• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

R&D of New Cryptographic Technologies with Long-Term Usability

Research Project

Project/Area Number 23500031
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionNational Institute of Information and Communications Technology

Principal Investigator

WANG Lihua  独立行政法人情報通信研究機構, ネットワークセキュリティ研究所セキュリティ基盤研究室, 主任研究員 (00447228)

Research Collaborator WANG Licheng  中国北京郵電大学, State Key Laboratory of Networking and Switching Technology, 准教授
CAO Zhenfu  中国上海交通大学, Department of Computer Science and Engineering, 教授
MAMBO Masahiro  金沢大学, 理工研究域電子情報学系, 教授 (60251972)
SHAO Jun  中国Zhejiang Gongshang University, School of Computer and Information Engineering, 准教授
AONO Yoshinori  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 研究員 (50611125)
BOYEN Xavier  Queensland University of Technology, 准教授
LE Trieu Phong  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 研究員 (40583191)
TANAKA Hidema  防衛大学校, 情報工学科, 准教授 (30328570)
WASEDA Atsushi  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 研究員 (10455454)
NOJIMA Ryo  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 主任研究員 (40446597)
MORIAI Shiho  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 室長 (80636192)
Project Period (FY) 2011 – 2013
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥5,070,000 (Direct Cost: ¥3,900,000、Indirect Cost: ¥1,170,000)
Fiscal Year 2013: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Fiscal Year 2012: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Fiscal Year 2011: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Keywords暗号系 / Lattice / LWE / 非可換暗号 / プロキシ再暗号 / PRINCESS / クラウドストレージ / 準同型暗号応用 / 位置情報認証 / 準同型暗号 / 秘密分散 / Threshold PKE / 耐量子攻撃 / IDベース暗号 / PRE / プロキシ暗号 / Threshold KEM
Research Abstract

The development of quantum computation casts serious threats to the security of most existing public-key cryptosystems. Cryptosystems that are secure against quantum attacks and can be run on traditional computers are desirable and known as post-quantum cryptosystems. On the other hand, public cloud storage service provides several benefits, including availability (being able to access data from anywhere) and reliability, at a relatively low cost. An adoptable cloud storage service should aim to achieve the best of both worlds by providing the security of a private cloud and the functionality of a public cloud.
We investigated cryptographic technologies with long-term usability on the following two issues: Post-Quantum Cryptography (Lattice-based cryptography and non-commutative cryptography) and Practical Cryptography for Cloud Security (proxy re-encryption, threshold encryption, secret sharing scheme, and position authentication using homomorphic encryption, etc.).

Report

(4 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (27 results)

All 2014 2013 2012 2011 Other

All Journal Article (12 results) (of which Peer Reviewed: 12 results) Presentation (8 results) Remarks (7 results)

  • [Journal Article] Certificate-based proxy decryption systems with revocability in the standard model2013

    • Author(s)
      Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, and Licheng Wang
    • Journal Title

      Information Sciences

      Volume: Vol.247 Pages: 188-201

    • DOI

      10.1016/j.ins.2013.06.026

    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Key-Private Proxy Re-encryption under LWE2013

    • Author(s)
      Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang
    • Journal Title

      INDOCRYPT 2013

      Volume: 8250 Pages: 1-18

    • DOI

      10.1007/978-3-319-03515-4_1

    • ISBN
      9783319035147, 9783319035154
    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie–Hellman Assumption2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang
    • Journal Title

      THE COMPUTER JOURNAL

      Volume: - Issue: 10 Pages: 1249-1257

    • DOI

      10.1093/comjnl/bxs167

    • Related Report
      2013 Annual Research Report 2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Efficient Threshold PKE with Full Security Based on Dual Pairing Vector Spaces2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, and Yixian Yang
    • Journal Title

      International Journal of Communication Systems

    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中 秀磨, 王 立華, 市川 隆一, 岩間 司, 小山 泰弘
    • Journal Title

      IEICE

      Volume: J96-D(8) Pages: 1913-1924

    • NAID

      110009634962

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups2013

    • Author(s)
      Ping Pan, Licheng Wang, Yixian Yang, Yuanju Gan, Lihua Wang, and Chengqian Xu
    • Journal Title

      Fundamenta Informaticae

      Volume: 126 Issue: 1 Pages: 103-119

    • DOI

      10.3233/fi-2013-873

    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Lattice-Based Signcryption in Standard Model2013

    • Author(s)
      Jianhua Yan, Licheng Wang, Lihua Wang, Yixian Yang, Wenbin Yao
    • Journal Title

      Mathematical Problems in Engineering

      Volume: 2013 Pages: 1-18

    • DOI

      10.1155/2013/702539

    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang
    • Journal Title

      INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS

      Volume: - Issue: 2 Pages: 902462-902462

    • DOI

      10.1155/2013/902462

    • Related Report
      2013 Annual Research Report 2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中 秀磨,王 立華,市川 隆一,岩間 司,小山 泰弘
    • Journal Title

      IEICE

      Volume: Vol.J96-D, No.8 Pages: 1913-1924

    • NAID

      110009634962

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中秀磨, 王立華, 市川隆一, 岩間司, 小山泰弘
    • Journal Title

      電子情報通信学会誌

      Volume: Vol.J96-D,No.8

    • NAID

      110009634962

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities2012

    • Author(s)
      Lihua Wang, Licheng Wang, Masahiro Mambo, and Eiji Okamoto
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E95-A Issue: 1 Pages: 70-88

    • DOI

      10.1587/transfun.E95.A.70

    • NAID

      10030534516

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2013 Final Research Report 2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] CSP-DHIES: a new public-key encryption scheme from matrix conjugation2012

    • Author(s)
      Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, Yixian Yang
    • Journal Title

      Security and Communication Networks

      Volume: Volume 5, Issue 7, Issue: 7 Pages: 809-822

    • DOI

      10.1002/sec.376

    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Presentation] PRINCESS : プロキシ再暗号化技術を活用したセキュアなストレージシステム2014

    • Author(s)
      王 立華, 早稲田 篤志, 野島 良, 盛合 志帆
    • Organizer
      2014年暗号と情報セキュリティシンポジウム SCIS2014
    • Place of Presentation
      鹿児島県鹿児島市城山観光ホテル
    • Related Report
      2013 Final Research Report
  • [Presentation] PRINCESS:プロキシ再暗号化技術を活用したセキュアなストレージシステム2014

    • Author(s)
      王 立華, 早稲田 篤志, 野島 良, 盛合 志帆
    • Organizer
      2014年暗号と情報セキュリティシンポジウム(SCIS2014)
    • Place of Presentation
      鹿児島県鹿児島市城山観光ホテル
    • Related Report
      2013 Annual Research Report
  • [Presentation] Study on CSP-based Cryptography2012

    • Author(s)
      王 立華
    • Organizer
      代数系および計算機科学基礎研究集会
    • Place of Presentation
      京都府京都市京都大学数理解析研究所
    • Related Report
      2013 Final Research Report
  • [Presentation] A CCA Secure Threshold KEM Scheme2012

    • Author(s)
      Yuanju Gan, Lihua Wang, Ping Pan, Licheng Wang, and Yixian Yang
    • Organizer
      2012年暗号と情報セキュリティシンポジウム SCIS2012
    • Place of Presentation
      石川県金沢市金沢エクセルホテル東急
    • Related Report
      2013 Final Research Report
  • [Presentation] A CCA Secure Threshold KEM Scheme2012

    • Author(s)
      Yuanju Gan, Lihua Wang, Ping Pan, Licheng Wang, and Yixian Yang
    • Organizer
      2012年暗号と情報セキュリティシンポジウム(SCIS2012)
    • Place of Presentation
      石川県金沢エクセルホテル東急
    • Related Report
      2011 Research-status Report
  • [Presentation] Study on CSP-based Cryptography2012

    • Author(s)
      王 立華
    • Organizer
      代数系および計算機科学基礎研究集会
    • Place of Presentation
      京都府京都大学数理解析研究所
    • Related Report
      2011 Research-status Report
  • [Presentation] 電波を使った位置情報認証2011

    • Author(s)
      王 立華, 田中 秀磨, 市川 隆一, 岩間 司, 小山 泰弘
    • Organizer
      第34回情報理論とその応用シンポジウムSITA2011
    • Place of Presentation
      岩手県岩手郡鶯宿ホテル森の風鶯宿
    • Related Report
      2013 Final Research Report
  • [Presentation] 電波を使った位置情報認証2011

    • Author(s)
      王 立華, 田中 秀磨, 市川 隆一, 岩間 司, 小山 泰弘
    • Organizer
      第34回情報理論とその応用シンポジウム(SITA2011)
    • Place of Presentation
      岩手県ホテル森の風鶯宿
    • Related Report
      2011 Research-status Report
  • [Remarks]

    • URL

      http://www2/nsri/fund/wang/kakenhi/index.html

    • Related Report
      2013 Final Research Report
  • [Remarks]

    • URL

      http://www.nict.go.jp/nsri/fund/papers.html

    • Related Report
      2013 Final Research Report
  • [Remarks] 長期利用可能な新しい暗号に関する研究開発

    • URL

      http://www2/nsri/fund/wang/kakenhi/index.html

    • Related Report
      2013 Annual Research Report
  • [Remarks] 情報通信研究機構 ネットワークセキュリティ研究所 セキュリティ基盤研究室

    • URL

      http://www.nict.go.jp/nsri/fund/members.html

    • Related Report
      2013 Annual Research Report
  • [Remarks] 情報通信研究機構 ネットワークセキュリティ研究所 セキュリティ基盤研究室

    • URL

      http://www.nict.go.jp/nsri/fund/index.html

    • Related Report
      2013 Annual Research Report
  • [Remarks] 情報通信研究機構 ネットワークセキュリティ研究所 セキュリティ基盤研究室

    • URL

      http://www.nict.go.jp/nsri/fund/index.html

    • Related Report
      2012 Research-status Report
  • [Remarks] 長期利用可能な新しい暗号に関する研究開発 (Home Pageを作成する予定, URL未定)

    • Related Report
      2012 Research-status Report

URL: 

Published: 2011-08-05   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi