{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00225682","sets":["1164:3925:11156:11248"]},"path":["11248"],"owner":"44499","recid":"225682","title":["Efficient multiplication protocols on the replicated secret sharing"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-05-04"},"_buckets":{"deposit":"948bb5ef-54a7-4312-abe6-5d17d5cf190b"},"_deposit":{"id":"225682","pid":{"type":"depid","value":"225682","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Efficient multiplication protocols on the replicated secret sharing","author_link":["597684","597686","597688","597685","597690","597691","597689","597687"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Efficient multiplication protocols on the replicated secret sharing"},{"subitem_title":"Efficient multiplication protocols on the replicated secret sharing","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"CSEC, 暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-05-04","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTT"},{"subitem_text_value":"NTT"},{"subitem_text_value":"NTT"},{"subitem_text_value":"NTT"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"NTT","subitem_text_language":"en"},{"subitem_text_value":"NTT","subitem_text_language":"en"},{"subitem_text_value":"NTT","subitem_text_language":"en"},{"subitem_text_value":"NTT","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/225682/files/IPSJ-CSEC23101006.pdf","label":"IPSJ-CSEC23101006.pdf"},"date":[{"dateType":"Available","dateValue":"2025-05-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC23101006.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"1a5f3d1c-78cf-432e-b752-2a92c66d3e96","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Sudo"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryo, Kikuchi"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koki, Hamada"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Dai, Ikarashi"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Sudo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryo, Kikuchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koki, Hamada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Dai, Ikarashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"As the use of data analysis becomes increasingly widespread, protecting confidential information has become a growing concern. To address this, secure multiparty computation (MPC) has gained attention as a useful and secure method. In this work, we propose a new technique to reduce total communication in specific cases (by one-third in the best case) compared to the state-of-the-art multiplication protocol for the (2, 3) replicated secret sharing scheme, despite the fact that the known protocol has already achieved the communication cost of one element per party. Additionally, we demonstrate that multiplication protocol can be extended to product-sum protocols by presenting a concrete protocol based on a general observation by Genkin et al.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"As the use of data analysis becomes increasingly widespread, protecting confidential information has become a growing concern. To address this, secure multiparty computation (MPC) has gained attention as a useful and secure method. In this work, we propose a new technique to reduce total communication in specific cases (by one-third in the best case) compared to the state-of-the-art multiplication protocol for the (2, 3) replicated secret sharing scheme, despite the fact that the known protocol has already achieved the communication cost of one element per party. Additionally, we demonstrate that multiplication protocol can be extended to product-sum protocols by presenting a concrete protocol based on a general observation by Genkin et al.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-05-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"2023-CSEC-101"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":225682,"updated":"2025-01-19T12:42:58.221852+00:00","links":{},"created":"2025-01-19T01:25:11.199728+00:00"}