{"updated":"2025-01-21T17:38:22.876253+00:00","links":{},"id":86750,"created":"2025-01-18T23:37:44.693269+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00086750","sets":["6164:6165:6462:6909"]},"path":["6909"],"owner":"11","recid":"86750","title":["似顔絵認証: 情報認知の個人差を用いた記憶照合型個人認証への推測攻撃に対する安全性向上策の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-10-23"},"_buckets":{"deposit":"1e78f047-899b-4e20-9e74-faf7f7ab58ec"},"_deposit":{"id":"86750","pid":{"type":"depid","value":"86750","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"似顔絵認証: 情報認知の個人差を用いた記憶照合型個人認証への推測攻撃に対する安全性向上策の提案","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"似顔絵認証: 情報認知の個人差を用いた記憶照合型個人認証への推測攻撃に対する安全性向上策の提案"},{"subitem_title":"A Countermeasure for a Password Guessing Attack in Knowledge-based User Authentication by a Personal Difference in Information Recognition","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"個人認証,推測攻撃,似顔絵,情報認知","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2012-10-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"電気通信大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Univ. of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Univ. of Electro-Communications","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/86750/files/IPSJCSS2012115.pdf"},"date":[{"dateType":"Available","dateValue":"2014-10-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2012115.pdf","filesize":[{"value":"550.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"24835ea1-59ac-4017-8719-6c548ba074bf","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"益尾, 文里"},{"creatorName":"高田, 哲司"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Fumisato, Masuo","creatorNameLang":"en"},{"creatorName":"Tetsuji, Takada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"記憶照合型個人認証への攻撃方法の1つに推測に基づくパスワード破りがある.辞書攻撃や類推攻撃はその一例と言えよう.この攻撃への対策として我々は「情報認知の個人差」を秘密情報に応用した認証手法を提案する.この対策方法により,攻撃者が複数回の推測を成功しないと秘密情報の特定ができなくなり,結果として推測攻撃に対する安全性が向上する.このアイデアに基づき似顔絵を秘密情報とした認証システムを実装し,利用可能性と安全性に関して被験者による評価実験を実施した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Password cracking is a practical issue in knowledge-based user authentication. Especially password guessing attack, such as dictionary attack, is a major methods in this type of attack. To counter this type of attack, we try to apply ``a personal difference in information recognition'' to a user authentication. This makes password guessing more hard because attackers have to guess a victim's secret more than one times. In this paper, we use a deformed portrait as a secret in a user authentication. In this system, attackers have to succeed two guesses in order to impersonate a victim: 1) Whose face is a secret?, 2) How a face is illustrated to a portrait? We implemented a prototype authentication system and conducted a user study to evaluate memorability of a secret and security level to a guessing attack.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"872","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2012論文集"}],"bibliographicPageStart":"865","bibliographicIssueDates":{"bibliographicIssueDate":"2012-10-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2012"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}