{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00217058","sets":["1164:3925:10844:10845"]},"path":["10845"],"owner":"44499","recid":"217058","title":["同種写像問題に基づくパスワードベース認証付き鍵共有について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-03-03"},"_buckets":{"deposit":"71f55331-de64-430a-9323-9c9f31290473"},"_deposit":{"id":"217058","pid":{"type":"depid","value":"217058","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"同種写像問題に基づくパスワードベース認証付き鍵共有について","author_link":["561568","561566","561569","561567"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"同種写像問題に基づくパスワードベース認証付き鍵共有について"},{"subitem_title":"Study on Password-based Key Agreement Protocol using The Isogeny Problem","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-03-03","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Security","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/217058/files/IPSJ-CSEC22096022.pdf","label":"IPSJ-CSEC22096022.pdf"},"date":[{"dateType":"Available","dateValue":"2024-03-03"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC22096022.pdf","filesize":[{"value":"638.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"e7dfde4d-b151-4c39-b1a7-c760a02a67ea","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岡村, 貴仁"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"有田, 正剛"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takahito, Okamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Seiko, Arita","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現在の公開鍵暗号化スキームの多くは,離散対数問題に基づいている.しかし,量子計算機が出現すると,量子アルゴリズムを使用して簡単に破れる.そこで,量子計算機に対応可能な難問として,同種写像問題が注目されている.同種写像問題は,離散対数問題と数学的構造としては似ている為,暗号設計上,同じように扱えることが期待できる.同種写像問題を用いた量子計算機に対応可能な鍵共有方式として,CSIDH が提案されている.本論文では,暗号通信において一般的に使われている認証付き鍵共有の中で,CSIDH を用いたパスワードベースの認証付き鍵共有に注目し,研究する.CSIDH を用いたパスワードベースの認証付き鍵共有に対するオフライン辞書攻撃の危険性を提示し,オフライン辞書攻撃に対応可能な改良案を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Many of the current public key encryption schemes are based on the discrete logarithm problem. However, with the advent of quantum computers, they can be easily broken using quantum algorithms. Therefore, the isogeny problem is attracting attention as a difficult problem that can be handled by quantum computers. The isogeny problem has a similar mathematical structure to the discrete logarithm problem, so it can be treated in the same way in cryptographic design. CSIDH has been proposed as a key sharing scheme for quantum computers using the homomorphic mapping problem. In this paper, we focus on password-based authenticated key sharing using CSIDH among the commonly used authenticated key sharing schemes for cryptographic communication. We present the dangers of offline dictionary attacks on password-based authenticated key sharing using CSIDH and propose possible improvements to cope with offline dictionary attacks.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-03-03","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"22","bibliographicVolumeNumber":"2022-CSEC-96"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":217058,"updated":"2025-01-19T15:38:21.214482+00:00","links":{},"created":"2025-01-19T01:17:33.945381+00:00"}