• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research of Self-protection Mechanism for Information

Research Project

Project/Area Number 07455419
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field 情報通信工学
Research InstitutionJapan Advanced Institute of Science and Technology (JAIST)

Principal Investigator

OKAMOTO Eiji  JAIST,School of Information Science, Professor, 情報科学研究科, 教授 (60242567)

Co-Investigator(Kenkyū-buntansha) KANEKO Mineo  JAIST,School of Information Science, Associate Professor, 情報科学研究科, 助教授 (00185935)
KUROSAWA Kaoru  Tokyo Institute of Technology, Faculty of Engineering, Professor, 工学部, 教授 (60153409)
MAMBO Masahiro  Tohoku University, Dept.of Computer and Mathematical Sciences, 情報処理教育センター, 助教授 (60251972)
SHINODA Youichi  JAIST,School of Information Science, Associate Professor, 情報科学研究科, 助教授 (50206108)
UEMATSU Tomohiko  Tokyo Institute of Technology, Faculty of Engineering, Associate Professor, 工学部, 助教授 (60168656)
Project Period (FY) 1995 – 1997
Project Status Completed (Fiscal Year 1997)
Budget Amount *help
¥3,100,000 (Direct Cost: ¥3,100,000)
Fiscal Year 1997: ¥1,300,000 (Direct Cost: ¥1,300,000)
Fiscal Year 1996: ¥1,800,000 (Direct Cost: ¥1,800,000)
Keywordsencryption / decryption / cryptosystem / ciphertext / symmetric key cryptosystem / key distribution mechanism
Research Abstract

The standardization of cryptosysems is required for secret communication because internet users need secure but simple communication tools. However, there is no standard cryptosystem and there are many obstacles to creating one standard system in the near future. For the solution of these problems, we proposed "self-deciphering secret communication". This method is a secret communication method which is independent from a particular cryptosystem. A sender sends not only a ciphertext but its deciphering algorithm to the recipient. For enciphering and deciphering, symmetric key cryptosystems are used. For this reason, the sender and the recipient have to keep the secret key commonly, and a key distribution mechanism should be incorporated. In this project, we proposed and implemented a key distribution protocol using key distribution center.

Report

(4 results)
  • 1997 Annual Research Report   Final Research Report Summary
  • 1996 Annual Research Report
  • 1995 Annual Research Report
  • Research Products

    (34 results)

All Other

All Publications (34 results)

  • [Publications] Rene Peralta, Masahiro Mambo and Eiji Okamoto: "“Factoring hard integers on a paralle machine"." 電子情報通信学会英論文誌. VOL.E80-A NO.4. 658-662 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] 岡本 栄司: "“暗号の非線形性"" 電子情報通信学会誌. VOL.E81-A NO.1. 56-64 (1998)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] Kazuomi Oishi, Masahiro Mambo Eiji Okamoto: "“Anonymous public key certificates and their applications"." 電子情報通信学会英論文誌. VOL.E80NO.11. 1185-1189 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] Kenichi Hayashi, Eiji Okamoto Masahiro Mambo: "Proposal for User Identification Scheme Using Mouse." ICICS'97予稿集. 144-148 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] S, Shimo, E, Okamoto M, Mambo: "Electronic Commerce System Using IC Cards," JW-ISC'97予稿集. 95-98 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] T, Murayamo, M.Mambo E.Okamoto: "A Tentative Approach to Constructing Tamper-Resistant Software." New Security Paradigms'97予稿. (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] Y.Sengoku, E.Okamoto, S.Hattori: "Computer Virus Diffusion and Extinction Evaluation in Networks with Vaccine-free Nodes" Transactions on Information Processing Society of Japan. vol.39, no.3. 818-825 (1998)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] Kazuomi Oishi, Masahiro Mambo and Eiji Okamoto: "Anonymous Public Ley Certificates and Their Applications" IEICE (Institute of Electronics, Information and Communications Engineers) Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E81-A,no.1. 56-64 (1998)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] Rene Peralta, Masahiro Mambo and Eiji Okamoto: "Factoring Hard Integers on a Parallel Machine" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E80-A,no.4. 658-662 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] T.Uyematsu and E.Okamoto: "A Construction of Codes with Exponential Error Bounds on Arbitrary Discrete Memoryless Channels" IEEE Trans.on Information Theory. vol.43, no.3. 992-996 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] T.Uyematsu, K.Iwata and E.Okamoto: "An Efficient Algorithm for Enumerative Coding" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.J80-A,no.3. 573-575 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] M.Mambo and E.Okamoto: "Proxy Cryptosystems : Delegation of the Power to Decrypt Ciphers" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E80-A.no.1. 54-63 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] K.Iwata, T.Uyematsu and E.Okamoto: "Proposal of Partially Decodable Ziv-Lempel Code (in Japanese)" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.J79-A,no.11. 1899-1906 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] M.Mambo, K.Usuda and E.Okamoto: "Proxy Signatures : Delegation of the Power to Sign Messages" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E79-A,no.9. 1338-1354 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] T.Uyematsu, K.Nagano and E.Okamoto: "A Simple Construction of Codes for Identification via Channels under Average Error Criterion" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E79-A,no.9. 1440-1443 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] R.Peralta and E.Okamoto: "Faster Factoring of Integers of a Special Form" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E79-A,no.4. 489-493 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] E.Okamoto, W.Aitken and G.R.Blakley: "Algebraic Properties of Permutation Polynomials" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E79-A,no.4. 494-501 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] Y.Sengoku, E.Okamoto, M.Mambo and T.Uyematsu: "Golbal Behavior of Computer Virus Diffusion and Extinction (in Japanese)" Transaction on Information Processing Society of Japan. vol.37, no.4. 579-587 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] T.Uyematsu, M.Asano and E.Okamoto: "Performance Analysis of Hybrid ARQ Schemes in Optical Communication (in Japanese)" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.J79-A,no.3. 745-753 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] K.Usuda, M.Mambo, T.Uyematsu and E.Okamoto: "Proposal of an Automatic Signature Scheme Using a Compiler" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E79-A,no.1. 94-101 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] S.Tsujii, K.Araki, M.Kasahara, E.Okamoto, R.Sakai, Y.Maeda and T.Yagisawa: "On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Scheme" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E79-A,no.1. 66-75 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] T.Uyematsu, J.Kaga and E.Okamoto: "Reliability Functions for Concatenated Codes Employing Modular Codes with Maximum Likelihood Decoding" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. vol.E78-A,no.9. 1160-1169 (1996)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] E.Okamoto and M.Mambo: Electronic Money. Iwanami Shoten, (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1997 Final Research Report Summary
  • [Publications] Rene Peralta,Masahiro Mambo and Eiji Okamoto: ""Factoring hard integers on a parallel machine"," 電子情報通信学会英論文誌. VOL.E80-A,NO.4,. 658-662 (1997)

    • Related Report
      1997 Annual Research Report
  • [Publications] 岡本栄司;: ""暗号の非線形性"," 電子情報通信学会誌,. VOL.E81-A,NO.1. 56-64 (1998)

    • Related Report
      1997 Annual Research Report
  • [Publications] 千石靖、岡本栄司、満保雅浩、植松友彦: "コンピュータウイルスの拡散と消滅の大域的振舞いについて" 情報処理学会論文誌. 37巻. 579-587 (1996)

    • Related Report
      1996 Annual Research Report
  • [Publications] 岡本栄司,W.Aitken G.R.Blakley: "Algebraic Properties of Permutation Polynomials" 電子情報通信学会論文誌. E79-A巻. 494-501 (1996)

    • Related Report
      1996 Annual Research Report
  • [Publications] R.Peralta,E.Okamoto: "Faster Factoring of Integers of a Special Form" 電子情報通信学会論文誌. E79-A巻. 489-493 (1996)

    • Related Report
      1996 Annual Research Report
  • [Publications] 満保雅浩,岡本栄司: "社会での暗号技術の取り扱いとClipper Chipについて" 情報処理. 37巻. 503-510 (1996)

    • Related Report
      1996 Annual Research Report
  • [Publications] 南尚鎮,岡本栄司,篠田陽一,満保雅浩: "A Design and Implementation of a Platform for Self-Deciphering Secret Communication" Int'l Symp. of Information Theory and Its Application. 242-245 (1996)

    • Related Report
      1996 Annual Research Report
  • [Publications] 満保雅浩、岩田賢一、植松友彦、岡本栄司: "LZ78符号における文字列検索と復号" 第18回情報理論とその応用シンポジウム予稿集. 2巻. 465-468 (1995)

    • Related Report
      1995 Annual Research Report
  • [Publications] 村上隆徳、満保雅浩、岡本栄司、植松友彦: "ソフトウェアの難読化について" 電子情報通信学会技術研究報告. 95巻. 9-14 (1995)

    • Related Report
      1995 Annual Research Report
  • [Publications] 南 尚鎮、岡本栄司、篠田陽一、満保雅浩: "自己復号型秘密情報通信のためのプラットフォームの開発研究" 電子情報通信学会 1996年暗号と情報セキュリティシンポジウム予稿集. 1C1-12 (1996)

    • Related Report
      1995 Annual Research Report
  • [Publications] 村山隆徳、満保雅浩、岡本栄司、植松友彦: "プログラムコードの難読化について" 電子情報通信学会 1996年暗号と情報セキュリティシンポジウム予稿集. 8D1-12 (1996)

    • Related Report
      1995 Annual Research Report

URL: 

Published: 1996-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi