• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on Encryption and Signatures with Information-theoretic Security and Their Application

Research Project

Project/Area Number 19700008
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Fundamental theory of informatics
Research InstitutionYokohama National University

Principal Investigator

SHIKATA Junji  Yokohama National University, 大学院・環境情報研究院, 准教授 (30345483)

Project Period (FY) 2007 – 2009
Project Status Completed (Fiscal Year 2009)
Budget Amount *help
¥3,830,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥630,000)
Fiscal Year 2009: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2008: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2007: ¥1,100,000 (Direct Cost: ¥1,100,000)
Keywords情報セキュリティ / 暗号理論 / 情報理論的安全性 / 暗号 / ステガノグラフィ / 認証 / 署名 / 認証・署名
Research Abstract

Today, cryptographic primitives such as encryption and digital signature schemes are fundamental and important to establish various and complex systems in the modern society of computers and networks. Considering security of the systems in the future, it is desirable to provide cryptographic primitives whose security can be guaranteed for a long time. In this research project, we successfully developed such cryptographic primitives concerning to encryption, signatures and their applications. Since our contribution lies in proposing new mechanisms of cryptographic primitives whose security does not depend on any computational model, we hope that our research results can contribute to the development of construction of security systems in the future.

Report

(4 results)
  • 2009 Annual Research Report   Final Research Report ( PDF )
  • 2008 Annual Research Report
  • 2007 Annual Research Report
  • Research Products

    (42 results)

All 2010 2009 2008 2007 Other

All Journal Article (24 results) (of which Peer Reviewed: 8 results) Presentation (16 results) Remarks (2 results)

  • [Journal Article] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 3A1-4

    • Related Report
      2009 Final Research Report
  • [Journal Article] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 2B4-3

    • Related Report
      2009 Final Research Report
  • [Journal Article] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      T. Seito, T. Aikawa, J. Shikata, T. Matsumoto
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 2B2-4

    • Related Report
      2009 Final Research Report
  • [Journal Article] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM)

    • Related Report
      2009 Annual Research Report
  • [Journal Article] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM)

    • Related Report
      2009 Annual Research Report
  • [Journal Article] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM)

    • Related Report
      2009 Annual Research Report
  • [Journal Article] Unconditionally Secure Blind Signatures2009

    • Author(s)
      Y. Hara, T. Seito, J. Shikata, T. Matsumoto
    • Journal Title

      Information Theoretic Security, ICITS 2007 - Selected Papers 4883

      Pages: 23-43

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment2009

    • Author(s)
      Y. Hara, T. Ishiwata, J. Shikata, T. Matsumoto
    • Journal Title

      Formal to Practical Security 5458

      Pages: 116-137

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集(CDROM) 3B3-3

    • Related Report
      2009 Final Research Report
  • [Journal Article] Unconditionally Secure Blind Authentication Codes : The Model, Constructions, and Links to Commitment2009

    • Author(s)
      Yuki Hara, Taiki Ishiwata, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      Formal to Practical Security, Springer-Verlag LNCS 5458

      Pages: 116-137

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Unconditionally Secure Blind Signatures2009

    • Author(s)
      Yuki Hara, Takenobu Seito, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      Information Theoretic Security, ICITS 2007-Selected Papers, Springer LNCS 4883

      Pages: 24-43

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 情報理論的安全性に基づく相手認証方式2009

    • Author(s)
      二井将太, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] Bounded Storage Modelにおいて安全な非対称鍵配送方式2009

    • Author(s)
      重田真義, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] Bounded Storage Modelにおける効率的なビットコミットメントの構成法2009

    • Author(s)
      山中大輔, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Related Report
      2008 Annual Research Report
  • [Journal Article] Unconditionally Secure Steganography Against Active Attacks2008

    • Author(s)
      Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      IEEE Transactions on Information Theory 54(6)

      Pages: 2690-2705

    • Related Report
      2009 Final Research Report 2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems2008

    • Author(s)
      Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling
    • Journal Title

      T. Data Hiding and Multimedia Security 3, Springer

      Pages: 23-32

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤武暢, 二井将太, 四方順司, 松本勉
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム論文集(CDROM) 1E1-5

    • Related Report
      2009 Final Research Report
  • [Journal Article] On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems2008

    • Author(s)
      Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling
    • Journal Title

      T. Data Hiding and Multimedia Security 3

      Pages: 23-32

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Bounded Storage Modelにおいて情報理論的に安全なビットコミットメントについて2008

    • Author(s)
      山中大輔
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム(SCIS2008:Symposium on Cryptography and Information Security)論文集(CDROM)

    • Related Report
      2007 Annual Research Report
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤武暢
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム(SCIS2008:Symposium on Cryptography and Information Security)論文集(CDROM)

    • Related Report
      2007 Annual Research Report
  • [Journal Article] Unconditionally Secure Blind Signatures2007

    • Author(s)
      清藤武暢
    • Journal Title

      Pre-Proceedings of International Conference on Information Theoretic Security(ICITS 2007).

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 情報理論的に安全な非対称鍵配送方式2007

    • Author(s)
      重田真義
    • Journal Title

      コンピュータセキュリティシンポジウム2007(CSS2007)論文集(CDROM)

    • Related Report
      2007 Annual Research Report
  • [Journal Article] 情報理論的に安全なブラインド認証とコミットメントの一般的構成法について2007

    • Author(s)
      石和田大気
    • Journal Title

      コンピュータセキュリティシンポジウム2007(CSS2007)論文集(CDROM)

    • Related Report
      2007 Annual Research Report
  • [Presentation] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-21
    • Related Report
      2009 Annual Research Report 2009 Final Research Report
  • [Presentation] Information-theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-20
    • Related Report
      2009 Final Research Report
  • [Presentation] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report 2009 Final Research Report
  • [Presentation] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      清藤武暢
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report
  • [Presentation] 情報理論的安全性に基づく相手認証方式2009

    • Author(s)
      二井将太
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津
    • Year and Date
      2009-01-23
    • Related Report
      2008 Annual Research Report
  • [Presentation] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津
    • Year and Date
      2009-01-22
    • Related Report
      2009 Final Research Report 2008 Annual Research Report
  • [Presentation] Bounded Storage Modelにおいて安全な非対称鍵配送方式2009

    • Author(s)
      重田真義
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Bounded Storage Modelにおける効率的なビットコミットメントの構成法2009

    • Author(s)
      山中大輔
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津
    • Year and Date
      2009-01-20
    • Related Report
      2008 Annual Research Report
  • [Presentation] Bounded Storage Modelにおいて情報理論的に安全なビットコミットメントについて2008

    • Author(s)
      山中 大輔
    • Organizer
      2008年暗号と情報セキュリティシンポジウム(SCIS2008:Symposium on Cryptography and Information Security)論文集(CDROM)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-23
    • Related Report
      2007 Annual Research Report
  • [Presentation] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2008年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-22
    • Related Report
      2009 Final Research Report
  • [Presentation] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤 武暢
    • Organizer
      2008年暗号と情報セキュリティシンポジウム(SCIS2008:Symposium on Cryptography and Information Security)論文集(CDROM)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-22
    • Related Report
      2007 Annual Research Report
  • [Presentation] 情報理論的に安全な非対称鍵配送方式2007

    • Author(s)
      重田 真義
    • Organizer
      コンピュータセキュリティシンポジウム2007(CSS2007)
    • Place of Presentation
      奈良
    • Year and Date
      2007-11-02
    • Related Report
      2007 Annual Research Report
  • [Presentation] 情報理論的に安全なブラインド認証とコミットメントの一般的構成法について2007

    • Author(s)
      石和田 大気
    • Organizer
      コンピュータセキュリティシンポジウム2007(CSS2007)
    • Place of Presentation
      奈良
    • Year and Date
      2007-11-01
    • Related Report
      2007 Annual Research Report
  • [Presentation] Construction Methodology of Unconditionally Secure Signature Schemes (Invited Talk)2007

    • Author(s)
      Junji Shikata
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-05-26
    • Related Report
      2007 Annual Research Report
  • [Presentation] Construction Methodology of Unconditionally Secure Signature Schemes2007

    • Author(s)
      Junji Shikata
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-03-26
    • Related Report
      2009 Final Research Report
  • [Presentation] Unconditionally Secure Blind Signatures2007

    • Author(s)
      Y. Hara, T. Seito, J. Shikata, T. Matsumoto
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-03-25
    • Related Report
      2009 Final Research Report 2007 Annual Research Report
  • [Remarks]

    • URL

      http://er-web.jmk.ynu.ac.jp/html/SHIKATA_Junji/ja.html

    • Related Report
      2009 Final Research Report
  • [Remarks]

    • URL

      http://ipsr.ynu.ac.jp/

    • Related Report
      2009 Final Research Report

URL: 

Published: 2007-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi