• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A new look at security proofs of cryptographic primitives from logic

Research Project

Project/Area Number 18K19780
Research Category

Grant-in-Aid for Challenging Research (Exploratory)

Allocation TypeMulti-year Fund
Review Section Medium-sized Section 60:Information science, computer engineering, and related fields
Research InstitutionThe University of Electro-Communications

Principal Investigator

Iwamoto Mitsugu  電気通信大学, 大学院情報理工学研究科, 教授 (50377016)

Project Period (FY) 2018-06-29 – 2022-03-31
Project Status Completed (Fiscal Year 2021)
Budget Amount *help
¥6,370,000 (Direct Cost: ¥4,900,000、Indirect Cost: ¥1,470,000)
Fiscal Year 2020: ¥2,340,000 (Direct Cost: ¥1,800,000、Indirect Cost: ¥540,000)
Fiscal Year 2019: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Fiscal Year 2018: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Keywords暗号理論 / 安全性証明 / 論理学 / 物理暗号 / 情報理論的安全性 / カードベース暗号 / PEZプロトコル / 情報理論
Outline of Final Research Achievements

In this study, we revisited the security proofs of cryptographic protocols from the viewpoint of logic and tried to understand them easily. As the tools for this purpose, we used so-called physical cryptography such as card-based protocols and private PEZ protocols, which have been studied extensively in recent years. Since the card-based protocols are based on the technique called a private permutation, the proposed protocols have a similar structure to ordinary (algebraic) multi-party computations. The security of private PEZ protocols is easier to understand compared to algebraic multi-party computations because it is free from simulation-based security. We proposed several new card-based and private PEZ protocols with higher efficiency, which contributed to understanding the security of cryptographic protocols simply. Some of these results have been published in international journals and major international conferences.

Academic Significance and Societal Importance of the Research Achievements

暗号理論の安全性証明は,安全性という曖昧な概念を数学的に書き下す,という意味で独特の論理体系を構築してきた.これは強固な安全性を保証するという利点と,その一方で分野外の研究者には困難が伴うという難点を抱えている.今後ますます重要になると予想される情報セキュリティの中核である暗号理論に対して,直観的で分かり易い理解の仕方を提供することは,暗号・情報セキュリティ技術がより社会に受け入れられるために必要なことである.論理学と暗号理論の関係をより深めていくことは,学際的な研究として重要であると考えており,得られた成果は学術的興味が実社会で役立つ良い事例になっていると考える.

Report

(5 results)
  • 2021 Annual Research Report   Final Research Report ( PDF )
  • 2020 Research-status Report
  • 2019 Research-status Report
  • 2018 Research-status Report
  • Research Products

    (34 results)

All 2022 2021 2020 2019 2018 Other

All Journal Article (7 results) (of which Peer Reviewed: 7 results,  Open Access: 3 results) Presentation (16 results) (of which Int'l Joint Research: 1 results,  Invited: 2 results) Book (2 results) Remarks (8 results) Funded Workshop (1 results)

  • [Journal Article] Efficient Card-Based Majority Voting Protocols2022

    • Author(s)
      Abe Yoshiki, Nakai Takeshi, Kuroki Yoshihisa, Suzuki Shinnosuke, Koga Yuta, Watanabe Yohei, Iwamoto Mitsugu, and Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 40 Issue: 1 Pages: 173-198

    • DOI

      10.1007/s00354-022-00161-7

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations2022

    • Author(s)
      Nakai Takeshi、Shirouchi Satoshi、Tokushige Yuuki、Iwamoto Mitsugu、Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 40 Issue: 1 Pages: 95-113

    • DOI

      10.1007/s00354-022-00153-7

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] How to Solve Millionaires’ Problem with Two Kinds of Cards2021

    • Author(s)
      Nakai Takeshi、Misawa Yuto、Tokushige Yuuki、Iwamoto Mitsugu、Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 39 Issue: 1 Pages: 98-105

    • DOI

      10.1007/s00354-020-00118-8

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs2020

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 377-381

    • DOI

      10.34385/proc.65.C01-9

    • NAID

      230000012660

    • ISSN
      2188-5079
    • Year and Date
      2020-10-18
    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Journal Article] Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes2019

    • Author(s)
      Reo Eriguchi, Noboru Kunihiro, and Mitsugu Iwamoto
    • Journal Title

      Proc. IEEE International Symposium on Information Theory (ISIT2019)

      Volume: 2019-July Pages: 3047-3051

    • DOI

      10.1109/isit.2019.8849591

    • Related Report
      2019 Research-status Report
    • Peer Reviewed
  • [Journal Article] Efficient Private PEZ Protocols for Symmetric Functions2019

    • Author(s)
      Y. Abe, M. Iwamoto, and K. Ohta
    • Journal Title

      Proc. Theory of Cryptography Conference (TCC2019)

      Volume: LNCS11891 Pages: 372-392

    • DOI

      10.1007/978-3-030-36030-6_15

    • ISBN
      9783030360290, 9783030360306
    • Related Report
      2019 Research-status Report
    • Peer Reviewed
  • [Journal Article] Card-Based Majority Voting Protocols with Three Inputs Using Three Cards2018

    • Author(s)
      Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, Kazuo Ohta
    • Journal Title

      Proc. International Symposium on Information Theory and Its Applications (ISITA2018)

      Volume: - Pages: 218-222

    • DOI

      10.23919/isita.2018.8664324

    • Related Report
      2018 Research-status Report
    • Peer Reviewed
  • [Presentation] 一様で閉じたシャッフルの効率的な実装2022

    • Author(s)
      岩成慶太, 中井雄士, 渡邉洋平, 栃窪孝也, 岩本貢
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2022)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 秘匿置換を用いた効率的なn入力多数決カードプロトコル2022

    • Author(s)
      安部芳紀, 中井雄士, 渡邉洋平, 岩本貢, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2022)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 視覚復号型秘密分散法における任意の改ざんを検知する手法2021

    • Author(s)
      根岸 奎人, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム 2021
    • Related Report
      2021 Annual Research Report
  • [Presentation] カードを用いた秘匿共通集合プ ロトコル2021

    • Author(s)
      土井アナスタシヤ, 中井雄士, 品川和雅, 渡邉洋平, 岩本貢
    • Organizer
      コンピュータセキュリティシンポジウム(CSS2021)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 視覚復号型秘密分散法における任意の改ざんを検知する手法2021

    • Author(s)
      根岸 奎人, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] 時間ドロボー問題に対する健全性誤りのない物理的ゼロ知識証明2021

    • Author(s)
      初貝 恭祐, 安部 芳紀, 中井 雄士, 品川 和雅, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] 秘匿置換を用いたカードベースしきい値関数プロトコル2021

    • Author(s)
      中井 雄士, 徳重 佑樹, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] 対称関数を効率的に計算するPrivate PEZ プロトコル (from TCC 2019)2021

    • Author(s)
      安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      電子情報通信学会ISEC研究会
    • Related Report
      2020 Research-status Report
    • Invited
  • [Presentation] 気泡検出器を用いたゼロ知識非破壊検査2020

    • Author(s)
      品川和雅, 三浦典之, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Research-status Report
  • [Presentation] 任意の始集合を持つ関数を計算するprivate PEZプロトコル2020

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Research-status Report
  • [Presentation] 任意の関数を計算するprivate PEZプロトコルの改善2019

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      コンピューターセキュリティシンポジウム (CSS) 2019
    • Related Report
      2019 Research-status Report
  • [Presentation] How to improve the private PEZ protocol for general functions2019

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
    • Organizer
      The 14th International Workshop on Security (IWSEC2019), poster session
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research
  • [Presentation] 初期文字列が29 文字の4 入力多数決Private PEZプロトコル2019

    • Author(s)
      安部 芳紀, 山本 翔太, 岩本 貢, 太田 和夫
    • Organizer
      情報理論・情報セキュリティ・ワイドバンドシステム合同研究会
    • Related Report
      2018 Research-status Report
  • [Presentation] 不正検知可能な3入力多数決カードプロトコル2019

    • Author(s)
      安部 芳紀, 山本 翔太, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] 4入力多数決を計算する効率的なPrivate PEZプロトコル2019

    • Author(s)
      山本 翔太, 安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Research-status Report
  • [Presentation] 秘密計算の安全性~プライバシーを保ちつつどこまで計算できるか2018

    • Author(s)
      岩本貢
    • Organizer
      第8回バイオメトリクスと認識・認証シンポジウム(SBRA)
    • Related Report
      2018 Research-status Report
    • Invited
  • [Book] Newton別冊 数学の世界 現代編 増補第2版(暗号 個人情報を守る数学, pp.98-115)2021

    • Author(s)
      太田和夫、岩本貢、渡邉洋平(取材協力)
    • Total Pages
      176
    • Publisher
      ニュートンプレス
    • ISBN
      9784315523508
    • Related Report
      2020 Research-status Report
  • [Book] PRIVATE PERMUTATIONS IN CARD-BASED CRYPTOGRAPHY2021

    • Author(s)
      Takeshi Nakai
    • Total Pages
      96
    • Publisher
      The University of Electro-Communications
    • Related Report
      2020 Research-status Report
  • [Remarks] 岩本・渡邉研究室

    • URL

      https://iw-lab.jp/

    • Related Report
      2021 Annual Research Report
  • [Remarks] 電気通信大学 教員総覧

    • URL

      http://kjk.office.uec.ac.jp/Profiles/11/0001044/profile.html

    • Related Report
      2020 Research-status Report
  • [Remarks] 岩本・渡邉研究室ホームページ

    • URL

      https://iw-lab.jp/

    • Related Report
      2020 Research-status Report
  • [Remarks] 岩本貢のホームページ

    • URL

      https://www.iw-lab.jp/users/mitsugu/

    • Related Report
      2020 Research-status Report
  • [Remarks] 岩本・渡邉研究室

    • URL

      https://iw-lab.jp

    • Related Report
      2019 Research-status Report
  • [Remarks] 電気通信大学教員情報検索

    • URL

      http://kjk.office.uec.ac.jp/Profiles/11/0001044/profile.html

    • Related Report
      2019 Research-status Report 2018 Research-status Report
  • [Remarks] 太田・岩本研究室ホームページ

    • URL

      http://ohta-lab.jp/

    • Related Report
      2018 Research-status Report
  • [Remarks] 岩本貢 (Mitsugu Iwamoto) のホームページ

    • URL

      http://ohta-lab.jp/users/mitsugu/index.html

    • Related Report
      2018 Research-status Report
  • [Funded Workshop] Workshop on Cryptography Using Physical Tools2019

    • Related Report
      2019 Research-status Report

URL: 

Published: 2018-07-25   Modified: 2023-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi