{"created":"2023-05-15T11:57:40.802731+00:00","id":3400,"links":{},"metadata":{"_buckets":{"deposit":"6ac4e7ce-1c52-4d26-aa89-0605ce78f35c"},"_deposit":{"created_by":3,"id":"3400","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"3400"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00003400","sets":["8:24"]},"author_link":["13623","13624","13625","27425","13627"],"control_number":"3400","item_1689815586683":{"attribute_name":"CRID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://cir.nii.ac.jp/crid/1390282680241641344","subitem_relation_type_select":"URI"}}]},"item_1697440742810":{"attribute_name":"HDL","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"http://id.nii.ac.jp/1001/00067730/","subitem_relation_type_select":"HDL"}}]},"item_21_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2006-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicPageEnd":"2370","bibliographicPageStart":"2362","bibliographicVolumeNumber":"47","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌","bibliographic_titleLang":"ja"},{"bibliographic_title":"IPSJ Journal","bibliographic_titleLang":"en"}]}]},"item_21_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Unlinkability, the property that prevents an adversary recognizing whether outputs are from the same user, is an important concept in RFID. Although hash-based schemes can provide unlinkability by using a low-cost hash function, existing schemes are not scalable since the server needs O(N) hash calculations for every ID matching, where N is the number of RFID devices. Our solution is the K-steps ID matching scheme, which can reduce the number of hash calculations on the server to O(logN). In this paper, we explain the protocol, describe a test implementation, and discuss the application of this scheme to practical RFID systems. We also compare the scheme with other hash-based schemes from various viewpoints.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_21_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"affiliations":[{"affiliationNames":[{"lang":"ja"}]}]}]},"item_21_link_62":{"attribute_name":"研究者情報","attribute_value_mlt":[{"subitem_link_url":"https://hyokadb02.jimu.kyutech.ac.jp/html/140_ja.html"}]},"item_21_publisher_7":{"attribute_name":"出版社","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_21_rights_13":{"attribute_name":"著作権関連情報","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2009 by the Information Processing Society of Japan. 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof.All Rights Reserved, Copyright (C) Information Processing Society of Japan. 本文データは学協会の許諾に基づきCiNiiから複製したものである"}]},"item_21_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"yes"}]},"item_21_source_id_10":{"attribute_name":"NCID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_21_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"EISSN"}]},"item_21_text_63":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"2465"}]},"item_21_text_64":{"attribute_name":"業績ID","attribute_value_mlt":[{"subitem_text_value":"F5918383EA80B3A9492576BE00340EB3"}]},"item_21_version_type_58":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Nohara, Yasunobu","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"13623","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Nakamura, Toru","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"13624","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Baba, Kensuke","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"13625","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNames":[{}]}],"creatorNames":[{"creatorName":"Inoue, Sozo","creatorNameLang":"en"},{"creatorName":"井上, 創造","creatorNameLang":"ja"},{"creatorName":"イノウエ, ソウゾウ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{"nameIdentifier":"27425","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"90346825","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000090346825"},{"nameIdentifier":"9335840200","nameIdentifierScheme":"Scopus著者ID","nameIdentifierURI":"https://www.scopus.com/authid/detail.uri?authorId=9335840200"},{"nameIdentifier":"140","nameIdentifierScheme":"九工大研究者情報","nameIdentifierURI":"https://hyokadb02.jimu.kyutech.ac.jp/html/140_ja.html"}]},{"creatorNames":[{"creatorName":"Yasuura, Hiroto","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"13627","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2010-02-02"}],"displaytype":"detail","filename":"110004761970.pdf","filesize":[{"value":"989.9 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"110004761970.pdf","url":"https://kyutech.repo.nii.ac.jp/record/3400/files/110004761970.pdf"},"version_id":"2f0136c3-23ac-49e0-84e2-3f88ae9e3433"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Unlinkable Identification for Large-scale RFID Systems","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Unlinkable Identification for Large-scale RFID Systems","subitem_title_language":"en"}]},"item_type_id":"21","owner":"3","path":["24"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2010-02-02"},"publish_date":"2010-02-02","publish_status":"0","recid":"3400","relation_version_is_last":true,"title":["Unlinkable Identification for Large-scale RFID Systems"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-09T02:52:22.401706+00:00"}