{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00213637","sets":["1164:3925:10503:10715"]},"path":["10715"],"owner":"44499","recid":"213637","title":["Mathematical Structure of Finsler Encryption"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-11-01"},"_buckets":{"deposit":"db49b3fb-cab5-45a7-b6aa-86553f8d472b"},"_deposit":{"id":"213637","pid":{"type":"depid","value":"213637","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Mathematical Structure of Finsler Encryption","author_link":["546925","546927","546926","546924"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Mathematical Structure of Finsler Encryption"},{"subitem_title":"Mathematical Structure of Finsler Encryption","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2021-11-01","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"University of Nagasaki"},{"subitem_text_value":"University of Nagasaki"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Nagasaki","subitem_text_language":"en"},{"subitem_text_value":"University of Nagasaki","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/213637/files/IPSJ-CSEC21095006.pdf","label":"IPSJ-CSEC21095006.pdf"},"date":[{"dateType":"Available","dateValue":"2023-11-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC21095006.pdf","filesize":[{"value":"717.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"1795631f-5313-461c-a07c-fcfef6e2babd","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tetsuya, Nagano"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroaki, Anada"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tetsuya, Nagano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroaki, Anada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"The public-key encryption scheme called Finsler encryption introduced by Nagano and Anada at SecITC2020 is investigated about its mathematical structure. In the previous work they stated the scheme based on the linear parallel displacement of vectors on a curve in a Finsler space and exhibited three algorithms of key generation, encryption and decryption in detail. The base idea of Finsler encryption was stated at CSS2019 and at SCIS2020 by the same authors. In this paper, the public key PK is represented as a mapping from R2 to R9 and the secret key SK is represented as the inverse mapping of PK.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The public-key encryption scheme called Finsler encryption introduced by Nagano and Anada at SecITC2020 is investigated about its mathematical structure. In the previous work they stated the scheme based on the linear parallel displacement of vectors on a curve in a Finsler space and exhibited three algorithms of key generation, encryption and decryption in detail. The base idea of Finsler encryption was stated at CSS2019 and at SCIS2020 by the same authors. In this paper, the public key PK is represented as a mapping from R2 to R9 and the secret key SK is represented as the inverse mapping of PK.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-11-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"2021-CSEC-95"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":213637,"updated":"2025-01-19T17:05:18.285011+00:00","links":{},"created":"2025-01-19T01:14:29.608724+00:00"}