{"created":"2023-07-27T06:24:28.968555+00:00","id":7404,"links":{},"metadata":{"_buckets":{"deposit":"1c7d3e35-9718-47f0-8885-06184c799a8c"},"_deposit":{"created_by":3,"id":"7404","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"7404"},"status":"published"},"_oai":{"id":"oai:kanazawa-u.repo.nii.ac.jp:00007404","sets":["934:935:936"]},"author_link":["9779","9780"],"item_4_biblio_info_8":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2006-03-25","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1045","bibliographicPageEnd":"25","bibliographicPageStart":"15","bibliographicVolumeNumber":"16","bibliographic_titles":[{"bibliographic_title":"日本応用数理学会論文誌"}]}]},"item_4_description_21":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Multi-secret sharing scheme (multi-SSS) is the method of distributing arbitrary numbers of secret information. Moreover, as a way anyone can check that secret information has been distributed correctly, M.Stadler defined publicly verifiable secret sharing scheme (PVSS). However the security of the method of Stadler is computationally. In this paper, we proposed that multi-SSS and PVSS using unconditionally secure asymmetric encryption (USAE) which is non-malleable cryptography. By using two methods together, it is possible to check that secret information has been correctly distributed to two or more secret information, without needing computational assumption.","subitem_description_type":"Abstract"}]},"item_4_description_5":{"attribute_name":"提供者所属","attribute_value_mlt":[{"subitem_description":"金沢大学大学院自然科学研究科機能開発システム","subitem_description_type":"Other"}]},"item_4_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"日本応用数理学会"}]},"item_4_relation_28":{"attribute_name":"関連URI","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://ci.nii.ac.jp/naid/110004706610/","subitem_relation_type_select":"URI"}}]},"item_4_rights_23":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"本文データは、日本応用数理学会の許諾に基づきCiNiiから複製したものである"}]},"item_4_source_id_11":{"attribute_name":"NCID","attribute_value_mlt":[{"subitem_source_identifier":"AN10289996","subitem_source_identifier_type":"NCID"}]},"item_4_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0917-2270","subitem_source_identifier_type":"ISSN"}]},"item_4_version_type_25":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"江村, 恵太"}],"nameIdentifiers":[{"nameIdentifier":"9779","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"野村, 明人"}],"nameIdentifiers":[{"nameIdentifier":"9780","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"00313700","nameIdentifierScheme":"研究者番号","nameIdentifierURI":"https://nrid.nii.ac.jp/nrid/1000000313700"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-10-03"}],"displaytype":"detail","filename":"TE-PR-NOMURA-A-15.pdf","filesize":[{"value":"664.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"TE-PR-NOMURA-A-15.pdf","url":"https://kanazawa-u.repo.nii.ac.jp/record/7404/files/TE-PR-NOMURA-A-15.pdf"},"version_id":"48eb86b2-83e2-4302-9619-021a23fd4c78"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"頑強性を有する暗号の秘密分散法への応用","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"頑強性を有する暗号の秘密分散法への応用"},{"subitem_title":"Some applications of non-malleable cryptography to secret sharing scheme","subitem_title_language":"en"}]},"item_type_id":"4","owner":"3","path":["936"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-10-03"},"publish_date":"2017-10-03","publish_status":"0","recid":"7404","relation_version_is_last":true,"title":["頑強性を有する暗号の秘密分散法への応用"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-06-20T06:41:15.140243+00:00"}