{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00104978","sets":["6164:6165:6640:7689"]},"path":["7689"],"owner":"11","recid":"104978","title":["暗号化匿名通信プロトコルの提案とそのプロトタイプ実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-07-02"},"_buckets":{"deposit":"b22364bf-9b01-43c5-bfc9-7f5bee9f4c00"},"_deposit":{"id":"104978","pid":{"type":"depid","value":"104978","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"暗号化匿名通信プロトコルの提案とそのプロトタイプ実装","author_link":["6200","6196","6197","6198","6199"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"暗号化匿名通信プロトコルの提案とそのプロトタイプ実装"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ, 暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-07-02","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報通信研究機構"},{"subitem_text_value":"東邦大学/情報通信研究機構"},{"subitem_text_value":"北陸先端科学技術大学院大学/情報通信研究機構"},{"subitem_text_value":"北陸先端科学技術大学院大学"},{"subitem_text_value":"情報通信研究機構"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/104978/files/IPSJ-DICOMO2014108.pdf"},"date":[{"dateType":"Available","dateValue":"2014-07-02"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DICOMO2014108.pdf","filesize":[{"value":"393.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c4cadfa8-edb5-4d29-9ef4-274c58b46573","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"江村恵太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"金岡晃"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"太田悟史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"面和成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高橋健志"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ユーザの匿名性を担保したまま権限を確認することや暗号化を行うためには,暗号方式と匿名通信プ ロトコルとの融合が必要不可欠である.例えば暗号方式として匿名でユーザの権限を確認する機能を保証 していたとしても,IP アドレス等の通信時の付加情報によりその匿名性が損なわれてしまう.また現在の PKI を利用すると,ユーザの公開鍵 (の証明書) からユーザを特定可能であるため匿名性を担保できない.そこで本論文では,暗号方式 (グループ署名及び ID ベース暗号) 及び匿名通信プロトコル (Simpleproxy ま たは Tor) を利用した暗号化匿名通信プロトコルの提案及びプロトタイプ実装を行い,そのフィージビリ ティを検証する.特に Tor を用いた場合,提案プロトコルを用いた場合と SSL 通信の場合 (また暗号化通 信を行わない場合) とを比較して,大きな差異が見られない.これらの結果から,提案プロトコルが現実的 なコストで暗号化匿名通信を実現できることが示される.なお本論文は著者らが ACM SAC 2014 で発表 した成果に対し,Tor を用いた場合の評価を加えたものである.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"774","bibliographic_titles":[{"bibliographic_title":"マルチメディア、分散協調とモバイルシンポジウム2014論文集"}],"bibliographicPageStart":"765","bibliographicIssueDates":{"bibliographicIssueDate":"2014-07-02","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":104978,"updated":"2025-01-21T10:04:31.982536+00:00","links":{},"created":"2025-01-18T23:48:55.922717+00:00"}