• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A Unified Paradigm in Information Theoretic Cryptography and Its Applications

Research Project

Project/Area Number 15H02710
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Information security
Research InstitutionYokohama National University

Principal Investigator

SHIKATA Junji  横浜国立大学, 大学院環境情報研究院, 教授 (30345483)

Co-Investigator(Kenkyū-buntansha) 松本 勉  横浜国立大学, 大学院環境情報研究院, 教授 (40183107)
岩本 貢  電気通信大学, 大学院情報理工学研究科, 准教授 (50377016)
太田 和夫  電気通信大学, 大学院情報理工学研究科, 教授 (80333491)
Project Period (FY) 2015-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥18,070,000 (Direct Cost: ¥13,900,000、Indirect Cost: ¥4,170,000)
Fiscal Year 2017: ¥6,110,000 (Direct Cost: ¥4,700,000、Indirect Cost: ¥1,410,000)
Fiscal Year 2016: ¥5,850,000 (Direct Cost: ¥4,500,000、Indirect Cost: ¥1,350,000)
Fiscal Year 2015: ¥6,110,000 (Direct Cost: ¥4,700,000、Indirect Cost: ¥1,410,000)
Keywords暗号理論 / 情報理論 / 情報理論的安全性 / 暗号 / 鍵共有 / 認証 / 暗号・認証等 / 署名
Outline of Final Research Achievements

In this research project, we studied a unified paradigm in information theoretic cryptography which can deal with various security notions in cryptography and information theory from systematic and bird’s-eye viewpoints. By overlooking security notions of computational security and information-theoretic security from various aspects, we showed new formalizations of security, construction of cryptographic systems, and their relationships. In particular, we formalized various security notions of encryption and key agreement which have meaningful operations, and showed relationships among security formalizations including the existing ones. We also showed (im)possibility of information theoretic security for encryption, authentication and secret sharing only from biased randomness. Furthermore, as applications of this paradigm, we showed new security formalizations and/or new construction methodology for advanced cryptographic systems.

Report

(4 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Annual Research Report
  • 2015 Annual Research Report
  • Research Products

    (99 results)

All 2018 2017 2016 2015

All Journal Article (53 results) (of which Peer Reviewed: 22 results,  Acknowledgement Compliant: 17 results) Presentation (45 results) (of which Int'l Joint Research: 14 results,  Invited: 3 results) Book (1 results)

  • [Journal Article] Security Formalizations and Their Relationships for Encryption and Key Agreement in Information Theoretic Cryptography2018

    • Author(s)
      M. Iwamoto, K. Ohta, and J. Shikata
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: Vol. 64, No. 1 Issue: 1 Pages: 654-685

    • DOI

      10.1109/tit.2017.2744650

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 格子問題の困難性に基づく多重暗号の効率的な構成法2018

    • Author(s)
      大沼航史, 佐藤慎悟, 四方順司
    • Journal Title

      2018年暗号と情報セキュリティシンポジウム論文集

      Volume: -

    • Related Report
      2017 Annual Research Report
  • [Journal Article] 非一様ランダム鍵を用いた情報理論的に安全な調停者付き認証符号について2018

    • Author(s)
      石川美穂, 四方順司
    • Journal Title

      電子情報通信学会, 信学技報

      Volume: vol. 117, no. 488 Pages: 231-236

    • Related Report
      2017 Annual Research Report
  • [Journal Article] Cooperative Jammingを用いた主通信路に雑音のあるWiretap Channel IIにおける暗号通信について2018

    • Author(s)
      飯塚寛貴, 田中亮大, 四方順司
    • Journal Title

      電子情報通信学会, 信学技報

      Volume: vol. 117, no. 488 Pages: 245-251

    • Related Report
      2017 Annual Research Report
  • [Journal Article] ロバスト秘密分散法CFOR方式における精密な安全性解析2018

    • Author(s)
      鈴木慎之介, 渡邉洋平, 岩本貢, 太田和夫
    • Journal Title

      2018年暗号と情報セキュリティシンポジウム論文集

      Volume: -

    • Related Report
      2017 Annual Research Report
  • [Journal Article] 3枚のカードで実現可能な3入力多数決プロトコル2018

    • Author(s)
      黒木慶久, 古賀優太, 渡邉洋平, 岩本貢, 太田和夫
    • Journal Title

      2018年暗号と情報セキュリティシンポジウム論文集

      Volume: -

    • Related Report
      2017 Annual Research Report
  • [Journal Article] カードを用いた複数人でのマッチングプロトコル2018

    • Author(s)
      古賀優太, 鈴木慎之介, 渡邉洋平, 岩本貢, 太田和夫
    • Journal Title

      2018年暗号と情報セキュリティシンポジウム論文集

      Volume: -

    • Related Report
      2017 Annual Research Report
  • [Journal Article] Timed-Release Computational Secret Sharing and Threshold Encryption2017

    • Author(s)
      Y. Watanabe and J. Shikata
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 印刷中 Issue: 1 Pages: 17-54

    • DOI

      10.1007/s10623-016-0324-2

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Tighter Bounds on Entropy of Secret Keys in Authentication Codes2017

    • Author(s)
      J. Shikata
    • Journal Title

      Proc. of 2017 IEEE Information Theory Workshop (ITW2017)

      Volume: - Pages: 259-263

    • DOI

      10.1109/itw.2017.8278016

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance2017

    • Author(s)
      Y. Ishida, J. Shikata, and Y. Watanabe
    • Journal Title

      International Journal on Applied Cryptography (IJACT)

      Volume: vol.3, no.3 Issue: 3 Pages: 288-311

    • DOI

      10.1504/ijact.2017.086229

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Wiretap Channel IIにおける能動的攻撃を考慮した暗号通信について2017

    • Author(s)
      田中亮大,四方順司
    • Journal Title

      コンピュータセキュリティシンポジウム2017論文集

      Volume: -

    • NAID

      170000176337

    • Related Report
      2017 Annual Research Report
  • [Journal Article] Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations2017

    • Author(s)
      T. Nakai, S. Shirouchi, M. Iwamoto and K. Ohta
    • Journal Title

      Information Theoretic Security (ICITS2017), Springer

      Volume: LNCS 10681 Pages: 153-165

    • DOI

      10.1007/978-3-319-72089-0_9

    • ISBN
      9783319720883, 9783319720890
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance2017

    • Author(s)
      Y. Ishida, J. Shikata, Y. Watanabe
    • Journal Title

      International Journal on Applied Cryptography

      Volume: 未定

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Timed-Release Computational Secret Sharing Scheme and Threshold Encryption2017

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 未定

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Numerical Analysis of Elias's and Peres's Deterministic Extractors2017

    • Author(s)
      A. Prasitsupparote, N. Konno, J. Shikata
    • Journal Title

      Proc. of The 51st Annual Conference on Information Systems and Sciences (CISS 2017)

      Volume: 未定

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Unconditionally Secure Searchable Encryption2017

    • Author(s)
      T. Yoshizawa, Y. Watanabe, J. Shikata
    • Journal Title

      Proc. of The 51st Annual Conference on Information Systems and Sciences (CISS 2017)

      Volume: 未定

    • NAID

      170000151476

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] 3ラウンド対話型Signcryptionの効率的な構成法2017

    • Author(s)
      井田潤一, 渡邉洋平, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] 量子ランダムオラクルモデルにおけるSigncryptionの構成法2017

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] SIS問題の計算量評価2017

    • Author(s)
      青野良範, 清藤武暢, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] 種々のFO変換のKDM安全性に関する一考察2017

    • Author(s)
      中川原里沙, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] 推測秘匿性に基づく情報理論的に安全な検索可能暗号2017

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] 最悪推測秘匿性を満たす秘密分散法に関する基本的性質2017

    • Author(s)
      岩本貢, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] カードを用いた複数人での金持ち比べプロトコル2017

    • Author(s)
      徳重佑樹,中井雄士,岩本貢,太田和夫
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] 秘匿操作を用いた効率的なカードベース論理演算プロトコル2017

    • Author(s)
      城内聡志,中井雄士,岩本貢,太田和夫
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] 電子決済方式 MicroMint の潜在的な偽造脅威に対する安全性評価2017

    • Author(s)
      鴨志田優一,岩本貢,太田和夫
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] マルチパーティ計算に関する安全性概念の定式化について2017

    • Author(s)
      岩本貢
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] 共通鍵暗号による秘匿検索暗号のセキュリティ2017

    • Author(s)
      太田和夫
    • Journal Title

      日本銀行金融研究所ディスカッション・ペーパー・シリーズ

      Volume: 2017-J-05

    • Related Report
      2016 Annual Research Report
  • [Journal Article] Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness2016

    • Author(s)
      Y. Watanabe, G. Hanaoka, J. Shikata
    • Journal Title

      Information Theoretic Security, Springer

      Volume: LNCS 10015 Pages: 213-237

    • DOI

      10.1007/978-3-319-49175-2_11

    • ISBN
      9783319491745, 9783319491752
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Information-theoretically Secure Timed-release Secret Sharing Schemes2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Journal of Information Processing

      Volume: 24 Issue: 4 Pages: 680-689

    • DOI

      10.2197/ipsjjip.24.680

    • NAID

      130005165245

    • ISSN
      1882-6652
    • Related Report
      2016 Annual Research Report 2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99.A Issue: 6 Pages: 1097-1106

    • DOI

      10.1587/transfun.E99.A.1097

    • NAID

      130005154232

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] An Efficient Method for Detecting Obfuscated Suspicious JavaScript Based on Text Pattern Analysis2016

    • Author(s)
      J. Su, K. Yoshioka, J. Shikata, T. Matsumoto
    • Journal Title

      Proc. of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016)

      Volume: - Pages: 3-11

    • DOI

      10.1145/2903185.2903189

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 情報理論的に安全な検索可能暗号の構成法について2016

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS 2016)論文集

      Volume: -

    • NAID

      170000173735

    • Related Report
      2016 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] 格子問題に基づくSigncryption構成法の再考2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS 2016)論文集

      Volume: -

    • NAID

      170000173664

    • Related Report
      2016 Annual Research Report
  • [Journal Article] Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Storage2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      IEICE Trans., Special Section on Discrete Mathematics and Its Applications

      Volume: 未定

    • NAID

      130005154232

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] An Efficient Method for Detecting Obfuscated Suspicious JavaScript Based on Text Pattern Analysis2016

    • Author(s)
      J. Su, K. Yoshioka, J. Shikata, T. Matsumoto
    • Journal Title

      Proc. of International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), ACM

      Volume: 未定

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Sequential Aggregate Authentication Codes with Information Theoretic Security2016

    • Author(s)
      S. Tomita, Y. Watanabe, J. Shikata
    • Journal Title

      2016 Annual Conference on Information Sciences and Systems (CISS)

      Volume: - Pages: 192-197

    • DOI

      10.1109/ciss.2016.7460500

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 情報理論的安全性を持つ検索可能暗号の一般的モデルとその構成法2016

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Annual Research Report
  • [Journal Article] 格子問題に基づくSigncryptionのスタンダードモデルでの構成2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Annual Research Report
  • [Journal Article] 汎用的結合可能なゲーム理論的安全性を達成する二者間プロトコル用コンパイラの提案と紛失通信への適用2016

    • Author(s)
      後藤彰太, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] A Limitation on Security Evaluation of Cryptographic Primitives with Fixed Keys2016

    • Author(s)
      Y. Kawai, G. Hanaoka, K. Ohta, N. Kunihiro
    • Journal Title

      Security and Communication Networks

      Volume: 未定 Issue: 12 Pages: 1663-1675

    • DOI

      10.1002/sec.1457

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Joux-Lucks のマルチコリジョン探索アルゴリズムのMicroMint への応用2016

    • Author(s)
      鴨志田優一, 岩本貢, 太田和夫
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] 人間向け暗号/認証プロトコルの統一的安全性評価2016

    • Author(s)
      三澤裕人, 徳重佑樹, 岩本貢, 太田和夫
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] グループ認証付鍵交換プロトコルのweak-SK-secure 性の形式検証2016

    • Author(s)
      徳重佑樹,花谷嘉一,岩本貢, 太田和夫
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Annual Research Report
  • [Journal Article] カード操作の分類とカードベース暗号プロトコル2016

    • Author(s)
      中井雄士,三澤裕人,徳重佑樹,岩本貢, 太田和夫
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Annual Research Report
  • [Journal Article] A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer2015

    • Author(s)
      S. Goto, J. Shikata
    • Journal Title

      Cryptography and Coding (IMACC 2015), Springer

      Volume: LNCS 9496 Pages: 133-151

    • DOI

      10.1007/978-3-319-27239-9_8

    • ISBN
      9783319272382, 9783319272399
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection2015

    • Author(s)
      J. Su, K. Yoshioka, J. Shikata, T. Matsumoto
    • Journal Title

      Information Security and Cryptology (ICISC 2015), Springer

      Volume: LNCS 9558 Pages: 278-293

    • DOI

      10.1007/978-3-319-30840-1_18

    • ISBN
      9783319308395, 9783319308401
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage2015

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Provable Security (ProvSec 2015), Springer

      Volume: LNCS 9451 Pages: 489-502

    • DOI

      10.1007/978-3-319-26059-4_27

    • ISBN
      9783319260587, 9783319260594
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Constructions of Symmetric-key Encryption with Guessing Secrecy2015

    • Author(s)
      M. Iwamoto, J. Shikata
    • Journal Title

      Proc. of 2015 IEEE International Symposium on Information Theory (ISIT2015)

      Volume: - Pages: 725-729

    • DOI

      10.1109/isit.2015.7282550

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 情報理論的に安全な検索可能暗号2015

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 1321-1326

    • NAID

      170000151476

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] 暗号文長と秘密鍵長間のトレードオフをもつ情報理論的に安全な放送型暗号の構成法2015

    • Author(s)
      渡邉洋平, 四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 395-402

    • NAID

      170000151356

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] Constructions of CCA-secure Revocable Identity-based Encryption2015

    • Author(s)
      Y. Ishida, Y. Watanabe, J. Shikata
    • Journal Title

      Information Security and Privacy (ACISP 2015), Springer

      Volume: LNCS 9144 Pages: 174-191

    • DOI

      10.1007/978-3-319-19962-7_5

    • ISBN
      9783319199610, 9783319199627
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] ブロックサインの安全性に対するコードブックの影響2015

    • Author(s)
      三澤裕人,徳重佑樹,岩本貢, 太田和夫
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 1011-1018

    • NAID

      170000151436

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] 物理的復元が容易な音響秘密分散法2015

    • Author(s)
      徳重佑樹,三澤裕人, 吉田文晶, 上床昌也, 岩本貢,太田和夫
    • Journal Title

      信学技報

      Volume: 115 (37) Pages: 75-80

    • Related Report
      2015 Annual Research Report
  • [Presentation] 格子問題の困難性に基づく多重暗号の効率的な構成法2018

    • Author(s)
      大沼航史
    • Organizer
      2018年暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] 非一様ランダム鍵を用いた情報理論的に安全な調停者付き認証符号について2018

    • Author(s)
      石川美穂
    • Organizer
      電子情報通信学会, ISEC研究会
    • Related Report
      2017 Annual Research Report
  • [Presentation] Cooperative Jammingを用いた主通信路に雑音のあるWiretap Channel IIにおける暗号通信について2018

    • Author(s)
      飯塚寛貴
    • Organizer
      電子情報通信学会, ISEC研究会
    • Related Report
      2017 Annual Research Report
  • [Presentation] ロバスト秘密分散法CFOR方式における精密な安全性解析2018

    • Author(s)
      鈴木慎之介
    • Organizer
      2018年暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] 3枚のカードで実現可能な3入力多数決プロトコル2018

    • Author(s)
      黒木慶久
    • Organizer
      2018年暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] カードを用いた複数人でのマッチングプロトコル2018

    • Author(s)
      古賀優太
    • Organizer
      2018年暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] Numerical Analysis of Elias's and Peres's Deterministic Extractors2017

    • Author(s)
      A. Prasitsupparote
    • Organizer
      The 51st Annual Conference on Information Systems and Sciences (CISS 2017)
    • Place of Presentation
      Baltimore, Maryland, USA
    • Year and Date
      2017-03-22
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Unconditionally Secure Searchable Encryption2017

    • Author(s)
      T. Yoshizawa
    • Organizer
      The 51st Annual Conference on Information Systems and Sciences (CISS 2017)
    • Place of Presentation
      Baltimore, Maryland, USA
    • Year and Date
      2017-03-22
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 最悪推測秘匿性を満たす秘密分散法に関する基本的性質2017

    • Author(s)
      岩本貢
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 推測秘匿性に基づく情報理論的に安全な検索可能暗号2017

    • Author(s)
      吉澤貴博
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 種々のFO変換のKDM安全性に関する一考察2017

    • Author(s)
      中川原里沙
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] SIS問題の計算量評価2017

    • Author(s)
      青野良範
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 量子ランダムオラクルモデルにおけるSigncryptionの構成法2017

    • Author(s)
      佐藤慎悟
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 3ラウンド対話型Signcryptionの効率的な構成法2017

    • Author(s)
      井田潤一
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] カードを用いた複数人での金持ち比べプロトコル2017

    • Author(s)
      徳重佑樹
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 秘匿操作を用いた効率的なカードベース論理演算プロトコル2017

    • Author(s)
      城内聡志
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 電子決済方式 MicroMint の潜在的な偽造脅威に対する安全性評価2017

    • Author(s)
      鴨志田優一
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] マルチパーティ計算に関する安全性概念の定式化について2017

    • Author(s)
      岩本貢
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] Tighter Bounds on Entropy of Secret Keys in Authentication Codes2017

    • Author(s)
      J. Shikata
    • Organizer
      2017 IEEE Information Theory Workshop (ITW2017)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Wiretap Channel IIにおける能動的攻撃を考慮した暗号通信について2017

    • Author(s)
      田中亮大
    • Organizer
      2017年コンピュータセキュリティシンポジウム (CSS2017)
    • Related Report
      2017 Annual Research Report
  • [Presentation] Worst-case guessing secrecy is meaningful in secret sharing schemes2017

    • Author(s)
      M. Iwamoto
    • Organizer
      ICITS 2017, Workshop Track
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations2017

    • Author(s)
      M. Iwamoto
    • Organizer
      ICITS 2017, Conference Track
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Secret sharing schemes under guessing secrecy2017

    • Author(s)
      M. Iwamoto
    • Organizer
      Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 情報理論的安全性: さまざまな視点から2017

    • Author(s)
      岩本貢
    • Organizer
      誤り訂正符号のワークショップ
    • Related Report
      2017 Annual Research Report
    • Invited
  • [Presentation] 格子問題に基づくSigncryption構成法の再考2016

    • Author(s)
      佐藤慎悟
    • Organizer
      2016年コンピュータセキュリティシンポジウム(CSS 2016)
    • Place of Presentation
      秋田, 日本
    • Year and Date
      2016-10-11
    • Related Report
      2016 Annual Research Report
  • [Presentation] 情報理論的に安全な検索可能暗号の構成法について2016

    • Author(s)
      吉澤貴博
    • Organizer
      2016年コンピュータセキュリティシンポジウム(CSS 2016)
    • Place of Presentation
      秋田, 日本
    • Year and Date
      2016-10-11
    • Related Report
      2016 Annual Research Report
  • [Presentation] 横浜国立大学先端科学高等研究院「情報・物理セキュリティ研究ユニット」の活動紹介2016

    • Author(s)
      四方順司
    • Organizer
      IoT Security Forum 2016
    • Place of Presentation
      東京, 日本
    • Year and Date
      2016-09-15
    • Related Report
      2016 Annual Research Report
    • Invited
  • [Presentation] Application of Joux-Lucks Search Algorithm for Multi-Collisions to MicroMint2016

    • Author(s)
      Y. Kamoshida
    • Organizer
      The 11th International Workshop on Security (IWSEC 2016)
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2016-09-12
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness2016

    • Author(s)
      Y. Watanabe
    • Organizer
      The 9th International Conference on Information Theoretic Security (ICITS 2016)
    • Place of Presentation
      Tacoma, Washington, USA
    • Year and Date
      2016-08-09
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Sequential Aggregate Authentication Codes with Information Theoretic Security2016

    • Author(s)
      S. Tomita
    • Organizer
      The 50th Annual Conference on Information Sciences and Systems (CISS 2016)
    • Place of Presentation
      Princeton, USA
    • Year and Date
      2016-03-16
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 情報理論的安全性を持つ検索可能暗号の一般的モデルとその構成法2016

    • Author(s)
      吉澤貴博
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] 格子問題に基づくSigncryptionのスタンダードモデルでの構成2016

    • Author(s)
      佐藤慎悟
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] 汎用的結合可能なゲーム理論的安全性を達成する二者間プロトコル用コンパイラの提案と紛失通信への適用2016

    • Author(s)
      後藤彰太
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] Joux-Lucks のマルチコリジョン探索アルゴリズムのMicroMint への応用2016

    • Author(s)
      鴨志田優一
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] 人間向け暗号/認証プロトコルの統一的安全性評価2016

    • Author(s)
      三澤裕人
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] グループ認証付鍵交換プロトコルのweak-SK-secure 性の形式検証2016

    • Author(s)
      徳重佑樹
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] カード操作の分類とカードベース暗号プロトコル2016

    • Author(s)
      中井雄士
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] An Efficient Method for Detecting Obfuscated Suspicious JavaScript Based on Text Pattern Analysis2016

    • Author(s)
      J. Su
    • Organizer
      2016 ACM International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016)
    • Place of Presentation
      Xi'an, China
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer2015

    • Author(s)
      S. Goto
    • Organizer
      IMA Cryptography and Coding (IMACC 2015)
    • Place of Presentation
      Oxford, UK
    • Year and Date
      2015-12-15
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection2015

    • Author(s)
      J. Su
    • Organizer
      The 18th International Conference on Information Security and Cryptology (ICISC 2015)
    • Place of Presentation
      Seoul, South Korea
    • Year and Date
      2015-11-25
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage2015

    • Author(s)
      Y. Watanabe
    • Organizer
      The 9th international Conference on Provable Security (ProvSec 2015)
    • Place of Presentation
      Kanazawa, Japan
    • Year and Date
      2015-11-24
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 情報理論的に安全な検索可能暗号2015

    • Author(s)
      吉澤貴博
    • Organizer
      2015年コンピュータセキュリティシンポジウム (CSS 2015)
    • Place of Presentation
      長崎, 日本
    • Year and Date
      2015-10-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 暗号文長と秘密鍵長間のトレードオフをもつ情報理論的に安全な放送型暗号の構成法2015

    • Author(s)
      渡邉洋平
    • Organizer
      2015年コンピュータセキュリティシンポジウム (CSS 2015)
    • Place of Presentation
      長崎, 日本
    • Year and Date
      2015-10-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] ブロックサインの安全性に対するコードブックの影響2015

    • Author(s)
      三澤裕人
    • Organizer
      2015年コンピュータセキュリティシンポジウム (CSS 2015)
    • Place of Presentation
      長崎, 日本
    • Year and Date
      2015-10-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] Constructions of Symmetric-key Encryption with Guessing Secrecy2015

    • Author(s)
      J. Shikata
    • Organizer
      2015 IEEE International Symposium on Information Theory (ISIT2015)
    • Place of Presentation
      Hong Kong, China
    • Year and Date
      2015-06-14
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Book] Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings2017

    • Author(s)
      Junji Shikata (Editor)
    • Total Pages
      233
    • Publisher
      Springer
    • ISBN
      9783319720883
    • Related Report
      2017 Annual Research Report

URL: 

Published: 2015-04-16   Modified: 2023-03-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi