{"created":"2025-01-19T00:57:20.486854+00:00","updated":"2025-01-20T00:39:02.633874+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00191455","sets":["581:9322:9331"]},"path":["9331"],"owner":"11","recid":"191455","title":["計算機援用セキュリティスキームの一般的構成法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-09-15"},"_buckets":{"deposit":"c940d240-9448-447c-859d-e189a56bab6d"},"_deposit":{"id":"191455","pid":{"type":"depid","value":"191455","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"計算機援用セキュリティスキームの一般的構成法","author_link":["441791","441792","441799","441797","441790","441793","441796","441798","441789","441795","441794","441800"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"計算機援用セキュリティスキームの一般的構成法"},{"subitem_title":"General Constructions of Computer-aided Security Schemes","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:超スマート社会を支えるコンピュータセキュリティ技術] 暗号,計算機援用セキュリティ,一般的構成法,共通鍵暗号,メッセージ認証コード,公開鍵暗号,デジタル署名,ユーザ認証","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2018-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"株式会社日立製作所"},{"subitem_text_value":"東京工業大学"},{"subitem_text_value":"静岡大学"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Hitachi Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/191455/files/IPSJ-JNL5909010.pdf","label":"IPSJ-JNL5909010.pdf"},"date":[{"dateType":"Available","dateValue":"2020-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5909010.pdf","filesize":[{"value":"563.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"43a3bb18-603c-4467-b94d-683b69fbe155","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"神農, 泰圭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"土屋, 貴史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大木, 哲史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高橋, 健太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"尾形, わかは"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yasuyoshi, Jinno","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takashi, Tsuchiya","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsushi, Ohki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenta, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Wakaha, Ogata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatsu, Nishigaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"CPUの計算機能力は日々向上する.計算機を利用した攻撃に耐性を持たせるためには,秘密情報のエントロピーを増加させる必要がある.しかし,CPUの計算機能力の進化は攻撃者だけでなく,正規ユーザにも恩恵を与えるものである.実際に,CPUの計算機能力を使用して正規ユーザの秘密情報の安全性を高めるセキュリティスキームが提案されている.本稿では,そのような「CPUの計算機能力を使用して正規ユーザの秘密情報の安全性を高めるセキュリティスキーム」を「計算機援用セキュリティスキームCASS」と呼び,それらをメカニズムの違いにより2つのタイプに分類する.そして,一方のタイプに対して,一般的構成法を提案し,その安全性証明を行う.そのタイプのCASSの実現可能性について議論する.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"CPU performance has been increasing continually. To resist attacks in such a technological environment, we must increase the entropy of secrets. However, the progress of CPU performance benefits not only attackers but also legitimate users. Security schemes specifically designed to enhance legitimate users' security by exploiting CPU performance have been proposed. In this paper, we call such schemes “computer-aided security schemes”, or CASS, and classify them into two types in terms of the aiding mechanism. We propose general constructions and provide security proofs of CASS for one type. We discuss the feasibility of CASS.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1569","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1557","bibliographicIssueDates":{"bibliographicIssueDate":"2018-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"59"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":191455,"links":{}}