<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-11T00:42:14Z</responseDate>
  <request metadataPrefix="jpcoar_1.0" verb="GetRecord" identifier="oai:ipsj.ixsq.nii.ac.jp:00237199">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00237199</identifier>
        <datestamp>2025-01-19T08:57:43Z</datestamp>
        <setSpec>1164:6389:11481:11662</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>順序付きマルチ署名に対する鍵代替攻撃の検討</dc:title>
          <dc:title xml:lang="en">Key Substitution Attack against Ordered Multisignature</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>藤田, 祐輝</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>坂井, 祐介</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>山下, 恭佑</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>花岡, 悟一郎</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yuuki, Fujita</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yusuke, Sakai</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kyosuke, Yamashita</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Goichiro, Hanaoka</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">ISEC</jpcoar:subject>
          <datacite:description descriptionType="Other">鍵代替攻撃とは，ある署名に対して検証で受理されるようなメッセージと公開鍵の組を 2 通り与える攻撃である．本稿では Boldyreva ら (CCS’ 07) が提案した順序付きマルチ署名 (以下BGOY OMS) に関して検討を行う．まず，順序付きマルチ署名では検証に用いる公開鍵の組の中での鍵の順序を保証する必要があるという点を踏まえ，強い鍵代替不可能性と弱い鍵代替不可能性を定義する．本稿では，この定義に基づいて BGOY OMS が弱い鍵代替不可能性を満たさないことを示し，更に BGOY OMS を修正した構成方式を提案し，この方式がランダムオラクルモデルにおいて DBP 仮定の下でこの弱い安全性を満たすことを示す．</datacite:description>
          <datacite:description descriptionType="Other">The key substitution attack is an attack in which given a signature, a malicious party creates two messages and sequences of public keys that are accepted by the veriﬁcation algorithm. We investigate the possibility of key substitution attacks against the ordered multisignature ( BGOY OMS ) proposed by Boldyreva et al. ( CCS’ 07 ). First, we observe that the order of public keys in a sequence of public keys must be guaranteed in ordered mulsignatures. We introduce two security notions: (i) strong non-key substitutability that means the security against any key substitution attack and (ii) weak non-key substitutability that means the security against targeted key substitution attacks. We then show that BGOY OMS does not satisfy weak non-key substitutability. Furthermore, we propose a modiﬁed construction of BGOY OMS and prove that the modiﬁed BGOY OMS satisﬁes weak non-key substitutability under the DBP assumption in the random oracle model.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2024-07-15</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_18gh">technical report</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/237199</jpcoar:identifier>
          <jpcoar:sourceIdentifier identifierType="ISSN">2188-8671</jpcoar:sourceIdentifier>
          <jpcoar:sourceIdentifier identifierType="NCID">AA12628305</jpcoar:sourceIdentifier>
          <jpcoar:sourceTitle>研究報告セキュリティ心理学とトラスト（SPT）</jpcoar:sourceTitle>
          <jpcoar:volume>2024-SPT-56</jpcoar:volume>
          <jpcoar:issue>78</jpcoar:issue>
          <jpcoar:pageStart>1</jpcoar:pageStart>
          <jpcoar:pageEnd>8</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-SPT24056078.pdf">https://ipsj.ixsq.nii.ac.jp/record/237199/files/IPSJ-SPT24056078.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>963.9 kB</jpcoar:extent>
            <datacite:date dateType="Available">2026-07-15</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
