{"created":"2023-05-15T12:34:48.404164+00:00","id":3461,"links":{},"metadata":{"_buckets":{"deposit":"eaddeaf5-7c68-4015-a05a-fd94b58defc0"},"_deposit":{"created_by":3,"id":"3461","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"3461"},"status":"published"},"_oai":{"id":"oai:nitech.repo.nii.ac.jp:00003461","sets":["31"]},"author_link":["9208","8514","8515"],"item_5_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2011-02-11","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"84","bibliographicPageStart":"79","bibliographic_titles":[{"bibliographic_title":"Proceedings of the World Congress on Internet Security 2011 (WorldCIS-2011)"}]}]},"item_5_description_16":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_5_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"Since the problem of disclosing personal information on the Internet continues to increase, many anonymous communication systems have been studied. Such systems usually use directory servers to manage public keys of participant nodes. However, this reduces anonymity because the query messages for the directory servers can give adversaries route information of anonymous communication channels. To solve this problem, applying ID-Based Encryption has been proposed, but in the existing method, directory servers continue to exist. Our novel method, which can grasp assigned NodeIDs without directory servers, can be applied to existing DHT-based anonymous communication systems. Our proposal enhances scalability. This paper describes the structure of our proposed system and its application.","subitem_description_type":"Other"}]},"item_5_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"8514","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"1000070304186 ","nameIdentifierScheme":"NRID","nameIdentifierURI":"http://rns.nii.ac.jp/nr/1000070304186 "}],"names":[{"name":"齋藤, 彰一"}]},{"nameIdentifiers":[{"nameIdentifier":"8515","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"1000000219396 ","nameIdentifierScheme":"NRID","nameIdentifierURI":"http://rns.nii.ac.jp/nr/1000000219396 "}],"names":[{"name":"松尾, 啓志"}]}]},"item_5_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Institute of Electrical and Electronics Engineers"}]},"item_5_version_type_13":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tanaka, Hiroyuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Saito, Shoichi","creatorNameLang":"en"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"Matsuo, Hiroshi","creatorNameLang":"en"}],"nameIdentifiers":[{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-01-17"}],"displaytype":"detail","filename":"saito_2011_wcis_2.pdf","filesize":[{"value":"188.3 kB"}],"format":"application/pdf","license_note":"c2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文_fulltext","url":"https://nitech.repo.nii.ac.jp/record/3461/files/saito_2011_wcis_2.pdf"},"version_id":"157f2d5a-3d47-4284-86be-cfaf760cb0f8"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Removing Directory Servers from Anonymous Communication Systems using ID-Based Encryption to Improve Scalability","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Removing Directory Servers from Anonymous Communication Systems using ID-Based Encryption to Improve Scalability","subitem_title_language":"en"}]},"item_type_id":"5","owner":"3","path":["31"],"pubdate":{"attribute_name":"公開日","attribute_value":"2013-06-25"},"publish_date":"2013-06-25","publish_status":"0","recid":"3461","relation_version_is_last":true,"title":["Removing Directory Servers from Anonymous Communication Systems using ID-Based Encryption to Improve Scalability"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-05-15T14:43:31.555717+00:00"}