• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Secure and reliable communication in distributed systems

Research Project

Project/Area Number 10205203
Research Category

Grant-in-Aid for Scientific Research on Priority Areas (B)

Allocation TypeSingle-year Grants
Research InstitutionGunma University

Principal Investigator

IGARASHI Yoshihide  Gunma University, Faculty of Engineering, Professor, 工学部, 教授 (60006260)

Co-Investigator(Kenkyū-buntansha) MOTEGI Kazuhiro  Gunma University, Faculty of Engineering, Research associate, 工学部, 助手 (00251124)
OSAWA Shingo  Gunma University, Faculty of Engineering, Research associate, 工学部, 助手 (30241863)
NISHITANI Yasuaki  Iwate University, Faculty of Engineering, Professor, 工学部, 教授 (60198463)
Project Period (FY) 1998 – 2000
Project Status Completed (Fiscal Year 2001)
Budget Amount *help
¥8,300,000 (Direct Cost: ¥8,300,000)
Fiscal Year 2000: ¥1,900,000 (Direct Cost: ¥1,900,000)
Fiscal Year 1999: ¥2,700,000 (Direct Cost: ¥2,700,000)
Fiscal Year 1998: ¥3,700,000 (Direct Cost: ¥3,700,000)
Keywordsdistributed systems / fault tolerance / information security / parallel algorithms / interconnection networks / cryptography / distributed algorithms / mutual exclusion / 非同期共有メモリーモデル / 相互排他問題 / κ-排他問題 / 暗号システムの安全性 / 多重パーティ計算 / 非ランダム化 / ブロードキャスト / 時間計算量 / 領域計算量 / 秘密共有
Research Abstract

This project is to study the design and analysis of reliable and secure protocols for communication and computation on large scale distributed systems. We proposed some fault tolerant broadcasting schemes in networks, and mutual exclusion algorithms and k-exclusion algorithms on the asynchronous shared memory model. Our mutual exclusion algorithms are improvements of the n-process algorithm by Peterson and the tournament algorithm by Peterson and Fischer. Our k-exclusion algorithms are extensions of our mutual exclusion algorithms. Our algorithms use multi-writer/reader shared variables. This is an unattractive feature, but the structures of the algorithms are simple. The n-exclusion algorithms satisfy not only k-exclusion but also k-lockout avoidance.
We proposed the problem of how to transmit an information-theoretic secure bit using random deals of cards among players in hierarchical groups and a computationally unlimited eavesdropper. We also introduced a refined definition of semantic security. The new definition is valid against not only chosen-plaintext attacks but also chosen-ciphertext attacks. We show that semantic security formalized by the new definition is equivalent to indistinguishability, due to Goldwasser and Micali, for each of chosen-plaintext attacks, non-adaptive chosen ciphertext attacks, and adaptive chosen-ciphertext attacks.
We constructed a distributed processing system where clients can join or leave whenever they want to do so. We implemented some algorithms for solving the discrete logarithm problem on PVM (Parallel Virtual Machine).

Report

(4 results)
  • 2001 Final Research Report Summary
  • 2000 Annual Research Report
  • 1999 Annual Research Report
  • 1998 Annual Research Report
  • Research Products

    (33 results)

All Other

All Publications (33 results)

  • [Publications] Nishitani, Y.: "Secure multi-party computation over networks"IEICE Transactions on Information and Systems. E83-D,3. 561-569 (2000)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Yoshikawa, R.: "Secret key exchange using random deals of cards on hierarchical structures"11th International Conference on Algorithms and Computation(ISAAC 2000),Lecture Notes in Computer Science. 1969. 290-301 (2000)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Sakai, H.: "A refined definition of semantic security for public-key encryption schemes"IEICE Transactions on Information and Systems. E84-D,1. 34-39 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Yoshikawa, R.: "Construction of secret key exchange spanning trees by random deals on hierarchical structures"IEICE Transactions on Fundamentals. E84-A,5. 1110-1119 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Obokata, K.: "A lockout avoidance algorithm without using time-stamps for the k-exclusion problem"7th International Computing and Combinatorics Conference(COCOON 2001),Lecture Notes in Computer Science. 2108. 571-575 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] 杉原 厚吉他編: "アルゴリズム工学-計算困難問題への挑戦"共立出版. 280 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Nishitani, Y.: "Secure multi-party computation over networks"IEICE Transactions on Information and Systems. Vol. E83-D, No.3. 561-569 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Yoshikawa, R.: "Secret key exchange using random deals of cards on hierarchical structures"11th International Conference on Algorithms and Computation (ISAAC 2000), Taipei, Taiwan, Lecture Notes in Computer Science. Vol. 1969, Springer. 290-301 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Sakai, H.: "A refined definition of semantic security for public-key encryption schemes"IEICE Transactions on Information and Systems. Vol. E84-D, No.1. 34-39 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Yoshikawa, R.: "Construction of secret key exchange spanning trees by random deals on hierarchical structures"IEICE Transactions on Fundamentals. Vol. E84-A, No.5. 1110-1119 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Obokata, K.: "A lockout avoidance algorithm without using time-stamps for the k-exclusion problem"7th International Computing and Combinatorics Conference (CO COON 2001), Guilin, China, Lecture Notes in Computer Science. Vol. 2108, Springer. 571-575 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Hideaki Sakai,Yoshihide Igarashi: "A refined definition of semantics security for public-key encryption schemes"IEICE Trans. on Information and Systems. E84-D・1. 34-39 (2001)

    • Related Report
      2000 Annual Research Report
  • [Publications] Reina Yoshikawa,Yoshihide Igarashi: "Secret key exchange using random deals of cards on hierarchical structures"Lecture Notes in Computer Science. 1969. 290-301 (2000)

    • Related Report
      2000 Annual Research Report
  • [Publications] Kumiko Obokata,Yoshihide Igarashi: "A lockout avoidance algorithm for the κ-exclusion problem"電子情報通信学会技術研究報告. 100・449. 33-40 (2000)

    • Related Report
      2000 Annual Research Report
  • [Publications] Yasuaki Nishitani,Yoshihide Igarashi: "Secure multi-party computation over networks"IEICE Trans. on Information and Systems. E83-D・3. 561-569 (2000)

    • Related Report
      2000 Annual Research Report
  • [Publications] Yoshihide Igarashi,Yasuaki Nishitani: "Speedup of the n-process mutual exclusion algorithm"Parallel Processing Letters. 9・4. 475-485 (2000)

    • Related Report
      2000 Annual Research Report
  • [Publications] Hideaki Sakai,Yoshihide Igarashi: "Refinements to the definition of distingushability for public-key encryption systems"電子情報通信学会研究報告. 100・216. 9-16 (2000)

    • Related Report
      2000 Annual Research Report
  • [Publications] 杉原厚吉,五十嵐善英: "アルゴリズム工学"共立出版. 300 (2001)

    • Related Report
      2000 Annual Research Report
  • [Publications] Y.Ham,Y.Igarashi: "Polarel PROFIT/COST algorithms through fast derandomization"Acta Informatica. 36・3. 215-232 (1999)

    • Related Report
      1999 Annual Research Report
  • [Publications] Y.Iwaski,Y.Kajiwara,K.Obokata,Y.Igarashi: "Independent spanning trees of chordal rings"Information Processing Letters. 69・3. 155-160 (1999)

    • Related Report
      1999 Annual Research Report
  • [Publications] Y.Igarashi,H.Kurumazaki,Y,Nishitani: "Some modification of the tournament algorithm for the mutual exclusion problem"IEICE Trans.Inf and Syst.. E82-D,2. 368-375 (1999)

    • Related Report
      1999 Annual Research Report
  • [Publications] A.Mei,F.Bao,Y.Hamada,Y.Igarashi: "Optimal time broadcasting schemes in faulty star graphs"IEICE Trans.Fundamentals. E82-A・5. 722-732 (1999)

    • Related Report
      1999 Annual Research Report
  • [Publications] K.W.Chong,Y.Ham,Y.Igarashi,T.W.Lam: "Improving parallel computation with fast integer sorting"Lecture Notes in Computer Science. 1627. 452-461 (1999)

    • Related Report
      1999 Annual Research Report
  • [Publications] Y.Igarashi,Y.Nishitani: "Speedup of lookout-free mutual exclusion algorithms"1999 Internation Symposium on Parallel Architectures,and Networks,IEEE.Comp.Soc.. 172-177 (1999)

    • Related Report
      1999 Annual Research Report
  • [Publications] F.Bao: "Reliable broadcasting in product networks" Discrete Applied Mathematics. 83,1. 3-20 (1998)

    • Related Report
      1998 Annual Research Report
  • [Publications] F.Bao: "Reliable broadcasting and secure distribution in channel networks" IEICE Transactions on Fundamentals of Electronics,Com-munications and Computer Sciences. E81-A,5. 796-806 (1998)

    • Related Report
      1998 Annual Research Report
  • [Publications] A.Mei: "Optimal time broadcasting schemes in faulty star graphs" IEICE Transactions on Fundamentals of Electronics,Com-munications and Computer Sciences. (to appear).

    • Related Report
      1998 Annual Research Report
  • [Publications] Y.Iwasaki: "Independent spanning trees of chordal rings" Information Processing Letters. (to appear).

    • Related Report
      1998 Annual Research Report
  • [Publications] Y.Igarashi: "Some modifications of the tournament algorithm for the mutual exclu-sion" IEICE Transactions on Information and Systems. (to appear).

    • Related Report
      1998 Annual Research Report
  • [Publications] 熊亜平: "故障があるアレンジメントグラフのブロードキャスティング" 電子情報通信学会論文誌A. (掲載予定).

    • Related Report
      1998 Annual Research Report
  • [Publications] 服部靖之: "バタフライのde Bruijn族のネットワークへの埋め込み" 電子情報通信学会技術研究報告 COMP. 98-15. 7-14 (1998)

    • Related Report
      1998 Annual Research Report
  • [Publications] H.Sakai: "Secure message transmissions by the information dispersal algorithm" 電子情報通信学会技術研究報告 COMP. 98-47. 73-80 (1998)

    • Related Report
      1998 Annual Research Report
  • [Publications] 田中進也: "パーミュテーショナルグラフのブロードキャスティング" 電子情報通信学会技術研究報告 COMP. 98-65. 17-24 (1998)

    • Related Report
      1998 Annual Research Report

URL: 

Published: 1998-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi