• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on techniques to keep confidentiality and integrity of a large amount of information

Research Project

Project/Area Number 20300003
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Fundamental theory of informatics
Research InstitutionUniversity of Fukui

Principal Investigator

HIROSE Shoichi  福井大学, 大学院・工学研究科, 教授 (20228836)

Co-Investigator(Kenkyū-buntansha) MIYAJI Atsuko  北陸先端科学技術大学院大学, 情報科学研究科, 教授 (10313701)
SOSHI Masakazu  広島市立大学, 情報科学部, 准教授 (00293142)
Co-Investigator(Renkei-kenkyūsha) TANABE Hidehiko  福井大学, 大学院・工学研究科, 助教 (80236661)
Project Period (FY) 2008 – 2011
Project Status Completed (Fiscal Year 2011)
Budget Amount *help
¥18,850,000 (Direct Cost: ¥14,500,000、Indirect Cost: ¥4,350,000)
Fiscal Year 2011: ¥3,510,000 (Direct Cost: ¥2,700,000、Indirect Cost: ¥810,000)
Fiscal Year 2010: ¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2009: ¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2008: ¥6,500,000 (Direct Cost: ¥5,000,000、Indirect Cost: ¥1,500,000)
Keywords暗号・認証等 / 情報基礎 / セキュア・ネットワーク / 暗号・認証
Research Abstract

We made security analyses of two efficient cryptographic primitives : stream ciphers to keep confidentiality and hash functions to keep integrity. We also designed authenticated data structures with confidentiality, which can be constructed using these cryptographic primitives, and confirmed their efficiency and security. The results are useful to make secure and reliable responses efficiently to queries on a large amount of information. An example of applications is outsourcing of database services using clouds.

Report

(6 results)
  • 2011 Annual Research Report   Final Research Report ( PDF )
  • 2010 Annual Research Report   Self-evaluation Report ( PDF )
  • 2009 Annual Research Report
  • 2008 Annual Research Report
  • Research Products

    (57 results)

All 2012 2011 2010 2009 2008 Other

All Journal Article (31 results) (of which Peer Reviewed: 23 results) Presentation (25 results) Remarks (1 results)

  • [Journal Article] Collision Resistance of Hash Functions in a Weak Ideal Cipher Model2012

    • Author(s)
      S. Hirose
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: vol.E95-A Pages: 252-255

    • NAID

      10030534957

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] One time signatureの効率的な構成の検討2012

    • Author(s)
      双紙正和, 早稲田篤志
    • Journal Title

      情報処理学会研究報告

      Volume: vol.35 Pages: 1-4

    • Related Report
      2011 Annual Research Report 2011 Final Research Report
  • [Journal Article] Collision Resistance of Hash Functions in a Weak Ideal Cipher Model2012

    • Author(s)
      Shoichi Hirose
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E95-A Issue: 1 Pages: 252-255

    • DOI

      10.1587/transfun.E95.A.252

    • NAID

      10030534957

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] How to Find Short RC4 Colliding Key Pairs, The 14th Information Security Conference2011

    • Author(s)
      J. Chen, A. Miyaji
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.7001 Pages: 32-46

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] Content Authentication for Range Queries in Peer-to-Peer Networks2011

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vol.111 Pages: 177-180

    • NAID

      10031099532

    • Related Report
      2011 Annual Research Report 2011 Final Research Report
  • [Journal Article] How to Find Short RC4 Colliding Key Pairs2011

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science

      Volume: 7001 Pages: 32-46

    • DOI

      10.1007/978-3-642-24861-0_3

    • NAID

      120003752194

    • ISBN
      9783642248603, 9783642248610
    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      A. Miyaji and M. Sukegawa
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: vol.E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance, The 6th Information Security Practice and Experience Conference(ISPEC 2010)2010

    • Author(s)
      J. Chen and A. Miyaji
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.6047 Pages: 30-44

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] 新しいハッシュ連鎖の構成による単純な認証方式とその応用2010

    • Author(s)
      双紙正和
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vol.110 Pages: 1-5

    • NAID

      110008152380

    • Related Report
      2011 Final Research Report
  • [Journal Article] Hidden credential retrieval without random oracles, The 11th International Workshop on Information Security Applications(WISA 2010)2010

    • Author(s)
      A. Miyaji, M. Rahman, M. Soshi
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.6513 Pages: 160-174

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions, The 7th Conference on Security and Cryptography for Networks (SCN 2010)2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      Lecture Notes in Computer Science vol.6280

      Pages: 73-87

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] A New Class ofRC4 Colliding Key Pairs With Greater Hamming Distance, The 6th Information Security Practice and Experience Conference (ISPEC 2010)2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      Lecture Notes in Computer Science vol.6047

      Pages: 30-44

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences, IEICE Trans.2010

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      Fundamentals vol.E93-A

      Pages: 1066-1077

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] Hidden credential retrieval without random oracles, The 11th International Workshop on Information Security Applications (WISA 2010)2010

    • Author(s)
      A.Miyaji, M.Rahman, M.Soshi
    • Journal Title

      Lecture Notes in Computer Science vol.6513

      Pages: 160-174

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] Hidden credential retrieval without random oracles2010

    • Author(s)
      A.Miyaji, M.Rahman, M.Sochi
    • Journal Title

      The 11th International Workshop on Information Security Applications(WISA 2010), Lecture Notes in Computer Science

      Volume: 6513 Pages: 160-174

    • NAID

      120003184341

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      The 6th Information Security Practice and Experience Conference(ISPEC 2010), Lecture Notes in Computer Science

      Volume: 6047 Pages: 30-44

    • NAID

      120002260312

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      The 7th Conference on Security and Cryptography for Networks(SCN 2010), Lecture Notes in Computer Science

      Volume: 6280 Pages: 73-87

    • NAID

      120002753787

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences, ACISP 20092009

    • Author(s)
      A. Miyaji and M. Sukegawa
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.5594 Pages: 134-152

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] ハッシュ関数の安全性に関する考察2009

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vol.108 Pages: 267-271

    • NAID

      110007324400

    • Related Report
      2011 Final Research Report
  • [Journal Article] Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      S.Hirose, H.Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals vol.E92-A

      Pages: 2447-2453

    • NAID

      10026860049

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      Lecture Notes in Computer Science, ACISP 2009 5594

      Pages: 134-152

    • NAID

      120002260315

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      S.Hirose, H.Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals 10

      Pages: 2447-2453

    • NAID

      10026860049

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K. Emura, M. Miyaii, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      ISPEC 2009, Lecture Notes in Computer Science, Springer-Verlag 5451

      Pages: 13-23

    • NAID

      120002260310

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      A. Miyaji, M. S. Rahman, M. Soshi
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing

      Pages: 559-564

    • NAID

      120006674344

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 擬似等価鍵を用いたRC4 PRGA の内部状態の状態遷移解析(1)2009

    • Author(s)
      助川昌泰, 宮地充子
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 231-237

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 擬似等価鍵を用いたRC4 PRGAの内部状態の状態遷移解析(2)2009

    • Author(s)
      網代充希, 宮地充子
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 239-244

    • Related Report
      2008 Annual Research Report
  • [Journal Article] ハッジュ関数の安全性に関する考察2009

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 267-271

    • Related Report
      2008 Annual Research Report
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Trans. 49

      Pages: 2975-2988

    • NAID

      130002073193

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fundamentals. E91-A

      Pages: 2833-2842

    • NAID

      10026852444

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 差分を用いたRC4PRAGAにおける内部状態の状態遷移解析2008

    • Author(s)
      助川昌泰, 宮地充子
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 67-72

    • Related Report
      2008 Annual Research Report
  • [Presentation] 木構造データに対するMerkle木に基づく編集可能署名2012

    • Author(s)
      廣瀬勝一,桑門秀典
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-02-02
    • Related Report
      2011 Annual Research Report 2011 Final Research Report
  • [Presentation] 初期差分を用いたRC4PRGAの解析2012

    • Author(s)
      市丸祐,宮地充子
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-01-31
    • Related Report
      2011 Final Research Report
  • [Presentation] 初期差分を用いたRC4 PRGAの解析2012

    • Author(s)
      市丸祐, 宮地充子
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-01-31
    • Related Report
      2011 Annual Research Report
  • [Presentation] 複数閾値複数秘密分散に関する一考察2012

    • Author(s)
      早稲田篤志, 双紙正和
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-01-30
    • Related Report
      2011 Annual Research Report
  • [Presentation] HC-128の内部状態非独立性について2011

    • Author(s)
      陳嘉耕, 柿脇一穂, 宮地充子
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県)
    • Year and Date
      2011-01-27
    • Related Report
      2010 Annual Research Report
  • [Presentation] 新しいハッシュ連鎖の構成による単純な認証方式とその応用2010

    • Author(s)
      双紙正和
    • Organizer
      電子情報通信学会情報通信システムセキュリティ研究会
    • Place of Presentation
      広島市立大学
    • Year and Date
      2010-11-05
    • Related Report
      2010 Self-evaluation Report
  • [Presentation] 新しいハッシュ連鎖の構成による単純な認証方式とその応用2010

    • Author(s)
      双紙正和
    • Organizer
      信学技報,ICSS2010-44(2010-11),pp.1-5
    • Place of Presentation
      広島市立大学
    • Year and Date
      2010-11-05
    • Related Report
      2010 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークにおける効率的なグループ鍵配送プロトコル2010

    • Author(s)
      三吉雄大, 双紙正和
    • Organizer
      信学技報,ICSS2010-45(2010-11),pp.7-10
    • Place of Presentation
      広島市立大学
    • Year and Date
      2010-11-05
    • Related Report
      2010 Annual Research Report
  • [Presentation] 共通鍵認証暗号における再暗号化について2010

    • Author(s)
      廣瀬勝一
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Related Report
      2011 Final Research Report 2010 Annual Research Report 2010 Self-evaluation Report
  • [Presentation] 差分情報を利用したRC4PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂,宮地充子
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Related Report
      2011 Final Research Report 2010 Self-evaluation Report
  • [Presentation] ハッシュ連鎖による単純な認証法とセンサーネットワークへの応用2010

    • Author(s)
      双紙正和
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Related Report
      2011 Final Research Report 2010 Annual Research Report
  • [Presentation] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂, 宮地充子
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Related Report
      2010 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークにおけるグループ鍵配送プロトコルの検討2010

    • Author(s)
      三吉雄大, 双紙正和
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Related Report
      2010 Annual Research Report
  • [Presentation] ブロック暗号に基づくハッシュ関数の構成法2010

    • Author(s)
      廣瀬勝一
    • Organizer
      電子情報通信学会2010年ソサイエティ大会
    • Place of Presentation
      大阪府立大学
    • Year and Date
      2010-09-17
    • Related Report
      2010 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークのためのグループ鍵分配プロトコルの提案2010

    • Author(s)
      村上大樹, 双紙正和
    • Organizer
      暗号と情報セキュリティシンポジウムSCIS2010
    • Place of Presentation
      高松
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report
  • [Presentation] Constructing a Hash Function from a Weak Block Cipher in an Ideal Model2009

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機会振興会館(東京)
    • Year and Date
      2009-09-18
    • Related Report
      2010 Self-evaluation Report
  • [Presentation] 「ユビキタス社会の情報セキュリティについて-安全・安心な情報基盤を保証する情報セキュリティ-2009

    • Author(s)
      宮地充子
    • Organizer
      石川県企業産業交流研究会OB会
    • Place of Presentation
      石川県工業試験場
    • Year and Date
      2009-06-10
    • Related Report
      2009 Annual Research Report
  • [Presentation] ハッシュ関数の安全性に関する考察2009

    • Author(s)
      廣瀬勝一
    • Organizer
      電子情報通信学会情報通信基礎サブソサイェティ合同研究会
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      2009-03-10
    • Related Report
      2010 Self-evaluation Report
  • [Presentation] Efficient PRF Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      大津プリンスホテル
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Constructing a Hash Function from a Weak Block Cipher in an Ideal Model2009

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      東京
    • Related Report
      2009 Annual Research Report
  • [Presentation] ハッジュ関数の標準化と最新動向2008

    • Author(s)
      廣瀬勝一
    • Organizer
      第5回ISSスクエア水平ワークショップ
    • Place of Presentation
      情報セキュリティ大学院大学
    • Year and Date
      2008-12-19
    • Related Report
      2008 Annual Research Report
  • [Presentation] Elliptic Curve Cryptosystem for the Privacy Protection : Theory and International Standardization2008

    • Author(s)
      Atsuko Miyaji
    • Organizer
      UK-JAPAN Symposium on "Privacy and Security in the Information Society"
    • Place of Presentation
      東京
    • Year and Date
      2008-11-11
    • Related Report
      2008 Annual Research Report
  • [Presentation] An RFID authentication protocol suitable for batch-mode authentication2008

    • Author(s)
      R. Mohammad, M. Soshi, K. Omote, A. Miyaji
    • Organizer
      Computer Security Symposium 2008 (CSS 2008)
    • Place of Presentation
      沖縄コンベンションセンター
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] センサーネットワークにおける柔軟な鍵共有方式の提案2008

    • Author(s)
      村上大樹, 双紙正和
    • Organizer
      Computer Security Symposium 2008 (CSS 2008)
    • Place of Presentation
      沖縄コンベンションセンター
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] Provable Security of a Hash Function Using an MMO Compression Function and Merkle-Damgaard Domain Extension with an Output Function2008

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会基礎・境界ソサイェティ大会
    • Place of Presentation
      明治大学
    • Year and Date
      2008-09-16
    • Related Report
      2008 Annual Research Report
  • [Remarks] 該当なし

    • Related Report
      2010 Annual Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi