{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077911","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77911","title":["Fuzzy Commitment Schemeを用いたバイオメトリック暗号におけるテンプレートの安全性に関する一考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"c1e334c2-0aae-47f9-a647-e122b5454af0"},"_deposit":{"id":"77911","pid":{"type":"depid","value":"77911","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"Fuzzy Commitment Schemeを用いたバイオメトリック暗号におけるテンプレートの安全性に関する一考察","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Fuzzy Commitment Schemeを用いたバイオメトリック暗号におけるテンプレートの安全性に関する一考察"},{"subitem_title":"A Study on Security of Template in Biometric Cryptosystem Using Fuzzy Commitment Scheme","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"バイオメトリクス","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"株式会社日立製作所"},{"subitem_text_value":"早稲田大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77911/files/IPSJCSS2011016.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011016.pdf","filesize":[{"value":"139.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"b13eed7d-a44d-42f6-b1f1-503194e11132","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"披田野, 清良"},{"creatorName":"市野, 将嗣"},{"creatorName":"大木, 哲史"},{"creatorName":"高橋, 健太"},{"creatorName":"小松, 尚久"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Seira, Hidano","creatorNameLang":"en"},{"creatorName":"Masatsugu, Ichino","creatorNameLang":"en"},{"creatorName":"Tetsushi, Ohki","creatorNameLang":"en"},{"creatorName":"Kenta, Takahashi","creatorNameLang":"en"},{"creatorName":"Naohisa, Komatsu","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,生体情報を秘匿して認証を行うテンプレート保護型生体認証が注目されている.しかしながら,それらの安全性に関する議論では,生体情報間の相関性により,生体情報の推定が容易となる可能性については必ずしも十分に検討されていない.そこで,本稿では,Fuzzy Commitment Schemeを用いたバイオメトリック暗号に着目し,まず,Renyiエントロピーを用いた情報量評価手法に基づき,一例として指紋情報の情報量を定量的に評価することにより,生体情報間に強い相関性があることを明らかにする.次いで,上記の相関性を利用したなりすましに関する脅威を示し,それらの脅威に対する安全性について考察する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Template protection-based biometric authentication attracted attention in the past decade. However, in the discussion on the security of these systems, biometric information content is assumed to be sufficiently large and real conditions of biometric samples have not yet been reflected. Thus, it is demonstrated in this paper that there is any correlation between biometric samples by evaluating fingerprint information content on the basis of an evaluation method using a Renyi entropy. Additionally, spoofing attacks taking advantage of the correlation are explained and the security against these attacks is discussed.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"94","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"89","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:40:33.340889+00:00","created":"2025-01-18T23:33:23.878091+00:00","links":{},"id":77911}