{"created":"2023-05-15T10:27:01.844438+00:00","id":22319,"links":{},"metadata":{"_buckets":{"deposit":"bf55d920-889f-478a-a3ba-3018a5326376"},"_deposit":{"created_by":1,"id":"22319","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"22319"},"status":"published"},"_oai":{"id":"oai:u-fukui.repo.nii.ac.jp:00022319","sets":["2403:2404"]},"author_link":["64339","64338","64337","64336"],"item_10001_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2011-11","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"11","bibliographicPageEnd":"1542","bibliographicPageStart":"1533","bibliographicVolumeNumber":"6","bibliographic_titles":[{"bibliographic_title":"JOURNAL OF NETWORKS"}]}]},"item_10001_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Anonymous networks enable entities to send messages without disclosing their identities. Many anonymous networks had been proposed already, such as Mixnet, DC-net, Crowds, etc., however, they still have serious drawbacks. Namely, they require tremendous computation overheads to transmit messages over networks. That is because asymmetric key encryption algorithms are used. This paper proposes ESEBM (Enhanced Symmetric Key Encryption based Mixnet), a new mechanism for anonymous communication that removes drawbacks of existing anonymous networks while exploiting symmetric key encryption algorithms. According to experimentations, throughput of ESEBM is about 1/4.4 of usual non-anonymous networks, and it achieves more than 36 times higher throughput compared withMixnet. In addition, different from existing anonymous networks, ESEBM can handle reply messages without any additional mechanism, and it can protect itself from various threats, e.g. DOS attacks and message forgeries.","subitem_description_type":"Abstract"}]},"item_10001_relation_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"TD00006766","subitem_relation_type_select":"NCID"}}]},"item_10001_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"17962056","subitem_source_identifier_type":"ISSN"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"HADDAD, Hazim"}],"nameIdentifiers":[{"nameIdentifier":"64336","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"TAMURA, Shinsuke"}],"nameIdentifiers":[{"nameIdentifier":"64337","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"TANIGUCHI, Shuji"}],"nameIdentifiers":[{"nameIdentifier":"64338","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"YANASE, Tatsuro"}],"nameIdentifiers":[{"nameIdentifier":"64339","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-08-04"}],"displaytype":"detail","filename":"J.Networks6_11_2011.pdf","filesize":[{"value":"1.4 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"J.Networks6_11_2011.pdf","url":"https://u-fukui.repo.nii.ac.jp/record/22319/files/J.Networks6_11_2011.pdf"},"version_id":"1b25521c-214c-4d15-ba89-9abe1b30db8f"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"other","resourceuri":"http://purl.org/coar/resource_type/c_1843"}]},"item_title":"Development of Anonymous Networks Based on Symmetric Key Encryptions","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Development of Anonymous Networks Based on Symmetric Key Encryptions"}]},"item_type_id":"10001","owner":"1","path":["2404"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-01-24"},"publish_date":"2012-01-24","publish_status":"0","recid":"22319","relation_version_is_last":true,"title":["Development of Anonymous Networks Based on Symmetric Key Encryptions"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-05-15T13:03:08.339961+00:00"}