{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00214503","sets":["6164:6165:6462:10749"]},"path":["10749"],"owner":"44499","recid":"214503","title":["Algebraic Group ModelにおけるFiat-Shamir変換"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-10-19"},"_buckets":{"deposit":"0113837b-4457-4bb8-bcae-ee9f8c3b80fb"},"_deposit":{"id":"214503","pid":{"type":"depid","value":"214503","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Algebraic Group ModelにおけるFiat-Shamir変換","author_link":["551054","551056","551053","551055"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Algebraic Group ModelにおけるFiat-Shamir変換"},{"subitem_title":"Fiat-Shamir Transform in Algebraic Group Model","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Fiat-Shamir変換,Algebraic Group Model,Provable Security","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2021-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"北海道情報大学情報メディア学部"},{"subitem_text_value":"東北大学データ駆動科学・AI 教育研究センター"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Information Media, Hokkaido Information University","subitem_text_language":"en"},{"subitem_text_value":"Center for Data-driven Science and Artificial Intelligence, Tohoku University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/214503/files/IPSJCSS2021103.pdf","label":"IPSJCSS2021103.pdf"},"date":[{"dateType":"Available","dateValue":"2023-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2021103.pdf","filesize":[{"value":"462.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"3db5a644-0e68-44c2-b476-0e73c6f290ad","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"福光, 正幸"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"長谷川, 真吾"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masayuki, Fukumitsu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shingo, Hasegawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Fiat-Shamir 型署名の安全性証明については多くの研究がなされているが,ランダムオラクルモデルにおける証明では, 帰着効率を tight にできないことが知られている.しかしながら, 代表的な Fiat-Shamir 型証明である Schnorr 署名について,Fuchsbauer, Plouviez, Seurin は攻撃アルゴリズムが Algebraic な場合に,上記の不可能性を突破し,tight な安全性証明を構築できることを示した.本稿では, 彼らの結果が一般の Fiat-Shamir 型署名においても成立することを示す.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"There exist many results on the provable security of the Fiat-Shamir (FS)-type signatures. Especially, it is known that the tight security proof for the FS-type signatures cannot be achieved in the random oracle model. However, Fuchsbauer, Plouviez, Seurin overcame the barrier and constructed the tight security proof when the adversary algebraic. In this paper, we aim to generalize their results.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"770","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2021論文集"}],"bibliographicPageStart":"763","bibliographicIssueDates":{"bibliographicIssueDate":"2021-10-19","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":214503,"updated":"2025-01-19T16:36:10.938751+00:00","links":{},"created":"2025-01-19T01:15:19.119745+00:00"}