{"updated":"2025-01-20T12:18:18.583783+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00160466","sets":["1164:3925:8483:8688"]},"path":["8688"],"owner":"11","recid":"160466","title":["秘密分散ベース秘密計算を用いたニューラルネットワークのコスト評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-05-19"},"_buckets":{"deposit":"98974d43-5375-45aa-b84f-df676b1b151b"},"_deposit":{"id":"160466","pid":{"type":"depid","value":"160466","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"秘密分散ベース秘密計算を用いたニューラルネットワークのコスト評価","author_link":["310586","310587","310590","310589","310591","310588"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"秘密分散ベース秘密計算を用いたニューラルネットワークのコスト評価"},{"subitem_title":"Cost Evaluation of Neural Network using Secret-sharing-based Secure Computation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"秘密計算・高機能暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2016-05-19","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/160466/files/IPSJ-CSEC16073021.pdf","label":"IPSJ-CSEC16073021.pdf"},"date":[{"dateType":"Available","dateValue":"2018-05-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC16073021.pdf","filesize":[{"value":"768.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"17b93a12-f422-4195-8a79-9ce5fbe682e3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"田中, 哲士"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山田, 真徳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"菊池, 亮"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Satoshi, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masanori, Yamada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryo, Kikuchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"機械学習が大規模化するにつれて,機械学習のクラウドへの委託が行われるようになってきている.しかしクラウドからデータが漏洩した場合,ユーザのプライバシー情報のみならず,企業の資産とも言える機械学習パラメータも漏洩してしまう危険性がある.本論文ではこの問題を解決するために,ユーザが持つプライバシー情報と企業が持つ機械学習パラメータを秘匿しながら,クラウドに機械学習を委託する方法を提案する.提案方法は秘密分散ベース秘密計算を基に,ニューラルネットワークを用いた学習・予言を可能としている.さらに,提案方式の有効性を測るため,ニューラルネットワークで用いる活性関数としてランプ関数を用いた場合の計算コストを見積り,既存の実装結果と併せることで,機械学習にどの程度の時間がかかるかを推定する.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2016-05-19","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"21","bibliographicVolumeNumber":"2016-CSEC-73"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:33:22.651783+00:00","id":160466,"links":{}}