{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00223068","sets":["6164:6165:6462:11124"]},"path":["11124"],"owner":"44499","recid":"223068","title":["カードベース暗号における物理仮定に対する脅威とその対策に関する検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-10-17"},"_buckets":{"deposit":"d076b04b-01ae-4cd8-b16f-a6c45330e554"},"_deposit":{"id":"223068","pid":{"type":"depid","value":"223068","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"カードベース暗号における物理仮定に対する脅威とその対策に関する検討","author_link":["586704","586707","586705","586709","586706","586708"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"カードベース暗号における物理仮定に対する脅威とその対策に関する検討"},{"subitem_title":"Threat against Physical Assumption in Card-Based Cryptography and Its Countermeasure","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"秘密計算,カードベース暗号,ハイパースペクトルカメラ,物理仮定","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2022-10-17","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"電気通信大学/産業技術総合研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-communications","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-communications","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-communications / National Institute of Advanced Industrial Science and Technology (AIST)","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/223068/files/IPSJ-CSS2022013.pdf","label":"IPSJ-CSS2022013.pdf"},"date":[{"dateType":"Available","dateValue":"2024-10-17"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2022013.pdf","filesize":[{"value":"665.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6907970f-a753-4b23-ba65-4176bbec8051","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"嶌野, 雅久"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"崎山, 一男"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮原, 大輝"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masahisa, Shimano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuo, Sakiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daiki, Miyahara","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"秘密計算を物理的に実現する暗号技術に関する研究が盛り上がっている.特にカードベース暗号の理論研究に関する論文が急増し,秘密計算の実現に必要なカード枚数や手順が効率化され,多種多様な計算を短時間で実行できる水準までに発展している.そのような背景の下で著者らは,カードベース暗号に関するほぼ全ての研究が仮定している「カードの裏面は全て同一視できる」という物理仮定が現実的であるかを検証するために,強力な道具を用いる攻撃者を想定し,そのような攻撃者がカードを特定し得る実証結果を SCIS 2022 にて報告した.本稿では,先行研究において曖昧であった,物理仮定に対する現実的な攻撃シナリオを明確に記述した上で,その効果的な対策方法を新たに示し,カードベース暗号の安全性を高める.加えて,攻撃シナリオが現実的であるかどうか調査したアンケート結果を発表し,その考察を行う.また本研究は上記の工学的な成果に加えて,理論的な側面でも新たに知見を生み出せる特徴がある.本稿では,上記の攻撃シナリオが機能するカードベースプロトコルの条件を解明する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Many researches have focused on cryptographic techniques physically realizing secure computations. In particular, the number of papers on theoretical studies of card-based cryptography has increased rapidly; the efficiency regarding the number of required cards and procedures has become improved so that various computations can be quickly performed. Against this background, we study a physical assumption that the backs of cards are identical, which almost all studies assume, to contribute to improving the security of card-based cryptography. In SCIS 2022, we reported the result of our fundamental experiments; in this paper, we clearly describe a realistic attack scenario against the physical assumption, which was vague in our previous study, and present a new effective countermeasure against it to improve the security. We also present and discuss the result of questionnaires on the attack scenario. In addition, we elucidate the condition of card-based protocols where the above attack scenario works.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"85","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2022論文集"}],"bibliographicPageStart":"78","bibliographicIssueDates":{"bibliographicIssueDate":"2022-10-17","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:22:56.503855+00:00","updated":"2025-01-19T13:31:47.318997+00:00","id":223068}