• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Searchable Symmetric Encryption for a Long Term Use

Research Project

Project/Area Number 18K11293
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Review Section Basic Section 60070:Information security-related
Research InstitutionThe University of Electro-Communications

Principal Investigator

Ohta Kazuo  電気通信大学, 大学院情報理工学研究科, 特任教授 (80333491)

Co-Investigator(Kenkyū-buntansha) 岩本 貢  電気通信大学, 大学院情報理工学研究科, 教授 (50377016)
渡邉 洋平  電気通信大学, 大学院情報理工学研究科, 助教 (40792263)
Project Period (FY) 2018-04-01 – 2023-03-31
Project Status Completed (Fiscal Year 2022)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2021: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2020: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2019: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2018: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Keywords検索可能暗号 / 動的検索可能暗号 / (強)フォワード安全性 / バックワード安全性 / フォワード安全性 / 暗号 / プライバシィ / 共通鍵暗号 / 秘匿検索
Outline of Final Research Achievements

Searchable encryption is a technology that entrusts encrypted database to the cloud and performs keyword searches while the data is encrypted without leaking the private information. In this research, we examine the update functionality of the database where pairs of documents and keywords are kept securely and efficiently using symmetric key encryption.
A patent application has been filed for a single-user type dynamic searchable encryption (DSSE) that can update the database in the server at anytime.
On the other hand, after scrutinizing representative paper (Currtmola et al. 2003), we pointed out that infinite loops may occur in SSE-1 when searches are performed under unexpected conditions, and that a subtle information that is not allowed by an improved security definition is leaked in SSE-2. So we formulated a strong forward security. The method for solving the point-outed problems and the DSSE method for which the patent application was filed have been integrated into a full paper.

Academic Significance and Societal Importance of the Research Achievements

検索可能暗号(SSE)はクラウドに機微な情報を預託しつつ検索可能とするプライバシ保証技術である。共通鍵暗号ベースの検索方式が高速で暗号化と検索が可能なので早期に普及すると想定して研究とした。
申請時に文書の集まりとキーワードの集まりの世代更新機能を課題としたが、任意のタイミングでファイル・キーワードをサーバに登録可能な動的方式(DSSE)が研究の主流となり、その流れに従い研究成果を特許取得した。世代更新の課題は解決できた。
DSSEの有力方式について安全性証明の欠陥を指摘し、その方式を基にDSSE方式を提案して国際会議で発表した。また、SSEの代表的論文の問題を指摘し解決する方式を論文にした。

Report

(6 results)
  • 2022 Annual Research Report   Final Research Report ( PDF )
  • 2021 Research-status Report
  • 2020 Research-status Report
  • 2019 Research-status Report
  • 2018 Research-status Report
  • Research Products

    (44 results)

All 2023 2022 2021 2020 2019 2018

All Journal Article (17 results) (of which Int'l Joint Research: 2 results,  Peer Reviewed: 16 results,  Open Access: 6 results) Presentation (22 results) (of which Int'l Joint Research: 3 results,  Invited: 5 results) Book (4 results) Patent(Industrial Property Rights) (1 results)

  • [Journal Article] Lightweight Authentication Using Noisy Key Derived from?Physically Unclonable Function2023

    • Author(s)
      Komano Yuichi、Iwamoto Mitsugu、Ohta Kazuo、Sakiyama Kazuo
    • Journal Title

      Lecture Notes in Computer Science, Springer,

      Volume: 13809 Pages: 203-221

    • DOI

      10.1007/978-3-031-32636-3_12

    • ISBN
      9783031326356, 9783031326363
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] How to Make a Secure Index for Searchable Symmetric Encryption, Revisited2022

    • Author(s)
      WATANABE Yohei、NAKAI Takeshi、OHARA Kazuma、NOJIMA Takuya、LIU Yexuan、IWAMOTO Mitsugu、OHTA Kazuo
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E105.A Issue: 12 Pages: 1559-1577

    • DOI

      10.1587/transfun.2021EAP1163

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2022-12-01
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage2022

    • Author(s)
      Y. Watanabe, K. Ohara, M. Iwamoto, and K. Ohta
    • Journal Title

      ACM CODASPY 2022

      Volume: - Pages: 312-323

    • DOI

      10.1145/3508398.3511521

    • Related Report
      2022 Annual Research Report 2021 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption2022

    • Author(s)
      K. Emura, R. Ito, S. Kanamori, R. Nojima, and Y. Watanabe
    • Journal Title

      ICEIS 2022

      Volume: - Pages: 312-323

    • DOI

      10.5220/0011045200003179

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations2022

    • Author(s)
      Nakai Takeshi、Shirouchi Satoshi、Tokushige Yuuki、Iwamoto Mitsugu、Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 40 Issue: 1 Pages: 95-113

    • DOI

      10.1007/s00354-022-00153-7

    • Related Report
      2021 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers2021

    • Author(s)
      K. Takemure, Y. Sakai, B. Santoso, G. Hanaoka, K. Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E104.A Issue: 9 Pages: 1188-1205

    • DOI

      10.1587/transfun.2020DMP0023

    • NAID

      130008081795

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-09-01
    • Related Report
      2021 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] How to Solve Millionaires’ Problem with Two Kinds of Cards2021

    • Author(s)
      Nakai Takeshi、Misawa Yuto、Tokushige Yuuki、Iwamoto Mitsugu、Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 39 Issue: 1 Pages: 98-105

    • DOI

      10.1007/s00354-020-00118-8

    • Related Report
      2021 Research-status Report 2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More2021

    • Author(s)
      Atsushi Takayasu and Yohei Watanabe
    • Journal Title

      Theoretical Computer Science

      Volume: 849 Pages: 64-98

    • DOI

      10.1016/j.tcs.2020.10.010

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule2020

    • Author(s)
      Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, and Kazuo Ohta
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 382-386

    • DOI

      10.34385/proc.65.C01-10

    • NAID

      230000012603

    • ISSN
      2188-5079
    • Year and Date
      2020-10-18
    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Journal Article] How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs2020

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 377-381

    • DOI

      10.34385/proc.65.C01-9

    • NAID

      230000012660

    • ISSN
      2188-5079
    • Year and Date
      2020-10-18
    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Journal Article] An IC-Level Countermeasure Against Laser Fault Injection Attack By Information Leakage Sensing Based on Laser-Induced Opto-Electric Bulk Current Density2020

    • Author(s)
      Kohei Matsuda, Sho Tada, Makoto Nagata, Yuichi Komano, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, Noriyuki Miura
    • Journal Title

      Japanese Journal of Applied Physics (JJAP)

      Volume: Vol.59 Issue: SG Pages: SGGL02-SGGL02

    • DOI

      10.7567/1347-4065/ab65d3

    • NAID

      210000157953

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers2020

    • Author(s)
      Kaoru Takemure、Yusuke Sakai、Bagus Santoso 、Goichiro Hanaoka 、Kazuo Ohta
    • Journal Title

      ProvSec 2020

      Volume: LNCS 12505 Pages: 65-84

    • DOI

      10.1007/978-3-030-62576-4_4

    • NAID

      130008081795

    • ISBN
      9783030625757, 9783030625764
    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] 検索可能暗号:データベースシステムの安全な運用に向けて2020

    • Author(s)
      渡邉 洋平
    • Journal Title

      ケミカルエンジニヤリング

      Volume: 65(9) Pages: 552-560

    • Related Report
      2020 Research-status Report
  • [Journal Article] Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing2019

    • Author(s)
      K. Ohara, Y. Watanabe, M. Iwamoto, and K. Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E102.A Issue: 9 Pages: 1079-1090

    • DOI

      10.1587/transfun.E102.A.1079

    • NAID

      130007699566

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2019-09-01
    • Related Report
      2019 Research-status Report
    • Peer Reviewed
  • [Journal Article] Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology2019

    • Author(s)
      K. Ohara, K. Emura, G. Hanaoka, A. Ishida, K. Ohta, and Y. Sakai
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E102.A Issue: 9 Pages: 1101-1117

    • DOI

      10.1587/transfun.E102.A.1101

    • NAID

      130007699571

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2019-09-01
    • Related Report
      2019 Research-status Report
    • Peer Reviewed
  • [Journal Article] Efficient Private PEZ Protocols for Symmetric Functions2019

    • Author(s)
      Y. Abe, M. Iwamoto, and K. Ohta
    • Journal Title

      Proc. Theory of Cryptography Conference (TCC2019)

      Volume: LNCS11891 Pages: 372-392

    • DOI

      10.1007/978-3-030-36030-6_15

    • ISBN
      9783030360290, 9783030360306
    • Related Report
      2019 Research-status Report
    • Peer Reviewed
  • [Journal Article] Card-Based Majority Voting Protocols with Three Inputs Using Three Cards2018

    • Author(s)
      Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, Kazuo Ohta
    • Journal Title

      Proc. International Symposium on Information Theory and Its Applications (ISITA2018)

      Volume: - Pages: 218-222

    • DOI

      10.23919/isita.2018.8664324

    • Related Report
      2018 Research-status Report
    • Peer Reviewed
  • [Presentation] Recent Progress in Searchable Encryption2022

    • Author(s)
      渡邉 洋平
    • Organizer
      IMI共同利用研究集会 高度化する暗号技術と数学的技法の進展
    • Related Report
      2022 Annual Research Report
    • Invited
  • [Presentation] AES鍵スケジュールからの固定ビット数漏洩を用いた鍵復元アルゴリズムの性能評価2021

    • Author(s)
      植村 友紀, 渡邉 洋平, 李 陽, 三浦 典之, 岩本 貢, 崎山 一男, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] 視覚復号型秘密分散法における任意の改ざんを検知する手法2021

    • Author(s)
      根岸 奎人, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] 時間ドロボー問題に対する健全性誤りのない物理的ゼロ知識証明2021

    • Author(s)
      初貝 恭祐, 安部 芳紀, 中井 雄士, 品川 和雅, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] 秘匿置換を用いたカードベースしきい値関数プロトコル2021

    • Author(s)
      中井 雄士, 徳重 佑樹, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] より少ない漏洩の下で安全な動的検索可能暗号への変換手法2020

    • Author(s)
      渡邉 洋平, 大原 一真, 岩本 貢, 太田 和夫
    • Organizer
      コンピュータセキュリティシンポジウム (CSS)
    • Related Report
      2020 Research-status Report
  • [Presentation] 対称関数を効率的に計算するPrivate PEZ プロトコル (from TCC 2019)2020

    • Author(s)
      安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      電子情報通信学会ISEC研究会
    • Related Report
      2020 Research-status Report
    • Invited
  • [Presentation] 鍵のランダムな漏洩に対するAES鍵スケジュール復元アルゴリズム2020

    • Author(s)
      植村友紀, 李陽, 三浦典之, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Research-status Report
  • [Presentation] 事前通信モデルにおけるペアリングを用いない集約署名2020

    • Author(s)
      竹牟禮薫, 坂井祐介, Bagus Santoso, 花岡悟一郎, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Research-status Report
  • [Presentation] 気泡検出器を用いたゼロ知識非破壊検査2020

    • Author(s)
      品川和雅, 三浦典之, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Research-status Report
  • [Presentation] 任意の始集合を持つ関数を計算するprivate PEZプロトコル2020

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Research-status Report
  • [Presentation] フォワード安全かつ検索時通信量が最適な動的検索可能暗号2020

    • Author(s)
      渡邉洋平
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Research-status Report
  • [Presentation] 任意の関数を計算するprivate PEZプロトコルの改善2019

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      コンピューターセキュリティシンポジウム (CSS) 2019
    • Related Report
      2019 Research-status Report
  • [Presentation] (強)フォワード安全な動的検索可能暗号の効率的な構成2019

    • Author(s)
      渡邉洋平, 大原一真, 岩本貢, 太田和夫
    • Organizer
      コンピューターセキュリティシンポジウム (CSS) 2019
    • Related Report
      2019 Research-status Report
  • [Presentation] Strong Forward Privacy for Dynamic Searchable Encryption2019

    • Author(s)
      Kazuo Ohta
    • Organizer
      Seminar at Google - Searchable Encryption Talk
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] Card-based Majority Voting Protocols with Three Inputs Using Three Cards2019

    • Author(s)
      Kazuo Ohta
    • Organizer
      the International Secure Multi-party Computation Forum
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research / Invited
  • [Presentation] How to improve the private PEZ protocol for general functions2019

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
    • Organizer
      The 14th International Workshop on Security (IWSEC2019), poster session
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research
  • [Presentation] 現代暗号研究の事始め ~ 1つのケーススタディ ~2019

    • Author(s)
      太田和夫
    • Organizer
      情報理論・情報セキュリティ・ワイドバンドシステム合同研究会
    • Related Report
      2018 Research-status Report
    • Invited
  • [Presentation] 効率的でフォワード安全な動的検索可能暗号2019

    • Author(s)
      渡邉洋平, 岩本貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] 共通鍵型マルチユーザ検索可能暗号の検索機能拡張2019

    • Author(s)
      平野 貴人, 川合 豊, 小関 義博, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] Three-Party Private Set Operation Protocols Using Polynomials and OPPRF2019

    • Author(s)
      Wenjia Wang, Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta,
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] Another Look at One-More Discrete Logarithm Problem in Generic Model2019

    • Author(s)
      Bagus Santoso and Kazuo Ohta.
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Book] 計算理論の基礎 [原著第3版] 1.オートマトンと言語2023

    • Author(s)
      Michael Sipser (著/文), 田中 圭介 (監修 | 翻訳), 藤岡 淳 (監修 | 翻訳), 阿部 正幸 (翻訳), 植田 広樹 (翻訳), 太田 和夫 (翻訳), 田中 圭介 (翻訳), 藤岡 淳 (翻訳), 渡辺 治 (翻訳)
    • Total Pages
      272
    • Publisher
      共立出版
    • ISBN
      9784320125612
    • Related Report
      2022 Annual Research Report
  • [Book] 計算理論の基礎 [原著第3版] 2.計算可能性の理論2023

    • Author(s)
      Michael Sipser (著/文), 田中 圭介 (監修 | 翻訳), 藤岡 淳 (監修 | 翻訳), 阿部 正幸 (翻訳), 植田 広樹 (翻訳), 太田 和夫 (翻訳), 田中 圭介 (翻訳), 藤岡 淳 (翻訳), 渡辺 治 (翻訳)
    • Total Pages
      208
    • Publisher
      共立出版
    • ISBN
      9784320125629
    • Related Report
      2022 Annual Research Report
  • [Book] 計算理論の基礎 [原著第3版] 3.複雑さの理論2023

    • Author(s)
      Michael Sipser (著/文), 田中 圭介 (監修 | 翻訳), 藤岡 淳 (監修 | 翻訳), 阿部 正幸 (翻訳), 植田 広樹 (翻訳), 太田 和夫 (翻訳), 田中 圭介 (翻訳), 藤岡 淳 (翻訳), 渡辺 治 (翻訳)
    • Total Pages
      288
    • Publisher
      共立出版
    • ISBN
      9784320125636
    • Related Report
      2022 Annual Research Report
  • [Book] ニュートン別冊 数学の世界 現代編 増補第2版,暗号 個人情報を守る数学2021

    • Author(s)
      太田 和夫, 岩本 貢, 渡邉 洋平 (取材協力)
    • Total Pages
      28
    • Publisher
      Newton Press
    • ISBN
      9784315523508
    • Related Report
      2020 Research-status Report
  • [Patent(Industrial Property Rights)] 動的検索可能暗号処理システム及び動的検索可能暗号処理方法2019

    • Inventor(s)
      渡邉洋平,岩本貢,太田和夫
    • Industrial Property Rights Holder
      渡邉洋平,岩本貢,太田和夫
    • Industrial Property Rights Type
      特許
    • Industrial Property Number
      2019-003908
    • Filing Date
      2019
    • Related Report
      2018 Research-status Report

URL: 

Published: 2018-04-23   Modified: 2024-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi