{"created":"2023-07-25T10:33:22.229197+00:00","id":4746,"links":{},"metadata":{"_buckets":{"deposit":"43248c0e-b316-46bb-ad5a-07fb5c0f6a8f"},"_deposit":{"created_by":3,"id":"4746","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"4746"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00004746","sets":["80:222"]},"author_link":["1176","1207","1174","941","4685","4686"],"item_26_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Mechanism-based PKI : A Real-time Key Generation from Fingerprints(Security Infrastructure)(Computer Security and Privacy Protection)"}]},"item_26_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2004-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicPageEnd":"1844","bibliographicPageStart":"1833","bibliographicVolumeNumber":"45","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}]}]},"item_26_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_26_description_9":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"公関鍵基盤(PKI)における秘密鍵は通常,ユーザが所有しているデバイスに保存されることになる.よって,デバイスの耐タンパ性の確保や盗難・紛失などに対して注意を払わなければならない.そこで本論文では,秘密鍵そのものではなく,秘密鍵を生成するメカニズムのみをデバイスに実装する「メカニズムベースPKI」を提案する.本方式では,ユーザが文章に署名を付す瞬間に,ユーザがデバイスに秘密鍵の種を入力することにより,デバイス内で秘密鍵を生成する.普段はデバイス内に秘密鍵は存在せず,デバイスの盗難・紛失の際にも問題はない.秘密鍵の種には様々な候補が考えられるが,ここでは一例として指紋を使用する方法について示す.しかし,指紋はアナログデータであり,指紋からつねに一意の秘密鍵をリアルタイムで生成すること昧困難であった.本論文では統計学的なアプローチによりこの問題を解決する「統計的AD変換」についてもあわせて提案する.基礎実験の結果,統計的AD変換によって指紋からつねに一意なユニークコードをリアルタイムで抽出可能であることが確かめられた.","subitem_description_type":"Abstract"}]},"item_26_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_26_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110002712232","subitem_relation_type_select":"NAID"}}]},"item_26_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"本文データは学協会の許諾に基づきCiNiiから複製したものであるここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_26_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"03875806","subitem_source_identifier_type":"ISSN"}]},"item_26_source_id_23":{"attribute_name":"NII書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_26_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_26_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"柴田, 陽一"}],"nameIdentifiers":[{},{},{}]},{"creatorNames":[{"creatorName":"三村, 昌弘"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高橋, 健太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中村, 逸一"}],"nameIdentifiers":[{},{},{}]},{"creatorNames":[{"creatorName":"曽我, 正和"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-12-14"}],"displaytype":"detail","filename":"101029004.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"101029004.pdf","url":"https://shizuoka.repo.nii.ac.jp/record/4746/files/101029004.pdf"},"version_id":"273dcf2a-fe36-4b4c-af87-fcff8da1758b"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"メカニズムベースPKI : 指紋からの秘密鍵動的生成(セキュリティ基盤技術)(<特集>プライバシを保護するコンピュータセキュリティ技術)","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"メカニズムベースPKI : 指紋からの秘密鍵動的生成(セキュリティ基盤技術)(<特集>プライバシを保護するコンピュータセキュリティ技術)"}]},"item_type_id":"26","owner":"3","path":["222"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-10-29"},"publish_date":"2010-10-29","publish_status":"0","recid":"4746","relation_version_is_last":true,"title":["メカニズムベースPKI : 指紋からの秘密鍵動的生成(セキュリティ基盤技術)(<特集>プライバシを保護するコンピュータセキュリティ技術)"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-14T02:53:15.262332+00:00"}