{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00043683","sets":["1164:3865:3881:3885"]},"path":["3885"],"owner":"1","recid":"43683","title":["モバイル環境への適用を想定したPKI設計方針について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2005-03-17"},"_buckets":{"deposit":"f8a1e8eb-3f4f-4021-9745-0041d5c0f50d"},"_deposit":{"id":"43683","pid":{"type":"depid","value":"43683","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"モバイル環境への適用を想定したPKI設計方針について","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"モバイル環境への適用を想定したPKI設計方針について"},{"subitem_title":"Design Principle of PKI for Mobile Services","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2005-03-17","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"KDDI研究所"},{"subitem_text_value":"KDDI研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"KDDI Labs.","subitem_text_language":"en"},{"subitem_text_value":"KDDI Labs.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/43683/files/IPSJ-MBL04032007.pdf"},"date":[{"dateType":"Available","dateValue":"2007-03-17"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MBL04032007.pdf","filesize":[{"value":"1.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"35"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"fb4f47e5-ae4d-40ab-9206-b9a351bc64d4","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2005 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"清本, 晋作"},{"creatorName":"田中, 俊昭"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shinsaku, Kiyomoto","creatorNameLang":"en"},{"creatorName":"Toshiaki, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11851388","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年 携帯電話端末に対してクライアント公開鍵証明書を発行し モバイル環境における公開鍵認証基盤(PKI)を整備しようとする試みがなされている. 携帯電話を利用しているユーザの数は 数千万人という膨大な数であり またモバイル特有の制約条件から PCと同様の構成をそのまま適用することはできない. 本稿では PKIを設計する際に必要な 公開鍵証明書の有効期限などの各種パラメータについて 現在のユーザ数や環境を想定した場合の最適値を導出する. 特に 系全体の通信量を決定する要因となる失効情報提供手法について比較を行ない 最適な失効情報提供手法を検討する. また 系全体の計算時間の定式化を図ることで 現状の携帯電話環境において ユーザ認証のためにPKIを導入した場合の最適な鍵長 有効期限について導出を行なう. ","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, a public key infrastructure (PKI) for mobile terminals has been discussed to improve the security of mobile services. In the mobile PKI, public key certificates of mobile users are issued to use authentication of the user, and stored the certificates into their mobile terminals. Open problem is the scalability of the PKI, because the number of the mobile users is extremely larger than the number of users who uses a PKI for PC environments. This paper discusses a design principle of PKI for mobile services. Especially, we compare the method of providing certificates revocation lists on mobile service environments, and suggests the most efficient method. Furthermore, we calculate the computational cost of a general public key based authentication method of a whole system, and estimate feasible lengths of public/secret keys and validity.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"51","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告モバイルコンピューティングとユビキタス通信(MBL)"}],"bibliographicPageStart":"45","bibliographicIssueDates":{"bibliographicIssueDate":"2005-03-17","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"28(2004-MBL-032)","bibliographicVolumeNumber":"2005"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":43683,"updated":"2025-01-22T10:49:02.791345+00:00","links":{},"created":"2025-01-18T23:10:01.973120+00:00"}