{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:16:46Z","timestamp":1768969006299,"version":"3.49.0"},"reference-count":20,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T00:00:00Z","timestamp":1564358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>We propose a new authentication algorithm for small internet of things (IoT) devices without key distribution and secure servers. Encrypted private data are stored on the cloud server in the registration step and compared with incoming encrypted data without decryption in the verification step. We call a set of encryptions that can verify two encrypted data items without decryption a verifiable encryption (VE). In this paper, we define VE, and claim that several cryptosystems belong to the VE class. Moreover, we introduce an authentication algorithm based on VE, and show an example of the algorithm and discuss its performance and security. As the algorithm neither shares any secret keys nor decrypts, its computation time becomes very small.<\/jats:p>","DOI":"10.3390\/cryptography3030019","type":"journal-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T11:20:18Z","timestamp":1564399218000},"page":"19","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["New Authentication Algorithm Based on Verifiable Encryption with Digital Identity"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9217-6019","authenticated-orcid":false,"given":"Maki","family":"Kihara","sequence":"first","affiliation":[{"name":"Department of Information Science, Tokyo University of Science, Yamazaki 2641, Noda, Chiba 278-8510, Japan"}]},{"given":"Satoshi","family":"Iriyama","sequence":"additional","affiliation":[{"name":"Department of Information Science, Tokyo University of Science, Yamazaki 2641, Noda, Chiba 278-8510, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cachin, C., and Camenisch, J.L. (2004). Public key encryption with keyword search. Advances in Cryptology\u2014EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2\u20136 May 2004, Springer.","DOI":"10.1007\/b97182"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Shoup, V. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Advances in Cryptology\u2014CRYPTO 2005, Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14\u201318 August 2005, Springer.","DOI":"10.1007\/11535218"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1016\/j.proeng.2011.08.324","article-title":"Decryptable searchable encryption with a designated tester","volume":"15","author":"Hu","year":"2011","journal-title":"Procedia Eng."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Li, S., Li, M., Xu, H., and Zhou, X. (2019). Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data. Sensors, 19.","DOI":"10.3390\/s19051059"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.1109\/JIOT.2018.2845106","article-title":"Secure Range Search over Encrypted Uncertain IoT Outsourced Data","volume":"6","author":"Guo","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_6","first-page":"288","article-title":"Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data","volume":"Volume 11337","author":"Zhou","year":"2018","journal-title":"International Conference on Algorithms and Architectures for Parallel Processing ICA3PP"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"Elgamal","year":"1985","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. [Ph.D. Dissertation, Stanford University].","DOI":"10.1145\/1536414.1536440"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Paterson, K.G. (2011). Implementing Gentry\u2019s fully-homomorphic encryption scheme. Advances in Cryptology\u2014EUROCRYPT 2011, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 15\u201319 May 2011, Springer.","DOI":"10.1007\/978-3-642-20465-4"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., and Xu, L. (2013). Packed homomorphic encryption based on ideal lattices and its application to biometrics. Security Engineering and Intelligence Informatics, Proceedings of the International Conference on Availability, Reliability, and Security, Regensburg, Germany, 2\u20136 September 2013, Springer.","DOI":"10.1007\/978-3-642-40588-4"},{"key":"ref_12","unstructured":"Odlyzko, A.M. (1986). How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology\u2014CRYPTO \u201986, Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA, 11\u201315 August 1986, Springer."},{"key":"ref_13","unstructured":"Brassard, G. (1989). Efficient identification and signatures for smart cards. Advances in Cryptology\u2014CRYPTO \u201989, Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, CA, USA, 20\u201324 August 1989, Springer."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF02351717","article-title":"Zero-knowledge proofs of identity","volume":"1","author":"Feige","year":"1988","journal-title":"J. Cryptol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1137\/0218012","article-title":"The knowledge complexity of interactive proof systems","volume":"18","author":"Goldwasser","year":"1989","journal-title":"SIAM J. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Goldreich, O. (2001). Foundations of Cryptography: Volume 1\u2014Basic Tools, Cambridge University Press.","DOI":"10.1017\/CBO9780511546891"},{"key":"ref_17","unstructured":"Daemen, J., and Rijmen, V. (2013). The Design of Rijndael: AES\u2014The Advanced Encryption Standard, Springer Science and Business Media."},{"key":"ref_18","unstructured":"Murakami, T. (2005). Japan\u2019s National IT Strategy and the Ubiquitous Network, Nomura Research Institute. NRI Paper 97."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/BF02576183","article-title":"Hyperbolic automorphisms of tori and pseudo-random sequences","volume":"29","author":"Abundo","year":"1992","journal-title":"Calcolo"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Accardi, L., Freudenberg, W., and Ohya, M. (2010). The QP-DYN algorithms. QP\u2013PQ Quantum Probability and White Noise Analysis, Volume 28, World Scientific.","DOI":"10.1142\/9789814343763_0001"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/3\/19\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:10:56Z","timestamp":1760188256000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/3\/19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,29]]},"references-count":20,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["cryptography3030019"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3030019","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,29]]}}}