{"created":"2023-05-15T12:12:46.940788+00:00","id":670,"links":{},"metadata":{"_buckets":{"deposit":"1504eb95-d0dd-454b-b716-07ac063130ce"},"_deposit":{"created_by":1,"id":"670","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"670"},"status":"published"},"_oai":{"id":"oai:kansai-u.repo.nii.ac.jp:00000670","sets":["63:68"]},"author_link":["1659","1661","1660","1662"],"item_9_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2017-03-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicPageEnd":"495","bibliographicPageStart":"483","bibliographicVolumeNumber":"E100–D","bibliographic_titles":[{"bibliographic_title":"IEICE Transactions on Information and Systems"}]}]},"item_9_description_4":{"attribute_name":"概要","attribute_value_mlt":[{"subitem_description":"This paper proposes secure regenerating codes that are composed of non-secure regenerating codes and a new all-or-nothing transform. Unlike the previous analysis of secure regenerating codes, the security of the proposed codes is analyzed in the sense of the indistinguishability. The advantage of the proposed codes is that the overhead caused by the security against eavesdropping is much less than that of previous secure regenerating codes. The security of the proposed codes against eavesdropping mainly depends on the new all-or-nothing transform.","subitem_description_type":"Other"}]},"item_9_description_5":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"This is a product of research which was financially supported in part by the Kansai University Outlay Support for Establish Research Centers, 2015 “Further development of identification technology based on device fingerprints.”","subitem_description_type":"Other"}]},"item_9_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"1661","nameIdentifierScheme":"WEKO"}],"names":[{"name":"桑門, 秀典"}]},{"nameIdentifiers":[{"nameIdentifier":"1662","nameIdentifierScheme":"WEKO"}],"names":[{"name":"栗原, 正純"}]}]},"item_9_publisher_34":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"The Institute of Electronics, Information and Communication Engineers"}]},"item_9_relation_12":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1587/transinf.2016EDP7220","subitem_relation_type_select":"DOI"}}]},"item_9_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (C) 2017 The Institute of Electronics, Information and Communication Engineers"}]},"item_9_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA10826272","subitem_source_identifier_type":"NCID"}]},"item_9_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"09168532","subitem_source_identifier_type":"ISSN"}]},"item_9_text_35":{"attribute_name":"出版者(他言語)","attribute_value_mlt":[{"subitem_text_value":"電子情報通信学会"}]},"item_9_version_type_17":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kuwakado, Hidenori"}],"nameIdentifiers":[{"nameIdentifier":"1659","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"30283914","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000030283914"}]},{"creatorNames":[{"creatorName":"Kurihara, Masazumi"}],"nameIdentifiers":[{"nameIdentifier":"1660","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-05-20"}],"displaytype":"detail","filename":"KU-0020-20170301-00.pdf","filesize":[{"value":"394.0 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"KU-0020-20170301-00.pdf","url":"https://kansai-u.repo.nii.ac.jp/record/670/files/KU-0020-20170301-00.pdf"},"version_id":"1a1d9483-da5f-4347-97ca-6b0eecfa0a30"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"regenerating code","subitem_subject_scheme":"Other"},{"subitem_subject":"secure regenerating code","subitem_subject_scheme":"Other"},{"subitem_subject":"all-or-nothing transform","subitem_subject_scheme":"Other"},{"subitem_subject":"indistinguishability","subitem_subject_scheme":"Other"},{"subitem_subject":"関西大学","subitem_subject_scheme":"Other"},{"subitem_subject":"Kansai University","subitem_subject_scheme":"Other"},{"subitem_subject":"平成27年度関西大学研究拠点形成支援経費","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Secure Regenerating Codes Using Linear Regenerating Codes and the All-or-Nothing Transform","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Secure Regenerating Codes Using Linear Regenerating Codes and the All-or-Nothing Transform"}]},"item_type_id":"9","owner":"1","path":["68"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-10-30"},"publish_date":"2017-10-30","publish_status":"0","recid":"670","relation_version_is_last":true,"title":["Secure Regenerating Codes Using Linear Regenerating Codes and the All-or-Nothing Transform"],"weko_creator_id":"1","weko_shared_id":1},"updated":"2023-05-15T16:15:09.766111+00:00"}