{"created":"2025-01-19T01:41:19.684037+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00238226","sets":["6164:6165:7651:11699"]},"path":["11699"],"owner":"44499","recid":"238226","title":["SHA2とSHAKEを統合したSPHINCS+署名生成ハードウェアの設計"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-08-21"},"_buckets":{"deposit":"1951ab76-c120-414a-9dd0-8115f5dfd78e"},"_deposit":{"id":"238226","pid":{"type":"depid","value":"238226","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"SHA2とSHAKEを統合したSPHINCS+署名生成ハードウェアの設計","author_link":["652200","652197","652199","652198"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SHA2とSHAKEを統合したSPHINCS+署名生成ハードウェアの設計"},{"subitem_title":"Design of SPHINCS+ Signature Generation Hardware Integrating SHA2 and SHAKE","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2024-08-21","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学大学院工学系研究科"},{"subitem_text_value":"東京大学大学院工学系研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/238226/files/IPSJ-DAS2024002.pdf","label":"IPSJ-DAS2024002.pdf"},"date":[{"dateType":"Available","dateValue":"2026-08-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DAS2024002.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"10"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"4012b5f6-fa09-492d-a9e8-93283f6664e9","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"竹島, 優太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"池田, 誠"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuta, Takeshima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Makoto, Ikeda","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"量子コンピュータの発展により,RSA や楕円曲線暗号は破られる可能性が高まっており,耐量子計算機暗号の導入が急務となっている.SPHINCS+ は NIST による標準化が決まったデジタル署名アルゴリズムであり,ハッシュの衝突困難性のみを安全性の根拠とするため他のデジタル署名よりも安全と考えられる.しかしその分計算に時間がかかるため,ハードウェアでの高速化が必要である.現時点で採用されているパラメータには SHA2 と SHAKE の 2 パターンがあり,これらの 2 つのハッシュに対応することにより通信相手のデバイスとの互換性の問題を回避できる.統合に際して片方のハッシュのパフォーマンスを損なわないよう,クロック周期が整合するようなハッシュの設計を検討した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"With the advancement of quantum computers, the likelihood of breaking RSA and elliptic curve cryptography has increased, making the introduction of post-quantum cryptography urgent. SPHINCS+ is a digital signature algorithm that has been standardized by NIST, and it is considered more secure than other digital signatures because it relies solely on the collision resistance of hash functions for its security. However, because it takes more time to compute, hardware acceleration is necessary. The currently adopted parameters include two patterns: SHA2 and SHAKE. By supporting these two hashes, compatibility issues with the communication partner's device can be avoided. A hash design was considered to ensure clock cycles are aligned, preventing the performance of one hash from being compromised.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"7","bibliographic_titles":[{"bibliographic_title":"DAシンポジウム2024論文集"}],"bibliographicPageStart":"2","bibliographicIssueDates":{"bibliographicIssueDate":"2024-08-21","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2024"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"links":{},"id":238226,"updated":"2025-01-19T08:37:56.108085+00:00"}