• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Flexible and efficient hash chain constructions and its applications for lightweight authentication

Research Project

Project/Area Number 15K00189
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionHiroshima City University

Principal Investigator

Soshi Masakazu  広島市立大学, 情報科学研究科, 准教授 (00293142)

Co-Investigator(Kenkyū-buntansha) 宮地 充子  大阪大学, 工学研究科, 教授 (10313701)
Research Collaborator Miyaji Atsuko  大阪大学, 工学系研究科, 教授 (10313701)
Project Period (FY) 2015-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥4,550,000 (Direct Cost: ¥3,500,000、Indirect Cost: ¥1,050,000)
Fiscal Year 2017: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2016: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Fiscal Year 2015: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywordsセキュリティ / ネットワーク / IoT / 認証 / プロトコル / ハッシュ関数 / モバイルコンピューティング / ユビキタス / ハッシュ連鎖 / 通信
Outline of Final Research Achievements

In recent years, the importance of lightweight and efficient authentication protocols for IoT environments has been increasing. In this work we propose a flexible hash chain construction, hash chain aggregation (HCA), and a scheme to set up a common key for two users with HCA. Our scheme uses only hash functions as cryptographic primitives. Furthermore, in our schemes no communication is required when a common key for two users is set up. We also evaluate security of the scheme extensively. Especially we show that our scheme is secure against a single attacker, but not against two attackers or more. We also show that our scheme is efficient. In this work we examine application of hash functions and lightweight authentication such as one time signatures and white-box cryptography.

Report

(4 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (33 results)

All 2018 2017 2016 2015

All Journal Article (9 results) (of which Int'l Joint Research: 7 results,  Peer Reviewed: 9 results,  Open Access: 3 results,  Acknowledgement Compliant: 5 results) Presentation (23 results) (of which Int'l Joint Research: 9 results) Book (1 results)

  • [Journal Article] Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices2017

    • Author(s)
      Gordon Steven、Huang Xinyi、Miyaji Atsuko、Su Chunhua、Sumongkayothin Karin、Wipusitwarakun Komwut
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 12 Issue: 12 Pages: 3024-3038

    • DOI

      10.1109/tifs.2017.2730584

    • NAID

      120006469242

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      International Journal of Foundations of Computer Science

      Volume: 28 Issue: 06 Pages: 661-682

    • DOI

      10.1142/s0129054117400123

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] A simple authentication encryption scheme2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: 29 Issue: 16 Pages: 16-16

    • DOI

      10.1002/cpe.4058

    • Related Report
      2017 Annual Research Report 2016 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Variable message encryption through blockcipher compression function2017

    • Author(s)
      Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: Volume 29, Issue 7 Issue: 7 Pages: 1-16

    • DOI

      10.1002/cpe.3956

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Privacy-Preserving Integration of Medical Data A Practical Multiparty Private Set Intersection2017

    • Author(s)
      Atsuko Miyaji, Kazuhisa Nakasho and Shohei Nishida
    • Journal Title

      Journal of Medical Systems

      Volume: 41 Issue: 3 Pages: 1-10

    • DOI

      10.1007/s10916-016-0657-4

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Refined Construction of RC4 Key Setting in WPA2017

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 1 Pages: 138-148

    • DOI

      10.1587/transfun.E100.A.138

    • NAID

      130005180798

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A novel hash chain construction for simple and efficient authentication2016

    • Author(s)
      Yuta Kurihara and Masakazu Soshi
    • Journal Title

      Privacy, Security and Trust (PST), 2016 14th Annual Conference on

      Volume: - Pages: 539-542

    • DOI

      10.1109/pst.2016.7907012

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] A New Scheme of Blockcipher Hash2016

    • Author(s)
      Mazumder Rashed and Atsuko Miyaji
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E99.D Issue: 4 Pages: 796-804

    • DOI

      10.1587/transinf.2015ICP0028

    • NAID

      130005141349

    • ISSN
      0916-8532, 1745-1361
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-2562016

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99.A Issue: 1 Pages: 14-21

    • DOI

      10.1587/transfun.E99.A.14

    • NAID

      130005115228

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Presentation] パッチを導入したワームの動的感染モデル2018

    • Author(s)
      杉谷 勇気, ボネ フランソワ, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-54 (2018-03), 19-24
    • Related Report
      2017 Annual Research Report
  • [Presentation] 集合法を用いた多変数多項式の解法の高速化について2018

    • Author(s)
      西口 朋哉, 鄭 振牟, 宮地 充子,
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-55(2018-03), 25-30
    • Related Report
      2017 Annual Research Report
  • [Presentation] 多機関データ集合演算の応用手法2018

    • Author(s)
      林 基, 宮地 充子, 宍戸 克成
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-56 (2018-03), 31-36
    • Related Report
      2017 Annual Research Report
  • [Presentation] QC-MDPC符号に対するGuo-Johansson-Stankovski攻撃の解析2018

    • Author(s)
      前澤 陽平, 周 丹彡, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-57 (2018-03), 37-42
    • Related Report
      2017 Annual Research Report
  • [Presentation] ランダムなネットワークモデルにおけるウイルスの拡散と抑制モデルに関する研究2018

    • Author(s)
      西野 大一, ボネ フランソワ, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-61 (2018-03), 61-66
    • Related Report
      2017 Annual Research Report
  • [Presentation] ストリーム暗号Salsa20/ChaCha20のdiffusionの再設計による安全性評価2018

    • Author(s)
      松岡 勇介, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-62 (2018-03), 67-72
    • Related Report
      2017 Annual Research Report
  • [Presentation] ユニバーサルサンプラを用いた階層型IDベース暗号方式の評価2018

    • Author(s)
      大塚 俊輔, 河内 亮周, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-63 (2018-03), 73-78
    • Related Report
      2017 Annual Research Report
  • [Presentation] 準同型暗号に用いるRing-LWEの安全性について2018

    • Author(s)
      寺田 翔太, 仲野 秀人, 奥村 伸也, 宮地 充子
    • Organizer
      The 35th Symposium on Cryptography and Information Security, SCIS2018 (2018-1), 4B2-4
    • Related Report
      2017 Annual Research Report
  • [Presentation] ストリーム暗号RC4における反復性のある新しい鍵相関2018

    • Author(s)
      伊藤 竜馬, 宮地 充子
    • Organizer
      The 35th Symposium on Cryptography and Information Security, SCIS2018 (2018-1), 2B3-1
    • Related Report
      2017 Annual Research Report
  • [Presentation] ホワイトボックスAES実装の改良2017

    • Author(s)
      堀田 智彦,双紙 正和
    • Organizer
      第170回マルチメディア通信と分散処理・第76回コンピュータセキュリティ合同研究発表会
    • Place of Presentation
      神奈川工科大学
    • Year and Date
      2017-03-02
    • Related Report
      2016 Research-status Report
  • [Presentation] On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus2017

    • Author(s)
      Chen-Mou Cheng, Kenta Kodera, and Atsuko Miyaji
    • Organizer
      The 20th Annual International Conference on Information Security and Cryptology (ICISC 2017), Lecture Notes in Computer Science, volume 10779(2017), Springer-Verlag, 245-263.
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen22017

    • Author(s)
      Hiroshi Nomaguchi, Atsuko Miyaji and Chunhua Su
    • Organizer
      The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'17)}, IEEE, 721-728
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] (p, N)-identifiability: Anonymity under Practical Adversaries2017

    • Author(s)
      Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka and Atsuko Miyaji
    • Organizer
      The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'17)}, IEEE, 996-1003
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A simple construction of encryption for a tiny domain message2017

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, and Chunhua Su
    • Organizer
      The 51th Annual Conference on Information Sciences and Systems (CISS2017), IEEE, 1-6
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Robust ORAM: Enhancing Availability, Confidentiality and Integrity2017

    • Author(s)
      Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, and Ayumu Kubota
    • Organizer
      The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC2017), IEEE, 1-6
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Short Merkle One-Time Signatures2017

    • Author(s)
      Hiroaki Anada, Shunsuke Tsumori, Samiran Bag, Masakazu Soshi, Atsushi Waseda and Kouichi Sakurai
    • Organizer
      IWSEC 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] ハッシュ連鎖アグリゲーションの応用2017

    • Author(s)
      栗原 勇太, 双紙 正和
    • Organizer
      コンピュータセキュリティシンポジウム 2017
    • Related Report
      2017 Annual Research Report
  • [Presentation] 効率の良い認証のための新しく柔軟なハッシュ連鎖構成法2016

    • Author(s)
      栗原勇太, 双紙正和
    • Organizer
      コンピュータセキュリティシンポジウム2016 (CSS2016)
    • Place of Presentation
      秋田キャッスルホテル
    • Year and Date
      2016-10-11
    • Related Report
      2016 Research-status Report
  • [Presentation] VANETにおけるゲーム理論を応用した認証法の選択2016

    • Author(s)
      日浦博昭,双紙正和
    • Organizer
      情報通信システムセキュリティ研究会(ICSS)
    • Place of Presentation
      京都大学 学術情報メディアセンター 南館
    • Year and Date
      2016-03-03
    • Related Report
      2015 Research-status Report
  • [Presentation] ゲーム理論を応用したVANETにおける認証法の分析2016

    • Author(s)
      日浦博昭、双紙正和
    • Organizer
      SCIS2016 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] Improved Differential Characteristic Searching Methods2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Je Sen Teh
    • Organizer
      The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015)
    • Place of Presentation
      New York, USA
    • Year and Date
      2015-11-03
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Accurate Estimation of the Full Differential Distribution for General Feistel Structures2015

    • Author(s)
      Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh
    • Organizer
      The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015)
    • Place of Presentation
      Beijing Friendship Hotel, China
    • Year and Date
      2015-11-01
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] A New Scheme of (n; n) Blockcipher based Cryptographic Hash: Single Key Scheduling2015

    • Author(s)
      Jiageng Chen, Rashed Mazumder, and Atsuko Miyaji
    • Organizer
      10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015)
    • Place of Presentation
      Callirhoe at the Heliotrope Hotel, Greek
    • Year and Date
      2015-07-20
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Book] Applied Cryptography and Network Security - 15th International Conference, ACNS 20172017

    • Author(s)
      Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
    • Total Pages
      707
    • Publisher
      Springer
    • ISBN
      9783319612034
    • Related Report
      2017 Annual Research Report

URL: 

Published: 2015-04-16   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi