{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077917","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77917","title":["検索可能暗号の安全性再考"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"6fe36b16-e377-4660-87b7-8a44afe1a925"},"_deposit":{"id":"77917","pid":{"type":"depid","value":"77917","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"検索可能暗号の安全性再考","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"検索可能暗号の安全性再考"},{"subitem_title":"Security of Searchable Encryption Revisited","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"暗号理論(1)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州大学"},{"subitem_text_value":"九州大学"},{"subitem_text_value":"九州大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Kyushu University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77917/files/IPSJCSS2011022.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011022.pdf","filesize":[{"value":"262.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"0fc5429f-c6e1-40bc-8ba3-44e36da61078","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"菅, 孝徳"},{"creatorName":"西出, 隆志"},{"creatorName":"櫻井, 幸一"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takanori, Suga","creatorNameLang":"en"},{"creatorName":"Takashi, Nishide","creatorNameLang":"en"},{"creatorName":"Kouichi, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"データの暗号化と検索を両立可能な検索可能暗号と呼ばれる暗号がある.この検索可能暗号では,安全性モデルに基づき安全性が証明されているものの,ファイルの内容を表すキーワードを単語単位で暗号化する為,構成によって頻度分析により解読される危険性が存在する.この攻撃は,暗号文の出現頻度を測定し,推測される単語の出現頻度と比較することで平文を推測しようとするものである.本研究では,確定的暗号と確率的暗号のどちらにより構成されているか,また,対応する検索方式により頻度分析に対する耐性の違いについて検討する.更に,既存方式の頻度分析への耐性を検討し,検索可能暗号の頻度分析への耐性について考察を行う.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"There are encryption schemes called searchable encryption schemes. We can prove the security of them based on a security model. However, we face the risk of the frequency analysis in some construction because these schemes encrypt the keywords in the file per word. In this attack, an adversary measures the frequency of the index and guesses the keyword by comparing the frequency of the keyword. In this work, we consider this attack to the existing works and consider the resistance to this attack by considering the difference between the deterministic ones and the probabilistic ones, and the supported searches.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"130","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"125","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:40:43.977500+00:00","created":"2025-01-18T23:33:24.168627+00:00","links":{},"id":77917}