WEKO3
アイテム
{"_buckets": {"deposit": "7b2ac700-6dcd-4a28-bc77-ce03d258ee38"}, "_deposit": {"id": "19877", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "19877"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00019877", "sets": ["1170"]}, "author_link": ["105684", "105685", "105686", "105687", "105688"], "item_1628147817048": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_6_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2015-02", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "2", "bibliographicPageEnd": "194", "bibliographicPageStart": "169", "bibliographicVolumeNumber": "26", "bibliographic_titles": [{"bibliographic_title": "INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE"}]}]}, "item_6_description_20": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "In this paper, we specify a class of mathematical problems, which we refer to as \"Function Density Problems\" (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1.), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDFs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other cryptographic applications of FDPs and on mathematical studies on FDPs themselves.", "subitem_description_type": "Abstract"}]}, "item_6_description_30": {"attribute_name": "資源タイプ(コンテンツの種類)", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_6_description_5": {"attribute_name": "引用", "attribute_value_mlt": [{"subitem_description": "INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. 26(2):169-194 (2015)", "subitem_description_type": "Other"}]}, "item_6_link_3": {"attribute_name": "信州大学研究者総覧へのリンク", "attribute_value_mlt": [{"subitem_link_text": "Numata, Yasuhide", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.OanmPhLa.html"}]}, "item_6_link_67": {"attribute_name": "WoS", "attribute_value_mlt": [{"subitem_link_text": "Web of Science", "subitem_link_url": "http://gateway.isiknowledge.com/gateway/Gateway.cgi?\u0026GWVersion=2\u0026SrcAuth=ShinshuUniv\u0026SrcApp=ShinshuUniv\u0026DestLinkType=FullRecord\u0026DestApp=WOS\u0026KeyUT=000354049200001"}]}, "item_6_publisher_4": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "WORLD SCIENTIFIC PUBL CO PTE LTD"}]}, "item_6_relation_48": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "10.1142/S0129054115500100"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1142/S0129054115500100", "subitem_relation_type_select": "DOI"}}]}, "item_6_rights_62": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "Electronic version of an article published as International Journal of Foundations of Computer Science, 26(2), 2015, 169-194 DOI: 10.1142/s0129054115500100. © World Scientific Publishing Company, https://doi.org/10.1142/s0129054115500100"}]}, "item_6_select_64": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "author"}]}, "item_6_source_id_35": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0129-0541", "subitem_source_identifier_type": "ISSN"}]}, "item_6_source_id_39": {"attribute_name": "NII ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0129-0541", "subitem_source_identifier_type": "ISSN"}]}, "item_6_source_id_40": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA10742015", "subitem_source_identifier_type": "NCID"}]}, "item_6_text_69": {"attribute_name": "wosonly authkey", "attribute_value_mlt": [{"subitem_text_value": "Function density problem; hash function; pseudorandom generator; security evaluation"}]}, "item_6_textarea_68": {"attribute_name": "wosonly abstract", "attribute_value_mlt": [{"subitem_textarea_value": "In this paper, we specify a class of mathematical problems, which we refer to as \"Function Density Problems\" (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1.), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDFs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other cryptographic applications of FDPs and on mathematical studies on FDPs themselves."}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Nuida, Koji"}], "nameIdentifiers": [{"nameIdentifier": "105684", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Abe, Takuro"}], "nameIdentifiers": [{"nameIdentifier": "105685", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaji, Shizuo"}], "nameIdentifiers": [{"nameIdentifier": "105686", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Maeno, Toshiaki"}], "nameIdentifiers": [{"nameIdentifier": "105687", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Numata, Yasuhide"}], "nameIdentifiers": [{"nameIdentifier": "105688", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2018-06-13"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "A_Mathematical_Problem_for_Security_Analysis_of_Hash_Functions_and_Pseudorandom_Generators.pdf", "filesize": [{"value": "182.9 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensefree": "Electronic version of an article published as International Journal of Foundations of Computer Science, 26(2), 2015, 169-194 DOI: 10.1142/s0129054115500100. © World Scientific Publishing Company, https://doi.org/10.1142/s0129054115500100", "licensetype": "license_note", "mimetype": "application/pdf", "size": 182900.0, "url": {"label": "A_Mathematical_Problem_for_Security_Analysis_of_Hash_Functions_and_Pseudorandom_Generators.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/19877/files/A_Mathematical_Problem_for_Security_Analysis_of_Hash_Functions_and_Pseudorandom_Generators.pdf"}, "version_id": "17a5d24d-ae58-4426-b65f-16e534b8d574"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Function density problem", "subitem_subject_scheme": "Other"}, {"subitem_subject": "hash function", "subitem_subject_scheme": "Other"}, {"subitem_subject": "pseudorandom generator", "subitem_subject_scheme": "Other"}, {"subitem_subject": "security evaluation", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators", "subitem_title_language": "en"}]}, "item_type_id": "6", "owner": "1", "path": ["1170"], "permalink_uri": "http://hdl.handle.net/10091/00020638", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2018-06-13"}, "publish_date": "2018-06-13", "publish_status": "0", "recid": "19877", "relation": {}, "relation_version_is_last": true, "title": ["A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators"], "weko_shared_id": -1}
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
http://hdl.handle.net/10091/00020638
http://hdl.handle.net/10091/00020638f881d0a6-de16-4b9a-b638-da4e0b06c05e
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2018-06-13 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Function density problem | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | hash function | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | pseudorandom generator | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | security evaluation | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_6501 | |||||
タイプ | journal article | |||||
著者 |
Nuida, Koji
× Nuida, Koji× Abe, Takuro× Kaji, Shizuo× Maeno, Toshiaki× Numata, Yasuhide |
|||||
信州大学研究者総覧へのリンク | ||||||
氏名 | Numata, Yasuhide | |||||
URL | http://soar-rd.shinshu-u.ac.jp/profile/ja.OanmPhLa.html | |||||
出版者 | ||||||
出版者 | WORLD SCIENTIFIC PUBL CO PTE LTD | |||||
引用 | ||||||
内容記述タイプ | Other | |||||
内容記述 | INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. 26(2):169-194 (2015) | |||||
書誌情報 |
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE 巻 26, 号 2, p. 169-194, 発行日 2015-02 |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | In this paper, we specify a class of mathematical problems, which we refer to as "Function Density Problems" (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1.), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDFs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other cryptographic applications of FDPs and on mathematical studies on FDPs themselves. | |||||
資源タイプ(コンテンツの種類) | ||||||
内容記述タイプ | Other | |||||
内容記述 | Article | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0129-0541 | |||||
書誌レコードID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA10742015 | |||||
DOI | ||||||
識別子タイプ | DOI | |||||
関連識別子 | https://doi.org/10.1142/S0129054115500100 | |||||
関連名称 | 10.1142/S0129054115500100 | |||||
権利 | ||||||
権利情報 | Electronic version of an article published as International Journal of Foundations of Computer Science, 26(2), 2015, 169-194 DOI: 10.1142/s0129054115500100. © World Scientific Publishing Company, https://doi.org/10.1142/s0129054115500100 | |||||
出版タイプ | ||||||
出版タイプ | AM | |||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||
WoS | ||||||
表示名 | Web of Science | |||||
URL | http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=ShinshuUniv&SrcApp=ShinshuUniv&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000354049200001 |