{"updated":"2025-01-21T20:43:09.561292+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077993","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77993","title":["Gentry 準同型暗号に対するLLL攻撃実験について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"1b1fec21-d433-4290-82cd-b1e72c779dcf"},"_deposit":{"id":"77993","pid":{"type":"depid","value":"77993","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"Gentry 準同型暗号に対するLLL攻撃実験について","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Gentry 準同型暗号に対するLLL攻撃実験について"},{"subitem_title":"On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"暗号実装・評価","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社富士通研究所"},{"subitem_text_value":"株式会社富士通研究所"},{"subitem_text_value":"株式会社富士通研究所"},{"subitem_text_value":"株式会社富士通研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"FUJITSU LABORATORIES LTD.","subitem_text_language":"en"},{"subitem_text_value":"FUJITSU LABORATORIES LTD.","subitem_text_language":"en"},{"subitem_text_value":"FUJITSU LABORATORIES LTD.","subitem_text_language":"en"},{"subitem_text_value":"FUJITSU LABORATORIES LTD.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77993/files/IPSJCSS2011098.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011098.pdf","filesize":[{"value":"205.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"ba085c5f-892e-4aab-8664-0514086e9a18","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"矢嶋, 純"},{"creatorName":"安田, 雅哉"},{"creatorName":"下山, 武司"},{"creatorName":"小暮, 淳"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Jun, Yajima","creatorNameLang":"en"},{"creatorName":"Masaya, Yasuda","creatorNameLang":"en"},{"creatorName":"Takeshi, Shimoyama","creatorNameLang":"en"},{"creatorName":"Jun, Kogure","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"2009 年,Gentry はイデアル格子を利用した完全準同型暗号の具体的な構成法を示した.Gentry による完全準同型暗号は,限定された暗号文操作が可能な準完全方式(somewhat homomorphic encryption scheme) から構成される.今回,準完全Gentry 方式の安全性を検証するために,準完全Gentry 方式の安全性を支える格子問題に対し,格子縮約アルゴリズムを利用した攻撃実験を行った.本論文では,代表的な格子縮約アルゴリズムの1 つであるLLLアルゴリズムを利用した攻撃実験の結果を報告する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In 2009, Gentry proposed a concrete method for constructing a fully homomorphic encryption scheme using ideal lattices. Gentry's construction starts from a somewhat homomorphic encryption scheme, which supports limited evaluations over encrypted data. To analyze the security, we attacked the lattice problem ensuring the security of Gentry's somewhat homomorphic encryption scheme. In this paper, we report our experimental results of attacking the lattice problem using the LLL algorithm, which is one of the typical lattice reduction algorithms.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"581","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"576","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:33:27.817883+00:00","id":77993,"links":{}}