• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A Study of the Hardness of Algebraic Algorithms and Its Applications to Public-Key Cryptography

Research Project

Project/Area Number 20540125
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field General mathematics (including Probability theory/Statistical mathematics)
Research InstitutionTokyo Metropolitan University

Principal Investigator

UCHIYAMA Shigenori  首都大学東京, 大学院・理工学研究科, 准教授 (40433172)

Project Period (FY) 2008 – 2011
Project Status Completed (Fiscal Year 2011)
Budget Amount *help
¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2011: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2010: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2009: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2008: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Keywordsアルゴリズム / 暗号・認証 / 量子コンピュータ
Research Abstract

We analyzed algebraic algorithms which are computationally intractable. We proposed an improved method for a problem relevant to lattices, an improvement of key-generation algorithm for a homomorphic encryption scheme based on a lattice problem, efficient attacks against some multivariate public-key cryptosystems, and some pairing algorithms. Moreover, based on these analyses, we proposed a multivariate cryptosystem which is expected to be secure against attacks using quantum computers. multivariate public-key cryptosystems, and some pairing algorithms. Moreover, based on these analyses, we proposed a multivariate cryptosystem which is expected to be secure against attacks using quantum computers.

Report

(6 results)
  • 2011 Annual Research Report   Final Research Report ( PDF )
  • 2010 Annual Research Report   Self-evaluation Report ( PDF )
  • 2009 Annual Research Report
  • 2008 Annual Research Report
  • Research Products

    (53 results)

All 2012 2011 2010 2009 2008

All Journal Article (21 results) (of which Peer Reviewed: 21 results) Presentation (32 results)

  • [Journal Article] A note on the pairing computation using normalized Miller functions2012

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama, Naoki Kanayama, Eiji Okamoto
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: Vol.E95-A, No.1 Pages: 196-203

    • NAID

      10030534797

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] A note on the pairing computation using normalized Miller function2012

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama, Naoki Kanayama, Eiji Okamoto
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E95-A Pages: 196-203

    • NAID

      10030534797

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cryptographic Pairings Based on Elliptic Nets2011

    • Author(s)
      Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
    • Journal Title

      Proc. of IWSEC 2011

      Volume: LNCS7038 Pages: 65-78

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme from Ideal Lattices2011

    • Author(s)
      Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama
    • Journal Title

      J. of Math-for-Industry

      Volume: Vol.3(2011A-1) Pages: 99-106

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] On the reduction attack against the algebraic surface public-key cryptosystem(ASC04)2011

    • Author(s)
      Satoshi Harada, Yuichi Wada, Shigenori Uchiyama, Hiro-o Tokunaga
    • Journal Title

      JSIAM Letters

      Volume: Vol.3 Pages: 53-56

    • NAID

      130001011973

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] On the reduction attack against the algebraic surface public-key cryp tosystem (ASC04)2011

    • Author(s)
      Satoshi Harada, Yuichi Wada, Shigenori Uchiyama, Hiro-o Tokunaga
    • Journal Title

      JSIAM Letters

      Volume: Vol.3 Pages: 53-56

    • NAID

      130001011973

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cryptographic Pairings Based on Elliptic Nets2011

    • Author(s)
      Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
    • Journal Title

      Proceedings of 6^<rd> International Workshop of Security (IWSEC2011)

      Volume: LNCS7038 Pages: 65-78

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of the Birational Permutation Signatue Scheme over a Non-commutative Ring2010

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Journal Title

      JSIAM Letters

      Volume: Vol.2 Pages: 85-88

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] On Patarin's Attack against the lIC Scheme, IEICE Trans2010

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Journal Title

      Fundamentals

      Volume: Vol.E93-A, No.1 Pages: 33-41

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Key Generation Algorithm for Gentry's Lattice Based Homomorphic Encryption Scheme2010

    • Author(s)
      Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama
    • Journal Title

      Proc.of IWSEC2010 LNCS6434

      Pages: 70-83

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of the Birational Permutation Signatue Scheme over a Non-commutative Ring2010

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Journal Title

      JSIAM Letters Vol.2

      Pages: 85-88

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] On Patarin's Attack against the lIC Scheme2010

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Journal Title

      IEICE Trans.Fundamentals Vol.E93-A, No.1

      Pages: 33-41

    • NAID

      10026862240

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring2010

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Journal Title

      JSIAM Letters

      Volume: Vol.2 Pages: 85-88

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Key Generation Algorithm for Gentry's Lattice Based Homomorphic Encryption Scheme2010

    • Author(s)
      Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama
    • Journal Title

      Proceedings of 5^<rd> International Workshop of Security(IWSEC2010)

      Volume: LNCS6434 Pages: 70-83

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] NZMATH 1.02010

    • Author(s)
      Satoru Tanaka, Naoki Ogura, Ken Nakamula, Tetsushi Matsui, Shigenori Uchiyama
    • Journal Title

      Proceedings of the 3^<rd> International Congress on Mathematical Software(ICMS2010)

      Volume: LNCS6327 Pages: 260-269

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] SFLASH署名方式への攻撃法の実装について2009

    • Author(s)
      小椋直樹,内山成憲,中村憲
    • Journal Title

      日本応用数理学会論文誌

      Volume: Vol.19, No.4 Pages: 433-445

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] SFLASH署名方式への攻撃法の実装について2009

    • Author(s)
      小椋直樹, 内山成憲, 中村憲
    • Journal Title

      日本応用数理学会論文誌 Vol.19, No.4

      Pages: 433-445

    • Related Report
      2010 Self-evaluation Report
    • Peer Reviewed
  • [Journal Article] On Patarin's Attack against the 1IC Scheme2009

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A

      Pages: 34-41

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] SFLASH署名方式への攻撃法の実装について2009

    • Author(s)
      小椋直樹、内山成憲、中村憲
    • Journal Title

      日本応用数理学会論文誌 19

      Pages: 433-445

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Remarks on the Attack of Fouque et al. against lIC Scheme2008

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Journal Title

      Proceeding of 3^<rd> International Workshop of Security (IWSEC2008) LNCS5312

      Pages: 34-48

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Knapsack暗号への攻撃を効果的にするためのSampling Reductionの改良と考察2008

    • Author(s)
      小泉賢洋, 宮澤俊之, 内山成憲, 中村憲
    • Journal Title

      日本応用数理学会論文誌 18

      Pages: 687-701

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Presentation] 代数曲面上の求セクション問題暗号に対するWuのアルゴリズムの適用2012

    • Author(s)
      小椋直樹、三原千穂、秋山浩一郎、三宅秀亨、内山成憲
    • Organizer
      日本応用数理学会2012年研究部会連合発表会
    • Place of Presentation
      九州大学
    • Year and Date
      2012-03-09
    • Related Report
      2011 Annual Research Report
  • [Presentation] wild自己同型を利用した高次多変数公開鍵暗号2012

    • Author(s)
      小椋直樹,内山成憲
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-01-31
    • Related Report
      2011 Annual Research Report 2011 Final Research Report
  • [Presentation] 代数曲面上の求セクション問題暗号に対するWuのアルゴリズムの適用2012

    • Author(s)
      小椋直樹,三原千穂,秋山浩一郎,三宅秀亨,内山成憲
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-01-31
    • Related Report
      2011 Annual Research Report 2011 Final Research Report
  • [Presentation] Elliptic Divisibility Sequenceを用いた素因数分解アルゴリズムの計算量評価と高速化2011

    • Author(s)
      櫻田尚寿, 鑓水淳一, 小椋直樹, 内山成憲
    • Organizer
      日本応用数理学会2012年度年会
    • Place of Presentation
      同志社大学
    • Year and Date
      2011-09-16
    • Related Report
      2011 Annual Research Report
  • [Presentation] 3変数多項式環の自己同型のtame性判定アルゴリズムの実装について2011

    • Author(s)
      原田諭,宮本泰徳,小椋直樹,黒田茂,内山成憲
    • Organizer
      日本応用数理学会2011年研究部会連合発表会
    • Place of Presentation
      電気通信大学
    • Year and Date
      2011-03-08
    • Related Report
      2011 Final Research Report
  • [Presentation] Elliptic Divisibility Sequenceを用いた素因数分解アルゴリズム2011

    • Author(s)
      鑓水淳一、櫻田尚寿、小椋直樹、内山成憲
    • Organizer
      2011年日本応用数理学会研究会連合発表会
    • Place of Presentation
      電気通信大学
    • Year and Date
      2011-03-08
    • Related Report
      2010 Annual Research Report
  • [Presentation] 3変数多項式環の自己同型のtame性判定アルゴリズムの実装について2011

    • Author(s)
      原田諭、宮本泰徳、小椋直樹、内山成憲
    • Organizer
      2011年日本応用数理学会研究会連合発表会
    • Place of Presentation
      電気通信大学
    • Year and Date
      2011-03-08
    • Related Report
      2010 Annual Research Report
  • [Presentation] 正規化されたMiller関数を用いたペアリング計算についての注意2011

    • Author(s)
      小椋直樹、内山成憲、金山直樹、岡本栄司
    • Organizer
      2011年日本応用数理学会研究会連合発表会
    • Place of Presentation
      電気通信大学
    • Year and Date
      2011-03-08
    • Related Report
      2010 Annual Research Report
  • [Presentation] 代数曲面暗号に対するFaugereらの攻撃法の理論的考察2011

    • Author(s)
      小椋直樹,三原千穂,秋山浩一郎,三宅秀亨,内山成憲
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉
    • Year and Date
      2011-01-27
    • Related Report
      2011 Final Research Report 2010 Self-evaluation Report
  • [Presentation] 代数曲面暗号(ASC06)に対する一般リダクション攻撃法の実装について2011

    • Author(s)
      原田諭,和田祐一,内山成憲,徳永浩雄
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉
    • Year and Date
      2011-01-27
    • Related Report
      2011 Final Research Report 2010 Annual Research Report
  • [Presentation] 正規化されたMiller関数を用いたペアリング計算についての注意2011

    • Author(s)
      小椋直樹,内山成憲,金山直樹,岡本栄司
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉
    • Year and Date
      2011-01-27
    • Related Report
      2011 Final Research Report 2010 Annual Research Report 2010 Self-evaluation Report
  • [Presentation] 公開鍵暗号NICEへの2次形式を用いた攻撃法の実装について2011

    • Author(s)
      田村創,内山成憲
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉
    • Year and Date
      2011-01-27
    • Related Report
      2011 Final Research Report 2010 Annual Research Report
  • [Presentation] 代数曲面暗号に対するFaugere等の攻撃法の理論的考察2011

    • Author(s)
      小椋直樹、三原子穂、秋山浩一郎、三宅秀亨、内山成憲
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉
    • Year and Date
      2011-01-27
    • Related Report
      2010 Annual Research Report
  • [Presentation] Elliptic Netを用いたAteペアリングとその変形2011

    • Author(s)
      小椋直樹、金山直樹、内山成憲、岡本栄司
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉
    • Year and Date
      2011-01-26
    • Related Report
      2010 Annual Research Report
  • [Presentation] Elliptic Netを用いたAteペアリングとその変形2010

    • Author(s)
      小椋直樹、金山直樹、内山成憲、岡本栄司
    • Organizer
      電子情報通信学会ISEC研究会
    • Place of Presentation
      機械振興会館
    • Year and Date
      2010-09-10
    • Related Report
      2010 Annual Research Report
  • [Presentation] Elliptic Netを用いたAteペアリングとその変形2010

    • Author(s)
      小椋直樹,金山直樹,内山成憲,岡本栄司
    • Organizer
      日本応用数理学会2010年度年会
    • Place of Presentation
      明治大学
    • Year and Date
      2010-09-08
    • Related Report
      2011 Final Research Report 2010 Annual Research Report
  • [Presentation] EllipticNetを用いたAteペアリングとその変形2010

    • Author(s)
      小椋直樹, 金山直樹, 内山成憲, 岡本栄司
    • Organizer
      日本応用数理学会2010年度年会
    • Place of Presentation
      明治大学
    • Year and Date
      2010-09-08
    • Related Report
      2010 Self-evaluation Report
  • [Presentation] 代数曲面暗号(ASC04)に対するリダクション攻撃法の実装について2010

    • Author(s)
      原田諭、和田祐一、内山成憲、徳永浩雄
    • Organizer
      日本応用数理学会2010年度年会
    • Place of Presentation
      明治大学
    • Year and Date
      2010-09-08
    • Related Report
      2010 Annual Research Report
  • [Presentation] Cryptographic pairings using elliptic nets2010

    • Author(s)
      Shigenori Uchiyama
    • Organizer
      Workshop on Algorithmic Number Theory and Its Application to Cryptography
    • Place of Presentation
      九州大学
    • Year and Date
      2010-06-11
    • Related Report
      2010 Annual Research Report
  • [Presentation] Elliptic netを用いたペアリングの計算について2010

    • Author(s)
      前田博之、小椋直樹、金山直樹、内山成憲、岡本栄司
    • Organizer
      平成22年日本応用数理学会研究部会連合発表会
    • Place of Presentation
      筑波大学
    • Year and Date
      2010-03-09
    • Related Report
      2009 Annual Research Report
  • [Presentation] 代数曲面暗号に対するグレブナー基底を用いた攻撃法の考察2010

    • Author(s)
      和田祐一、内山成憲、徳永浩雄
    • Organizer
      平成22年日本応用数理学会研究部会連合発表会
    • Place of Presentation
      筑波大学
    • Year and Date
      2010-03-09
    • Related Report
      2009 Annual Research Report
  • [Presentation] イデアル格子に基づく準同型暗号の構成法について2010

    • Author(s)
      小椋直樹、小林鉄太郎、山本剛、内山成憲
    • Organizer
      平成22年日本応用数理学会研究部会連合発表会
    • Place of Presentation
      筑波大学
    • Year and Date
      2010-03-09
    • Related Report
      2009 Annual Research Report
  • [Presentation] 暗号の数理~多変数公開鍵暗号へのいざない~2010

    • Author(s)
      内山成憲
    • Organizer
      暗号及び情報セキュリティと数学の相関ワークショップ
    • Place of Presentation
      秋葉原ダイビル
    • Year and Date
      2010-02-24
    • Related Report
      2009 Annual Research Report
  • [Presentation] 非可換双有理置換を用いた署名方式の安全性について2010

    • Author(s)
      小椋直樹、内山成憲
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松
    • Year and Date
      2010-01-21
    • Related Report
      2009 Annual Research Report
  • [Presentation] イデアル格子に基づく準同型暗号の構成法について2010

    • Author(s)
      小椋直樹、小林鉄太郎、山本剛、内山成憲
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report
  • [Presentation] 非可換双有理置換を用いた署名方式の安全性について2009

    • Author(s)
      小椋直樹,内山成憲
    • Organizer
      日本応用数理学会2009年度年会
    • Place of Presentation
      大阪大学豊中キャンパス
    • Year and Date
      2009-09-30
    • Related Report
      2011 Final Research Report 2009 Annual Research Report
  • [Presentation] 非可換双有理置換を用いた署名方式の安全性について2009

    • Author(s)
      小椋直樹, 内山成憲
    • Organizer
      日本応用数理学会2009年度年会
    • Place of Presentation
      大阪大学豊:中キャンパス
    • Year and Date
      2009-09-30
    • Related Report
      2010 Self-evaluation Report
  • [Presentation] 楕円曲線を用いた秘密分散共有法2009

    • Author(s)
      西遥, 前田博之, 内山成憲
    • Organizer
      日本応用数理学会2009年春の連合発表会
    • Place of Presentation
      京都大学理学部
    • Year and Date
      2009-03-07
    • Related Report
      2008 Annual Research Report
  • [Presentation] lIC方式へのFouque等の攻撃法について2009

    • Author(s)
      小椋直樹,内山成憲
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      大津プリンスホテル
    • Year and Date
      2009-01-21
    • Related Report
      2011 Final Research Report 2010 Self-evaluation Report
  • [Presentation] lIC 方式へのFouque等の攻撃法について2009

    • Author(s)
      小椋直樹, 内山成憲
    • Organizer
      2009年暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津プリンスホテル
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Remarks on the Attack of Fouque et al. against lIC Scheme2008

    • Author(s)
      Naoki Ogura, Shigenori Uchiyama
    • Organizer
      3^<rd> International Workshop of Security(IWSEC2008)
    • Place of Presentation
      かがわ国際会議場
    • Year and Date
      2008-11-25
    • Related Report
      2008 Annual Research Report
  • [Presentation] lIC 方式へのFouque等の攻撃法について2008

    • Author(s)
      小椋直樹, 内山成憲
    • Organizer
      日本応用数理学会「数論アルゴリズムとその応用」研究部会第18回研究集会
    • Place of Presentation
      情報セキュリティ大学院大学
    • Year and Date
      2008-07-05
    • Related Report
      2008 Annual Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi