• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

格子暗号の大規模解読実験による安全性解析

Research Project

Project/Area Number 17J01987
Research Category

Grant-in-Aid for JSPS Fellows

Allocation TypeSingle-year Grants
Section国内
Research Field Information security
Research InstitutionKyushu University

Principal Investigator

王 贇トウ  九州大学, 大学院数理学府, 特別研究員(DC2)

Project Period (FY) 2017-04-26 – 2019-03-31
Project Status Completed (Fiscal Year 2018)
Budget Amount *help
¥1,700,000 (Direct Cost: ¥1,700,000)
Fiscal Year 2018: ¥800,000 (Direct Cost: ¥800,000)
Fiscal Year 2017: ¥900,000 (Direct Cost: ¥900,000)
Keywords次世代暗号 / 安全性解析 / 暗号方式提案 / 世界記録 / アルゴリズムの改良 / 高速実装 / 格子ベース暗号 / 理論的安全性証明 / 格子暗号 / 簡約アルゴリズム / Learning With Errors / 次世代暗号標準化
Outline of Annual Research Achievements

本研究では,次世代公開鍵暗号方式として注目されている格子暗号の大規模解読実験による安全性の解析を行い,格子アルゴリズムの改良と格子暗号方式安全性評価に関する研究業績が挙げられる.まずは,報告者の改良した格子アルゴリズムLLLを用いて,格子暗号解読で最も使われている格子アルゴリズムBKZを高速実装で最大50%の時間短縮で改良した.本研究結果は査読付国際会議ACISP2018に採録された.また,格子暗号におけるLWEベース暗号を実用化するために,最適なパラメータの評価は最も重要な課題となっている.報告者は従来研究で提案したProgressive BKZアルゴリズムと埋込手法を用いて,LWE問題の理論的困難性を評価したと共に,実験的に“LWE Challenge”インスタンスまでの世界記録を達成した.本研究結果をまとめた論文が査読付国際会議ICICS2017に採録され,フルバーションが電子情報通信学会論文誌に受理された.また,LWE問題に対するhalf-twisted埋込と呼ばれる新しい解析手法を提案し,査読付国際会議IWSEC2018に採録され,最優秀学生論文賞を受賞した.さらに,報告者は海外研究者と共同研究して格子ベース鍵交換方式を提案した.2012年にアメリカの暗号研究者Dingらより世界初のLWEベース鍵交換方式を提案した.しかし,元の方式は安全性証明には不備があり,かつ最適なパラメータは選出できなかったため,実用には至ってない.報告者は本鍵交換方式の証明可能安全性を示し,実用的パラメータを選出した.本研究結果をまとめた論文が査読付国際会議ACNS 2019に採録された.その他,格子問題のGACDの困難性を評価した論文は査読付国際会議ICISCE2018に採録された.以上,報告者はDC2の研究計画通りに実行し,暗号業界に貢献できる優れた研究業績を残したと考えられる.

Research Progress Status

平成30年度が最終年度であるため、記入しない。

Strategy for Future Research Activity

平成30年度が最終年度であるため、記入しない。

Report

(2 results)
  • 2018 Annual Research Report
  • 2017 Annual Research Report
  • Research Products

    (26 results)

All 2019 2018 2017 Other

All Int'l Joint Research (8 results) Journal Article (1 results) (of which Peer Reviewed: 1 results,  Open Access: 1 results) Presentation (16 results) (of which Int'l Joint Research: 10 results) Remarks (1 results)

  • [Int'l Joint Research] University of Cincinnati(米国)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] 北京交通大学/南京理工大学(中国)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] Technical University of Darmstadt(ドイツ)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] Korean Institute for Advanced Study(韓国)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] シンシナティ大学(米国)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] 高等科学院(KIAS)(韓国)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] 北京交通大学(中国)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] ダルムシュタット工科大学(ドイツ)

    • Related Report
      2017 Annual Research Report
  • [Journal Article] Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator2018

    • Author(s)
      Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E101.A Issue: 12 Pages: 2162-2170

    • DOI

      10.1587/transfun.E101.A.2162

    • NAID

      130007539089

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2018-12-01
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Presentation] One Sample Ring-LWE with Rounding and its Application to Key Exchange2019

    • Author(s)
      Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang
    • Organizer
      Applied Cryptography and Network Security - 17th International Conference, ACNS 2019
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Experimental Analysis for Linear Algebraic Attack on a Variant of Indeterminate Equation Public-Key Cryptosystems2019

    • Author(s)
      Yasuhiko Ikematsu, Yuntao Wang, Koichiro Akiyama, Tsuyoshi Takagi
    • Organizer
      the 36th Symposium on Cryptography and Information Security, SCIS2019
    • Related Report
      2018 Annual Research Report
  • [Presentation] 不定方程式暗号のバリエーションに対する鍵復元攻撃に関する考察2019

    • Author(s)
      Koichiro Akiyama, Yasuhiko Ikematsu, Yuntao Wang, Tsuyoshi Takagi
    • Organizer
      the 36th Symposium on Cryptography and Information Security, SCIS2019
    • Related Report
      2018 Annual Research Report
  • [Presentation] 少ないサンプル数のLWE問題に対するKannanの埋め込み法の挙動評価2019

    • Author(s)
      Akito Inoue, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi
    • Organizer
      the 36th Symposium on Cryptography and Information Security, SCIS2019
    • Related Report
      2018 Annual Research Report
  • [Presentation] Recent Progress in Lattice-based Cryptography2019

    • Author(s)
      Yuntao Wang
    • Organizer
      The 11th Workshop among Asia Information Security Labs, WAIS2019
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Improving the BKZ Reduction Algorithm by Quick Reordering Technique2018

    • Author(s)
      Yuntao Wang, Tsuyoshi Takagi
    • Organizer
      Information Security and Privacy - 23rd Australasian Conference, ACISP 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem2018

    • Author(s)
      Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi
    • Organizer
      2018 5th International Conference on Information Science and Control Engineering (ICISCE)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques2018

    • Author(s)
      Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi
    • Organizer
      Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE2018

    • Author(s)
      Yuntao Wang, Thomas Wunderer
    • Organizer
      Information Security Practice and Experience - 14th International Conference, ISPEC 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Security Evaluation for Ding Key Exchange2018

    • Author(s)
      Yuntao Wang, Xinwei Gao, Jintai Ding and Tsuyoshi Takagi
    • Organizer
      the 35th Symposium on Cryptography and Information Security (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] Ding Key Exchange -- A Proposal to NIST PQC Competition2018

    • Author(s)
      Jintai Ding, Tsuyoshi Takagi, Xinwei Gao and Yuntao Wang
    • Organizer
      the 35th Symposium on Cryptography and Information Security (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] Security Evaluation of Lattice-based Cryptography based on Progressive BKZ2018

    • Author(s)
      Yuntao Wang
    • Organizer
      CREST・さきがけ数学関連領域合同シンポジウム
    • Related Report
      2017 Annual Research Report
  • [Presentation] Improving the BKZ Reduction Algorithm by Quick Reordering Technique2018

    • Author(s)
      Yuntao Wang and Tsuyoshi Takagi
    • Organizer
      23rd Australasian Conference on Information Security and Privacy (ACISP2018)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem2017

    • Author(s)
      Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi
    • Organizer
      the 2017 International Conference on Information and Communications Security (ICICS2017)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] The Beauty and the Beasts --The Hard Cases in LLL Reduction2017

    • Author(s)
      Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi and Yuntao Wang
    • Organizer
      the 12th International Workshop on Security (IWSEC 2017)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Symmetric Structures Derive Hard Cases in Lattice Reduction World2017

    • Author(s)
      Yuntao Wang
    • Organizer
      Forum Math-for-Industry 2017 (FMfI2017)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Remarks] 東京大学数理情報第1研究室 発表論文リスト

    • URL

      http://crypto.mist.i.u-tokyo.ac.jp/publications/index.html

    • Related Report
      2017 Annual Research Report

URL: 

Published: 2017-05-25   Modified: 2024-03-26  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi