{"created":"2025-01-18T23:33:23.685172+00:00","updated":"2025-01-21T20:40:26.121314+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077907","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77907","title":["Web サービスにおける不正ユーザを排除可能な匿名認証システムの実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"8add09f4-91cd-4218-b611-0d48c00537a8"},"_deposit":{"id":"77907","pid":{"type":"depid","value":"77907","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"Web サービスにおける不正ユーザを排除可能な匿名認証システムの実装","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Web サービスにおける不正ユーザを排除可能な匿名認証システムの実装"},{"subitem_title":"An Implementation of an Anonymous Authentication System with Exclusion of Illegal Users in the Web Services","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"認証・署名(1)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"岡山大学大学院"},{"subitem_text_value":"岡山大学大学院"},{"subitem_text_value":"岡山大学大学院"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Okayama Univercity","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Okayama Univercity","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Okayama Univercity","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77907/files/IPSJCSS2011012.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011012.pdf","filesize":[{"value":"253.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"70af2e4d-b21a-44c0-b0fb-4d4f4008ead1","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"堀地, 恭輔"},{"creatorName":"中西, 透"},{"creatorName":"舩曵, 信生"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kyosuke, Horichi","creatorNameLang":"en"},{"creatorName":"Toru, Nakanishi","creatorNameLang":"en"},{"creatorName":"Nobuo, Funabiki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究グループでは,グループ署名を用いた匿名認証に関する研究を行っている.既存のシステムでは,ユーザはグループ管理者に対する匿名性が低いという問題があった.そこで本研究では,グループ署名に含まれるタグから作成したブラックリストを用いた匿名認証プロトコルの実装を行った.この匿名認証システムでは,既存のシステム変更を最小限に抑えるため,プロキシを用いている.また,サーバ側でブラックリストを管理するプロトコルの実装を行った.また評価実験により,実装した匿名認証システムの認証時間,ブラックリスト管理プロトコルの処理時間を測定し,実用的な時間で利用が可能なことを確認した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Our research group has implemented the anonymous authentication system based on a group signature scheme. An existing system has the problem that User's anonymity to the manager of the group is low. In this study, we implemented the anonymous authentication protocol using the blacklist which created from a tag included in a group signature. To avoid modifications of Web services and browsers, this system uses proxies. Moreover, we implemented the protocol that managed the blacklist on the server side. The experimental results show that each protocol is available in practical time.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"71","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"66","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"id":77907,"links":{}}