[1] Authentication, Cambridge Dictionary. Available online: https://dictionary.cambridge.org/dictionary/english/ authentication (accessed on 20 September 2020).
[2] Tanaka, T. Higashi Asia Tsukoken to Kokusaininnshiki (East Asian Commerce and International Recognition). Yoshikawa Kobunkan, 1997.
[3] Tanaka, T.; Ishii, M. Taigai Kankeishi Jiten (Foreign Relations History Dictionary). Yoshikawa Kobunkan: 2009.
[4] Grassi, P.A.; Garcia, M.E.; Fenton, J.L. Digital Identity Guidelines; NIST Special Publication (NIST SP)-800-63-3; National Institute of Standards and Technology, Los Altos, Calif. 2017.
[5] Identification, Cambridge Dictionary. Available online: https://dictionary.cambridge.org/us/dictionary/learner-english/ identification (accessed on 20 September 2020).
[6] Authorization, Oxford Learner’s Dictionaries. Available online: https://www.oxfordlearnersdictionaries.com/definition/english/ authorization?q=authorization (accessed on 20 September 2020).
[7] Kihara, M.; Iriyama, S. New authentication algorithm based on verifiable encryption with digital identity. Cryptography 2019, 3, 19
[8] Kihara, M.; Iriyama, S. Security and Performance of Single Sign-On Based on One-Time Pad Algorithm. Cryptography 2020, 4, 16
[9] Rivest, R.L.; Shamir, A.; Adleman, L. Method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126; DOI:10.1145/359340.359342.
[10] Elgamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory 1985, 31, 469–472; DOI:10.1109/TIT.1985.1057074.
[11] Gentry, C. Fully homomorphic encryption scheme. Ph.D. Dissertation, Stanford University, Stanford, CA, USA, September 2009.
[12] Gentry, C., Halevi, S. Implementing Gentry’s fully homomorphic encryption scheme. In Advances in Cryptology – EUROCRYPT 2011, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia 15–19 May, 2011; Paterson, K.G., Ed.; Springer: Berlin Heidelberg, Germany, 2011; pp. 129–148.
[13] Fiat, A.; Shamir, A. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology—CRYPTO ’86, Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA, 11–15 August, 1986; Odlyzko, A.M., Ed.; Springer: Berlin Heidelberg, Germany, 1986; pp. 186–194.
[14] Schnorr, C.P. Efficient identification and signatures for smart cards. In Advances in Cryptology—CRYPTO ’89, Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, CA, USA, 20–24 August, 1989; Brassard, G., Ed.; Springer: New York, NY, USA, 1989; pp. 239–252.
[15] Daemen, J.; Rijmen, V. The Design of Rijndael: AES – The Advanced Encryption Standard; Springer Science and Business Media: Berlin Heidelberg, Germany, 2013.
[16] Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G. Public key encryption with keyword search. In Advances in Cryptology – EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2–6 2004; Cachin, C., Camenisch, J.L., Eds.; Springer: Berlin Heidelberg, Germany, 2004; pp. 506–522.
[17] Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J.; Neven, G.; Paillier, P.; Shi, H. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In Advances in Cryptology—CRYPTO 2005, Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August, 2005; Shoup, V., Ed.; Springer: Berlin Heidelberg, Germany, 2005; pp. 205–222.
[18] Hu, C.; Liu, P. Decryptable searchable encryption with a designated tester. In Procedia Engineering 2011, 15, 1737–1741.
[19] Li, S.; Li, M.; Xu, H.; Zhou, X. Searchable encryption scheme for personalized privacy in IoT-based big data. In Sensors 2019, 19, 1059; DOI:10.3390/s19051059.
[20] C, Guo.; R, Zhuang; Y, Jie.; K.R. Choo.; X. Tang. Secure Range Search Over Encrypted Uncertain IoT Outsourced Data. In IEEE Internet of Things Journal 2019 ,6, 1520–1529. DOI: 10.1109/JIOT.2018.2845106
[21] Zhou, R.; Zhang, X.; Wang, X.; Yang, G.; Li, W. Keyword searchable encryption with fine-grained forward secrecy for Internet of Thing Data. In ICA3PP 2018, 11337, Springer, Cham, 288–302.
[22] M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama, T. Koshiba, Packed homomorphic encryption based on ideal lattices and its application to biometrics. In Security Engineering and Intelligence Informatics, Proceedings of the International Conference on Availability, Reliability, and Security, Regensburg, Germany, 2–6 September 2013; Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L., Eds.; Springer: Berlin Heidelberg, Germany, 2013; pp. 55–74.
[23] Feige, U.; Fiat, A.; Shamir, A. Zero-knowledge proofs of identity. J. Cryptol. 1988, 1, 77–94; DOI:10.1007/BF02351717.
[24] Goldwasser, S.; Micali, S.; Rackoff, C.. Knowledge complexity of interactive proof systems. SIAM J. Comput. 1989, 18, 186–208; DOI:10.1137/0218012.
[25] Goldreich, O. Foundations of Cryptography: Volume 1 - Basic Tools; Cambridge University Press, Cambridge, UK, 2001.
[26] Murakami, T. Japan’s National IT Strategy and the Ubiquitous Network. NRI Paper 97, 2005.
[27] Abundo, M.; Accardi, L.; Auricchio, A. Hyperbolic automorphisms of tori and pseudo-random sequences. Calcolo 1992, 29, 213–240; DOI:10.1007/BF02576183.
[28] Accardi, L.; Regoli, M.; Ohya, M. The QP-DYN algorithms. In QP–PQ Quantum Probability and White Noise Analysis; Accardi, L., Freudenberg, W., Ohya, M., Eds.; World Scientific: Singapore, 2010; pp. 1–16.
[29] Internet World Stats. Available online: https://www.internetworldstats.com/stats.htm (accessed on 31 March 2020).
[30] Hu, J.; Sun, Q.; Chen, H. Application of single sign-on (SSO) on a digital campus. In Proceedings of the Third IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT 2010), Beijing, China, 26–28 October, 2010; IEEE: Piscataway, NJ, USA, 2011; pp. 725–727.
[31] Single Sign-on Market by Type (Enterprise, Federated & Web-Based, Windows Integrated), Organization Size (Small & Medium Enterprises, Large Enterprises), Deployment Mode (Cloud, On-Premises), Vertical, Region—Global Forecast to 2021. Markets and Markets. Available online: https://www.marketsandmarkets.com/Market-Reports/ single-sign-on-market-83280444.html (accessed on 28 May 2020).
[32] Villanueva, J. 5 Big Business Benefits of Using SSO (Single Sign-On). Managed File Transfer and Network Solutions Available online: https://www.jscape.com/blog/bid/104856/5-Big-Business-Benefits-of-UsingSSO-Single-Sign-On (accessed on 14 May 2020).
[33] Radha, V.; Reddy, D.H. A survey on single sign-on techniques Proc. Technol. 2012, 4, 134–139.
[34] Bazaz, T.; Khalique, A. A review on single signs for enabling technologies and protocols. Int. J. Comput. Appl. 2016, 151, 18–25.
[35] De Clercq, J. Single sign-on architectures. In Proceedings of the International Conference on Infrastructure Security, Heidelberg, Germany, 1 October, 2002; Springer: Berlin, Germany, 2002; pp. 40–58.
[36] Miller, S.P.; Neuman, B.C.; Schiller, J.I.; Saltzer, J.H. Project Athena Technical Plan. In Kerberos Authentication and Authorization System, MIT Project Athena. 1988.
[37] Neuman, B.C.; Ts’o, T. Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 1994, 32, 33–38.
[38] Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard, OASIS, 2005. Available online: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os. pdf (accessed on 6 April 2020).
[39] Security Assertion Markup Language (SAML) V2.0 Technical Overview, OASIS, 2008. OASIS. Available online: http://docs.oasis-open.org/security/saml/Post2.0/ sstc-saml-tech-overview-2.0.html (accessed on 14 May 2020).
[40] OpenID Foundation Website. Available online: http://openid.net/ (accessed on 6 April 2020).
[41] OAuth Website. Available online: https://oauth.net/2/ (accessed on 28 May 2020).
[42] Sun, S.T.; Pospisil, E.; Muslukhov, I.; Dindar, N.; Hawkey, K.; Beznosov, K. Beznosov KWhat makes users refuse a single web sign-on? An empirical investigation of OpenID. In Proceedings of the Seventh Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, 20–22 July, 2011.
[43] Horie S. Keeping Anonymity at the Consumer Behavior on the Internet: Proof of Sacrifice. Comput. Ethics-Philos. Enq. (CEPE) Proc. 2019, 2019, 5.
[44] F. Yang, S. Manoharan, S. Security analysis of the OAuth protocol. In Proceedings of the 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), Victoria, BC, Canada, August 27– 29, 2013
[45] Tsyrklevich, E.; Tsyrklevich, V. Single sign-on for the Internet: A security story. July and August 340, 2007.
[46] Groß, T. Security analysis of the SAML single sign-on browser/artifact profile. In Proceedings of the 19th Annual Computer Security Applications Conference 2003, Las Vegas, NV, USA, December 8–12, 2003.
[47] Wu, T.D. A Real-World Analysis of Kerberos Password Security. Ndss, 3 February 1999 .
[48] Iriyama, S.; Tanaka, Y.; Hara, Toshihide,; Ohya, M. On a PRNG based on noncommutative algebra and its applications. SPT 2014, 13, 1–3.
[49] ProVerif Webcite. Available online: https://prosecco.gforge.inria.fr/personal/bblanche/proverif/ (accessed on 2 June 2020).
[50] Iriyama, S.; Kihara, M. ENCRYPTED DATA PROCESSING SYSTEM AND PROGRAM Japan patent PCT/JP2018/045505, date (27 June, 2019).
[51] Iriyama, S.; Kihara, M. AUTHENTICATION SYSTEM AND PROGRAM. Japan patent JP2020/25659, date (18 February 2020).