• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Network-Dependent Security Evaluation for Cryptographic Protocols

Research Project

Project/Area Number 15K00196
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionNational Institute of Information and Communications Technology

Principal Investigator

Maki Yoshida  国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員 (50335387)

Project Period (FY) 2015-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2017: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2016: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Fiscal Year 2015: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywords暗号プロトコル / 安全性評価 / IoT / セキュアネットワーク / 汎用的結合可能性
Outline of Final Research Achievements

An important issue of cryptographic protocols is to evaluate the security. The purpose of this work is to evaluate the security in IoT environments according to the End-to-End network between users and devices. We study the security evaluation of well-known and important protocols such as SSL/TLS, QUIC, and multi-party computation, find a flow of the previous security model of QUIC, and present some improvements on both security and efficiency.

Report

(4 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (12 results)

All 2018 2017 2016 2015

All Journal Article (8 results) (of which Int'l Joint Research: 1 results,  Peer Reviewed: 7 results,  Open Access: 1 results) Presentation (4 results)

  • [Journal Article] On the (in)efficiency of non-interactive secure multiparty2018

    • Author(s)
      Maki Yoshida, Satoshi Obana
    • Journal Title

      Designs, Codes and Cryptography

      Volume: - Issue: 8 Pages: 1-13

    • DOI

      10.1007/s10623-017-0424-7

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Verifiably multiplicative secret sharing2017

    • Author(s)
      Maki Yoshida, Satoshi Obana
    • Journal Title

      Proceedings of ICITS 2017, Lecture Notes in Computer Science

      Volume: 10681 Pages: 73-82

    • DOI

      10.1007/978-3-319-72089-0_5

    • ISBN
      9783319720883, 9783319720890
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Analyzing and Fixing the QACCE Security of QUIC2016

    • Author(s)
      Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida
    • Journal Title

      Proceedings of SSR 2016, Lecture Notes in Computer Science

      Volume: 10074 Pages: 1-31

    • DOI

      10.1007/978-3-319-49100-4_1

    • ISBN
      9783319490991, 9783319491004
    • Related Report
      2016 Research-status Report
    • Peer Reviewed
  • [Journal Article] An Efficient Construction of Non-Interactive Secure Multiparty Computation2016

    • Author(s)
      Satoshi Obana, Maki Yoshida
    • Journal Title

      Proceedings of CANS 2016, Lecture Notes in Computer Science

      Volume: 10052 Pages: 604-614

    • DOI

      10.1007/978-3-319-48965-0_39

    • ISBN
      9783319489643, 9783319489650
    • Related Report
      2016 Research-status Report
    • Peer Reviewed
  • [Journal Article] Efficient Usage of Cover Free Families in Broadcast Encryption2016

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99-A, 6 Pages: 1216-1221

    • NAID

      130005154246

    • Related Report
      2016 Research-status Report
    • Peer Reviewed
  • [Journal Article] Two Approaches to Analyzing the Security of Cryptographic Protocols2016

    • Author(s)
      Maki Yoshida
    • Journal Title

      Journal of the National Institute of Information and Communications Technology

      Volume: vol.63, no.2 Pages: 179-184

    • Related Report
      2016 Research-status Report
    • Peer Reviewed
  • [Journal Article] On the (In)Efficiency of Non-Interactive Secure Multiparty Computation2016

    • Author(s)
      Maki Yoshida and Satoshi Obana
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 9558 Pages: 185-193

    • DOI

      10.1007/978-3-319-30840-1_12

    • ISBN
      9783319308395, 9783319308401
    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Trade-off between resiliency and efficiency of cryptographic protocols -- The case of information theoretical security --2015

    • Author(s)
      Maki Yoshida
    • Journal Title

      IEICE Technical Report

      Volume: vol.115, no.38 Pages: 69-74

    • Related Report
      2015 Research-status Report
  • [Presentation] 検証乗算可能な秘密分散2018

    • Author(s)
      吉田真紀, 尾花賢
    • Organizer
      2018年暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] 秘密分散とマトロイド2017

    • Author(s)
      吉田真紀
    • Organizer
      日本応用数理学会2017年度年会, 数理的技法による情報セキュリティ (FAIS)
    • Related Report
      2017 Annual Research Report
  • [Presentation] TLSへのLogjam攻撃のProVerifによる形式化と検出2016

    • Author(s)
      木村文哉,吉田真紀,米山一樹
    • Organizer
      2016年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ, 熊本県熊本市中央区東阿弥陀寺町
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] A Note on Using Sigma Protocols in Cryptographic Protocols2016

    • Author(s)
      Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida
    • Organizer
      日本応用数理学会2016 年度年会, 数理的技法による情 報セキュリティ(FAIS)
    • Place of Presentation
      北九州国際会議場, 福岡県北九州市
    • Related Report
      2016 Research-status Report

URL: 

Published: 2015-04-16   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi