{"id":201327,"updated":"2025-01-19T21:05:25.860504+00:00","links":{},"created":"2025-01-19T01:04:36.078106+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00201327","sets":["6164:6165:6462:10022"]},"path":["10022"],"owner":"44499","recid":"201327","title":["スケーラブルな二者間秘匿計算のサーバー構成と効率的な通信方法の実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-10-14"},"_buckets":{"deposit":"2f857e54-47a3-4ea3-b621-f05b3a3c8f76"},"_deposit":{"id":"201327","pid":{"type":"depid","value":"201327","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"スケーラブルな二者間秘匿計算のサーバー構成と効率的な通信方法の実装","author_link":["491905","491897","491902","491903","491898","491906","491901","491904","491900","491899"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"スケーラブルな二者間秘匿計算のサーバー構成と効率的な通信方法の実装"},{"subitem_title":"A Scalable Server Configuration and Round-Efficient Implementation in Secure Two-Party Computation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"秘匿計算,MPC,通信,サーバー構成","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2019-10-14","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社ZenmuTech/産業技術総合研究所 サイバーフィジカルセキュリティ研究センター"},{"subitem_text_value":"株式会社ZenmuTech/産業技術総合研究所 サイバーフィジカルセキュリティ研究センター"},{"subitem_text_value":"株式会社ZenmuTech/産業技術総合研究所 サイバーフィジカルセキュリティ研究センター"},{"subitem_text_value":"産業技術総合研究所 サイバーフィジカルセキュリティ研究センター"},{"subitem_text_value":"産業技術総合研究所 サイバーフィジカルセキュリティ研究センター"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"ZenmuTech Inc.  /  CPSEC (Cyber Physical Security Research Center), AIST","subitem_text_language":"en"},{"subitem_text_value":"ZenmuTech Inc.  /  CPSEC (Cyber Physical Security Research Center), AIST","subitem_text_language":"en"},{"subitem_text_value":"ZenmuTech Inc.  /  CPSEC (Cyber Physical Security Research Center), AIST","subitem_text_language":"en"},{"subitem_text_value":"CPSEC (Cyber Physical Security Research Center), AIST","subitem_text_language":"en"},{"subitem_text_value":"CPSEC (Cyber Physical Security Research Center), AIST","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/201327/files/IPSJCSS2019034.pdf","label":"IPSJCSS2019034.pdf"},"date":[{"dateType":"Available","dateValue":"2021-10-14"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2019034.pdf","filesize":[{"value":"711.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"44850c8f-625d-46a3-9cc9-08b9f23218d3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"石田, 祐介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"桶谷, 純一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"國井, 淳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大畑, 幸矢"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"花岡, 悟一郎"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yusuke, Ishida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Junichi, Oketani","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Atsushi, Kunii","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satsuya, Ohata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Goichiro, Hanaoka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"秘密分散に基づく秘匿計算 (MPC) は計算量,通信ラウンド数,データ量において性能改善が進んでおり実用化が近いことが伺える.一方,MPCは複数のサーバーを要する構成であるため,実際のサービス化を考えると,純粋な性能以外にサーバーの管理と運用を考慮しなくてはならない.本論文では,このようなサービス化を考慮した場合の二者間秘匿計算の利点に着目しサーバー構成を検討した.特に,各計算パーティーにサービス提供サーバーと汎用依頼計算サーバーという役割を持たせることで,スケーラブルな構成にできることを説明する.加えて,この構成において,総データ量を変化させずに通信ラウンド数を半分程度にできる通信方法を示す.この方法はパーティー間の計算の並列性を若干犠牲にするものの,通信がボトルネックとなるWAN環境においては有効である.最後に提案する構成と通信方法を実装しその効果を検証する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The efficiency of protocols in secure two-party computation (2PC) has been improved. When we make 2PC practical, we also need to consider the management and operation of the servers. In this paper, we explain a (1) scalable server configuration (2) round-efficient implementation method in 2PC. Moreover, we implement our methods and show their performances via experiments.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"244","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2019論文集"}],"bibliographicPageStart":"237","bibliographicIssueDates":{"bibliographicIssueDate":"2019-10-14","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2019"}]},"relation_version_is_last":true,"weko_creator_id":"44499"}}