{"created":"2025-01-19T01:24:15.049564+00:00","updated":"2025-01-19T13:03:35.142037+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00224681","sets":["1164:3925:11156:11157"]},"path":["11157"],"owner":"44499","recid":"224681","title":["Generic-Forward-Secureカメレオンハッシュ関数の構築"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-02-27"},"_buckets":{"deposit":"639d98bd-b1b7-4b78-b9c6-d7df66081bd8"},"_deposit":{"id":"224681","pid":{"type":"depid","value":"224681","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Generic-Forward-Secureカメレオンハッシュ関数の構築","author_link":["592988","592986","592987"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Generic-Forward-Secureカメレオンハッシュ関数の構築"},{"subitem_title":"Construction of Generic-Forward-Secure Chameleon Hash Function","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-02-27","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大阪大学"},{"subitem_text_value":"サリー大学"},{"subitem_text_value":"大阪大学/北陸先端科学技術大学院大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Osaka University","subitem_text_language":"en"},{"subitem_text_value":"University Of Surrey","subitem_text_language":"en"},{"subitem_text_value":"Osaka University / Japan Advanced Institute of Science and Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/224681/files/IPSJ-CSEC23100005.pdf","label":"IPSJ-CSEC23100005.pdf"},"date":[{"dateType":"Available","dateValue":"2025-02-27"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC23100005.pdf","filesize":[{"value":"793.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"8dfc0459-9412-4ad6-81e2-3884ae5ee079","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"松原, 功樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tian, Yangguang"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮地, 充子"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"カメレオンハッシュ関数 (CH) は秘密鍵と公開鍵のペアを持つハッシュ関数である.CH は秘密鍵を持たないユーザには衝突に強いハッシュ関数となるが,秘密鍵を持っているユーザはハッシュ値の衝突を発見することができる.CH は,Shamir らによるオンライン/オフライン署名などの署名方式や Ateniese らによるブロックチェーンの修正などを始めとする様々な暗号方式で利用されている.しかし,CH において一度秘密鍵が露呈した場合その衝突耐性は失われ,既存の全ての CH を用いた手法の安全性は保証されない.本研究では,任意の CH を Forward-Secure CH (FSCH) に変換する Generic-FSCH (G-FSCH) のスキームを提案する.本提案では,現在の秘密鍵が露呈した場合でも過去のハッシュ値に関する衝突は発見されない Forward-Secure 衝突耐性を満たしつつ,新たに以前の FSCH では保証されていなかった識別不可能性を満たすプロトコルを構築した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Chameleon Hash Function (CH) is a hash function with a secret and public key pair. CH is collision resistant for users without a secret key, while users with a secret key can find collisions in hash values. CH has been used in various cryptographic schemes, including online/offline signatures by Shamir et al. and blockchain modification by Ateniese et al. However, once the secret key is exposed in CH, its collision resistance is lost, and the security of all existing CH-based methods cannot be guaranteed. In this paper, we propose a Generic-FSCH (G-FSCH) scheme that transforms an arbitrary CH into a Forward-Secure CH (FSCH).. The proposed protocol satisfies Forward-Secure collision resistance, which means that collisions regarding past hash values will not be detected even if the current secret key is exposed, while satisfying indistinguishability, which was not guaranteed in previous FSCH protocols.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-02-27","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"2023-CSEC-100"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":224681,"links":{}}