{"id":210102,"created":"2025-01-19T01:11:22.220375+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00210102","sets":["1164:3925:10503:10504"]},"path":["10504"],"owner":"44499","recid":"210102","title":["差分プライベートな秘密計算のための暗号化された離散乱数を生成する非対話型二者間プロトコル"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-03-08"},"_buckets":{"deposit":"9fbb6051-3550-4279-ba85-3db58c6843c7"},"_deposit":{"id":"210102","pid":{"type":"depid","value":"210102","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"差分プライベートな秘密計算のための暗号化された離散乱数を生成する非対話型二者間プロトコル","author_link":["531190","531191"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"差分プライベートな秘密計算のための暗号化された離散乱数を生成する非対話型二者間プロトコル"},{"subitem_title":"A Non-Interactive Two-Party Protocol that Generate Encrypted Discrete Random Numbers for Differential Private Secure Computation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュアプロトコル","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2021-03-08","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/210102/files/IPSJ-CSEC21092005.pdf","label":"IPSJ-CSEC21092005.pdf"},"date":[{"dateType":"Available","dateValue":"2023-03-08"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC21092005.pdf","filesize":[{"value":"986.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"8ec8b44d-c574-4a57-9ab2-ef757150988c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"紀伊, 真昇"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"市川, 敦謙"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"秘密計算は参加者がそれぞれの秘密情報を自身以外に漏洩させずに,秘密情報に統計処理などの処理を施すことを可能にする.最近では秘密計算での処理結果にノイズを加えて差分プライバシーを達成する手法が研究されている.そういった手法を実現するには安全な乱数,すなわち,いずれの参加者も事前に定めた分布以上のことは知らない乱数を生成する必要がある.特に離散乱数を安全に生成することは,様々な p についてベルヌーイ分布 Ber(p) に従う乱数を安全に生成することに帰着される.しかしこれは難しく,従来手法では参加者が三人以上必要,通信量が大きい,といった問題点が有った.本研究では完全準同型暗号方式の一つである TFHE 方式を用いて,確率 p=0/N, 1/N, 2/N,..., N/N(N は TFHE のパラメータ.210 程度.)についてベルヌーイ分布 Ber(p) に従う乱数を予め TFHE 方式で暗号化された形で安全に生成する手法を提案する.この手法では参加者は二人いれば十分であり,また準備の他に通信は不要である.論文では応用として,生成した乱数から予め暗号化された形で一様分布,二項分布,離散ラプラス分布に従う離散乱数を生成する手法を述べる.これらの乱数は差分プライバシーを達成するために利用することができる.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-03-08","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"2021-CSEC-92"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T18:16:19.199503+00:00","links":{}}