{"created":"2023-05-15T11:03:57.174416+00:00","id":110,"links":{},"metadata":{"_buckets":{"deposit":"94f626af-2f34-4d2f-8c84-fd0543d7d387"},"_deposit":{"created_by":15,"id":"110","owners":[15],"pid":{"revision_id":0,"type":"depid","value":"110"},"status":"published"},"_oai":{"id":"oai:u-aizu.repo.nii.ac.jp:00000110","sets":["7"]},"author_link":["59","54","57","56"],"control_number":"110","item_10010_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2014","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"7400","bibliographicPageStart":"7396","bibliographic_titles":[{"bibliographic_title":"Proceedings of the 39th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014)","bibliographic_titleLang":"en"}]}]},"item_10010_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"PDF"}]},"item_10010_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Secret sharing is a method of encrypting a secret into multiple pieces called shares so that only qualified sets of shares can be employed to reconstruct the secret. Audio secret sharing (ASS) is an example of secret sharing whose decryption can be performed by human ears. This paper examines the security of an audio secret sharing scheme encrypting audio secrets with bounded shares, and optimizes the security with respect to the probability distribution used in its encryption.","subitem_description_type":"Abstract"}]},"item_10010_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_10010_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"IEEE Xplore"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6855037","subitem_relation_type_select":"URI"}},{"subitem_relation_name":[{"subitem_relation_name_text":"IEEE Copyright Form"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://www.ieee.org/publications_standards/publications/rights/copyrightmain.html","subitem_relation_type_select":"URI"}}]},"item_10010_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鷲尾, 槙也","creatorNameLang":"ja"},{"creatorName":"ワシオ, シンヤ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"渡邊, 曜大","creatorNameLang":"ja"},{"creatorName":"ワタナベ, ヨウダイ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Washio, Shinya","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Watanabe, Yodai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-07-29"}],"displaytype":"detail","filename":"icassp2014ass.pdf","filesize":[{"value":"413.3 kB"}],"format":"application/pdf","licensetype":"license_11","mimetype":"application/pdf","url":{"label":"国際会議予稿集2(渡邊)","url":"https://u-aizu.repo.nii.ac.jp/record/110/files/icassp2014ass.pdf"},"version_id":"f8d5d43a-02a0-4448-95be-0635dfb5cb01"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Audio Secret Sharing","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Information-Theoretic Security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Variation Distance","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"other","resourceuri":"http://purl.org/coar/resource_type/c_1843"}]},"item_title":"Security of audio secret sharing scheme encrypting audio secrets with bounded shares","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Security of audio secret sharing scheme encrypting audio secrets with bounded shares","subitem_title_language":"en"}]},"item_type_id":"10010","owner":"15","path":["7"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2015-07-29"},"publish_date":"2015-07-29","publish_status":"0","recid":"110","relation_version_is_last":true,"title":["Security of audio secret sharing scheme encrypting audio secrets with bounded shares"],"weko_creator_id":"15","weko_shared_id":-1},"updated":"2023-09-25T09:09:09.289153+00:00"}