{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00157737","sets":["1164:2836:8481:8482"]},"path":["8482"],"owner":"11","recid":"157737","title":["k out of n秘密計算プロトコルの一考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-02-25"},"_buckets":{"deposit":"e3b1f25f-9d5a-42ce-a799-3bd437c36bda"},"_deposit":{"id":"157737","pid":{"type":"depid","value":"157737","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"k out of n秘密計算プロトコルの一考察","author_link":["299088","299090","299086","299091","299089","299085","299087","299084"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"k out of n秘密計算プロトコルの一考察"},{"subitem_title":"A Study for k out of n Secret Computation Protocol","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"秘密分散・暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2016-02-25","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"千葉工業大学情報科学部情報工学科"},{"subitem_text_value":"千葉工業大学情報科学部情報工学科"},{"subitem_text_value":"株式会社アイエスイーエム"},{"subitem_text_value":"早稲田大学国際情報通信センター"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Computer Science, Faculty of Information and Computer Science, Chiba Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Faculty of Information and Computer Science, Chiba Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"ISEM, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Waseda University, Global Infromation and Telecommunication Institute","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/157737/files/IPSJ-DPS16166005.pdf","label":"IPSJ-DPS16166005.pdf"},"date":[{"dateType":"Available","dateValue":"2018-02-25"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DPS16166005.pdf","filesize":[{"value":"777.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"34"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c1c1f4eb-d62a-41eb-af79-3f4c868d3301","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"滝, 雄太郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"藤田, 茂"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮西, 洋太郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"白鳥, 則郎"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yutaro, Taki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shigeru, Fujita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yohtaro, Miyanishi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Norio, Shiratori","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10116224","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8906","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"クラウドシステムを利用して情報処理を行なう際に,クラウドシステムを構成するサーバがクラツキングされる,あるいはサーバの管理者が不正行為を行なうという可能性があるので,クラウドを安全に利用するためには秘匿性を担保する必要がある.この課題に対してセキュアマルチパーティ法による秘密分散法や秘密計算法が研究されている.中でも,“軽量 3 パーティ秘匿関数計算” は,1) 入力値の秘匿性が保証される,2) 演算結果が改竄された場合に,その検出効率が良い,とされている.本研究では,実用面から幾つかの制約を置いた上で,“軽量 3 パーティ秘匿関数計算” の拡張を検討したので,これを報告する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"When performing information processing by using Cloud System, Cracker is able to crack server that make up the cloud system, and an administrator of the server is able to do the fraud on Cloud System. In order to use safely, it is necessary to ensure the confidentiality. To solve this problem Secret sharing method and a secret computation method has been studied by the secure multi-party law. Above all, “A Lightweight Three-party secure function evaluatio” is, 1) confidentiality of the input values is ensured, 2) operation result is falsified, is the detection efficiency is good. In this paper, we report that having examined the expansion of “A Lightweight Three-party Secure Function evaluation” in terms of the practical side with some constraints.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"7","bibliographic_titles":[{"bibliographic_title":"研究報告マルチメディア通信と分散処理(DPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2016-02-25","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"2016-DPS-166"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":157737,"updated":"2025-01-20T13:13:42.541484+00:00","links":{},"created":"2025-01-19T00:31:36.684825+00:00"}