{"id":106646,"updated":"2025-01-21T09:24:54.529183+00:00","links":{},"created":"2025-01-18T23:50:00.871820+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106646","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106646","title":["カード組を用いた任意の論理関数の安全な計算について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"f1ca92fb-bde5-4512-ac60-8114e3872ae9"},"_deposit":{"id":"106646","pid":{"type":"depid","value":"106646","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"カード組を用いた任意の論理関数の安全な計算について","author_link":["13243","13249","13242","13247","13245","13246","13244","13248"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"カード組を用いた任意の論理関数の安全な計算について"},{"subitem_title":"Secure Computation for Any Boolean Function Using a Deck of Cards","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"暗号プロトコル,安全な計算,カード組,論理関数,対称関数","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東北大学大学院情報科学研究科"},{"subitem_text_value":"東北大学大学院情報科学研究科"},{"subitem_text_value":"東北大学サイバーサイエンスセンター"},{"subitem_text_value":"東北大学サイバーサイエンスセンター"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Sciences, Tohoku University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Sciences, Tohoku University","subitem_text_language":"en"},{"subitem_text_value":"Cyberscience Center, Tohoku University","subitem_text_language":"en"},{"subitem_text_value":"Cyberscience Center, Tohoku University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106646/files/IPSJCSS2014123.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014123.pdf","filesize":[{"value":"788.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"bf21ce63-842e-43ab-816e-bc710c840dc3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"西田, 拓也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"林, 優一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"水木, 敬明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"曽根, 秀昭"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takuya, Nishida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yu-ichi, Hayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takaaki, Mizuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hideaki, Sone","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"入力を秘密にしたまま出力を得られる安全な計算(Secure Multi-Party Computation)は,情報セキュリティを支える暗号技術の一つである.特に物理的なカード組を用いるカードベース暗号プロトコルは,情報理論的に安全な計算を実現する.既存研究では,論理積や多数決関数など,特定の論理関数にターゲットをしぼりテーラーメイドのプロトコルを構築し,計算に必要なカードの枚数を求めてきた.しかし,任意の論理関数を計算する為に十分な枚数について,一般的な解は未だ検討されていない.本稿では,任意の論理関数を安全に計算できるカード枚数を与えると共に,対称関数の場合は枚数を減らせることも示す.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Secure Multi-Party Computation, which outputs the result of some computation while concealing the inputs, is a cryptographic technique supporting information security. In particular, card-based cryptographic protocols that use physical cards achieve information theoretic security. The existing studies designed tailor-made protocols for certain Boolean functions such as the logical AND function and the majority function, showing the numbers of cards required for the computations. However, a sufficient number of cards to compute any function has not been revealed. In this paper, we give a sufficient condition on the number of cards for any function to be securely computed, and show that the number can be decreased for symmetric functions.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"951","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"944","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}