• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of universally composable long term signatures

Research Project

Project/Area Number 18700009
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Fundamental theory of informatics
Research InstitutionOsaka University

Principal Investigator

YOSHIDA Maki  Osaka University, 大学院・情報科学研究科, 助教 (50335387)

Project Period (FY) 2006 – 2008
Project Status Completed (Fiscal Year 2008)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥240,000)
Fiscal Year 2008: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2007: ¥1,200,000 (Direct Cost: ¥1,200,000)
Fiscal Year 2006: ¥1,400,000 (Direct Cost: ¥1,400,000)
Keywords電子文書 / 真正性 / 長期署名 / 汎用的結合 / セキュリティ / 安全性 / 汎用的結合可能
Research Abstract

電子文書の改ざんを防止し真正性を保つためのセキュリティ技術である長期署名について,まず既存方式とその要素技術が保証する安全性を評価し,問題点を指摘した.その上で,安全性を適切に定式化し,定式化した安全性を満たす方式を提案した.さらに,安全性の形式的検証法を提案し,その主要部分を実装し,実用性と有効性を評価した.

Report

(4 results)
  • 2008 Annual Research Report   Final Research Report ( PDF )
  • 2007 Annual Research Report
  • 2006 Annual Research Report
  • Research Products

    (49 results)

All 2009 2008 2007 2006

All Journal Article (36 results) (of which Peer Reviewed: 18 results) Presentation (13 results)

  • [Journal Article] Flexible Timed-release Encryption2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E92-A, No.1

      Pages: 222-225

    • NAID

      10026855139

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Flexible Timed-release Encryption2009

    • Author(s)
      Maki Yoshida, Torn Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E92-A, No.1

      Pages: 222-225

    • NAID

      10026855139

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Anonymous Fingerprinting for Predelivery of Contents2008

    • Author(s)
      Kazuhiro Haramura, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the 11th International Conference on Information Security and Cryptography (ICISC2008) LNCS 5461

      Pages: 134-151

    • NAID

      110006534097

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval2008

    • Author(s)
      Mohamed Layouni, Maki Yoshida, and Shingo Okamura
    • Journal Title

      Proceedings of the 10th International Conference on Information and Communications Security (ICICS2008) LNCS 5308

      Pages: 387-402

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Expiration-dated Fingerprinting2008

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP 2008

      Pages: 147-150

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Global Timed-release Encryption2008

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      to appear in Proceedings of the 26th International Conference on Consumer Electronics 2008 ICCE2008

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] 画素空間へのパッチワーク法と相関型電子透かし法の検出誤り確率の比較2008

    • Author(s)
      北村至, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会論文誌(D) Vol.J91-D, No.11

      Pages: 2605-2615

    • NAID

      110007380937

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Expiration-dated Fingerprinting2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing

      Pages: 147-150

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Multi-Authorizer Accredited Symmetrically Private In formation Retrieval2008

    • Author(s)
      Mohamed Layouni, Maki Yoshida, Shingo Okamura
    • Journal Title

      Proceedings of the 10th International Conference on Information and Communications Security (LNCS) 5308

      Pages: 387-402

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Anonymous Fingerprinting for Predelivery of Contents2008

    • Author(s)
      Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 11th International Conference on Information Security and Cryptography (LNCS) (To appear)

    • NAID

      110006534097

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Optimum General Threshold Secret Sharing2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara, Marc Fossorier
    • Journal Title

      Proceedings of the the 31th Symposium on In formation Theory and Its Applications (CD-ROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 画素空間への加法電子透かしに対する最適な抽出法の再設計とパッチワーク法との性能比較2008

    • Author(s)
      北村至, 大北和也, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会マルチメディア情報ハイディング研究会第5回研究会資料

      Pages: 59-64

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 統計的フラジャイル電子透かし法に関する改ざん位置特定性能の改善2008

    • Author(s)
      大北和也, 北村至, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 1D1-4(CD-ROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] DWT係数に対する加法電子透かし法とパッチワーク法の性能比較2008

    • Author(s)
      北村至, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 1D1-5(CD-ROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] コンテンツ事前配信における不正配布抑止力の強い匿名フィンガープリンティング2008

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 1D2-3(CD-ROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 相互認証の汎用的結合可能な安全性の解析のための形式的手法2008

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 4C2-4(CD-ROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 利便性の高いコンテンツ事前配信のための匿名フィンガープリンティング2008

    • Author(s)
      原村 和裕, 吉田 真紀, 藤原 融
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム予稿集 1D1-4

      Pages: 18-18

    • Related Report
      2007 Annual Research Report
  • [Journal Article] 画素空間への加法電子透かしに対する最適検出の再考2008

    • Author(s)
      木村 至, 吉田 真紀, 藤原 融
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム予稿集 2F3-4

      Pages: 149-149

    • Related Report
      2007 Annual Research Report
  • [Journal Article] A New Scheme for Optimum Decoding of Additive Watermarks in Spatial Domain2007

    • Author(s)
      Maki Yoshida, Itaru Kitamura, and Toru Fujiwara
    • Journal Title

      to appear in Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP2007

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Secure Construction for the Nonlinear Function Threshold Ramp Secret Sharing Scheme2007

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Proceedings of the 2007 IEEE International Symposium on Information Theory ISIT2007

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Private and Consistent Data Retrieval Scheme with Log-Squared Communication2007

    • Author(s)
      Satoshi Nakayama, Maki Yoshida, Shingo Okamura, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E90-A, No.1

      Pages: 204-215

    • NAID

      110007519088

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain2007

    • Author(s)
      Takaaki Fujita, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E90-A, No.1

      Pages: 216-225

    • NAID

      110007519089

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Effciency Analysis of the Nonlinear Function Ramp Secret Sharing Schemes2007

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 2007 Hawaii and SITA Joint Conference on Information Theory

      Pages: 119-124

    • Related Report
      2007 Annual Research Report
  • [Journal Article] Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing2007

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 2007 IEEE International Symposium on Information Theory

      Pages: 78-78

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Scheme for Optimum Decoding of additive Watermarks Embedded in Spatial Domain2007

    • Author(s)
      Maki Yoshida, Itaru Kitamura, Toru Fujiwara
    • Journal Title

      Proceedings of the Third International Conference on Interlligent Information Hiding and Multimedia Signal Processing Vol.II

      Pages: 16-19

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] コンテンツ事前配信のための匿名フィンガープリンティング2007

    • Author(s)
      原村 和裕, 吉田 真紀, 藤原 融
    • Journal Title

      電子情報通信学会技術研究報告 Vol.107,No.345

      Pages: 23-30

    • NAID

      110006534097

    • Related Report
      2007 Annual Research Report
  • [Journal Article] A Private and Consistent Data Retrieval Scheme with Log-Squared Communication2007

    • Author(s)
      Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E90 No.1

      Pages: 204-215

    • NAID

      110007519088

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain2007

    • Author(s)
      Takaaki Fujita, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E90 No.1

      Pages: 216-225

    • NAID

      110007519089

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 画素空間への加法電子透かしにおける秘密鍵の利用法による検出誤り確率への影響2007

    • Author(s)
      北村 至, 吉田 真紀, 藤原 融
    • Journal Title

      2007年暗号と情報セキュリティシンポジウム予稿集

      Pages: 189-189

    • Related Report
      2006 Annual Research Report
  • [Journal Article] C2Cコンテンツ配信仲介サービスのための協調型非対称フィンガープリンティング2007

    • Author(s)
      浅野 順也, 岡村 真吾, 吉田 真紀, 藤原 融
    • Journal Title

      2007年暗号と情報セキュリティシンポジウム予稿集

      Pages: 37-37

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Towards Secure C2C Contents Distribution Services2006

    • Author(s)
      Junya Asano, Shingo Okamura, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the 1st Joint Workshop on Information Security JWIS2006

      Pages: 347-360

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] On the Security of Tag-KEM for Signcryption2006

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Proceedings of the 2nd Workshop on Cryptography for Ad hoc Networks (WCAN'06), Electronic Notes in Theoretical Computer Science 171 No.1

      Pages: 83-91

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] On the Security of Tag-KEM for Signcryption2006

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      2nd Workshop on Cryptography for Ad hoc Networks

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Towards Secure C2C Contents Distribution Services2006

    • Author(s)
      Junya Asano, Shingo Okamura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      The 1st Joint Workshop on Information Security

      Pages: 347-360

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain2006

    • Author(s)
      Maki Yoshida, Takaaki Fujita, Toru Fujiwara
    • Journal Title

      IEEE 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing

      Pages: 101-104

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Authenticated Key Encapsulation Using Signatures2006

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 2006 Hawaii, IEICE and SITA Joint Conference on Information Theory, Nara; also included in IEICE Technical Report Vol.106,No-59

      Pages: 23-28

    • NAID

      110004741466

    • Related Report
      2006 Annual Research Report
  • [Presentation] 汎用的結合可能な鍵交換の安全性検証法2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年春の研究部会連合発表会,数理的技法による情報セキュリティ(FAIS)
    • Place of Presentation
      京都
    • Year and Date
      2009-03-07
    • Related Report
      2008 Annual Research Report
  • [Presentation] 暗号プロトコルに対する公理的安全性検証法の主要処理の改良と実装2009

    • Author(s)
      鎌野善樹, 鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年春の研究部会連合発表会,数理的技法による情報セキュリティ(FAIS)
    • Place of Presentation
      京都
    • Year and Date
      2009-03-07
    • Related Report
      2008 Annual Research Report
  • [Presentation] 汎用的結合可能な鍵交換の安全性検証法2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009 年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS)
    • Related Report
      2008 Final Research Report
  • [Presentation] 暗号プロトコルに対する公理的安全性検証法の主要処理の改良と実装2009

    • Author(s)
      鎌野善樹, 鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS)
    • Related Report
      2008 Final Research Report
  • [Presentation] 相互認証の汎用的結合可能な安全性の解析のための形式的手法2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2009年暗号と情報セキュリティシンポジウム予稿集
    • Related Report
      2008 Final Research Report
  • [Presentation] コンテンツ事前配信における不正配布抑止力の強い匿名フィンガープリンティング2009

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Organizer
      2009 年暗号と情報セキュリティシンポジウム予稿集
    • Related Report
      2008 Final Research Report
  • [Presentation] Global Timed-release Encryption2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      The 26th IEEE International Conference on Consumer Electronics
    • Place of Presentation
      LAS,US
    • Year and Date
      2008-01-11
    • Related Report
      2007 Annual Research Report
  • [Presentation] Optimum General Threshold Secret Sharing2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara, and Marc Fossorier
    • Organizer
      Proceedings of the 31th Symposium on Information Theory and Its Applications (SITA2008)
    • Related Report
      2008 Final Research Report
  • [Presentation] カルテ情報自己管理のための墨塗り署名2008

    • Author(s)
      冨士由奈, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会2008年総合大会
    • Related Report
      2008 Final Research Report
  • [Presentation] 利便性の高いコンテンツ事前配信のための匿名フィンガープリンティング2008

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Organizer
      2008年暗号と情報セキュリティシンポジウム予稿集
    • Related Report
      2008 Final Research Report
  • [Presentation] コンテンツ事前配信のための匿名フィンガープリンティング2007

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会技術研究報告(ISEC2007-92)
    • Related Report
      2008 Final Research Report
  • [Presentation] Efficiency Analysis of the Nonlinear Function Ramp Secret Sharing Schemes2007

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Organizer
      Proceedings of the 2007 Hawaii and SITA Joint Conference on Information Theory (HISC'07)
    • Place of Presentation
      Honolulu, Hawaii
    • Related Report
      2008 Final Research Report
  • [Presentation] C2Cコンテンツ配信仲介サービスのための協調型非対称フィンガープリンティング2007

    • Author(s)
      浅野順也, 岡村真吾, 吉田真紀, 藤原融
    • Organizer
      2007年暗号と情報セキュリティシンポジウム予稿集
    • Related Report
      2008 Final Research Report

URL: 

Published: 2006-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi