• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Theoretical Study for Practical Applications of Information Theoretically Secure Cryptosystems

Research Project

Project/Area Number 20760236
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Communication/Network engineering
Research InstitutionThe University of Electro-Communications

Principal Investigator

IWAMOTO Mitsugu  The University of Electro-Communications, 先端領域教育研究センター, 特任助教 (50377016)

Project Period (FY) 2008 – 2010
Project Status Completed (Fiscal Year 2010)
Budget Amount *help
¥4,030,000 (Direct Cost: ¥3,100,000、Indirect Cost: ¥930,000)
Fiscal Year 2010: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2009: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2008: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords暗号・情報セキュリティ / 情報理論的暗号 / 秘密分散法 / 不正検出 / 暗号 / 情報セキュリティ / 情報理論的暗号理論 / 仮説検定
Research Abstract

We studied information theoretically secure cryptosystems in order to make them more practical. As a result, we obtained three results along with this research direction. Three main results are : (1) coding theorems for (2,2)-threshold secret sharing schemes secure against cheaters, (2) a proposal of efficient visual secret sharing schemes by relaxing information theoretical security notion, and (3) a new look at relations among information theoretically secure and computationally secure symmetric key encryptions. Furthermore, we obtained several results in cryptography and information security in which information theoretic methods are effectively utilized.

Report

(4 results)
  • 2010 Annual Research Report   Final Research Report ( PDF )
  • 2009 Annual Research Report
  • 2008 Annual Research Report
  • Research Products

    (41 results)

All 2011 2010 2009 2008 Other

All Presentation (36 results) Book (1 results) Remarks (4 results)

  • [Presentation] Triviumのセットアップタイム違反に基づく新しい故障差分解析2011

    • Author(s)
      李奇, 五味澤重友, 岩本貢, 太田和夫, 崎山一男
    • Organizer
      電子情報通信学会研究会研究報告, IEICE-ISEC2010-122, pp.333-339
    • Year and Date
      2011-03-04
    • Related Report
      2010 Final Research Report
  • [Presentation] Triviumのセットアップタイム違反に基づく新しい故障差分解析2011

    • Author(s)
      李奇, 五味澤重友, 岩本貢, 太田和夫, 崎山一男
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      大阪大学吹田キャンパス(吹田市)
    • Year and Date
      2011-03-04
    • Related Report
      2010 Annual Research Report
  • [Presentation] 情報理論的に安全な暗号化のための安全性概念2011

    • Author(s)
      岩本貢, 太田和夫
    • Organizer
      CompView暗号理論ワークショップ
    • Place of Presentation
      東京工業大学,東京
    • Year and Date
      2011-02-21
    • Related Report
      2010 Final Research Report
  • [Presentation] FDH署名の安全性証明の再考2011

    • Author(s)
      坂井祐介, 岩本貢, 駒野雄一, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011), 4A2-1
    • Year and Date
      2011-02-21
    • Related Report
      2010 Final Research Report
  • [Presentation] 情報理論的に安全な暗号化のための安全性概念2011

    • Author(s)
      岩本貢, 太田和夫
    • Organizer
      CompView暗号理論ワークショップ
    • Place of Presentation
      東京工業大学蔵前会館ロイアルブルーホール(東京都)(招待講演)
    • Year and Date
      2011-02-21
    • Related Report
      2010 Annual Research Report
  • [Presentation] Joux-Lucksの3-collisions探索アルゴリズムに関する計算量の詳細な検討2011

    • Author(s)
      名渕大樹, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011), 4B1-4
    • Year and Date
      2011-01-28
    • Related Report
      2010 Final Research Report
  • [Presentation] Joux-Lucksの3-collisions探索アルゴリズムに関する計算量の詳細な検討2011

    • Author(s)
      名渕大樹, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011)
    • Place of Presentation
      リーガロイヤルホテル小倉(小倉市)
    • Year and Date
      2011-01-28
    • Related Report
      2010 Annual Research Report
  • [Presentation] FDH署名の安全性証明の再考2011

    • Author(s)
      坂井祐介, 岩本貢, 駒野雄一, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011)
    • Place of Presentation
      リーガロイヤルホテル小倉(小倉市)
    • Year and Date
      2011-01-28
    • Related Report
      2010 Annual Research Report
  • [Presentation] 電磁波解析における局所性と放射磁界方向について2011

    • Author(s)
      落合隆夫, 山本大, 伊藤孝一, 武仲正彦, 鳥居直哉, 内田大輔, 永井利明, 若菜伸一, 岩本貢, 太田和夫, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011), 2D3-3
    • Year and Date
      2011-01-26
    • Related Report
      2010 Final Research Report
  • [Presentation] ラッチの乱数出力位置を利用したPUFによるID生成/認証システムの信頼性向上手法2011

    • Author(s)
      山本大, 崎山一男, 岩本貢, 太田和夫, 落合隆夫, 武仲正彦, 伊藤孝一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011), 2D1-1
    • Year and Date
      2011-01-26
    • Related Report
      2010 Final Research Report
  • [Presentation] ラッチの乱数出力位置を利用したPUFによるID生成/認証システムの信頼性向上手法2011

    • Author(s)
      山本大, 崎山一男, 岩本貢, 太田和夫, 落合隆夫, 武仲正彦, 伊藤孝一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011)
    • Place of Presentation
      リーガロイヤルホテル小倉(小倉市)
    • Year and Date
      2011-01-26
    • Related Report
      2010 Annual Research Report
  • [Presentation] 電磁波解析における局所性と放射磁界方向について2011

    • Author(s)
      落合隆夫, 山本大, 伊藤孝一, 武仲正彦, 鳥居直哉, 内田大輔, 永井利明, 若菜伸一, 岩本貢, 太田和夫, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2011)
    • Place of Presentation
      リーガロイヤルホテル小倉(小倉市)
    • Year and Date
      2011-01-26
    • Related Report
      2010 Annual Research Report
  • [Presentation] 情報理論的に安全な暗号化のための安全性概念2010

    • Author(s)
      岩本貢, 太田和夫
    • Organizer
      情報理論とその応用シンポジウム(SITA2010), pp.202-207
    • Year and Date
      2010-12-01
    • Related Report
      2010 Final Research Report
  • [Presentation] 情報理論的に安全な暗号化のための安全性概念2010

    • Author(s)
      岩本貢, 太田和夫
    • Organizer
      情報理論とその応用シンポジウム(SITA2010)
    • Place of Presentation
      松代ロイヤルホテル(長野市)
    • Year and Date
      2010-12-01
    • Related Report
      2010 Annual Research Report
  • [Presentation] A general construction method of visual secret sharing schemes with share rotations2010

    • Author(s)
      M. Iwamoto, Y. Li, K. Sakiyama, K.Ohta
    • Organizer
      Technical Report of IEICE, ISEC2010-49, pp.67-74
    • Year and Date
      2010-09-10
    • Related Report
      2010 Final Research Report
  • [Presentation] A general construction method of visual secret sharing schemes with share rotations2010

    • Author(s)
      M.Iwamoto, Y.Li, K.Sakiyama, K.Ohta
    • Organizer
      電子情報通信学会 情報セキュリティ研究会
    • Place of Presentation
      機会振興会館(東京)
    • Year and Date
      2010-09-10
    • Related Report
      2010 Annual Research Report
  • [Presentation] PUF-HB 認証プロトコルに対する能動的な攻撃2010

    • Author(s)
      長井大地, 塙知剛, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム, 2C2-5
    • Year and Date
      2010-01-21
    • Related Report
      2010 Final Research Report
  • [Presentation] PUF-HB認証プロトコルに対する能動的な攻撃2010

    • Author(s)
      坂井大地, 塙知剛, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2010)
    • Place of Presentation
      サンポートホール高松(香川県高松市)
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report
  • [Presentation] Visual Secret Sharing Schemes for Multiple Secret Images Including Shifting Operation of Shares2009

    • Author(s)
      A. Espejel-Trujillo, M.Nakano-Miyatake, M. Iwamoto
    • Organizer
      6th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE 2009), pp.433-438
    • Year and Date
      2009-11-20
    • Related Report
      2010 Final Research Report
  • [Presentation] Visual Secret Sharing Schemes for Multiple Secret Images Including Shifting Operation of Shares2009

    • Author(s)
      A.Espejel-Trujillo, M.Nakano-Miyatake, M.Iwamoto
    • Organizer
      International Conference on Electrical Engineering, Computing Science and Automatic Control
    • Place of Presentation
      Facultad de Ingenieria, Universidad autonoma del Estado de Mexico(Mexico city, Mexico)
    • Year and Date
      2009-11-11
    • Related Report
      2009 Annual Research Report
  • [Presentation] Coding Theorems for a (2, 2) Threshold Scheme Secure against Impersonation by an Opponent2009

    • Author(s)
      H. Koga, M. Iwamoto, H. Yamamoto,
    • Organizer
      IEEE-ITW 2009, pp.188-192
    • Year and Date
      2009-10-13
    • Related Report
      2010 Final Research Report
  • [Presentation] Coding Theorems for a(2, 2)-Threshold Scheme Secure against Impersonation by an Opponent2009

    • Author(s)
      H.Koga, M.Iwamoto, H.Yamamoto
    • Organizer
      IEEE Information Theory Workshop
    • Place of Presentation
      Hotel Diodoro(Taormina, Italy)
    • Year and Date
      2009-10-13
    • Related Report
      2009 Annual Research Report
  • [Presentation] A coding theorem for cheating-detectable (2,2)-threshold blockwise secret sharing schemes2009

    • Author(s)
      M. Iwamoto, H. Yamamoto, H. Koga
    • Organizer
      IEEE-ISIT 2009, pp.1308-1312
    • Year and Date
      2009-06-30
    • Related Report
      2010 Final Research Report
  • [Presentation] 画像の回転に対する新しい視覚復号型秘密分散法2009

    • Author(s)
      李陽, 岩本貢, 太田和夫, 崎山一男
    • Organizer
      電子情報通信学会研究会研究報告, ISEC2009-5, pp.29-36
    • Year and Date
      2009-05-22
    • Related Report
      2010 Final Research Report
  • [Presentation] 画像の回転に対する新しい視覚復号型秘密分散法2009

    • Author(s)
      李陽, 岩本貢, 太田和夫, 崎山一男
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機会振興会館(東京)
    • Year and Date
      2009-05-22
    • Related Report
      2009 Annual Research Report
  • [Presentation] なりすまし攻撃を検出できる(2, 2)しきい値法に関する符号化定理2009

    • Author(s)
      古賀弘樹, 岩本貢, 山本博資
    • Organizer
      電子情報通信学会研究会研究報告, IT2008-66, ISEC2008-124, WBS2008-79, pp.143-150
    • Year and Date
      2009-03-09
    • Related Report
      2010 Final Research Report
  • [Presentation] なりすまし攻撃への耐性をもつ(2,2)しきい値法に関する符号化定理2009

    • Author(s)
      古賀弘樹, 岩本貢, 山本博資
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      北海道函館市, はこだて未来大学
    • Year and Date
      2009-03-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] 漸近的にほぼ確実に不正検出可能な秘密分散法2009

    • Author(s)
      岩本貢, 山本博資
    • Organizer
      暗号と情報セキュリティシンポジウム, 1F1-2
    • Year and Date
      2009-01-20
    • Related Report
      2010 Final Research Report
  • [Presentation] Weakly secure visual secret sharing schemes2009

    • Author(s)
      M. Iwamoto
    • Organizer
      暗号と情報セキュリティシンポジウム, 1F1-4
    • Year and Date
      2009-01-20
    • Related Report
      2010 Final Research Report
  • [Presentation] 漸近的にほぼ確実に不正検出可能な秘密分散法2009

    • Author(s)
      岩本貢, 山本博資
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-20
    • Related Report
      2008 Annual Research Report
  • [Presentation] Weakly Secure Visual Secret Sharing Schemes2009

    • Author(s)
      Mitsugu Iwamoto
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-20
    • Related Report
      2008 Annual Research Report
  • [Presentation] A Coding Theorem for Cheating-Detectable (2, 2)-Threshold Blockwise Secret Sharing Schemes2009

    • Author(s)
      M.Iwamoto, H.Yamamoto, H.Koga
    • Organizer
      IEEE International Symposium on Information Theory(ISIT)2010
    • Place of Presentation
      COEX(韓国ソウル市)
    • Related Report
      2009 Annual Research Report
  • [Presentation] Weakly secure visual secret sharing schemes2008

    • Author(s)
      M.Iwamoto
    • Organizer
      ISITA2008, pp.42-47
    • Year and Date
      2008-12-08
    • Related Report
      2010 Final Research Report
  • [Presentation] Weakly Secure Visual Secret Sharing Schemes2008

    • Author(s)
      Mitsugu Iwamoto
    • Organizer
      International Symposium on Information Theory and Its Applications (ISITA2008)
    • Place of Presentation
      Auckland, New Zealand
    • Year and Date
      2008-12-08
    • Related Report
      2008 Annual Research Report
  • [Presentation] 漸近的にほぼ確実に不正検出可能な秘密分散法2008

    • Author(s)
      岩本貢, 山本博資
    • Organizer
      情報理論とその応用シンポジウム, pp.532-537
    • Year and Date
      2008-10-09
    • Related Report
      2010 Final Research Report
  • [Presentation] 漸近的にほぼ確実に不正検出可能な秘密分散法2008

    • Author(s)
      岩本貢, 山本博資
    • Organizer
      情報理論とその応用学会
    • Place of Presentation
      栃木県日光市
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Book] 知識ベース「知識の森」(1群1編「情報理論」13.4 章「秘密分散」)

    • Publisher
      電子情報通信学会
    • URL

      http://www.ieice-hbkb.org/portal/

    • Related Report
      2010 Final Research Report
  • [Remarks] ホームページ等

    • URL

      http://www.quest.is.uec.ac.jp/mitsugu/http://www.ghrdp.uec.ac.jp/

    • Related Report
      2010 Final Research Report
  • [Remarks]

    • URL

      http://www.quest.is.uec.ac.jp/mitsugu/

    • Related Report
      2010 Annual Research Report
  • [Remarks]

    • URL

      http://www.ghrdp.uec.ac.jp/introduction/intro_iwamoto.html

    • Related Report
      2010 Annual Research Report
  • [Remarks]

    • URL

      http://kjk.office.uec.ac.jp/Profiles/0004/0001044/profile.html

    • Related Report
      2009 Annual Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi