• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Construction of secure communication theory needed for advanced IoT society based on multi-terminal information theory and cryptographic theory

Research Project

Project/Area Number 18H01438
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Review Section Basic Section 21020:Communication and network engineering-related
Research InstitutionThe University of Electro-Communications

Principal Investigator

Oohama Yasutada  電気通信大学, 大学院情報理工学研究科, 教授 (20243892)

Co-Investigator(Kenkyū-buntansha) SANTOSO BAGUS  電気通信大学, 大学院情報理工学研究科, 准教授 (40571956)
八木 秀樹  電気通信大学, 大学院情報理工学研究科, 准教授 (60409737)
渡辺 峻  東京農工大学, 工学(系)研究科(研究院), 准教授 (70546910)
Project Period (FY) 2018-04-01 – 2023-03-31
Project Status Completed (Fiscal Year 2022)
Budget Amount *help
¥11,180,000 (Direct Cost: ¥8,600,000、Indirect Cost: ¥2,580,000)
Fiscal Year 2022: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Fiscal Year 2021: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Fiscal Year 2020: ¥2,600,000 (Direct Cost: ¥2,000,000、Indirect Cost: ¥600,000)
Fiscal Year 2019: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Fiscal Year 2018: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
Keywords情報理論的安全性 / ハードウェア攻撃 / サイドチャネル攻撃 / 安全通信維持符号器 / 情報漏えい量 / 分散符号化 / 安全通信維持 / 秘密情報漏えい / 多端子仮説検定 / IoT環境下のセキュリティ秘 / 秘匿増強符号器 / 情報漏えい / 情報幾何学 / ユニバーサル符号 / IoT環境下のセキュリティ / ハードウエア攻撃 / IoT
Outline of Final Research Achievements

As a major research result, we have developed a general formulation of a theoretical model of hardware attacks. We also succeeded in giving necessary and sufficient conditions for secure communication for the problem formulated.
In the formulation, the problem was how to give a measure of safety. In this study, we solved this problem by introducing a practically meaningful scale. In addition, by clarifying the properties of the introduced security measures, we succeeded in deriving the necessary conditions for secure communication. We further obtained a concrete method of code construction keeping secure communication under hardware attacks.

Academic Significance and Societal Importance of the Research Achievements

研究成果は,IoT環境下において既存暗号系を変更せずに安全通信を維持する実装可能な具体的方法を提供する.具体的には,既存暗号暗号系に安全通信を維持する符号器を連結するものである.これは,非常に低コストで実現できるものであり,実用性が高い.IoT 社会の高度化に必要不可欠な安全通信維持技術を提供する点において,本研究の社会的貢献度は非常に高い.

Report

(6 results)
  • 2022 Annual Research Report   Final Research Report ( PDF )
  • 2021 Annual Research Report
  • 2020 Annual Research Report
  • 2019 Annual Research Report
  • 2018 Annual Research Report
  • Research Products

    (28 results)

All 2022 2021 2020 2019 2018

All Journal Article (28 results) (of which Int'l Joint Research: 6 results,  Peer Reviewed: 23 results,  Open Access: 5 results)

  • [Journal Article] Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources2022

    • Author(s)
      Vamoua Yachongka, Hideki Yagi, Yasutada Oohama
    • Journal Title

      Proceedings of IEEE International Symposium on Information Theory, ISIT 2022

      Pages: 2666-2671

    • DOI

      10.1109/isit50566.2022.9834725

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More2022

    • Author(s)
      Yasutada Oohama, Bagus Santoso
    • Journal Title

      IEEE International Symposium on Information Theory (ISIT) 2022

      Volume: ISIT Pages: 862-867

    • DOI

      10.1109/isit50566.2022.9834899

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] A Framework for Distributed Source Coding with Encryption: a New Strong Converse and More2022

    • Author(s)
      Yasutada Oohama, Bagus Santoso
    • Journal Title

      Proceedings of 2022 International Symposium on Information Theory and its Applications (ISITA2022)

    • Related Report
      2022 Annual Research Report
  • [Journal Article] 放送型共通伴暗号方式の枠組みと安全通信条件2022

    • Author(s)
      西山 和真, 大濱靖匡
    • Journal Title

      Proceedings of the 45th Symposium on Information Theory and its Applications (SITA2022)

    • Related Report
      2022 Annual Research Report
  • [Journal Article] Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels2021

    • Author(s)
      Yutaka JITSUMATSU, Ukyo MICHIWAKI, Yasutada OOHAMA
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E104.A Issue: 1 Pages: 295-304

    • DOI

      10.1587/transfun.2020EAP1017

    • NAID

      130007964830

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-01-01
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Biometric Identification Systems With Noisy Enrollment for Gaussian Source2021

    • Author(s)
      Vamoua Yachongka, Hideki Yagi, Yasutada Oohama
    • Journal Title

      Proceedings of 2020 IEEE Information Theory Workshop (ITW)

      Pages: 1-5

    • DOI

      10.1109/itw46852.2021.9457680

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Biometric identification systems with noisy enrollment for Gaussian sources and channels2021

    • Author(s)
      Vamoua Yachongka, Hideki Yagi, Yasutada Oohama
    • Journal Title

      Entropy

      Volume: 23, No. 8 (1049) Issue: 8 Pages: 1-26

    • DOI

      10.3390/e23081049

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Strong Converse for Distributed Source Coding with Encryption Using Correlated Keys2021

    • Author(s)
      Yasutada Oohama, Bagus Santoso
    • Journal Title

      2021 IEEE Information Theory Workshop (ITW)

      Volume: IEEE 2021 Pages: 1-6

    • DOI

      10.1109/itw48936.2021.9611414

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Converse Coding Theorem for the Distributed Hypothesis Testing2021

    • Author(s)
      Yasutada Oohama
    • Journal Title

      Proceedings of the 44th Symposium on Information Theory and its Applications (SITA2021)

      Pages: 298-303

    • Related Report
      2021 Annual Research Report
  • [Journal Article] リード・ソロモン符号を用いた放送型共通鍵暗号方式における秘匿増幅と安全性 解析2021

    • Author(s)
      西山 和真, 大濱 靖匡
    • Journal Title

      Proceedings of the 44th Symposium on Information Theory and its Applications (SITA2021)

      Pages: 226-231

    • Related Report
      2021 Annual Research Report
  • [Journal Article] 放送型共通伴暗号方式における安全通信と盗聴通信路2021

    • Author(s)
      西山 和真, 大濱 靖匡
    • Journal Title

      Proceedings of the 44th Symposium on Information Theory and its Applications (SITA2021)

      Pages: 221-225

    • Related Report
      2021 Annual Research Report
  • [Journal Article] Performance Analysis of the Interval Algorithm for Random Number Generation in the Case of Markov Coin Tossing2020

    • Author(s)
      Yasutada Oohama
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E103.A Issue: 12 Pages: 1325-1336

    • DOI

      10.1587/transfun.2020TAP0008

    • NAID

      130007948296

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2020-12-01
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Strong Converse for the State Dependent Channel2020

    • Author(s)
      Yasutada Oohama
    • Journal Title

      Proceedings of 2020 IEEE International Symposium on Information Theory (ISIT)

      Pages: 2126-2130

    • DOI

      10.1109/isit44484.2020.9174479

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Exponent Function for the Gel’fand-Pinsker Channel at Rates above the Capacity2020

    • Author(s)
      Yasutada Oohama
    • Journal Title

      Proceedings of 2020 International Symposium on Information Theory and Its Applications (ISITA)

      Pages: 36-40

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels2020

    • Author(s)
      Jitsumatsu Yutaka、Oohama Yasutada
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 66 Issue: 3 Pages: 1585-1606

    • DOI

      10.1109/tit.2019.2950678

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks2019

    • Author(s)
      Bagus Santoso, Yasutada Oohama, Chunhua Su
    • Journal Title

      International Conference on Network and System Security

      Volume: 11928 Pages: 3-17

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Capacity Results for Discrete Memoryless Channels in the Finite Blocklength Regime2019

    • Author(s)
      Yasutada Oohama
    • Journal Title

      Proceedings of 2019 IEEE Information Theory Workshop (ITW)

      Volume: - Pages: 1-5

    • DOI

      10.1109/itw44776.2019.8989294

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †2019

    • Author(s)
      Bagus Santoso, Yasutada Oohama
    • Journal Title

      Entropy

      Volume: 21 Issue: 8 Pages: 781-781

    • DOI

      10.3390/e21080781

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †2019

    • Author(s)
      Bagus Santoso, Yasutada Oohama
    • Journal Title

      Entropy

      Volume: 21 Issue: 5 Pages: 469-469

    • DOI

      10.3390/e21050469

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] An Inequality Useful for Proofs of Strong Converse Theorems in Network Information Theory2019

    • Author(s)
      Yasutada Oohama
    • Journal Title

      Proceedings of 2019 IEEE International Symposium on Information Theory (ISIT)

      Volume: 10.1109/ISIT.2019.8849849 Pages: 2883-2887

    • DOI

      10.1109/isit.2019.8849644

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks2019

    • Author(s)
      Bagus Santoso, Yasutada Oohama
    • Journal Title

      Proceedings of 2019 IEEE International Symposium on Information Theory (ISIT)

      Volume: - Pages: 305-309

    • DOI

      10.1109/isit.2019.8849849

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Exponential strong converse for one helper source coding problem2019

    • Author(s)
      Yasutada Oohama
    • Journal Title

      Entropy

      Volume: 21 Issue: 6 Pages: 567-567

    • DOI

      10.3390/e21060567

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Direct Link between Renyi-Tsallis Entropy and Holder's Inequality -Yet Another Proof of Renyi-Tsallis Entropy Maximization2019

    • Author(s)
      Hisa-Aki Tanaka, Masaki Nakagawa, Yasutada Oohama
    • Journal Title

      Entropy

      Volume: 21 Issue: 6 Pages: 549-549

    • DOI

      10.3390/e21060549

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Equivalence of Two Exponent Functions for Discrete Memoryless Channels with Input Cost at Rates above the Capacity2018

    • Author(s)
      Yasutada Oohama
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E101.A Issue: 12 Pages: 2199-2204

    • DOI

      10.1587/transfun.E101.A.2199

    • NAID

      130007538994

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2018-12-01
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On a Relationship between the Correct Probability of Estimation from Correlated Data and Mutual Information2018

    • Author(s)
      Yasutada Oohama
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E101.A Issue: 12 Pages: 2205-2209

    • DOI

      10.1587/transfun.E101.A.2205

    • NAID

      130007538999

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2018-12-01
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Exponential Strong Converse for Source Coding with Side Information at the Decoder2018

    • Author(s)
      Yasutada Oohama
    • Journal Title

      Entropy

      Volume: 20 Issue: 5 Pages: 352-352

    • DOI

      10.3390/e20050352

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Post Encryption Compression with Affine Encoders for Secrecy Amplification in Distributed Source Encryption with Correlated Keys2018

    • Author(s)
      Bagus Santoso and Yasutada Oohama
    • Journal Title

      International Symposium on Information Theory and Its Applications, ISITA 2018

      Volume: - Pages: 737-741

    • DOI

      10.23919/isita.2018.8664297

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System2018

    • Author(s)
      Yasutada Oohama and Bagus Santoso
    • Journal Title

      2018 IEEE International Symposium on Information Theory, ISIT 2018, Vail, CO, USA, June 17-22, 2018

      Volume: - Pages: 581-585

    • DOI

      10.1109/isit.2018.8437666

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research

URL: 

Published: 2018-04-23   Modified: 2024-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi