• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Coding Theorems for Information-Theoretically Secure Systems with Stochastic Encoders

Research Project

Project/Area Number 20500004
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Fundamental theory of informatics
Research InstitutionUniversity of Tsukuba

Principal Investigator

KOGA Hiroki  University of Tsukuba, 大学院・システム情報工学研究科, 准教授 (20272388)

Project Period (FY) 2008 – 2010
Project Status Completed (Fiscal Year 2010)
Budget Amount *help
¥4,030,000 (Direct Cost: ¥3,100,000、Indirect Cost: ¥930,000)
Fiscal Year 2010: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2009: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2008: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords情報理論的安全性 / 確率的符号器 / 秘密分散法 / 電子指紋 / 符号化定理 / 情報スペクトル / 一般情報源 / 情報理論 / 秘密鍵暗号 / 情報源符号化
Research Abstract

In this study we analyzed information systems with stochastic encoders and developed new results. First, we established novel coding theorems for Shannon's cipher system with a general source, where an encoder of the system can be stochastic. We also proposed a new simple n-out-of-n threshold scheme that is secure against a substitution attack by shareholders. In addition, we considered a digital fingerprinting code for copyright protection using a finite projective plane and obtained conditions under which all the malicious users are identifiable from a pirated content.

Report

(4 results)
  • 2010 Annual Research Report   Final Research Report ( PDF )
  • 2009 Annual Research Report
  • 2008 Annual Research Report
  • Research Products

    (25 results)

All 2011 2010 2009 2008 Other

All Journal Article (10 results) (of which Peer Reviewed: 10 results) Presentation (14 results) Remarks (1 results)

  • [Journal Article] A Digital Fingerprinting Code Based on a Projective Plane with Identifiability of All Malicious Users2011

    • Author(s)
      Hiroki Koga, Yusuke Minami
    • Journal Title

      IECIE Trans. Fundamentals vol.E94-A

      Pages: 223-232

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Digital Fingerprinting Code Based on a Projective Plane with Identifi ability of All Malicious Users2011

    • Author(s)
      Hiroki Koga, Yusuke Minami
    • Journal Title

      IEICE Trans.on Fundamentals.

      Volume: E94-A Pages: 223-232

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Two Generalizations of a Coding Theorem for a (2,2)-Threshold Scheme with a Cheater2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.2010 International Symposium on Information Theory and its Applications, Taichung

      Pages: 678-683

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Simple Secret Sharing Scheme Using a Key and its Security against Substitution of Shares2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.International Symposium on Information Theory Austin

      Pages: 2483-2487

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Simple Secret Sharing Scheme Using a Key and its Security against Substitution of Shares2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.2010 IEEE International Symposium on Information Theory

      Volume: CD-ROM Pages: 2483-2487

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Two Generalizations of a Coding Theorem for a (2, 2)-Threshold Scheme with a Cheater2010

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.2010 International Symposium on Information Theory and its Applications

      Volume: CD-ROM Pages: 678-683

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Coding Theorems for Fixed-Length Source Coding and Shannon's Cipher System with a General Source2008

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc.International Symposium on Information Theory and its Applications Auckland

      Pages: 251-256

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] Basic Properties of Complete Complementary Codes Using the DFT Matrices and Kronecker Products2008

    • Author(s)
      Yi Jin, Hiroki Koga
    • Journal Title

      Pro.International Symposium on Information Theory and its Applications Auckland

      Pages: 887-892

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] New Coding Theorems for Fixed-Length Source Coding and Shannon's Cipher System with a General Source2008

    • Author(s)
      Hiroki Koga
    • Journal Title

      Proc. International Symposium on Information Theory and its Applications

      Pages: 251-256

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Basic Properties of Complete Complementary Codes Using the DFT Matrices and Kronecker Products2008

    • Author(s)
      Yi Jin and Hiroki Koga
    • Journal Title

      Proc. International Symposium on Information Theory and its Applications

      Pages: 887-892

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Presentation] 情報スペクトルの幅と固定長符号の最悪冗長度2011

    • Author(s)
      古賀弘樹, 有村光晴, 岩田賢一
    • Organizer
      電子情報通信学会情報理論研究会,IT2010-83
    • Place of Presentation
      大阪大学
    • Year and Date
      2011-03-03
    • Related Report
      2010 Final Research Report
  • [Presentation] 情報スペクトルの幅と固定長符号化の最悪冗長度2011

    • Author(s)
      古賀弘樹, 有村光晴, 岩田賢一
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      大阪大学吹田キャンパス
    • Year and Date
      2011-03-03
    • Related Report
      2010 Annual Research Report
  • [Presentation] 4種類の確率的極限と情報源符号化2011

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会,IT2010-60
    • Place of Presentation
      国際奈良学セミナーハウス
    • Year and Date
      2011-01-18
    • Related Report
      2010 Final Research Report
  • [Presentation] 4種類の確率的極限と情報源符号化2011

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      奈良学セミナーハウス
    • Year and Date
      2011-01-18
    • Related Report
      2010 Annual Research Report
  • [Presentation] On the Necessary Conditions for Identification of all the Malicious Users by a Digital Watermarking Code Based on a Projective Plane2010

    • Author(s)
      古賀弘樹
    • Organizer
      第33回情報理論とその応用シンポジウム予稿集,pp.426-431
    • Place of Presentation
      信州松代ロイヤルホテル
    • Year and Date
      2010-12-01
    • Related Report
      2010 Final Research Report
  • [Presentation] On the Necessary Conditions for Identification of all the Malicious Users by a Digital Watermarking Code Based on a Projective Plane2010

    • Author(s)
      Hiroki Koga
    • Organizer
      第33回情報理論とその応用シンポジウム
    • Place of Presentation
      信州松代ロイヤルホテル
    • Year and Date
      2010-12-01
    • Related Report
      2010 Annual Research Report
  • [Presentation] AND攻撃に耐性をもつ結託耐性符号の容量について2010

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会,IT2009-110
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Related Report
      2010 Final Research Report
  • [Presentation] AND攻撃に耐性をもつ詰託耐性符号の容量について2010

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Related Report
      2009 Annual Research Report
  • [Presentation] BIBDを用いた結託耐性符号の基礎的性質2009

    • Author(s)
      南佑典, 古賀弘樹
    • Organizer
      第32回情報理論とその応用シンポジウム予稿集,pp.532-537
    • Place of Presentation
      山口湯田温泉ホテルかめ福
    • Year and Date
      2009-12-03
    • Related Report
      2010 Final Research Report
  • [Presentation] BIBDを用いた結託耐性符号の基礎的性質2009

    • Author(s)
      南祐典・古賀弘樹
    • Organizer
      第32回情報理論とその応用シンポジウム
    • Place of Presentation
      ホテルかめ福(山口県)
    • Year and Date
      2009-12-03
    • Related Report
      2009 Annual Research Report
  • [Presentation] 情報スペクトル的手法の発展とその秘密分散法への応用2009

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会,IT2009-47,(招待講演)
    • Place of Presentation
      山口湯田温泉ホテルかめ福
    • Year and Date
      2009-12-01
    • Related Report
      2010 Final Research Report
  • [Presentation] 情報スペクトル的手法の発展とその秘密分散法への応用(招待講演)2009

    • Author(s)
      古賀弘樹
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      ホテルかめ福(山口県)
    • Year and Date
      2009-12-01
    • Related Report
      2009 Annual Research Report
  • [Presentation] 不正者全員を特定できるアフィン平面を利用した結託耐性符号の一構成法2009

    • Author(s)
      南佑典, 古賀弘樹
    • Organizer
      2009年暗号と情報セキュリティシンポジウム,IDI-1
    • Place of Presentation
      大津プリンスホテル
    • Year and Date
      2009-01-20
    • Related Report
      2010 Final Research Report
  • [Presentation] 不正者全員を特定できるアフィン平面を利用した結託耐性符号の一構成法2009

    • Author(s)
      南佑典、古賀弘樹
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      大津プリンスホテル (滋賀県大津市)
    • Year and Date
      2009-01-20
    • Related Report
      2008 Annual Research Report
  • [Remarks] ホームページ等

    • Related Report
      2010 Final Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi