{"updated":"2025-03-05T02:07:47.799053+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:02001482","sets":["1164:3925:11908:1740986079630"]},"path":["1740986079630"],"owner":"80578","recid":"2001482","title":["悪意のあるルータを仮定した軽量匿名通信における責任追跡性に関する一考察"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2025-03-10"},"_buckets":{"deposit":"4b182165-8564-4e17-ad52-7653c977601c"},"_deposit":{"id":"2001482","pid":{"type":"depid","value":"2001482","revision_id":0},"owners":[80578],"status":"published","created_by":80578},"item_title":"悪意のあるルータを仮定した軽量匿名通信における責任追跡性に関する一考察","author_link":[],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"悪意のあるルータを仮定した軽量匿名通信における責任追跡性に関する一考察","subitem_title_language":"ja"},{"subitem_title":"A Study on Accountability in Lightweight Anonymity Networks with Malicious Routers","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ネットワークセキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2025-03-10","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"島根大学材料エネルギー学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Materials for Energy, Shimane University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/2001482/files/IPSJ-CSEC25108006.pdf","label":"IPSJ-CSEC25108006.pdf"},"date":[{"dateType":"Available","dateValue":"2027-03-10"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC25108006.pdf","filesize":[{"value":"1.5 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"05de5d92-63c7-4c36-91f7-0acff92490fe","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2025 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高田,直弥"}]},{"creatorNames":[{"creatorName":"吉仲,佑太郎"}]},{"creatorNames":[{"creatorName":"武政,淳二"}]},{"creatorNames":[{"creatorName":"小泉,佑揮"}]},{"creatorNames":[{"creatorName":"長谷川,亨"}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ネットワーク層で関係匿名性を提供する軽量匿名通信プロトコルは,能動的でかつローカル,すなわち経路上の高々1つの地点に存在する攻撃者を仮定して,パケットの経路情報をホップ毎に暗号化,復号することにより,高速なパケット転送を実現する.しかし,これらの匿名通信プロトコルは,本質的に送信者を信頼するものであり,クライアントが自身の身元を隠蔽しながら悪意のあるトラフィックをサーバへ送信することを可能にしてしまう点で問題がある.これまでに正当なクライアントの匿名性は保持しつつ,サーバが悪意のあるトラフィックを受信した際には,その送信元クライアントを特定し,クライアントの責任追跡性を保証する手法が提案されている.しかしながら,責任追跡性について能動的な攻撃者の存在を仮定せず手法が設計されており,匿名性に関する仮定との整合性を欠く.本稿では,能動的な攻撃者が存在する場合の責任追跡性に対する攻撃を示し,その防御法を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Lightweight anonymity protocols that provide relational anonymity at the network layer achieve fast packet forwarding by only encrypting and decrypting the routing information of packets at each hop, assuming that the attacker is active and local, i.e., residing at most one point along the route. However, these anonymity protocols are problematic in that they inherently trust the client and allow it to send malicious traffic to the server while concealing its own identity. Some methods have been proposed to preserve the anonymity of legitimate clients, but to identify the source client when the server receives malicious traffic, and to guarantee the client's accountability. However, the method is designed without assuming the existence of an active attacker, which is inconsistent with the assumption on anonymity. In this paper, we show attacks on accountability when an active attacker exists, and propose a defense against it.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2025-03-10","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"2025-CSEC-108"}]},"relation_version_is_last":true,"weko_creator_id":"80578"},"created":"2025-03-05T02:07:44.019970+00:00","id":2001482,"links":{}}