• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Security Analysis of Post-Quantum Cryptography

Research Project

Project/Area Number 17K00185
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionThe University of Tokyo

Principal Investigator

Tsuyoshi Takagi  東京大学, 大学院情報理工学系研究科, 教授 (60404802)

Co-Investigator(Kenkyū-buntansha) 安田 雅哉  立教大学, 理学部, 准教授 (30536313)
Project Period (FY) 2017-04-01 – 2021-03-31
Project Status Completed (Fiscal Year 2020)
Budget Amount *help
¥4,550,000 (Direct Cost: ¥3,500,000、Indirect Cost: ¥1,050,000)
Fiscal Year 2019: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2018: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2017: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
Keywords暗号・認証等 / 公開鍵暗号 / ポスト量子暗号 / 格子暗号
Outline of Final Research Achievements

In this research project, we conducted research on the derivation of secure cryptographic parameters for the standardization of post-quantum cryptography (PQC). In particular, we evaluated the difficulty of the Learning with Errors (LWE) problem, which is the basis of the security of lattice-based cryptography, and we achieved a world record for solving the 70-dimensional LWE problem in 32.7 CPU hours in the LWE challenge hosted by Darmstadt University of Technology. We also constructed an efficient key exchange scheme based on the difficulty of the ring-LWE problem and proposed cryptographic parameters to achieve the security level of the NIST PQC standardization project. Furthermore, the security of various attack methods against lattice-based cryptography (modulus switching attack, key reuse attack, etc.) was evaluated.

Academic Significance and Societal Importance of the Research Achievements

本研究課題では、格子暗号に対して堅牢な計算量評価と実計算環境による大規模解読実験を行い、攻撃法の現実的なfeasibilityを評価することにより、128ビット安全性を有する具体的な暗号パラメータの導出を行った。本研究課題により、ポスト量子暗号の安全性検証法を深化させ、その安全な暗号パラメータの選定に貢献できるため学術的かつ実用的な波及効果は大きい。

Report

(5 results)
  • 2020 Annual Research Report   Final Research Report ( PDF )
  • 2019 Research-status Report
  • 2018 Research-status Report
  • 2017 Research-status Report
  • Research Products

    (38 results)

All 2021 2020 2019 2018 2017 Other

All Int'l Joint Research (5 results) Journal Article (17 results) (of which Int'l Joint Research: 6 results,  Peer Reviewed: 16 results,  Open Access: 16 results) Presentation (14 results) (of which Int'l Joint Research: 2 results,  Invited: 4 results) Book (1 results) Remarks (1 results)

  • [Int'l Joint Research] Beijing Jiaotong University/China University of Geosciences(中国)

    • Related Report
      2019 Research-status Report
  • [Int'l Joint Research] University of Cincinnati(米国)

    • Related Report
      2019 Research-status Report
  • [Int'l Joint Research] Nanjing Univ Sci &Tech(中国)

    • Related Report
      2018 Research-status Report
  • [Int'l Joint Research] University of Cincinnati(米国)

    • Related Report
      2017 Research-status Report
  • [Int'l Joint Research] Institute for Infocomm Research(Singapore)

    • Related Report
      2017 Research-status Report
  • [Journal Article] Studying Lattice Reduction Algorithms Improved by Quick Reordering Technique2021

    • Author(s)
      Yuntao Wang, Tsuyoshi Takagi
    • Journal Title

      International Journal of Information Security

      Volume: 20 Issue: 2 Pages: 257-268

    • DOI

      10.1007/s10207-020-00501-y

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Memory-Constrained Implementation of Lattice-based Encryption Scheme on Standard Java Card Platform2021

    • Author(s)
      Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
    • Journal Title

      IET Information Security

      Volume: -

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Improving Key Mismatch Attack on NewHope with Fewer Queries2020

    • Author(s)
      Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi
    • Journal Title

      Information Security and Privacy (ACISP 2020)

      Volume: LNCS 12248 Pages: 505-524

    • DOI

      10.1007/978-3-030-55304-3_26

    • ISBN
      9783030553036, 9783030553043
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Impact of the modulus switching technique on some attacks against learning problems2020

    • Author(s)
      Le Huy Quoc, Mishra Pradeep Kumar, Nakamura Satoshi, Kinjo Koha, Duong Dung Hoang, Yasuda Masaya
    • Journal Title

      IET Information Security

      Volume: Vol.14 Issue: 3 Pages: 286-303

    • DOI

      10.1049/iet-ifs.2019.0220

    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest Vectors2019

    • Author(s)
      Kotaro Matsuda, Atsushi Takayasu, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E102.A Issue: 9 Pages: 1091-1100

    • DOI

      10.1587/transfun.E102.A.1091

    • NAID

      130007699564

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2019-09-01
    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Security Analysis of Public Key Encryption via Lattice Reduction Algorithms2019

    • Author(s)
      高安 敦, 高木 剛
    • Journal Title

      Bulletin of the Japan Society for Industrial and Applied Mathematics

      Volume: 29 Issue: 1 Pages: 12-19

    • DOI

      10.11540/bjsiam.29.1_12

    • NAID

      130007670555

    • ISSN
      2432-1982
    • Year and Date
      2019-03-26
    • Related Report
      2019 Research-status Report
    • Open Access
  • [Journal Article] One Sample Ring-LWE with Rounding and its Application to Key Exchange2019

    • Author(s)
      Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang
    • Journal Title

      17th International Conference on Applied Cryptography and Network Security

      Volume: LNCS 11464 Pages: 323-343

    • DOI

      10.1007/978-3-030-21568-2_16

    • ISBN
      9783030215675, 9783030215682
    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era2019

    • Author(s)
      Chi Cheng, Yue Qin, Rongxing Lu, Tao Jiang, Tsuyoshi Takagi
    • Journal Title

      IEEE Transactions on Smart Grid

      Volume: Vol.10 Issue: 6 Pages: 6386-6395

    • DOI

      10.1109/tsg.2019.2903836

    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths2019

    • Author(s)
      Yasuda Masaya, Yamaguchi Junpei
    • Journal Title

      Designs, Codes and Cryptography

      Volume: Vol.87 Issue: 11 Pages: 2489-2505

    • DOI

      10.1007/s10623-019-00634-9

    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator2018

    • Author(s)
      Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E101.A Issue: 12 Pages: 2162-2170

    • DOI

      10.1587/transfun.E101.A.2162

    • NAID

      130007539089

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2018-12-01
    • Related Report
      2018 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem2018

    • Author(s)
      Xiaoling Yu, Yuntao Wang, Chungen, Tsuyoshi Takagi
    • Journal Title

      5th International Conference on Information Science and Control Engineering

      Volume: ICISCE 2018 Pages: 533-537

    • DOI

      10.1109/icisce.2018.00117

    • Related Report
      2018 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Improving the BKZ Reduction Algorithm by Quick Reordering Technique2018

    • Author(s)
      Wang Yuntao, Takagi Tsuyoshi
    • Journal Title

      23rd Australasian Conference on Information Security and Privacy

      Volume: LNCS 10946 Pages: 7871-795

    • DOI

      10.1007/978-3-319-93638-3_47

    • ISBN
      9783319936376, 9783319936383
    • Related Report
      2018 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms2018

    • Author(s)
      Yuan Ye, Xiao Junting, Fukushima Kazuhide, Kiyomoto Shinsaku, Takagi Tsuyoshi
    • Journal Title

      Security and Communication Networks

      Volume: 2018 Pages: 1-14

    • DOI

      10.1155/2018/9846168

    • Related Report
      2018 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Recent Developments in Post-Quantum Cryptography2018

    • Author(s)
      Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E101.A Issue: 1 Pages: 3-11

    • DOI

      10.1587/transfun.E101.A.3

    • NAID

      130006300896

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem2018

    • Author(s)
      Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi
    • Journal Title

      19th International Conference on Information and Communications Security, ICICS 2017

      Volume: LNCS 10631

    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] An Experimental Study of the BDD Approach for the Search LWE Problem2017

    • Author(s)
      Rui Xu, Yeo Sze Ling, Kazuhide Fukushima, Tsuyoshi Takagi, Seo Hwajung, Shinsaku Kiyomoto, Henricksen Matt
    • Journal Title

      The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017

      Volume: LNCS 10355 Pages: 253-272

    • DOI

      10.1007/978-3-319-61204-1_13

    • ISBN
      9783319612034, 9783319612041
    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] The Beauty and the Beasts - The Hard Cases in LLL Reduction2017

    • Author(s)
      Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang
    • Journal Title

      12th International Workshop on Security, IWSEC 2017

      Volume: LNCS 10418 Pages: 19-35

    • DOI

      10.1007/978-3-319-64200-0_2

    • ISBN
      9783319641997, 9783319642000
    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Presentation] LWR問題に対するBai-Galbraith埋込法の格子に現れる最短ベクトル2021

    • Author(s)
      上村周作, 福島和英, 清本晋作, 工藤桃成, 高木剛
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS 2021)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 格子暗号SABERに対する鍵不一致攻撃2021

    • Author(s)
      大住友輝, 上村周作, 工藤桃成, 高木剛
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS 2021)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 耐量子計算機暗号の最新動向2021

    • Author(s)
      高木 剛
    • Organizer
      NICTサイバーセキュリティシンポジウム2021
    • Related Report
      2020 Annual Research Report
    • Invited
  • [Presentation] ユニモジュラ行列による格子基底のランダム化について2020

    • Author(s)
      青木大地, 福島和英, 清本晋作, 高木剛
    • Organizer
      2020年暗号と情報セキュリティシンポジウム (SCIS2020)
    • Related Report
      2019 Research-status Report
  • [Presentation] 格子暗号NewHopeに対する鍵不一致攻撃の改良2020

    • Author(s)
      岡田怜士, 王イントウ, 高木剛
    • Organizer
      2020年暗号と情報セキュリティシンポジウム (SCIS2020)
    • Related Report
      2019 Research-status Report
  • [Presentation] Computational Challenge Problems in Post-Quantum Cryptography2019

    • Author(s)
      Tsuyoshi Takagi
    • Organizer
      The Tenth International Conference on Post-Quantum Cryptography Chongqing University
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] Parallel Implementation and Comparison of Lattice-based Digital Signature Schemes using JavaScript2019

    • Author(s)
      Junting Xiao, Ye Yuan, Tsuyoshi Takagi
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] 少ないサンプル数のLWE問題に対するkannanの埋め込み法の挙動評価2019

    • Author(s)
      井上晶登, 王イントウ, 高安敦, 高木剛
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] SubSieveを用いた最短ベクトル問題の求解実験2019

    • Author(s)
      青木大地, 福島和英, 清本晋作, 高木剛
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] 量子コンピュータの時代に安全な次世代暗号の標準化動向2019

    • Author(s)
      高木剛
    • Organizer
      Security Days Spring 2019 Tokyo
    • Related Report
      2018 Research-status Report
    • Invited
  • [Presentation] Recent Developments in Post-Quantum Cryptography2018

    • Author(s)
      Tsuyoshi Takagi
    • Organizer
      22nd Workshop on Elliptic Curve Cryptography (ECC 2018)
    • Related Report
      2018 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] モンゴメリリダクションの改良によるNTTの高速化2018

    • Author(s)
      井上晶登, 齋藤恆和, 金城皓羽, 高木剛
    • Organizer
      2018年暗号と情報セキュリティシンポジウム, SCIS2018
    • Related Report
      2017 Research-status Report
  • [Presentation] Portable implementation of post-quantum encryption schemes and key exchange protocols on JavaScript-enabled platforms2018

    • Author(s)
      Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi", SCIS2018, 3A4-4, 2018.
    • Organizer
      2018年暗号と情報セキュリティシンポジウム, SCIS2018
    • Related Report
      2017 Research-status Report
  • [Presentation] Efficient Implementation of discrete Gaussian sampling for Lattice-based Cryptography using JavaScript2017

    • Author(s)
      Junting Xiao, Ye Yuan,Kazuhide Fukushima,Shinsaku Kiyomoto, Tsuyoshi Takagi
    • Organizer
      コンピュータセキュリティシンポジウム, CSS2017
    • Related Report
      2017 Research-status Report
  • [Book] 暗号と量子コンピュータ ―耐量子計算機暗号入門―2019

    • Author(s)
      高木 剛
    • Total Pages
      232
    • Publisher
      オーム社
    • ISBN
      9784274224102
    • Related Report
      2019 Research-status Report
  • [Remarks] 東京大学大学院情報理工学系研究科数理情報学専攻数理情報第1研究室

    • URL

      http://crypto.mist.i.u-tokyo.ac.jp/

    • Related Report
      2020 Annual Research Report 2019 Research-status Report 2018 Research-status Report 2017 Research-status Report

URL: 

Published: 2017-04-28   Modified: 2022-02-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi