{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:02004234","sets":["1164:4088:11911:1756879904860"]},"path":["1756879904860"],"owner":"80578","recid":"2004234","title":["鍵管理システムリスク低減モデルの基礎検討"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2025-09-18"},"_buckets":{"deposit":"325bf149-17ae-4100-a6ff-7d28b0ddcbe0"},"_deposit":{"id":"2004234","pid":{"type":"depid","value":"2004234","revision_id":0},"owners":[80578],"status":"published","created_by":80578},"item_title":"鍵管理システムリスク低減モデルの基礎検討","author_link":[],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"鍵管理システムリスク低減モデルの基礎検討","subitem_title_language":"ja"},{"subitem_title":"A Foundational Study on Risk-Reduction Models for Key-Management Systems in Crypto-assets","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2025-09-18","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社インターネットイニシアティブ"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Internet Initiative Japan Inc.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/2004234/files/IPSJ-IOT25071007.pdf","label":"IPSJ-IOT25071007.pdf"},"date":[{"dateType":"Available","dateValue":"2027-09-18"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT25071007.pdf","filesize":[{"value":"1005.8 KB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f0b8e1e8-d84d-43ee-a9b4-53c5d6aec2e5","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2025 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"須賀,祐治"}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuji Suga","creatorNameLang":"en"}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"昨今の暗号資産交換業においては署名鍵(Siganture key; Private key)の漏洩もしくは署名権限の奪取により,署名者が意図しない価値の移動を示すトランザクションへの署名が行われ,実際に暗号資産が漏洩する事例が発生している.この状況を鑑み,署名オペレーションの権限分離,マルチシグ署名やMPC技術の導入などの施策が取られている.一方で,これらの技術的対策と鍵管理の設計指針とは乖離しており,意図しない鍵分散を行うケースもあり,システムシスク対策が求められている.本稿はその初期検討として,鍵分散状況の形式モデルを考え,できるだけ軽い対策を提案する","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent cryptocurrency exchanges, there have been cases where transactions indicating unintended value transfers have been signed due to the leakage of signature keys (private keys) or the theft of signing authority, resulting in actual cryptocurrency leakage. In response to this situation, measures have been taken, such as the separation of authority for signing operations and the introduction of multi-sig signatures and MPC technology. However, these technical measures are not in line with the design guidelines for key management, and there have been cases of unintended key distribution, calling for measures to prevent system risk. As an initial consideration, this paper considers a formal model of key distribution situations and proposes measures that are as lightweight as possible.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2025-09-18","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicVolumeNumber":"2025-IOT-71"}]},"relation_version_is_last":true,"weko_creator_id":"80578"},"created":"2025-09-03T07:03:19.977149+00:00","updated":"2025-09-03T07:03:23.879600+00:00","id":2004234}