{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00168202","sets":["1164:6389:8485:8760"]},"path":["8760"],"owner":"11","recid":"168202","title":["多項式の近似GCDを利用した代数曲面暗号方式"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-07-07"},"_buckets":{"deposit":"80c4adb2-3c0e-4068-ade5-73510b3139f5"},"_deposit":{"id":"168202","pid":{"type":"depid","value":"168202","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"多項式の近似GCDを利用した代数曲面暗号方式","author_link":["336498","336494","336492","336491","336500","336499","336495","336496","336493","336497"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"多項式の近似GCDを利用した代数曲面暗号方式"},{"subitem_title":"Algebraic Surface Cryptosystems using Polynomial Approximate GCD","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2016-07-07","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社東芝研究開発センターコンピュータアーキテクチャ・セキュリティラボラトリー"},{"subitem_text_value":"株式会社東芝研究開発センターコンピュータアーキテクチャ・セキュリティラボラトリー"},{"subitem_text_value":"国立大学法人北海道教育大学"},{"subitem_text_value":"国立研究開発法人産業技術総合研究所(AIST)情報技術研究部門高機能暗号研究グループ"},{"subitem_text_value":"国立研究開発法人産業技術総合研究所(AIST)情報技術研究部門高機能暗号研究グループ"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Computer Architecture and Network Systems Laboratory, Corporate R&D Center, Toshiba Corporation","subitem_text_language":"en"},{"subitem_text_value":"Computer Architecture and Network Systems Laboratory, Corporate R&D Center, Toshiba Corporation","subitem_text_language":"en"},{"subitem_text_value":"Hokkaido University of Education","subitem_text_language":"en"},{"subitem_text_value":"Advanced Cryptography Research Group, Information Technology Research Institute, AIST","subitem_text_language":"en"},{"subitem_text_value":"Advanced Cryptography Research Group, Information Technology Research Institute, AIST","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/168202/files/IPSJ-SPT16019033.pdf","label":"IPSJ-SPT16019033.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT16019033.pdf","filesize":[{"value":"807.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"52e7677a-d725-42f7-8f0e-b54735dfb3fe","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"駒野, 雄一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"秋山, 浩一郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"後藤, 泰宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"縫田, 光司"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"花岡, 悟一郎"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuichi, Komano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koichiro, Akiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yasuhiro, Goto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koji, Nuida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Goichiro, Hanaoka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"2004 年に提案されて以来,代数曲面暗号には幾つかの攻撃が報告されている.本稿は,これらの攻撃が困難となるような新たな方式を提案する.提案方式は,代数曲面の性質により秘密鍵を利用すると除去可能なランダムな多項式に加えて,低次のランダムな多項式をノイズ成分として暗号文に加算することで,攻撃を回避する.復号者は,秘密鍵を利用して前者のランダムな多項式を除去した後,近似 GCD 計算により低次のランダムな多項式を取り除き,平文多項式を復元する.提案方式は本稿で定義する識別問題の困難性を安全性の根拠としているが,その困難性の評価は今後の課題である.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Since the original proposal in 2004, several attacks have been reported against algebraic surface cryptosystems. This report proposes a new construction (possibly) resistant to these attacks. Achieving such resistance, our proposal adds a new low-degree random polynomial, in addition to another random polynomial as in the previous constructions. In decryption, a user uses a secret key (section on the algebraic surface) to remove the latter random polynomial and then he recovers a plaintext free from the former low-degree random polynomial by calculating polynomial approximate GCD. The security of our proposal is based on a decision problem defined in this report; however, the estimation of its difficulty still remains as a future work.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2016-07-07","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"33","bibliographicVolumeNumber":"2016-SPT-19"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":168202,"updated":"2025-01-20T09:26:52.372534+00:00","links":{},"created":"2025-01-19T00:39:18.989218+00:00"}