{"updated":"2025-01-20T02:20:04.275359+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00187271","sets":["6164:6165:6462:9463"]},"path":["9463"],"owner":"11","recid":"187271","title":["ブロックチェーンと秘密分散法を用いた情報ライフサイクル制御"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-10-16"},"_buckets":{"deposit":"87aaddbc-9f4c-49d1-97ea-94b9a39afe49"},"_deposit":{"id":"187271","pid":{"type":"depid","value":"187271","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"ブロックチェーンと秘密分散法を用いた情報ライフサイクル制御","author_link":["423043","423045","423044","423046"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ブロックチェーンと秘密分散法を用いた情報ライフサイクル制御"},{"subitem_title":"Information Lifecycle Control Employing Blockchain and Secret Sharing","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ブロックチェーン,秘密分散法,消去,検閲","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2017-10-16","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学生産技術研究所"},{"subitem_text_value":"東京大学生産技術研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/187271/files/IPSJCSS2017096.pdf","label":"IPSJCSS2017096.pdf"},"date":[{"dateType":"Available","dateValue":"2017-10-16"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2017096.pdf","filesize":[{"value":"519.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"b51923ae-34c5-4867-af4b-c293082c8042","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"今田, 丈雅"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松浦, 幹太"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takemasa, Imada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kanta, Matsuura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"われわれは今日なんらかのコミュニケーションツールを使って情報の伝達をしている. 情報伝達にあたっては中央サーバーを経由しており, ユーザーからはデータの制御権が離れてしまう. このため後から政府の検閲によってセンシティブなデータが見られてしまう可能性がある. そのような脅威に対抗するためにはデータに期限を設定し, 自動で消去されるような仕組みが必要である. 本研究では公開分散型台帳と秘密分散法を組み合わせることによって上記の要請を満たすプロトコルを提案する. このシステムは従来研究と異なり, 信頼できる第三者機関やセキュアなハードウエアを必要とせずシビル攻撃にも耐性があるという性質を持つ.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Today we are communicating information using some communication tools. In communication, information goes through the central server and users lose its control. Therefore, sensitive data might be revealed by government censorship in the future. To counter such a threat, it is necessary for data to set an expiration time and to be automatically deleted. In this paper, we propose a protocol that satisfies the above requirement by combining blockchain and secret sharing. This system differs from previous research in that it is not requiring trusted third parties or secure hardware and resistant to a Sybil attack.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2017論文集"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2017-10-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2017"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:53:57.359086+00:00","id":187271,"links":{}}