• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Computationally sound symbolic analysis of security and assistance of redesign for cryptographic protocols

Research Project

Project/Area Number 21700015
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Fundamental theory of informatics
Research InstitutionOsaka University

Principal Investigator

YOSHIDA Maki  大阪大学, 大学院・情報科学研究科, 助教 (50335387)

Project Period (FY) 2009 – 2011
Project Status Completed (Fiscal Year 2011)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2011: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2010: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2009: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywords暗号プロトコル / 安全性 / 汎用的結合可能性 / 形式的検証 / 計算量的に健全 / 計算量的健全性 / UC安全性 / GUC安全性 / EUC安全性 / Generic model
Research Abstract

The purpose of this work is to develop a method to analysis universally composable security of cryptographic protocols and assist redesign insecure protocols.

Report

(4 results)
  • 2011 Annual Research Report   Final Research Report ( PDF )
  • 2010 Annual Research Report
  • 2009 Annual Research Report
  • Research Products

    (45 results)

All 2012 2011 2010 2009

All Journal Article (16 results) (of which Peer Reviewed: 13 results) Presentation (29 results)

  • [Journal Article] Toward Digital Watermarking for Cryptographic Data2011

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E94-A, No.1 Pages: 270-272

    • NAID

      10027986929

    • Related Report
      2011 Final Research Report 2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Bilinear Groupに関する困難性仮定への攻撃導出-Cryptology ePrint Archive上の仮定に攻撃は存在するか?-2011

    • Author(s)
      岡前直由, 吉田真紀, 雲嶋健太, 阿部正幸, 大久保美也子, 藤原融
    • Journal Title

      2011年暗号と情報セキュリティシンポジウム予稿集

      Volume: (CD-ROM)

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 評価者間類似度計算の改善による汚染コンテンツダウンロード抑制効果向上2010

    • Author(s)
      山中広明, 岡村真吾, 藤原融, 吉田真紀, 石原靖哲, 秋山豊和, 加藤精一, 下條真司
    • Journal Title

      情報処理学会論文誌

      Volume: Vol.51 No.8 Pages: 1428-1442

    • NAID

      110007970746

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] All-or-nothing Property for Efficient Symbolic Analysis2010

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Computational and Symbolic Proofs of Security

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] Expiration Dated Fingerprinting2010

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IJICIC

      Volume: Vol.6, No.3 Pages: 1271-1278

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] 公理的安全性の枠組みにおける汎用的結合可能な相互認証と鍵交換の記号的安全性2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Journal Title

      日本応用数理学会論文誌

      Volume: 第20巻,第1号 Pages: 11-32

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] The Vector Decomposition Problem2010

    • Author(s)
      Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E93-A, No.1 Pages: 188-193

    • NAID

      10026862600

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] Computationally Sound Symbolic Analysis for EUC Security of Key Exchange2010

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Journal Title

      日本応用数理学会2010年度年会

      Pages: 63-64

    • Related Report
      2010 Annual Research Report
  • [Journal Article] Generic Modelにおける困難性仮定への攻撃の数式処理を用いた導出2010

    • Author(s)
      雲嶋健太, 吉田真紀, 阿部正幸, 大久保美也子, 藤原融
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: Vol.110, No.281 Pages: 57-64

    • NAID

      110008153932

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 公理的安全性の枠組みにおける汎用的結合可能な相互認証と鍵交換の記号的安全性2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Journal Title

      日本応用数理学会論文誌 第20巻,第1号(To appear)

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Expiration Dated Fingerprinting2010

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      International Journal of Innovative Computing, Information and Control (IJICIC) Vo1.6, No.3

      Pages: 1271-1278

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] The Vector Decomposition Problem2010

    • Author(s)
      Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E93-A, No.1

      Pages: 188-193

    • NAID

      10026862600

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Watermarking Cryptographic Data2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP2009)

      Volume: A02-02(CD-ROM)

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking2009

    • Author(s)
      Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, and Toru Fujiwara
    • Journal Title

      the8th International Workshop on Digital Watermarking(IWDW2009)

      Volume: LNCS5703 Pages: 279-293

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] Development of a Verification Tool for Composable Security2009

    • Author(s)
      Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Computational and Symbolic Proofs of Security

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Journal Article] Flexible Timed-release Encryption2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E92-A, No.1 Pages: 222-225

    • NAID

      10026855139

    • Related Report
      2011 Final Research Report
    • Peer Reviewed
  • [Presentation] 画質劣化を抑えた加法と乗法のハイブリッド電子透かしと尤度比検定による最適な検出2012

    • Author(s)
      吉田真紀
    • Organizer
      CompView暗号理論ワークショップ
    • Place of Presentation
      東工大蔵前会館(東京都)(招待講演)
    • Year and Date
      2012-02-22
    • Related Report
      2011 Annual Research Report
  • [Presentation] 画質劣化を抑えた加法と乗法のハイブリッド電子透かし2012

    • Author(s)
      池田成吾, 吉田真紀, 藤原融
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急(石川県)
    • Year and Date
      2012-02-01
    • Related Report
      2011 Annual Research Report
  • [Presentation] On the Security of Ciphertext in Public-Key Encryption2012

    • Author(s)
      安永憲司, 吉田真紀
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急(石川県)
    • Year and Date
      2012-02-01
    • Related Report
      2011 Annual Research Report
  • [Presentation] Generic Construction of GUC Secure Commitment Protocol in the PKI Model2012

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急(石川県)
    • Year and Date
      2012-01-30
    • Related Report
      2011 Annual Research Report
  • [Presentation] Generic Construction of GUC Secure Commitment Protocol in the PKI Model2012

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Organizer
      Proceedings of the2012Symposium on Cryptography and Information Security
    • Related Report
      2011 Final Research Report
  • [Presentation] 画質劣化を抑えた加法と乗法のハイブリッド電子透かし2012

    • Author(s)
      池田成吾, 吉田真紀, 藤原融
    • Organizer
      2012年暗号と情報セキュリティシンポジウム予稿集
    • Related Report
      2011 Final Research Report
  • [Presentation] EUC安全なメッセージ認証のためのmulti-messageプロトコルに対する記号的基準2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      大阪電気通信大学(大阪府)
    • Year and Date
      2011-11-15
    • Related Report
      2011 Annual Research Report
  • [Presentation] Bilinear Groupに関する困難性仮定への攻撃導出2011

    • Author(s)
      吉田真紀
    • Organizer
      Progress in Computer Algebra Systems
    • Place of Presentation
      九州大学マス・フォア・インダストリ研究所(福岡県)(招待講演)
    • Year and Date
      2011-08-31
    • Related Report
      2011 Annual Research Report
  • [Presentation] Recovery of Tampered Pixels for Statistical Fragile Watermarking2011

    • Author(s)
      吉田真紀, 大北和也, 藤原融
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      静岡大学浜松キャンパス(静岡県)
    • Year and Date
      2011-07-12
    • Related Report
      2011 Annual Research Report
  • [Presentation] On d-Multiplicative Non-perfect Secret Sharing2011

    • Author(s)
      吉田真紀, 藤原融
    • Organizer
      2011 Workshop on Secret Sharing and Cloud Computing
    • Place of Presentation
      九州大学マス・フォア・インダストリ研究所(福岡県)(招待講演)
    • Year and Date
      2011-06-07
    • Related Report
      2011 Annual Research Report
  • [Presentation] On the Impossibility of d-Multiplicative Non-perfect Secret Sharing2011

    • Author(s)
      吉田真紀
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館(東京都)
    • Year and Date
      2011-05-13
    • Related Report
      2011 Annual Research Report
  • [Presentation] EUC安全なメッセージ認証のためのmulti-messageプロトコルに対する記号的基準2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      IEICE Tech. Rep.
    • Related Report
      2011 Final Research Report
  • [Presentation] Recovery of Tampered Pixels for Statistical Fragile Watermarking2011

    • Author(s)
      aki Yoshida, Kazuya Ohkita, Toru Fujiwara
    • Organizer
      IEICE Tech. Rep.
    • Related Report
      2011 Final Research Report
  • [Presentation] On the Impossibility of d-Multiplicative Non-perfect Secret Sharing2011

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      IEICE Tech. Rep.
    • Related Report
      2011 Final Research Report
  • [Presentation] Bilinear Groupに関する困難性仮定への攻撃導出-Cryptology ePrint Archive上の仮定に攻撃は存在するか?-2011

    • Author(s)
      岡前直由, 吉田真紀, 雲嶋健太, 阿部正幸, 大久保美也子, 藤原融
    • Organizer
      2011年暗号と情報セキュリティシンポジウム予稿集
    • Related Report
      2011 Final Research Report
  • [Presentation] Static Adversaryに対してEUC安全な認証の記号的基準について2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会技術研究報告
    • Related Report
      2011 Final Research Report
  • [Presentation] All-or-nothing Property for Efficient Symbolic Analysis2010

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      Computational and Symbolic Proofs of Security
    • Place of Presentation
      Barbizon, France
    • Year and Date
      2010-04-15
    • Related Report
      2010 Annual Research Report
  • [Presentation] 多様性か否か-安全性の形式的検証と男女共同参画2010

    • Author(s)
      吉田真紀
    • Organizer
      東工大女性研究者のキャリアモデルインタビュー
    • Place of Presentation
      東京,日本
    • Year and Date
      2010-02-25
    • Related Report
      2009 Annual Research Report
  • [Presentation] Recovery of Tampered Pixels for Statistical Fragile Watermarking2010

    • Author(s)
      Kazuya Ohkita, Maki Yoshida, Toru Fujiwara
    • Organizer
      Proceedings of the 2010 Symposium on Cryptography and Information Security (SCIS2010)
    • Place of Presentation
      高松、日本
    • Year and Date
      2010-01-21
    • Related Report
      2009 Annual Research Report
  • [Presentation] 汎用的結合可能な相互認証に対する記号的識別不可能性を用いた記号的基準2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      高松、日本
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report
  • [Presentation] Computationally Sound Symbolic Analysis for EUC Security of Key Exchange2010

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Organizer
      日本応用数理学会2010年度年会
    • Related Report
      2011 Final Research Report
  • [Presentation] Generic Modelにおける困難性仮定への攻撃の数式処理を用いた導出2010

    • Author(s)
      雲嶋健太, 吉田真紀, 阿部正幸, 大久保美也子, 藤原融
    • Organizer
      電子情報通信学会技術研究報告
    • Related Report
      2011 Final Research Report
  • [Presentation] 汎用的結合可能な相互認証に対する記号的識別不可能性を用いた記号的基準2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2010年暗号と情報セキュリティシンポジウム予稿集
    • Related Report
      2011 Final Research Report
  • [Presentation] 電子透かし性能向上のための統計的手法2009

    • Author(s)
      吉田真紀
    • Organizer
      電子透かしと確率的情報処理
    • Place of Presentation
      仙台,日本
    • Year and Date
      2009-11-13
    • Related Report
      2009 Annual Research Report
  • [Presentation] 汎用的結合可能な安全性の形式的検証のためのpattern拡張に関する一考察2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年度年会,数理的技法による情報セキュリティ(FAIS)
    • Place of Presentation
      豊中,日本
    • Year and Date
      2009-09-28
    • Related Report
      2009 Annual Research Report
  • [Presentation] Watermarking Cryptographic Data A02-022009

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009)
    • Place of Presentation
      Kyoto, Japan(CD-ROM)
    • Year and Date
      2009-09-12
    • Related Report
      2009 Annual Research Report
  • [Presentation] Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking2009

    • Author(s)
      Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara
    • Organizer
      The 8th International Workshop on Digital Watermarking (IWDW 2009)
    • Place of Presentation
      Guildford, UK
    • Year and Date
      2009-08-26
    • Related Report
      2009 Annual Research Report
  • [Presentation] Development of a Verification Tool for Composable Security2009

    • Author(s)
      Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, Toru Fujiwara
    • Organizer
      Computational and Symbolic Proofs of Security (CosyProofs 2009)
    • Place of Presentation
      Atagawa, Japan
    • Year and Date
      2009-04-08
    • Related Report
      2009 Annual Research Report
  • [Presentation] 汎用的結合可能な安全性の形式的検証のためのpattern拡張に関する一考察2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年度年会
    • Related Report
      2011 Final Research Report

URL: 

Published: 2009-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi