{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077499","sets":["581:6276:6531"]},"path":["6531"],"owner":"11","recid":"77499","title":["エラー検出可能な軽量3パーティ秘匿関数計算の提案と実装評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-09-15"},"_buckets":{"deposit":"e4135268-cb06-495a-9b74-1344bba62aae"},"_deposit":{"id":"77499","pid":{"type":"depid","value":"77499","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"エラー検出可能な軽量3パーティ秘匿関数計算の提案と実装評価","author_link":["362962","362960","362959","362956","362958","362963","362961","362957"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"エラー検出可能な軽量3パーティ秘匿関数計算の提案と実装評価"},{"subitem_title":"A Lightweight Three-party Secure Function Evaluation with Error Detection and Its Experimental Result","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:人と共存するコンピュータセキュリティ技術(論文賞受賞)","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2011-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTT情報流通プラットフォーム研究所"},{"subitem_text_value":"NTT情報流通プラットフォーム研究所"},{"subitem_text_value":"NTT情報流通プラットフォーム研究所"},{"subitem_text_value":"NTT情報流通プラットフォーム研究所"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"NTT Information Sharing Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Information Sharing Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Information Sharing Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Information Sharing Platform Laboratories","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77499/files/IPSJ-JNL5209017.pdf","label":"IPSJ-JNL5209017"},"date":[{"dateType":"Available","dateValue":"2013-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5209017.pdf","filesize":[{"value":"460.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5935f361-179b-4a69-a217-2903b256c656","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"千田, 浩司"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"五十嵐, 大"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"濱田, 浩気"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高橋, 克巳"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Koji, Chida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Dai, Ikarashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koki, Hamada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsumi, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本稿では3主体の協調計算により入力値を秘匿しつつ算術演算や論理演算を実行できる3パーティ秘匿関数計算プロトコルを提案し,その実装評価を行った結果を示す.提案プロトコルは主体間の結託はないと仮定したとき,semi-honestモデルにおいて入力値の秘匿性が保証され,maliciousモデルにおいて演算結果の改竄(エラー)を従来よりも効率良く検出できるという特徴を持つ.実装評価はCPU:Intel Core2 Quad 3.0GHz,RAM:4GBの1台マシン環境で測定し,32ビット乗算1回を約1.6μ秒で処理できることを確認した.また3パーティ秘匿関数計算プロトコルの応用として,個人に関する情報を安全に利活用できる技術として注目されているプライバシ保護データマイニング(Privacy-Preserving Data Mining)への適用について考察を行う.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We propose a three-party secure function evaluation protocol with lightweight error detection and show the experimental result. Assuming that there exists honest majority, the proposed protocol obtains the outcome of arithmetic and/or logic operations from three-shared values without disclosing the original value in the semi-honest model and can detect the error if the outcome is manipulated by a malicious party faster than the existing schemes. The implementation system, which consists of a PC with Intel Core2 Quad 3.0GHz and 4GB RAM, can compute the multiplication of two 32bits integers about 1.6microseconds. Moreover we consider Privacy-Preserving Data Mining as an application of the three-party secure function evaluation protocol.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"2685","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"2674","bibliographicIssueDates":{"bibliographicIssueDate":"2011-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"52"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":77499,"updated":"2025-01-20T06:26:12.317145+00:00","links":{},"created":"2025-01-18T23:33:04.074092+00:00"}