{"created":"2025-01-19T01:19:13.272708+00:00","updated":"2025-01-19T15:00:06.700923+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00218877","sets":["1164:6389:10832:10943"]},"path":["10943"],"owner":"44499","recid":"218877","title":["LWE仮定に基づく適応的CCA安全な平文一致確認可能IDベース暗号の効率的な構成"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-07-12"},"_buckets":{"deposit":"2fc4a293-fd7d-4f71-b64d-5892ff5b7c4d"},"_deposit":{"id":"218877","pid":{"type":"depid","value":"218877","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"LWE仮定に基づく適応的CCA安全な平文一致確認可能IDベース暗号の効率的な構成","author_link":["570211","570212","570215","570214","570210","570213"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"LWE仮定に基づく適応的CCA安全な平文一致確認可能IDベース暗号の効率的な構成"},{"subitem_title":"Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ICSS","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-07-12","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"情報通信研究機構"},{"subitem_text_value":"東京大学 "}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"NICT","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/218877/files/IPSJ-SPT22048033.pdf","label":"IPSJ-SPT22048033.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT22048033.pdf","filesize":[{"value":"997.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"e8c37ba6-5f79-4d6c-8799-312b2d9ebe65","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"淺野, 京一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"江村, 恵太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高安, 敦"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kyoichi, Asano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Keita, Emura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Atsushi, Takayasu","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"平文一致確認可能ID ベース暗号 (Identity-based Encryption with Equality Test; IBEET) は,ID ベース暗号 (Identity-based Encryption; IBE) の拡張であり,トラップドアを持つユーザは 2 つの暗号文の平文が同じか否かの判定が可能となる.これまで,格子ベースの IBEET 方式がいくつか提案されているが,標準モデルにおいて適応的安全性と CCA 安全性の両方を厳密に満たす方式は提案されておらず,適応的安全性を満たす全ての方式は公開鍵長が安全性パラメータに線形で非効率であった.本論文では,ある性質を満たす CPA 安全な格子ベース IBE 方式に適用可能な IBEET の準一般的構成を提案する.提案構成法は適応的安全な IBE 方式に適用することで,厳密に適応的 CCA 安全なIBEET 方式が初めて得られる.さらに,Yamada 方式や Jager-Kurek-Niehues 方式に適用することで,公開鍵長が安全性パラメータの poly-log となる適応的 CCA 安全な IBEET 方式を構成可能である.そのため,既存研究よりもより安全でより効率的な格子 IBEET 方式を得る.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check the plaintext equality of two distinct ciphertexts. Thus far, known lattice-baesd IBEET schemes do not purely satisfy adaptive security and CCA security, simultaneously. In this paper, we propose the first adaptive and CCA-secure lattice-based IBEET schemes. Moreover, the proposed schemes based on Yamada’s scheme and Jager-Kurek-Niehues’s scheme have shorter public keys than known adaptive and CPA-secure schemes. ","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-07-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"33","bibliographicVolumeNumber":"2022-SPT-48"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":218877,"links":{}}