{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00224794","sets":["1164:2836:11158:11159"]},"path":["11159"],"owner":"44499","recid":"224794","title":["格子暗号のJavaCardへの実用的な実装に関する検討と実装評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-02-27"},"_buckets":{"deposit":"e9d39bf7-1b3c-4e04-857d-c811020a1a69"},"_deposit":{"id":"224794","pid":{"type":"depid","value":"224794","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"格子暗号のJavaCardへの実用的な実装に関する検討と実装評価","author_link":["593513","593512","593511","593514","593515","593517","593516","593518"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"格子暗号のJavaCardへの実用的な実装に関する検討と実装評価"},{"subitem_title":"Considerations on Practical Implementation of Lattice Cryptography in JavaCard and Evaluation of the Implementation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"耐量子計算機暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-02-27","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"NTT Social Informatics Laboraotry","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboraotry","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboraotry","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboraotry","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/224794/files/IPSJ-DPS23194049.pdf","label":"IPSJ-DPS23194049.pdf"},"date":[{"dateType":"Available","dateValue":"2025-02-27"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DPS23194049.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"34"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7ec02ee1-3ba5-4fcc-8d3d-a7b2ad755e13","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"飯島, 悠介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"工藤, 史堯"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"永井, 彰"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"村上, 啓造"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yusuke, Iijima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Fumiaki, Kudoh","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Nagai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Keizo, Murakami","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10116224","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8906","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"格子暗号方式は耐量子計算機暗号の一つであり,将来的に SIM や SmartCard での利用を見据えた JavaCard での実装結果もいくつか報告されている.しかし,JavaCard 上で格子暗号全体を動作させるには数十秒程度処理時間がかかることが分かっており,適用できるアプリケーションが大きく制限される可能性があった.そのため,本稿では格子暗号の一つである CRYSTALS-Kyber について,秘密鍵を JavaCard の外に出さない条件の元で,JavaCard に実装する範囲を縮小しても安全性に大きな影響がないことを考察し,JavaCard 上に実装する範囲を縮小した実装における安全性についても考察した.また,考案した実装と JavaCard 上へ方式全体を実装した結果と比較し,どの程度処理時間が改善されるか検証した.その結果,方式全体を実装した結果に比べて,大幅に時間短縮となることが分かった.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告マルチメディア通信と分散処理(DPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-02-27","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"49","bibliographicVolumeNumber":"2023-DPS-194"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:24:21.481461+00:00","updated":"2025-01-19T13:01:10.232727+00:00","id":224794}