{"created":"2025-01-18T23:41:45.236561+00:00","updated":"2025-01-21T14:36:16.484027+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00094443","sets":["1164:3925:7119:7228"]},"path":["7228"],"owner":"11","recid":"94443","title":["秘密分散法による階層的アクセス制御"],"pubdate":{"attribute_name":"公開日","attribute_value":"2013-07-11"},"_buckets":{"deposit":"b08f192f-07a2-4a3f-81bf-59c4a5ef752a"},"_deposit":{"id":"94443","pid":{"type":"depid","value":"94443","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"秘密分散法による階層的アクセス制御","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"秘密分散法による階層的アクセス制御"},{"subitem_title":"A Hierarchical Access Control Method by the Secret Sharing Scheme","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2013-07-11","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"首都大学東京大学院システムデザイン研究科情報通信システム学域"},{"subitem_text_value":"首都大学東京大学院システムデザイン研究科情報通信システム学域"},{"subitem_text_value":"首都大学東京大学院システムデザイン研究科情報通信システム学域"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Information and Communication Systems, Tokyo Metropolitan University","subitem_text_language":"en"},{"subitem_text_value":"Department of Information and Communication Systems, Tokyo Metropolitan University","subitem_text_language":"en"},{"subitem_text_value":"Department of Information and Communication Systems, Tokyo Metropolitan University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/94443/files/IPSJ-CSEC13062028.pdf"},"date":[{"dateType":"Available","dateValue":"2100-01-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC13062028.pdf","filesize":[{"value":"571.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5aec02ef-11dd-4f1c-b003-a717fe3ce8b9","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2013 by the Institute of Electronics, Information and Communication Engineers\nThis SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"倉上, 高史"},{"creatorName":"藤吉, 正明"},{"creatorName":"貴家, 仁志"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takashi, Kurakami","creatorNameLang":"en"},{"creatorName":"Masaaki, Fujiyoshi","creatorNameLang":"en"},{"creatorName":"Hitoshi, Kiya","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本稿では,秘匿したい情報に対するアクセスを制御するアクセス制御の新しい概念として,階層的アクセス制御を示し,また,その構成法を示している.本稿で示されている階層的アクセス制御は,既存の秘密情報とその秘密情報同士の演算結果とを対象にしている.ここで,既存の秘密情報の秘匿性を保ったまま,秘密計算によって新たな秘密情報が生成される.加えて,既存の秘密情報に対するアクセス制御と新たな秘密情報に対するアクセス制御とが異なる.秘密計算が可能な従来のアクセス制御では,二種類の秘密情報に対して異なるアクセス制御を適用することは検討されていなかった.本稿はまた,秘密分散の 1 つである (k, n) しきい値法を用いた階層的アクセス制御の構成法を示している.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"This paper studies a new concept of access control which is referred to as hierarchical access control. A hierar chical access control method not only controls access to existing secret information but also controls access to new secret information derived from existing secret information. Secure computation on existing secret information produces new secret information, whereas the computation keeps existing secret information secure. In addition, different access control rules are applied to existing secret information and to new computed secret information, whereas conventional access control with secure computation controls access to both information by only one rule. The proposed hierarchical access control method is based on (k, n)-threshold secret sharing.\n","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2013-07-11","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"28","bibliographicVolumeNumber":"2013-CSEC-62"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":94443,"links":{}}