• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on treatment to prevent loss of cryptographic key

Research Project

Project/Area Number 16360184
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Communication/Network engineering
Research InstitutionUniversity of Tsukuba

Principal Investigator

OKAMOTO Eiji  University of Tsukuba, Graduate School of Systems and Information Engineering, Professor, 大学院システム情報工学研究科, 教授 (60242567)

Co-Investigator(Kenkyū-buntansha) MIAO Ying  University of Tsukuba, Graduate School of Systems and Information Engineering, Associate Professor, 大学院システム情報工学研究科, 助教授 (10302382)
OKAMOTO Takeshi  University of Tsukuba, Graduate School of Systems and Information Engineering, Lecturer, 大学院システム情報工学研究科, 講師 (00349797)
Project Period (FY) 2004 – 2006
Project Status Completed (Fiscal Year 2006)
Budget Amount *help
¥13,900,000 (Direct Cost: ¥13,900,000)
Fiscal Year 2006: ¥3,700,000 (Direct Cost: ¥3,700,000)
Fiscal Year 2005: ¥5,200,000 (Direct Cost: ¥5,200,000)
Fiscal Year 2004: ¥5,000,000 (Direct Cost: ¥5,000,000)
KeywordsPairing / Elliptic curve / Bilinear mapping / Cryptographic key management / (k, n) threshold scheme / Secret sharing scheme (SSS) / 1-out-of-n scheme / Hybrid-P2P model / ペアリング / Ateペアリング / Twisted Ateペアリング / 暗号 / 公開鍵暗号系 / 鍵 / 署名 / 証明書
Research Abstract

We construct efficient secret sharing scheme (SSS) (including "1-out-of-n" cryptosystem) and consider the treatment against the loss of cryptographic key. To make more concretely, we propose Hybrid P2P network model which does not access to the root server in case the system preserves or gathers the share of SSS. Our scheme can give some guarantee for the data integrity even when the system loses both terminal machines (e.g. mobile PC) and removable cryptographic key (e.g. USB key). We solve the above problem mainly using the following two methods : (1) The system uses the work key (not master key) to encrypt the data in mobile PC ; (2) The system uses the authentication code from the root server, which decrypts the encrypted data. Consequently, our system realizes the share's generation and the data recovery related to the (k, n) threshold scheme. The system gives the data integrity for the authentication code between server and client machines. Profitable performance evaluation is al … More so obtained from implementation point of view.
We also propose fast software/hardware implementation to calculate the paring on elliptic curve. Nowadays there are so many applications in the pairing based cryptosystem, e.g. ID-based cryptosystem, short signature, broadcast encryption, etc. However there exist some drawbacks in pairing calculation. This means that the amount of work to calculate the pairing is very large compared to the conventional calculation method. We propose some efficient pairing algorithms for calculation. One of them is a proposal of an efficient (twisted) Ate pairing. The twisted Ate pairing is faster than the conventional Tate pairing. We give the loop-shorten technique of the Eta T pairing. This pairing can be applied to the twisted Ate pairing and computational cost is reduced by 25 to 50 % in terms of software implementation. In addition, we show that the improvement of the twisted Ate pairing is theoretically faster than the Ate pairing when parameter rho is approximately 2. In the same way, we also proposed other efficient pairings and estimate them compared to conventional pairings. Less

Report

(4 results)
  • 2006 Annual Research Report   Final Research Report Summary
  • 2005 Annual Research Report
  • 2004 Annual Research Report
  • Research Products

    (40 results)

All 2007 2006 2005 2004

All Journal Article (38 results) Book (2 results)

  • [Journal Article] An ID-SP-M4M scheme and its security analysis2007

    • Author(s)
      王 立華
    • Journal Title

      IEICE Trans. Fundamentals 90・1

      Pages: 91-100

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Annual Research Report 2006 Final Research Report Summary
  • [Journal Article] Multiplication over F_p^m on FPGA : A Survey2007

    • Author(s)
      Jean-Luc Beuchat
    • Journal Title

      Proc. of ARC2007, LCNS, Springer-Verlag 4419

      Pages: 214-225

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] An ID-SP-M4M Scheme and Its Security Analysis2007

    • Author(s)
      Lihua Wang
    • Journal Title

      Institute of Electronics, Information and Communication Engineers of Japan (IEICE) Transactions Fundamentals Vol.E90-A, No.1

      Pages: 91-100

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Multiplication over F_p^m on FPGA : A Survey2007

    • Author(s)
      Jean-Luc Beuchat
    • Journal Title

      Proc.of ARC2007, LCNS Vol.4419

      Pages: 214-225

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] 送信者に認証機能を付加したブロードキャスト暗号とその応用2006

    • Author(s)
      金沢 史明
    • Journal Title

      情報処理学会論文誌 47・11

      Pages: 2992-3004

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Annual Research Report 2006 Final Research Report Summary
  • [Journal Article] An efficient ID-based digital signature with message recovery based on pairing2006

    • Author(s)
      Raylin Tso
    • Journal Title

      IACR Cryptology ePrint Archive Report, http://eprint. iacr. org/2006/195 195(査読付電子投稿)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Anonymous secure communication in wireless mobile ad- hoc networks2006

    • Author(s)
      Mizanur Rahman
    • Journal Title

      Proc. of International Conference on Ubiquitous Convergence Technology (ICUCT2006), LNCS, Springer-Verlag 4412

      Pages: 140-149

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Twisted Ateペアリングの高速化手法の提案2006

    • Author(s)
      松田 誠一
    • Journal Title

      電子情報通信学会、情報セキュリティ研究会、信学技法 106・411

      Pages: 29-34

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Broadcast Encryption with Sender Authentication and its Application2006

    • Author(s)
      Fumiaki Kanazawa
    • Journal Title

      Information Processing Society of Japan (IPSJ) Journal Vol.47, No.11

      Pages: 2992-3004

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] An Efficient ID-based Digital Signature with Message Recovery Based on Pairing2006

    • Author(s)
      Raylin Tso
    • Journal Title

      Cryptology ePrint Archive Report 2006/195

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Anonymous secure communication in wireless mobile ad-hoc networks2006

    • Author(s)
      Mizanur Rahman
    • Journal Title

      International Conference on Ubiquitous Convergence Technology (ICUCT), Lecture Notes in Computer Science (LNCS) 4412

      Pages: 140-149

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Proposal for an improvement of computing Twisted Ate pairing2006

    • Author(s)
      Seiichi Matsuda
    • Journal Title

      Information Security (ISEC), IEICE Technical report vol.106, no. 411

      Pages: 29-34

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] An efficient ID-based digital signature with message recovery based on pairing2006

    • Author(s)
      Raylin Tso
    • Journal Title

      IACR Cryptology ePrint Archive Report, http://eprint. iacr. org/2006/195(査読付電子投稿) 195((頁)割り当てなし)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Anonymous secure communication in wireless mobile ad-hoc networks2006

    • Author(s)
      Sk.Md.M.Rahman
    • Journal Title

      Proc. of International Conference on Ubiquitous Convergence Technology (ICUCT2006), LNCS, Springer-Verlag 4412

      Pages: 140-149

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Twisted Ateペアリングの高速化手法の提案2006

    • Author(s)
      松田誠一
    • Journal Title

      電子情報通信学会、情報セキュリティ研究会、信学技法 106・411

      Pages: 29-34

    • Related Report
      2006 Annual Research Report
  • [Journal Article] How to verify the threshold t of Shamir' s (t, n)-threshold scheme2005

    • Author(s)
      Raylin Tso
    • Journal Title

      Information Processing Society of Japan (IPSJ) Journal 46・8

      Pages: 1824-1833

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] A share-correctable protocol for the Shamir threshold scheme and its application to participant enrollment2005

    • Author(s)
      Raylin Tso
    • Journal Title

      Information Processing Society of Japan (IPSJ) Journal 46・8

      Pages: 1880-1888

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] An ID-based Non Interactive Tripartite Key Agreement Protocol with K-Resilience2005

    • Author(s)
      Raylin Tso
    • Journal Title

      IASTED International Conference Communications and Computer Networks (CCN2005), IASTED Proc.

      Pages: 38-42

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Performance evaluation of efficient algorithms for Tate pairing2005

    • Author(s)
      Seiichi Matsuda
    • Journal Title

      Proc. of PacRim2005 S36-2

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] k-resilient ID-based key distribution schemes from pairing - three party case2005

    • Author(s)
      Takeshi Okamoto
    • Journal Title

      Proc. of International Workshop on Coding and Cryptography (WCC2005)

      Pages: 402-412

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] How to verify the threshold t of Shamir's (t, n)-threshold scheme2005

    • Author(s)
      Raylin Tso
    • Journal Title

      IPSJ Journal Vol.46, No.8

      Pages: 1824-1833

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] A share-correctable protocol for the Shamir threshold scheme and its application to participant enrollment2005

    • Author(s)
      Raylin Tso
    • Journal Title

      IPSJ Journal Vol.46, No.8

      Pages: 1880-1888

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Performance evaluation of efficient algorithms for Tate pairing2005

    • Author(s)
      Seiichi Matsuda
    • Journal Title

      Proc.of PacRim2005 S36-2

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] k-resilient ID-based key distribution schemes from pairing-three party case2005

    • Author(s)
      Takeshi Okamoto
    • Journal Title

      Proc.of International Workshop on Coding and Cryptography (WCC2005)

      Pages: 402-412

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] How to verify the threshold t of Shamir's (t,n)-threshold scheme to verify2005

    • Author(s)
      R.Tso, Y.Miao, T.Okamoto, E.Okamoto
    • Journal Title

      IPSJ Journal Vol.46,No.8

      Pages: 1824-1833

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Specification and design of advanced authentication and authorization services2005

    • Author(s)
      Javier Lopez, Jose A.Montenegro, Jose L.Vivas, Eiji Okamoto, Ed Dawson
    • Journal Title

      Computer Standard and Interface Journal 27

      Pages: 467-478

    • Related Report
      2005 Annual Research Report
  • [Journal Article] A novel mail filtering method against method against phishing2005

    • Author(s)
      A.Inomata, Sk.Md.Mizanur Rahman, T.Okamoto, E.Okamoto
    • Journal Title

      PacRim2005

    • Related Report
      2005 Annual Research Report
  • [Journal Article] A proposal of short proxy signature using pairing2005

    • Author(s)
      T.Okamoto, A.Inomata, E.Okamoto
    • Journal Title

      2005 International Conference on Information Technology Coding and Computing (ITCC 2005), IEEE Computer Society

      Pages: 631-635

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Cryptosystems based on elliptic curve pairing2005

    • Author(s)
      E.Okamoto, T.Okamoto
    • Journal Title

      MDAI2O05 (Modeling Decisions for Artificial Intelligence)

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Real-time computation with enhanced pipe2005

    • Author(s)
      Y.Oyama, A.Inomata, T.Okamoto, E.Okamoto
    • Journal Title

      MDAI2005 (Modeling Decisions for Artificial Intelligence ) (submitted)

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Learner's privacy enhanced arechitecture for distance learning2005

    • Author(s)
      A.Inomata, Y.Oyama, S.Uda, T.Okamoto, E.Okamoto
    • Journal Title

      Proc. of The 4^<th> IASTED International Conference on Web-Based Education (WBW2005) WBW2005

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Transformation-free proxy cryptosystems and their applications to electronic commerce2004

    • Author(s)
      Lihua Wang
    • Journal Title

      Proc. of 3rd International Conference on Information Security (InfoSecu)

      Pages: 92-98

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Transformation-free proxy cryptosystems and their applications to electronic commerce2004

    • Author(s)
      Lihua Wang
    • Journal Title

      Proc.of 3rd International Conference on Information Security

      Pages: 92-98

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Security of Kuwakado-Tanaka transitive signature scheme for directed trees2004

    • Author(s)
      X.Yi, C.-H.Tan, E.Okamoto
    • Journal Title

      電子情報通信学会英論文誌 E87-A

      Pages: 955-957

    • NAID

      110003212987

    • Related Report
      2004 Annual Research Report
  • [Journal Article] A fast signature scheme with new on-line computation2004

    • Author(s)
      T.Okamoto, H.Katsuno, E.Okamoto
    • Journal Title

      電子情報通信学会英論文誌 E87-A

      Pages: 1154-1161

    • NAID

      110003213012

    • Related Report
      2004 Annual Research Report
  • [Journal Article] The dynamic-typed access model and decidability of the safety problem2004

    • Author(s)
      M.Soshi, M.Maekawa, E.Okamoto
    • Journal Title

      電子情報通信学会英論文誌 E87-A

      Pages: 190-203

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Anonymous traceable disclosure scheme using pairing over elliptic curve2004

    • Author(s)
      T.Ito, T.Okamoto, E.Okamoto
    • Journal Title

      Proc. of 3^<rd> International Conference on Information Security

      Pages: 48-52

    • Related Report
      2004 Annual Research Report
  • [Journal Article] ID-based key agreement protocols using pairing2004

    • Author(s)
      T.Okamoto, K.Harada, E.Okamoto
    • Journal Title

      Proc.of 2004 International Symposium on Information Theory and it Applications ISITA2004

    • Related Report
      2004 Annual Research Report
  • [Book] 情報セキュリティハンドブック2004

    • Author(s)
      岡本栄司(編集幹事長)
    • Total Pages
      610
    • Publisher
      電子情報通信学会,オーム社
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Book] 情報セキュリティハンドブック2004

    • Author(s)
      今井秀樹(編集長), 岡本栄司(編集幹事長)
    • Total Pages
      590
    • Publisher
      オーム社
    • Related Report
      2004 Annual Research Report

URL: 

Published: 2004-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi