WEKO3
アイテム
{"_buckets": {"deposit": "8565537f-683c-4d35-afcc-de2c957107b0"}, "_deposit": {"id": "27735", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "27735"}, "status": "published"}, "_oai": {"id": "oai:tsukuba.repo.nii.ac.jp:00027735", "sets": ["829", "601"]}, "item_5_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2012-09", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "9", "bibliographicPageEnd": "6206", "bibliographicPageStart": "6194", "bibliographicVolumeNumber": "58", "bibliographic_titles": [{"bibliographic_title": "IEEE transactions on information theory"}]}]}, "item_5_creator_3": {"attribute_name": "著者別名", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "古賀, 弘樹"}], "nameIdentifiers": [{"nameIdentifier": "204272", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "20272388", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020272388"}, {"nameIdentifier": "0000001006", "nameIdentifierScheme": "筑波大学研究者総覧", "nameIdentifierURI": "http://trios.tsukuba.ac.jp/researcher/0000001006"}]}]}, "item_5_description_4": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Coding theorems on a $(2,2)$-threshold scheme with an opponent are discussed in an asymptotic setup, where the opponent tries to impersonate one of the two participants. A situation is considered where $n$ secrets $S^{n}$ from a memoryless source is blockwisely encoded to two shares and the two shares are decoded to $S^{n}$ with permitting negligible decoding error. We introduce correlation level of the two shares and characterize the minimum attainable rates of the shares and a uniform random number for realizing a $(2, 2)$-threshold scheme that is secure against the impersonation attack by the opponent. It is shown that if the correlation level between the two shares equals to $ell geq 0$, the minimum attainable rates coincide with $H(S)+ell $, where $H(S)$ denotes the entropy of the source, and the maximum attainable exponent of the success probability of the impersonation attack equals to $ell $. It is also shown that a simple scheme using an ordinary $(2,2)$-threshold scheme attains all the bounds as well.", "subitem_description_type": "Abstract"}]}, "item_5_identifier_34": {"attribute_name": "URI", "attribute_value_mlt": [{"subitem_identifier_type": "HDL", "subitem_identifier_uri": "http://hdl.handle.net/2241/117674"}]}, "item_5_publisher_27": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE"}]}, "item_5_relation_11": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/TIT.2012.2204546", "subitem_relation_type_select": "DOI"}}]}, "item_5_rights_12": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2012IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works."}]}, "item_5_select_15": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "author"}]}, "item_5_source_id_7": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0018-9448", "subitem_source_identifier_type": "ISSN"}]}, "item_5_source_id_9": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA00667911", "subitem_source_identifier_type": "NCID"}]}, "item_5_subject_20": {"attribute_name": "NIIサブジェクト", "attribute_value_mlt": [{"subitem_subject": "情報学", "subitem_subject_scheme": "Other"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Iwamoto, Mitsugu"}], "nameIdentifiers": [{"nameIdentifier": "96073", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Koga, Hiroki"}], "nameIdentifiers": [{"nameIdentifier": "96074", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Yamamoto, Hirosuke"}], "nameIdentifiers": [{"nameIdentifier": "96075", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2013-12-25"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEETIT_58-9.pdf", "filesize": [{"value": "261.2 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 261200.0, "url": {"label": "IEEETIT_58-9.pdf", "url": "https://tsukuba.repo.nii.ac.jp/record/27735/files/IEEETIT_58-9.pdf"}, "version_id": "6098175a-b1f8-49e1-b3ae-4658a5efbc3c"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Coding Theorems for a (2; 2)–Threshold Scheme with Detectability of Impersonation Attacks", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Coding Theorems for a (2; 2)–Threshold Scheme with Detectability of Impersonation Attacks"}]}, "item_type_id": "5", "owner": "1", "path": ["829", "601"], "permalink_uri": "http://hdl.handle.net/2241/117674", "pubdate": {"attribute_name": "公開日", "attribute_value": "2012-10-19"}, "publish_date": "2012-10-19", "publish_status": "0", "recid": "27735", "relation": {}, "relation_version_is_last": true, "title": ["Coding Theorems for a (2; 2)–Threshold Scheme with Detectability of Impersonation Attacks"], "weko_shared_id": 5}
Coding Theorems for a (2; 2)–Threshold Scheme with Detectability of Impersonation Attacks
http://hdl.handle.net/2241/117674
http://hdl.handle.net/2241/117674550076ff-2ec7-405e-aaf4-a8530041327e
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEETIT_58-9.pdf (261.2 kB)
|
|
Item type | Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2012-10-19 | |||||
タイトル | ||||||
タイトル | Coding Theorems for a (2; 2)–Threshold Scheme with Detectability of Impersonation Attacks | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_6501 | |||||
タイプ | journal article | |||||
著者 |
Iwamoto, Mitsugu
× Iwamoto, Mitsugu× Koga, Hiroki× Yamamoto, Hirosuke |
|||||
著者別名 |
古賀, 弘樹
× 古賀, 弘樹 |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Coding theorems on a $(2,2)$-threshold scheme with an opponent are discussed in an asymptotic setup, where the opponent tries to impersonate one of the two participants. A situation is considered where $n$ secrets $S^{n}$ from a memoryless source is blockwisely encoded to two shares and the two shares are decoded to $S^{n}$ with permitting negligible decoding error. We introduce correlation level of the two shares and characterize the minimum attainable rates of the shares and a uniform random number for realizing a $(2, 2)$-threshold scheme that is secure against the impersonation attack by the opponent. It is shown that if the correlation level between the two shares equals to $ell geq 0$, the minimum attainable rates coincide with $H(S)+ell $, where $H(S)$ denotes the entropy of the source, and the maximum attainable exponent of the success probability of the impersonation attack equals to $ell $. It is also shown that a simple scheme using an ordinary $(2,2)$-threshold scheme attains all the bounds as well. | |||||
書誌情報 |
IEEE transactions on information theory 巻 58, 号 9, p. 6194-6206, 発行日 2012-09 |
|||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0018-9448 | |||||
書誌レコードID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA00667911 | |||||
DOI | ||||||
識別子タイプ | DOI | |||||
関連識別子 | 10.1109/TIT.2012.2204546 | |||||
権利 | ||||||
権利情報 | © 2012IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||
著者版フラグ | ||||||
値 | author | |||||
出版者 | ||||||
出版者 | IEEE | |||||
URI | ||||||
識別子 | http://hdl.handle.net/2241/117674 | |||||
識別子タイプ | HDL |