{"updated":"2025-01-23T02:45:46.122979+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00010548","sets":["581:625:630"]},"path":["630"],"owner":"1","recid":"10548","title":["交渉ゲームにおける鍵自己暴露戦略のインパクト?電子署名技術の利用に係る新たな課題"],"pubdate":{"attribute_name":"公開日","attribute_value":"2005-08-15"},"_buckets":{"deposit":"f92ba530-3af1-4ace-aa1f-079893c05d8f"},"_deposit":{"id":"10548","pid":{"type":"depid","value":"10548","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"交渉ゲームにおける鍵自己暴露戦略のインパクト?電子署名技術の利用に係る新たな課題","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"交渉ゲームにおける鍵自己暴露戦略のインパクト?電子署名技術の利用に係る新たな課題"},{"subitem_title":"Impact of the Key Self-compromise Strategy in a Bargaining Game The New Problem Affecting Application of Digital Signature Technology","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:多様な社会的責任を担うコンピュータセキュリティ技術","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2005-08-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社日立製作所システム開発研究所,東京大学生産技術研究所"},{"subitem_text_value":"早稲田大学大学院アジア太平洋研究科"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院"},{"subitem_text_value":"東京電機大学工学部"},{"subitem_text_value":"電気通信大学人間コミュニケーション学科"},{"subitem_text_value":"日立電子サービス株式会社"},{"subitem_text_value":"株式会社日立製作所システム開発研究所"},{"subitem_text_value":"株式会社日立製作所システム開発研究所"},{"subitem_text_value":"東京大学生産技術研究所"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Systems Development Laboratory, Hitachi Ltd.,Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Asia-Pasific Studies, Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Engineering, Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"The Department of Human Communication, The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Hitachi Electronics Services Co., Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Systems Development Laboratory, Hitachi Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Systems Development Laboratory, Hitachi Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/10548/files/IPSJ-JNL4608007.pdf"},"date":[{"dateType":"Available","dateValue":"2007-08-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4608007.pdf","filesize":[{"value":"196.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"8ea6abc2-6afe-48c9-b0dc-b18892a11425","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2005 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"宮崎, 邦彦"},{"creatorName":"岩村, 充"},{"creatorName":"松本, 勉"},{"creatorName":"佐々木, 良一"},{"creatorName":"吉浦, 裕"},{"creatorName":"松木, 武"},{"creatorName":"秦野, 康生"},{"creatorName":"手塚, 悟"},{"creatorName":"今井, 秀樹"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kunihiko, Miyazaki","creatorNameLang":"en"},{"creatorName":"Mitsuru, Iwamura","creatorNameLang":"en"},{"creatorName":"Tsutomu, Matsumoto","creatorNameLang":"en"},{"creatorName":"Ryoichi, Sasaki","creatorNameLang":"en"},{"creatorName":"Hiroshi, Yoshiura","creatorNameLang":"en"},{"creatorName":"Takeshi, Matsuki","creatorNameLang":"en"},{"creatorName":"Yasuo, Hatano","creatorNameLang":"en"},{"creatorName":"Satoru, Tezuka","creatorNameLang":"en"},{"creatorName":"Hideki, Imai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"電子署名技術の利用にあたっては,署名者は秘密鍵を安全に管理する必要がある.一般には,秘密鍵を安全に管理することは署名者自身にとって利益となると考えられているが,署名者の状況によっては,安全に管理することが利益とならないケースも生じうる.本稿では,署名者が債務超過に近い状態にある債務者である場合を例にあげて,署名鍵の自己暴露が債権者に対する攻撃となることを指摘する.さらに債務者が鍵自己暴露の可能性を持つことが,債権者?債務者間の債務縮減交渉に与える影響について分析を行い,この問題への対策の方針と例を示す.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In application of digital signature technology, a signer needs to manage his/her private key safely. Keeping the private key safely is seemingly profit for the signer him/herself, but this may not true in certain situation. In this paper, the case where the signer is an obligor who is almost crushed by debt is mentioned as an example and we point out that self-compromising the signing private key by the obligor serves as an attack on a creditor. Furthermore, we analyze how it affects on the debt curtailment bargaining between a creditor and an obligor that the obligor has private key self-compromising, and show examples for countermeasure.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1879","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1871","bibliographicIssueDates":{"bibliographicIssueDate":"2005-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicVolumeNumber":"46"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"セキュリティ基盤技術"}]},"weko_creator_id":"1"},"created":"2025-01-18T22:45:25.672857+00:00","id":10548,"links":{}}