• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of Practical and Error-Resilient Encryption and Authentication Mechanisms for Cloud-based Security Systems

Research Project

Project/Area Number 15K16006
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionNational Institute of Advanced Industrial Science and Technology

Principal Investigator

SCHULDT Jacob  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 主任研究員 (80750893)

Research Collaborator PATERSON Kenneth  University of London, Royal Holloway
DEGABRIELE Jean Paul  University of London, Royal Holloway
WOODAGE Joanne  University of London, Royal Holloway
WEE Hoeteck  Ecole Normale Superieure
MATSUDA Takahiro  National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
HANAOKA Goichiro  National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
MORITA Hiraku  National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
IWATA Tetsu  Nagoya University, Department of Computational Science and Engineering
Project Period (FY) 2015-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥3,900,000 (Direct Cost: ¥3,000,000、Indirect Cost: ¥900,000)
Fiscal Year 2017: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2016: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2015: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywordspublic key encryption / signatures / related randomness / related key attacks / NIKE / encryption / cloud security / related key security
Outline of Final Research Achievements

The advantages provided by the cloud computing paradigm have led to a rapid adaptation, and a large number of cloud-based systems and services are in use today. However, recent results illustrate that the standard approach to securing these systems is insufficient due to the unique properties of a cloud-based environment, and attacks on real-world implementations have been demonstrated. This research develops encryption and authentication mechanisms, which are central to the construction of practical security systems, that address security concerns in a cloud-based system. Specifically, the focus is on security using weak or maliciously manipulated randomness and security against leakage and tampering attacks, which are relevant for both virtual machines providing a cloud service and the devices accessing this service.

Report

(4 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (11 results)

All 2018 2017 2016 2015

All Journal Article (7 results) (of which Int'l Joint Research: 7 results,  Peer Reviewed: 7 results,  Acknowledgement Compliant: 4 results) Presentation (4 results) (of which Int'l Joint Research: 4 results)

  • [Journal Article] Related Randomness Security for Public Key Encryption, Revisited2018

    • Author(s)
      Takahiro Matsuda, Jacob C. N. Schuldt
    • Journal Title

      21st IACR International Conference on Practice and Theory of Public-Key Cryptography

      Volume: 10769 Pages: 280-311

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On the Security of Non-Interactive Key Exchange against Related-Key Attacks2017

    • Author(s)
      Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: 100-A Pages: 1910-1923

    • NAID

      130006038269

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks2017

    • Author(s)
      Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
    • Journal Title

      IEICE Transactions

      Volume: 100-A Pages: 73-90

    • NAID

      130005180958

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures2017

    • Author(s)
      Jacob C. N. Schuldt, Kazumasa Shinagawa
    • Journal Title

      ACM Asia Conference on Computer and Communications Security (AsiaCCS)

      Volume: - Pages: 241-252

    • DOI

      10.1145/3052973.3053040

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results2016

    • Author(s)
      Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
    • Journal Title

      Advances in Cryptology - CRYPTO

      Volume: 1 Pages: 403-432

    • DOI

      10.1007/978-3-662-53018-4_15

    • ISBN
      9783662530177, 9783662530184
    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks2016

    • Author(s)
      Hiraku Morita, Jacob C.N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, and Tetsu Iwata
    • Journal Title

      Information Security and Cryptology 2015, LNCS

      Volume: 9558 Pages: 20-35

    • DOI

      10.1007/978-3-319-30840-1_2

    • ISBN
      9783319308395, 9783319308401
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Secure Multi-Party Computation Using Polarizing Cards2015

    • Author(s)
      Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    • Journal Title

      IWSEC 2015, Lecture Notes in Computer Science

      Volume: 9241 Pages: 281-297

    • DOI

      10.1007/978-3-319-22425-1_17

    • ISBN
      9783319224244, 9783319224251
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Presentation] On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures2017

    • Author(s)
      Jacob C. N. Schuldt, Kazumasa Shinagawa
    • Organizer
      ACM Asia Conference on Computer and Communications Security (AsiaCCS)
    • Place of Presentation
      NYU Abu Dhabi
    • Year and Date
      2017-04-04
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results2016

    • Author(s)
      Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
    • Organizer
      Advances in Cryptology - CRYPTO
    • Place of Presentation
      Santa Barbara, University of California
    • Year and Date
      2016-08-16
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Security Against Related Randomness Attacks via Reconstructive Extractors2015

    • Author(s)
      Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, and Hoeteck Wee
    • Organizer
      IMA Coding and Cryptography
    • Place of Presentation
      University of Oxford, UK
    • Year and Date
      2015-12-15
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks2015

    • Author(s)
      Hiraku Morita, Jacob C.N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, and Tetsu Iwata
    • Organizer
      Information Security and Cryptology 2015
    • Place of Presentation
      KIISC, Seoul, Korea
    • Year and Date
      2015-11-25
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research

URL: 

Published: 2015-04-16   Modified: 2023-03-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi