• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Mathematical Foundation and Implantation Methods for Pairing-Based Cryptography

Research Project

Project/Area Number 22300026
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Computer system/Network
Research InstitutionKyushu University

Principal Investigator

TAKAGI Tsuyoshi  九州大学, マス・フォア・インダストリ研究所, 教授 (60404802)

Project Period (FY) 2010 – 2012
Project Status Completed (Fiscal Year 2012)
Budget Amount *help
¥13,650,000 (Direct Cost: ¥10,500,000、Indirect Cost: ¥3,150,000)
Fiscal Year 2012: ¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2011: ¥4,810,000 (Direct Cost: ¥3,700,000、Indirect Cost: ¥1,110,000)
Fiscal Year 2010: ¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Keywords暗号・認証 / 公開鍵暗号 / ペアリング暗号 / 高速実装 / 暗号プロトコル
Research Abstract

Pairing-based cryptography (PBC) provides us new cryptographicprotocols which cannot be constructed by the conventional public-key cryptosystems. In this research, we implemented ηT pairing and R-ate pairing on real-life computing environments such as mobilephones and GPGPU, and eventually we showed that PBC has become as efficient as RSA or elliptic curve cryptography on those devices. Moreover, we investigated the further development of ID-based encryption, and then we proposed an ID-based signcryption which is provably secure in the standard model.

Report

(4 results)
  • 2012 Annual Research Report   Final Research Report ( PDF )
  • 2011 Annual Research Report
  • 2010 Annual Research Report
  • Research Products

    (30 results)

All 2013 2012 2011 2010 Other

All Journal Article (20 results) (of which Peer Reviewed: 18 results) Presentation (4 results) Book (2 results) Remarks (4 results)

  • [Journal Article] 合成数位数のTateペアリングの効率的な計算方法2013

    • Author(s)
      清村優太郎, 高木剛
    • Journal Title

      2013年暗号と情報セキュリティシンポジウム

      Volume: SCIS2013 Pages: 70-70

    • Related Report
      2012 Annual Research Report
  • [Journal Article] Efficient Signcryption in the Standard Model2012

    • Author(s)
      Fagen Li, Mingwu Zhang, Tsuyoshi Takagi
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: Vol.24, No.17 Issue: 17 Pages: 1977-1989

    • DOI

      10.1002/cpe.1823

    • Related Report
      2012 Annual Research Report 2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] 携帯電話におけるペアリング暗号の実装2012

    • Author(s)
      井山政志, 清本晋作, 福島和英, 田中俊昭, 高木剛
    • Journal Title

      電子情報通信学会和文論文誌

      Volume: Vol.J95-A, No.7 Pages: 579-587

    • NAID

      10031083671

    • URL

      http://ci.nii.ac.jp/naid/10031083671

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Further Improvement of an Identity-Based Signcryption Scheme in the Standard Model2012

    • Author(s)
      Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi
    • Journal Title

      Computers & Electrical Engineering

      Volume: Vol.38,No.2 Issue: 2 Pages: 413-421

    • DOI

      10.1016/j.compeleceng.2011.11.001

    • Related Report
      2012 Annual Research Report 2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] 携帯電話におけるペアリング暗号の実装2012

    • Author(s)
      井山政志, 清本晋作, 福島和英, 田中俊昭, 高木剛
    • Journal Title

      電子情報通信学会論文誌

      Volume: Vol.J95-A, No.7 Pages: 579-587

    • NAID

      10031083671

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Android携帯電話におけるペアリングの高速実装2012

    • Author(s)
      井山政志, 福島和英, 清本晋作, 三宅優, 高木剛
    • Journal Title

      2012年暗号と情報セキュリティシンポジウム

      Volume: SCIS2012

    • Related Report
      2011 Annual Research Report
  • [Journal Article] Geometric Area based Keys and Policies in Functional Encryption Systems2011

    • Author(s)
      Mingwu Zhang, Tsuyoshi Takagi, GeoEnc
    • Journal Title

      16th Australasian Conference on Information Security and Privacy, ACISP 2011

      Volume: 6812 Pages: 241-258

    • DOI

      10.1007/978-3-642-22497-3_16

    • ISBN
      9783642224966, 9783642224973
    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Implementation of the nT Pairing on GPU2011

    • Author(s)
      Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
    • Journal Title

      9th International Conference on Applied Cryptography and Network Security, ACNS 2011

      Pages: 119-133

    • URL

      http://eprint.iacr.org/2011/540.pdf

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Anonymous Encryption with Partial-Order Subset Delegation Functionality, Fifth International Conference on Provable Security2011

    • Author(s)
      Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi
    • Journal Title

      ProvSec 2011

      Volume: LNCS 6980 Pages: 154-169

    • DOI

      10.1007/978-3-642-24316-5_12

    • ISBN
      9783642243158, 9783642243165
    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Identity-Based Signcryption in the Standard Model2011

    • Author(s)
      Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi
    • Journal Title

      Fifth International Conference on Provable Security, ProvSec 2011

      Volume: LNCS 6980 Pages: 120-137

    • DOI

      10.1007/978-3-642-24316-5_10

    • ISBN
      9783642243158, 9783642243165
    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 32011

    • Author(s)
      Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E94-A Issue: 1 Pages: 150-155

    • DOI

      10.1587/transfun.E94.A.150

    • NAID

      10027986627

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2012 Final Research Report 2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Implementation of the EtaT Pairing on GPU2011

    • Author(s)
      Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
    • Journal Title

      9th International Conference on Applied Cryptography and Network Security

      Volume: (Industrial Track) Pages: 119-133

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] GeoEnc : geometric area based key and policies in functional encryption systems2011

    • Author(s)
      Mingwu Zhang, Tsuyoshi Takagi
    • Journal Title

      16th Australasian Conference on Information Security and Privacy, ACISP 2011

      Volume: LNCS 6812 Pages: 241-258

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Anonymous encryption with partial-order subset delegation functionality2011

    • Author(s)
      Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi
    • Journal Title

      The Fifth International Conference on Provable Security, ProvSec2011

      Volume: LNCS 6980 Pages: 154-169

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Identity-Based Signcryption in the Standard Model2011

    • Author(s)
      Fagen Li, Fahad BinMuhaya, Mingwu Zhang, Tsuyoshi Takagi
    • Journal Title

      The Fifth International Conference on Provable Security, ProvSec 2011

      Volume: LNCS 6980 Pages: 120-137

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor, 20112011

    • Author(s)
      Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi
    • Journal Title

      International Journal of Network Security

      Volume: vol.12,no.1 Pages: 50-57

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Implemen- tation of Pairing-based Cryptography on BREW Mobile Phones2010

    • Author(s)
      Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi
    • Journal Title

      The 5th International Workshop on Security, IWSEC 2010

      Volume: LNCS 6434 Pages: 326-336

    • DOI

      10.1007/978-3-642-16825-3_22

    • ISBN
      9783642168246, 9783642168253
    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of Efficient Proxy Signature Schemes for Mobile Communication2010

    • Author(s)
      Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
    • Journal Title

      Science China Information Sciences

      Volume: Vol.53, No.10 Issue: 10 Pages: 2016-2021

    • DOI

      10.1007/s11432-010-4012-y

    • Related Report
      2012 Final Research Report 2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Pairing-based cryptography and its security analysis2010

    • Author(s)
      Tsuyoshi Takagi
    • Journal Title

      Casimir Force, Casimir Operators and the Riemann Hypothesis

      Volume: Chapter 5 Pages: 43-56

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Implementation of Pairing-based Cryptography on BREW Mobile Phones2010

    • Author(s)
      Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi
    • Journal Title

      The 5th International Workshop on Security

      Volume: LNCS 6434 Pages: 326-336

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Presentation] センサノード MICAz におけるペアリング暗号の高速実装2012

    • Author(s)
      高木剛
    • Organizer
      2012 年暗号と情報セキュリティシンポジウム, チュートリアル講演
    • Place of Presentation
      金沢エクセルホテル
    • Year and Date
      2012-02-01
    • Related Report
      2012 Final Research Report
  • [Presentation] センサノードMICAzにおけるペアリング暗号の高速実装2012

    • Author(s)
      高木剛
    • Organizer
      2012年暗号と情報セキュリティシンポジウム,SCIS2012
    • Place of Presentation
      金沢エクセルホテル(金沢)(チュートリアル講演)
    • Year and Date
      2012-02-01
    • Related Report
      2011 Annual Research Report
  • [Presentation] Fault Attacks on Multivariate Public-Key Cryptosystems2011

    • Author(s)
      Tsuyoshi Takagi
    • Organizer
      International Conference on Coding and Cryptography
    • Place of Presentation
      Ewha Womans University, ソウル, 韓国
    • Year and Date
      2011-08-26
    • Related Report
      2012 Final Research Report
  • [Presentation] Fault Attacks on Multivariate Public-Key Cryptosystems2011

    • Author(s)
      Tsuyoshi Takagi
    • Organizer
      International Conference on Coding and Cryptography
    • Place of Presentation
      Ewha Womans University, Seoul, Korea(招待講演)
    • Year and Date
      2011-08-26
    • Related Report
      2011 Annual Research Report
  • [Book] 6th International Conference on Provable Security - ProvSec 20122012

    • Author(s)
      Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
    • Total Pages
      335
    • Publisher
      Springer Verlag
    • Related Report
      2012 Final Research Report
  • [Book] 6th International Conference on Provable Security - ProvSec 20122012

    • Author(s)
      Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu (Eds.)
    • Total Pages
      335
    • Publisher
      Springer Verlag
    • Related Report
      2012 Annual Research Report
  • [Remarks]

    • URL

      http://imi.kyushu-u.ac.jp/~takagi/

    • Related Report
      2012 Final Research Report
  • [Remarks] http://imi.kyushu-u.ac.jp/~takagi/

    • Related Report
      2012 Annual Research Report
  • [Remarks]

    • URL

      http://imi.kyushu-u.ac.jp/~takagi/

    • Related Report
      2011 Annual Research Report
  • [Remarks]

    • URL

      http://www2.math.kyushu-u.ac.jp/~takagi/

    • Related Report
      2010 Annual Research Report

URL: 

Published: 2010-08-23   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi