• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

耐量子公開鍵暗号と能動的攻撃者に対して安全な秘密分散法の研究

Research Project

Project/Area Number 15K00186
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionTokyo Institute of Technology (2016-2017)
Kyushu University (2015)

Principal Investigator

Morozov Kirill  東京工業大学, 情報理工学院, 特任准教授 (80443232)

Project Period (FY) 2015-04-01 – 2018-03-31
Project Status Discontinued (Fiscal Year 2017)
Budget Amount *help
¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2018: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2017: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2016: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2015: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords符号理論に基づく暗号 / コミットメント方式 / 秘密分散法 / 不正者を検知可能な秘密分散法 / ロバスト秘密分散法 / 委託秘匿計算 / プライバシー保護計算 / 暗号解読 / 耐量子暗号 / デジタル署名 / 公開鍵暗号方式 / Robust秘密分散法
Outline of Annual Research Achievements

(1) PQCrypto 2017にて、標準モデルにおいて、匿名性(IK-CCA2安全性)をもつ以下の2つの符号理論に基づく公開鍵暗号方式を提案した:McEliece公開鍵暗号の場合にはDottlingその他(IEEE Trans-IT 2012)らの構築を使用し、Niederreter公開鍵暗号の場合にはRosenとSegevのk-繰り返しパラダイムを使用した。
(2) IWSEC 2017にて、Qiuその他(Security in Cloud Computing 2016)らのサーバ支援される検知可能な近似的類似検索計算プロトコルの暗号解読を発表した。
(3) IMCOM 2017にて、完全拘束性をもつ、符号理論に基づくコミットメント方式を構築した。この構築で、McElieceとNiederreiter公開鍵暗号方式のIND-CPAバリアントを応用した。
(4) ACISP 2016で提案した委託されたデータベースにおいてk近傍クエリー・プロトコルを改善し、Computers&Securityジャーナルに掲載した。
(5) IMCOM 2016で発表した複数プロバイダにわたる分散ストレージのためのグループ横断秘密分散法の構成を改善し、正式な安全性の証明及び実装の結果を追加し、Journal of Supercomputingに掲載した。

Report

(3 results)
  • 2017 Annual Research Report
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (47 results)

All 2017 2016 2015 Other

All Int'l Joint Research (7 results) Journal Article (18 results) (of which Int'l Joint Research: 14 results,  Peer Reviewed: 16 results,  Acknowledgement Compliant: 10 results,  Open Access: 1 results) Presentation (11 results) (of which Int'l Joint Research: 8 results,  Invited: 6 results) Book (1 results) Remarks (8 results) Funded Workshop (2 results)

  • [Int'l Joint Research] University of Texas at Dallas(米国)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] University of Texas at Dallas/Florida Atlantic University(米国)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] University of Calcutta(India)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] Institute for Infocomm Research(Singapore)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] Hubei University of Technology/Chinese Academy of Sciences(China)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] Florida Atlantic University(米国)

    • Related Report
      2015 Research-status Report
  • [Int'l Joint Research] University of Calcutta(India)

    • Related Report
      2015 Research-status Report
  • [Journal Article] CCA2 Key-Privacy for Code-Based Encryption in the Standard Model2017

    • Author(s)
      Y. Yoshida, K. Morozov, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (PQCrypto 2017)

      Volume: 10346 Pages: 35-50

    • DOI

      10.1007/978-3-319-59879-6_3

    • ISBN
      9783319598789, 9783319598796
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation2017

    • Author(s)
      Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto
    • Journal Title

      Advances in Information and Computer Security, IWSEC 2017, Lecture Notes in Computer Science

      Volume: 10418 Pages: 159-178

    • DOI

      10.1007/978-3-319-64200-0_10

    • ISBN
      9783319641997, 9783319642000
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On unconditionally binding code-based commitment schemes2017

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai
    • Journal Title

      Proc. of 11th International Conference on Ubiquitous Information Management and Communication

      Volume: - Pages: 101-101

    • DOI

      10.1145/3022227.3022327

    • Related Report
      2017 Annual Research Report 2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Efficient outsourcing of secure k-nearest neighbour query over encrypted database2017

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Computers & Security

      Volume: 69 Pages: 65-83

    • DOI

      10.1016/j.cose.2016.11.012

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions2017

    • Author(s)
      Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai
    • Journal Title

      The Journal of Supercomputing

      Volume: 73 Issue: 10 Pages: 4275-4301

    • DOI

      10.1007/s11227-017-2009-7

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Secret Sharing with Cheaters Using Multi-Receiver Authentication2017

    • Author(s)
      Rui Xu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 1 Pages: 115-125

    • DOI

      10.1587/transfun.E100.A.115

    • NAID

      130005180789

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2017

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Computers & Security

      Volume: N/A

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Cross-Group Secret Sharing Scheme for Secure Usage of Cloud Storage over Different Providers and Regions2017

    • Author(s)
      Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai
    • Journal Title

      The Journal of Supercomputing

      Volume: N/A

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2016

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Proc. Information Security and Privacy - 21st Australasian Conference (Part I), ACISP 2016, Lecture Notes in Computer Science

      Volume: 9722 Pages: 181-197

    • DOI

      10.1007/978-3-319-40253-6_11

    • ISBN
      9783319402529, 9783319402536
    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters2016

    • Author(s)
      Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Journal Title

      Proc. Information Theoretic Security - 9th International Conference, ICITS 2016, Lecture Notes in Computer Science

      Volume: 10015 Pages: 3-23

    • DOI

      10.1007/978-3-319-49175-2_1

    • ISBN
      9783319491745, 9783319491752
    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Cross-group Secret Sharing for Secure Cloud Storage Service2016

    • Author(s)
      Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai
    • Journal Title

      Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016

      Volume: - Pages: 1-8

    • DOI

      10.1145/2857546.2857610

    • NAID

      120006654575

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Privacy-preserving k-Nearest Neighbour Query on Outsourced Database2016

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Proc. of 21st Australasian Conference on Information Security and Privacy (ACISP 2016)

      Volume: 印刷中

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] On the Security of the CFS Signature2016

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Rainer Steinwandt, Rui Xu
    • Journal Title

      Proc. of Symposium on Cryptography and Information Security (SCIS 2016)

      Volume: - Pages: 1-5

    • Related Report
      2015 Research-status Report
    • Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services2015

    • Author(s)
      Mingwu Zhang, Yong Xia, Ou Yuan, and Kirill Morozov
    • Journal Title

      International Journal of Communication Systems

      Volume: 末定 Issue: 12 Pages: 1863-1872

    • DOI

      10.1002/dac.2817

    • Related Report
      2016 Research-status Report
    • Peer Reviewed
  • [Journal Article] Zero-Knowledge Protocols for Code-Based Public-Key Encryption2015

    • Author(s)
      Rong Hu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: 98-A (10) Pages: 2139-2151

    • NAID

      130005100672

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Note on Some Recent Cheater Identifiable Secret Sharing Schemes2015

    • Author(s)
      Rui Xu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: 98-A (8) Pages: 1814-1819

    • NAID

      130005089910

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Parity Check based redistribution of secret shares2015

    • Author(s)
      Yvo Desmedt, Kirill Morozov
    • Journal Title

      Proc. of IEEE International Symposium on Information Theory, ISIT 2015

      Volume: - Pages: 959-963

    • DOI

      10.1109/isit.2015.7282597

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters2015

    • Author(s)
      Avishek Adhikar, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Journal Title

      IACR Cryptology ePrint Archive

      Volume: 1115 Pages: 1-23

    • Related Report
      2015 Research-status Report
    • Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Presentation] Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters2017

    • Author(s)
      Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Organizer
      34th Symposium on Cryptography and Information Security
    • Place of Presentation
      Naha, Okinawa
    • Related Report
      2016 Research-status Report
  • [Presentation] Anonymity in Code-Based Public-Key Encryption2017

    • Author(s)
      Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka
    • Organizer
      3rd Asia Post-Quantum Cryptography Forum
    • Place of Presentation
      Tokyo Institute of Technology
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] On the Security of the CFS Signature2016

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Rainer Steinwandt, Rui Xu
    • Organizer
      Symposium on Cryptography and Information Security (SCIS 2016)
    • Place of Presentation
      Kumamoto, Japan
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] A Survey of Code-Based Cryptography2016

    • Author(s)
      Kirill Morozov
    • Organizer
      1st PQC Asia Forum
    • Place of Presentation
      Chengdu, China
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2016

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Organizer
      21st Australasian Conference on Information Security and Privacy, ACISP 2016
    • Place of Presentation
      Melbourne, Australia
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters2016

    • Author(s)
      Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Organizer
      9th International Conference on Information Theoretic Security, ICITS 2016
    • Place of Presentation
      Tacoma, WA, USA
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Recent Progress on Secret Sharing with Cheaters2016

    • Author(s)
      Kirill Morozov
    • Organizer
      3rd Sino-Korea International Conference on Coding Theory and Related Topics
    • Place of Presentation
      Beijing, China
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] Cloud-Friendly VSS with a Non-Interactive Dealer2016

    • Author(s)
      Kirill Morozov
    • Organizer
      2016 Workshop on Mathematics of Information-Theoretic Cryptography
    • Place of Presentation
      National University of Singapore, Singapore
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] Recent Trends in Code-Based Cryptography2016

    • Author(s)
      Kirill Morozov
    • Organizer
      Round table on Code-Based Cryptography
    • Place of Presentation
      Sogang University, Seoul, Korea
    • Related Report
      2016 Research-status Report
    • Invited
  • [Presentation] On Security of the Courtois-Finiasz-Sendrier signature2015

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Rainer Steinwandt, Rui Xu
    • Organizer
      Dagstuhl Seminar 15371 “Quantum Cryptanalysis”
    • Place of Presentation
      Schloss Dagstuhl, Germany
    • Year and Date
      2015-09-11
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] Code-based designated confirmer signatures2015

    • Author(s)
      Kirill Morozov, Rong Hu, Tsuyoshi Takagi
    • Organizer
      SIAM Conference on Applied Algebraic Geometry, Minisymposium MS24: Coding Theory and Cryptography 1
    • Place of Presentation
      Daejeon, Korea
    • Year and Date
      2015-08-04
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research / Invited
  • [Book] Code-Based Zero-Knowledge Protocols and Their Applications2017

    • Author(s)
      Kirill Morozov
    • Total Pages
      20
    • Publisher
      Springer
    • Related Report
      2016 Research-status Report
  • [Remarks] Personal page

    • URL

      http://www.is.c.titech.ac.jp/~morozov/

    • Related Report
      2017 Annual Research Report
  • [Remarks] Google Scholar Profile

    • URL

      http://scholar.google.com/citations?user=NcYfeG4AAAAJ&hl=en

    • Related Report
      2017 Annual Research Report
  • [Remarks] Workshop CT-SNS 2017

    • URL

      http://www.imi.kyushu-u.ac.jp/eng/events/view/1240/

    • Related Report
      2017 Annual Research Report
  • [Remarks] Homepage

    • URL

      http://www.is.c.titech.ac.jp/~morozov/

    • Related Report
      2016 Research-status Report
  • [Remarks] Google Scholar profile

    • URL

      https://scholar.google.com/citations?user=NcYfeG4AAAAJ&hl=en

    • Related Report
      2016 Research-status Report
  • [Remarks] Kirill Morozov's homepage

    • URL

      http://imi.kyushu-u.ac.jp/~morozov/

    • Related Report
      2015 Research-status Report
  • [Remarks] Kirill Morozov's Google Scholar profile

    • URL

      https://scholar.google.com/citations?user=NcYfeG4AAAAJ&hl=en

    • Related Report
      2015 Research-status Report
  • [Remarks] Kirill Morozov's DBLP profile

    • URL

      http://dblp.uni-trier.de/pers/hd/m/Morozov:Kirill

    • Related Report
      2015 Research-status Report
  • [Funded Workshop] Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling2017

    • Related Report
      2017 Annual Research Report
  • [Funded Workshop] Secret Sharing for Dependability, Usability and Security of Network Storage and Its Mathematical Modeling2016

    • Place of Presentation
      Academic Research and Industrial Collaboration Management Office, Kyushu University, Fukuoka
    • Year and Date
      2016-09-05
    • Related Report
      2016 Research-status Report

URL: 

Published: 2015-04-16   Modified: 2022-06-07  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi