savas, E.: Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices, <i>IEEE Trans. Computers<\/i>, Vol.68, No.4, pp.570-584 (2019).","DOI":"10.1109\/TC.2018.2874479"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] Joux, A. and Nguyen, K.: Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups, <i>Journal of Cryptology<\/i>, Vol.16, No.4, pp.239-247 (2003).","DOI":"10.1007\/s00145-003-0052-4"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] Katsumata, S., Yamada, S. and Yamakawa, T.: Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model, <i>Journal of Cryptology<\/i>, Vol.34, No.1, p.5 (2021).","DOI":"10.1007\/s00145-020-09371-y"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] Khan, S., Jadhav, A., Bharadwaj, I., Rooj, M. and Shiravale, S.: Blockchain and the Identity based Encryption Scheme for High Data Security, <i>ICCMC<\/i>, pp.1005-1008 (2020).","DOI":"10.1109\/ICCMC48092.2020.ICCMC-000187"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] Libert, B. and Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption, <i>Public Key Cryptography<\/i>, pp.360-379 (2008).","DOI":"10.1007\/978-3-540-78440-1_21"},{"key":"27","unstructured":"[27] Lynn, B.: The Pairing-Based Cryptography Library, available from &lt;https:\/\/crypto.stanford.edu\/pbc\/&gt;."},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] Matsuda, T., Nakai, Y. and Matsuura, K.: Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability, <i>Pairing-Based Cryptography<\/i>, pp.225-245 (2010).","DOI":"10.1007\/978-3-642-17455-1_15"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] Mitrokotsa, K., Mukherjee, S. and Tomy, J.: Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC), <i>Selected Areas in Cryptography<\/i> (2024, to appear). available from &lt;https:\/\/eprint.iacr.org\/2023\/825&gt;.","DOI":"10.1007\/978-3-031-82852-2_13"},{"key":"30","unstructured":"[30] Mitsunari, S.: bls: An implementation of BLS threshold signature (2023), available from &lt;https:\/\/github.com\/herumi\/bls&gt;."},{"key":"31","unstructured":"[31] Mitsunari, S.: mcl: A portable and fast pairing-based cryptography library (2021), available from &lt;https:\/\/github.com\/herumi\/mcl&gt;."},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] Nakai, Y., Matsuda, T., Kitada, W. and Matsuura, K.: A Generic Construction of Timed-Release Encryption with Pre-open Capability, <i>IWSEC<\/i>, pp.53-70 (2009).","DOI":"10.1007\/978-3-642-04846-3_5"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] Okano, H., Emura, K., Ishibashi, T., Ohigashi, T. and Suzuki, T.: Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings, <i>International Journal of Networking and Computing<\/i>, Vol.10, No.2, pp.174-188 (2020).","DOI":"10.15803\/ijnc.10.2_174"},{"key":"34","unstructured":"[34] R\u00fcckert, M.: Lattice-based Blind Signatures - preliminary version -, <i>Algorithms and Number Theory<\/i>, Vol.09221 (2009)."},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] R\u00fcckert, M.: Lattice-Based Blind Signatures, <i>ASIACRYPT<\/i>, Abe, M. (Ed.), pp.413-430 (2010).","DOI":"10.1007\/978-3-642-17373-8_24"},{"key":"36","unstructured":"[36] Sakemi, Y., Kobayashi, T., Saito, T. and Wahby, R.: Pairing-Friendly Curves (draft-irtf-cfrg-pairing-friendly-curves-10) (2021), available from &lt;https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-pairing-friendly-curves\/&gt;."},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] Shamir, A.: Identity-Based Cryptosystems and Signature Schemes, <i>CRYPTO<\/i>, pp.47-53 (1984).","DOI":"10.1007\/3-540-39568-7_5"},{"key":"38","doi-asserted-by":"crossref","unstructured":"[38] Yamakawa, T. and Zhandry, M.: Classical vs Quantum Random Oracles, <i>EUROCRYPT<\/i>, pp.568-597 (2021).","DOI":"10.1007\/978-3-030-77886-6_20"},{"key":"39","doi-asserted-by":"crossref","unstructured":"[39] Zhou, B., Li, H. and Xu, L.: An Authentication Scheme Using Identity-based Encryption &amp; Blockchain, <i>IEEE ISCC<\/i>, pp.556-561 (2018).","DOI":"10.1109\/ISCC.2018.8538446"}],"container-title":["Journal of Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/33\/0\/33_185\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T03:59:22Z","timestamp":1742011162000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/33\/0\/33_185\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":39,"journal-issue":{"issue":"0","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.2197\/ipsjjip.33.185","relation":{},"ISSN":["1882-6652"],"issn-type":[{"value":"1882-6652","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}