• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on Advanced Key Update Technique for Practical Applications of Advanced Cryptosystem

Research Project

Project/Area Number 16K00198
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionNational Institute of Information and Communications Technology

Principal Investigator

Keita Emura  国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員 (30597018)

Co-Investigator(Kenkyū-buntansha) 花岡 悟一郎  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 研究グループ長 (30415731)
Attrapadun Nutt  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 主任研究員 (40515300)
松田 隆宏  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 主任研究員 (60709492)
林 卓也  国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員 (70739995)
Project Period (FY) 2016-04-01 – 2019-03-31
Project Status Completed (Fiscal Year 2018)
Budget Amount *help
¥4,550,000 (Direct Cost: ¥3,500,000、Indirect Cost: ¥1,050,000)
Fiscal Year 2018: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2017: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2016: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Keywords鍵失効機能付きIDベース暗号 / 鍵失効機能付き属性ベース暗号 / 署名鍵有効期限付きグループ署名 / 鍵失効機能付きグループ署名 / 鍵失効可能IDベース暗号 / 鍵隔離公開鍵暗号
Outline of Final Research Achievements

Cryptography is widely recognized for realizing secure communication. We remark that cryptosystems are guaranteed to be security only when secret keys are suitably maintained. Thus, it is quite important to consider secret key exposure. In this research, we propose advanced key update/revocation techniques for practical applications of advanced cryptosystems. Concretely, we propose revocable identity-based encryption, revocable attribute-based encryption, and revocable group signatures.

Academic Significance and Societal Importance of the Research Achievements

次世代暗号では, 既存暗号に比べ秘密鍵を様々な用途に使用可能であるがゆえに, 鍵漏洩が及ぼす影響が甚大であるという懸念がある. 実際に問題が発生した例として,不正コピー防止技術HDCPおける鍵漏洩事件が知られている. これはTwitter上でIntel Global PRと名乗るユーザがHDCP用製品のデバイス鍵を作成可能なマスター鍵を拡散した事件である. ここで問題なのは, たかが一つのマスター鍵漏洩が全てのユーザに影響し, そのため攻撃者の鍵入手利益が非常に大きいという点である. この事例から明らかなように, 適切な鍵管理対策を行うことは急務である.

Report

(4 results)
  • 2018 Annual Research Report   Final Research Report ( PDF )
  • 2017 Research-status Report
  • 2016 Research-status Report
  • Research Products

    (13 results)

All 2019 2018 2017 2016 Other

All Int'l Joint Research (1 results) Journal Article (3 results) (of which Int'l Joint Research: 2 results,  Peer Reviewed: 2 results,  Open Access: 1 results,  Acknowledgement Compliant: 1 results) Presentation (9 results) (of which Int'l Joint Research: 4 results)

  • [Int'l Joint Research] Myongji University(韓国)

    • Related Report
      2016 Research-status Report
  • [Journal Article] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption2018

    • Author(s)
      Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E101.A Issue: 9 Pages: 1456-1472

    • DOI

      10.1587/transfun.E101.A.1456

    • NAID

      130007479446

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2018-09-01
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Group Signatures with Time-bound Keys Re- visited: A New Model, an Efficient Construction, and Its Implementation2017

    • Author(s)
      Keita Emura, Takuya Hayashi, Ai Ishida
    • Journal Title

      IEEE Transactions on Dependable and Secure Computing

      Volume: 印刷中 Issue: 2 Pages: 292-305

    • DOI

      10.1109/tdsc.2017.2754247

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters2016

    • Author(s)
      Yohei Watanabe, Keita Emura, Jae Hong Seo
    • Journal Title

      Cryptology ePrint Archive

      Volume: - Pages: 1-28

    • Related Report
      2016 Research-status Report
    • Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Presentation] より効率的で適応的に安全な鍵失効機能付きIDベース暗号の構成2019

    • Author(s)
      高安敦, 渡邉洋平, 江村恵太
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2019
    • Related Report
      2018 Annual Research Report
  • [Presentation] A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation2018

    • Author(s)
      Keita Emura, Takuya Hayashi
    • Organizer
      ISC 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 標準的な仮定で安全かつスケーラブルなメンバ削除可能グループ署名2018

    • Author(s)
      江村 恵太
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2018
    • Related Report
      2017 Research-status Report
  • [Presentation] New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters2017

    • Author(s)
      Yohei Watanabe, Keita Emura, Jae Hong Seo
    • Organizer
      CT-RSA 2017
    • Place of Presentation
      Moscone Center, San Francisco, USA
    • Year and Date
      2017-02-14
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] 適応的安全な無効化可能属性ベース暗号の一般的構成2017

    • Author(s)
      山田古都子, アッタラパドゥン・ナッタポン, 江村 恵太, 花岡 悟一郎, 田中 圭介
    • Organizer
      暗号と情報セキュリティシンポジウム2017
    • Place of Presentation
      ロワジールホテル那覇, 沖縄県, 那覇市
    • Year and Date
      2017-01-24
    • Related Report
      2016 Research-status Report
  • [Presentation] 署名鍵有効期限付きグループ署名の効率化とその実装評価2017

    • Author(s)
      江村 恵太, 林 卓也, 石田 愛
    • Organizer
      暗号と情報セキュリティシンポジウム2017
    • Place of Presentation
      ロワジールホテル那覇, 沖縄県, 那覇市
    • Year and Date
      2017-01-24
    • Related Report
      2016 Research-status Report
  • [Presentation] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption2017

    • Author(s)
      Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      ESORICS 2017
    • Related Report
      2017 Research-status Report
    • Int'l Joint Research
  • [Presentation] Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction2017

    • Author(s)
      Keita Emura, Takuya Hayashi, Ai Ishida
    • Organizer
      AsiaCCS 2017
    • Related Report
      2017 Research-status Report
    • Int'l Joint Research
  • [Presentation] 素数位数群における効率的な鍵失効機能付きIDベース暗号の構成法2016

    • Author(s)
      渡邉 洋平, 江村 恵太
    • Organizer
      コンピュータセキュリティシンポジウム2016
    • Place of Presentation
      秋田キャッスルホテル, 秋田県, 秋田市
    • Year and Date
      2016-10-11
    • Related Report
      2016 Research-status Report

URL: 

Published: 2016-04-21   Modified: 2022-02-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi