• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on Information-Theoretically Composable Security for Cryptographic Primitives

Research Project

Project/Area Number 23500012
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionYokohama National University

Principal Investigator

SHIKATA JUNJI  横浜国立大学, 大学院環境情報研究院, 准教授 (30345483)

Co-Investigator(Renkei-kenkyūsha) MATSUMOTO Tsutomu  横浜国立大学, 大学院・環境情報研究院, 教授 (40183107)
Project Period (FY) 2011 – 2013
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥4,940,000 (Direct Cost: ¥3,800,000、Indirect Cost: ¥1,140,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2012: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Fiscal Year 2011: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Keywords暗号・認証等 / 暗号理論 / 情報理論的安全性 / 結合可能安全性 / 情報セキュリティ / 結合可能性
Research Abstract

In this research project, we studied cryptographic primitives having information-theoretic composable security. Here, information-theoretic composable security implies the strong security which does not depend on any computational model, and cryptographic primitives having such a security can be composed with other ones without losing their security. The main contribution of this research is to show the essential equivalence of information-theoretic composable security and traditional information-theoretic security for cryptographic primitives such as encryption, key-agreement, and authentication codes. This result means that the cryptographic primitives having traditional information-theoretic security can be composed with other ones without losing security in various and complicated systems in information society, and therefore, our results are considered to be important not only from an theoretical aspect but also from a practical viewpoint.

Report

(4 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (60 results)

All 2014 2013 2012 2011 Other

All Journal Article (29 results) (of which Peer Reviewed: 12 results) Presentation (29 results) (of which Invited: 2 results) Remarks (2 results)

  • [Journal Article] Revisiting Information Theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      J. Shikata
    • Journal Title

      Proc. of the 31th Symposium on Cryptography and Information Security (SCIS2014)

      Volume: (CDROM)

    • Related Report
      2013 Final Research Report
  • [Journal Article] Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies2014

    • Author(s)
      M. Iwamoto and J. Shikata
    • Journal Title

      Proc. of the 31th Symposium on Cryptography and Information Security (SCIS2014)

      Volume: (CDROM)

    • Related Report
      2013 Final Research Report
  • [Journal Article] Revisiting Information-theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      Junji Shikata
    • Journal Title

      Proc. of The 31th Symposium on Cryptography and Information Security (SCIS 2014)

      Volume: なし

    • Related Report
      2013 Annual Research Report
  • [Journal Article] Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies2014

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of The 31th Symposium on Cryptography and Information Security (SCIS 2014)

      Volume: なし

    • Related Report
      2013 Annual Research Report
  • [Journal Article] Information Theoretic Security for Encryption Based on Conditional Renyi Entropies2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Journal Title

      Proc. of the 7th International Conference on Information Theoretic Security (ICITS2013)

      Volume: 8317 Pages: 103-121

    • URL

      http://eprint.iacr.org/2013/440

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Information Theoretically Secure Aggregate Authentication Code : Model, Bounds, and Constructions2013

    • Author(s)
      A. Kubai, J. Shikata, Y. Watanabe
    • Journal Title

      Proc. of CD-ARES 2013 Workshops

      Volume: 8128 Pages: 16-28

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Formalization of Information Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      J. Shikata
    • Journal Title

      Proc. of 2013 IEEE International Symposium on Information Theory (ISIT2013)

      Pages: 2720-2724

    • URL

      http://eprint.iacr.org/2012/383

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part I - Properties of Conditional Renyi Entropy-2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Journal Title

      Proc. of the 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: (CDROM)

    • Related Report
      2013 Final Research Report
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part II-Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      J. Shikata and M. Iwamoto
    • Journal Title

      Proc. of the 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: (CDROM)

    • Related Report
      2013 Final Research Report
  • [Journal Article] Formalization of Information-Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      Junji Shikata
    • Journal Title

      Proc. of 2013 IEEE International Symposium on Information Theory (ISIT2013)

      Volume: なし Pages: 2720-2724

    • DOI

      10.1109/isit.2013.6620721

    • Related Report
      2013 Annual Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Information Theoretic Security for Encryption Based on Conditional Renyi Entropies2013

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of The 7th International Conference on Information Theoretic Security (ICITS2013), Springer

      Volume: LNCS 8317 Pages: 103-121

    • DOI

      10.1007/978-3-319-04268-8_7

    • ISBN
      9783319042671, 9783319042688
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Information-Theoretically Secure Aggregate Authentication Code : Model, Bounds, and Constructions2013

    • Author(s)
      A. Kubai, J. Shikata, Y. Watanabe
    • Journal Title

      Proc. of CD-ARES 2013 Workshops(Springer LNCS 8128)

      Volume: LNCS 8128 Pages: 16-28

    • DOI

      10.1007/978-3-642-40588-4_2

    • ISBN
      9783642405877, 9783642405884
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] グループにおける情報理論的に安全な相互認証方式2013

    • Author(s)
      一将吾, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2013 (SCIS2013)論文集

      Volume: なし

    • Related Report
      2012 Research-status Report
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part I -Properties of Conditional Renyi Entropy-2013

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of The 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: なし

    • Related Report
      2012 Research-status Report
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part II -Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      Junji Shikata, Mitsugu Iwamoto
    • Journal Title

      Proc. of The 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: なし

    • Related Report
      2012 Research-status Report
  • [Journal Article] Information Theoretic Timed-Release Security : Key-Agreement, Encryption and Authentication Codes2012

    • Author(s)
      Y. Watanabe, T. Seito and J. Shikata
    • Journal Title

      Proc. of the 6th International Conference on Information Theoretic Security (ICITS2012)

      Volume: 7412 Pages: 167-186

    • URL

      http://eprint.iacr.org/2012/460

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] 情報理論的安全性の定式化の再考 : 暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム(SCIS2012) 論文集

      Volume: (CDROM)

    • Related Report
      2013 Final Research Report
  • [Journal Article] Information-Theoretic Timed-Release Security: Key-Agreement, Encryption and Authentication Codes2012

    • Author(s)
      Yohei Watanabe, Takenobu Seito, Junji Shikata
    • Journal Title

      Proc. of The 6th International Conference on Information Theoretic Security (ICITS), Springer

      Volume: LNCS 7412 Pages: 167-186

    • DOI

      10.1007/978-3-642-32284-6_10

    • ISBN
      9783642322839, 9783642322846
    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] 情報理論的に安全なタイムリリース暗号化方式及びメッセージ認証方式の下界について2012

    • Author(s)
      渡邉洋平, 清藤武暢, 四方順司
    • Journal Title

      コンピューターセキュリティシンポジウム 2012 (CSS2012) 論文集

      Volume: なし Pages: 601-608

    • Related Report
      2012 Research-status Report
  • [Journal Article] グループにおける情報理論的に安全な相手認証方式2012

    • Author(s)
      一将吾, 渡邉洋平, 四方順司
    • Journal Title

      コンピューターセキュリティシンポジウム 2012 (CSS2012) 論文集

      Volume: なし Pages: 595-600

    • NAID

      170000072739

    • Related Report
      2012 Research-status Report
  • [Journal Article] 情報理論的安全性の定式化の再考:暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Related Report
      2011 Research-status Report
  • [Journal Article] 情報理論的に安全なKey-Insulated Key-AgreementとTimed-Release Key-Agreementの関係性について2012

    • Author(s)
      清藤武暢, 渡邊洋平, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Related Report
      2011 Research-status Report
  • [Journal Article] 情報理論的に安全なタイムリリース鍵共有方式のアプリケーションについて2012

    • Author(s)
      渡邉洋平, 清藤武暢, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Related Report
      2011 Research-status Report
  • [Journal Article] 情報理論的に安全なアグリゲート機能を有するメッセージ認証技術2012

    • Author(s)
      玖波井麻人, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Related Report
      2011 Research-status Report
  • [Journal Article] Bit Commitment in the Bounded Storage Model : Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata and D. Yamanaka
    • Journal Title

      Proc. of the 13th IMA International Conference, Cryptography and Coding (IMACC2011)

      Volume: 7089 Pages: 112-131

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Information Theoretically Secure Key-Insulated Key Agreement2011

    • Author(s)
      T. Seito and J. Shikata
    • Journal Title

      Proc. of 2011 IEEE Information Theory Workshop (ITW2011)

      Pages: 287-291

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Information-theoretically Secure Key-Insulated Key Agreement2011

    • Author(s)
      T. Seito, J. Shikata
    • Journal Title

      Proc. of 2011 IEEE Information Theory Workshop (ITW2011)

      Volume: なし Pages: 287-291

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata, D. Yamanaka
    • Journal Title

      Proc. of 13th IMA International Conference, Cryptography and Coding (IMACC2011), Springer

      Volume: LNCS 7089 Pages: 112-131

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] 時刻情報で制御する情報理論的に安全な鍵共有方式2011

    • Author(s)
      渡邉洋平, 清藤武暢, 四方順司
    • Journal Title

      コンピュータセキュリティシンポジウム2011 (CSS2011) 論文集

      Volume: なし Pages: 738-743

    • NAID

      170000067565

    • Related Report
      2011 Research-status Report
  • [Presentation] 情報理論的暗号理論について~サーベイとチャレンジ~2014

    • Author(s)
      四方順司
    • Organizer
      電子情報通信学会ISEC-IT-WBS 合同研究会
    • Place of Presentation
      名古屋
    • Related Report
      2013 Final Research Report
    • Invited
  • [Presentation] Revisiting Information Theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      J. Shikata
    • Organizer
      The 31th Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      Kagoshima, Japan
    • Related Report
      2013 Final Research Report
  • [Presentation] Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies2014

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      The 31th Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      Kagoshima, Japan
    • Related Report
      2013 Final Research Report
  • [Presentation] Revisiting Information-theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      Junji Shikata
    • Organizer
      The 31th Symposium on Cryptography and Information Security (SCIS 2014)
    • Place of Presentation
      鹿児島, 日本
    • Related Report
      2013 Annual Research Report
  • [Presentation] Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies2014

    • Author(s)
      Mitsugu Iwamoto
    • Organizer
      The 31th Symposium on Cryptography and Information Security (SCIS 2014)
    • Place of Presentation
      鹿児島, 日本
    • Related Report
      2013 Annual Research Report
  • [Presentation] 情報理論的暗号理論について~サーベイとチャレンジ~2014

    • Author(s)
      四方順司
    • Organizer
      電子情報通信学会ISEC-IT-WBS合同研究会
    • Place of Presentation
      名古屋, 日本
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Information Theoretic Security for Encryption Based on Conditional Renyi Entropies2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      The 7th International Conference on Information Theoretic Security (ICITS2013)
    • Place of Presentation
      Singapore
    • Related Report
      2013 Annual Research Report 2013 Final Research Report
  • [Presentation] Information-Theoretically Secure Aggregate Authentication Code : Model, Bounds, and Constructions2013

    • Author(s)
      A. Kubai, J. Shikata, Y. Watanabe
    • Organizer
      CD-ARES 2013 Workshops
    • Place of Presentation
      Regensburg, Germany
    • Related Report
      2013 Final Research Report
  • [Presentation] Formalization of Information Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      J. Shikata
    • Organizer
      2013 IEEE International Symposium on Information Theory (ISIT2013)
    • Place of Presentation
      Istanbul, Turkey
    • Related Report
      2013 Final Research Report
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part I -Properties of Conditional Renyi Entropy-2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      Kyoto, Japan
    • Related Report
      2013 Final Research Report
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part II-Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      J. Shikata and M. Iwamoto
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      Kyoto, Japan
    • Related Report
      2013 Final Research Report
  • [Presentation] Formalization of Information-Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      Junji Shikata
    • Organizer
      2013 IEEE International Symposium on Information Theory (ISIT2013)
    • Place of Presentation
      Istanbul, Turkey
    • Related Report
      2013 Annual Research Report 2012 Research-status Report
  • [Presentation] Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions2013

    • Author(s)
      Yohei Watanabe
    • Organizer
      CD-ARES 2013 Workshops: MoCrySEn and SeCIHD
    • Place of Presentation
      Regensburg, Germany
    • Related Report
      2013 Annual Research Report
  • [Presentation] グループにおける情報理論的に安全な相互認証方式2013

    • Author(s)
      一将吾
    • Organizer
      暗号と情報セキュリティシンポジウム2013 (SCIS2013)
    • Place of Presentation
      京都府京都市
    • Related Report
      2012 Research-status Report
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part II -Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      Junji Shikata
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      京都府京都市
    • Related Report
      2012 Research-status Report
  • [Presentation] 情報理論的暗号理論について2013

    • Author(s)
      四方順司
    • Organizer
      日本応用数理学会
    • Place of Presentation
      東京
    • Related Report
      2012 Research-status Report
  • [Presentation] Information-Theoretic Timed-Release Security : Key-Agreement, Encryption and Authentication Codes2012

    • Author(s)
      Y. Watanabe, T. Seito and J. Shikata
    • Organizer
      The 6th International Conference on Information Theoretic Security (ICITS2012)
    • Place of Presentation
      Montreal, Canada
    • Related Report
      2013 Final Research Report
  • [Presentation] 情報理論的安全性の定式化の再考:暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Organizer
      暗号と情報セキュリティシンポジウム 2012 (SCIS2012)
    • Place of Presentation
      金沢
    • Related Report
      2013 Final Research Report
  • [Presentation] Information-Theoretic Timed-Release Security: Key-Agreement, Encryption and Authentication Codes2012

    • Author(s)
      Yohei Watanabe
    • Organizer
      The 6th International Conference on Information Theoretic Security (ICITS)
    • Place of Presentation
      Montreal, Canada
    • Related Report
      2012 Research-status Report
  • [Presentation] 情報理論的に安全なタイムリリース暗号化方式及びメッセージ認証方式の下界について2012

    • Author(s)
      渡邉洋平
    • Organizer
      コンピューターセキュリティシンポジウム 2012
    • Place of Presentation
      島根県松江市
    • Related Report
      2012 Research-status Report
  • [Presentation] グループにおける情報理論的に安全な相手認証方式2012

    • Author(s)
      一将吾
    • Organizer
      コンピューターセキュリティシンポジウム 2012
    • Place of Presentation
      島根県松江市
    • Related Report
      2012 Research-status Report
  • [Presentation] 情報理論的安全性の定式化の再考:暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Organizer
      暗号と情報セキュリティシンポジウム2012 (SCIS2012)
    • Place of Presentation
      金沢
    • Related Report
      2011 Research-status Report
  • [Presentation] 情報理論的に安全なKey-Insulated Key-AgreementとTimed-Release Key-Agreementの関係性について2012

    • Author(s)
      清藤武暢
    • Organizer
      暗号と情報セキュリティシンポジウム2012 (SCIS2012)
    • Place of Presentation
      金沢
    • Related Report
      2011 Research-status Report
  • [Presentation] 情報理論的に安全なタイムリリース鍵共有方式のアプリケーションについて2012

    • Author(s)
      渡邉洋平
    • Organizer
      暗号と情報セキュリティシンポジウム2012 (SCIS2012)
    • Place of Presentation
      金沢
    • Related Report
      2011 Research-status Report
  • [Presentation] 情報理論的に安全なアグリゲート機能を有するメッセージ認証技術2012

    • Author(s)
      玖波井麻人
    • Organizer
      暗号と情報セキュリティシンポジウム2012 (SCIS2012)
    • Place of Presentation
      金沢
    • Related Report
      2011 Research-status Report
  • [Presentation] Information-theoretically Secure Key-Insulated Key Agreement2011

    • Author(s)
      T. Seito and J. Shikata
    • Organizer
      2011 IEEE Information Theory Workshop (ITW2011)
    • Place of Presentation
      Brazil
    • Related Report
      2013 Final Research Report 2011 Research-status Report
  • [Presentation] Bit Commitment in the Bounded Storage Model : Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata and D. Yamanaka
    • Organizer
      The 13th IMA International Conference, Cryptography and Coding (IMACC2011)
    • Place of Presentation
      Oxford, UK
    • Related Report
      2013 Final Research Report
  • [Presentation] Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata
    • Organizer
      13th IMA International Conference, Cryptography and Coding (IMACC2011)
    • Place of Presentation
      UK
    • Related Report
      2011 Research-status Report
  • [Presentation] 時刻情報で制御する情報理論的に安全な鍵共有方式2011

    • Author(s)
      渡邉洋平
    • Organizer
      コンピュータセキュリティシンポジウム2011 (CSS2011)
    • Place of Presentation
      新潟
    • Related Report
      2011 Research-status Report
  • [Remarks]

    • URL

      http://www.slab.ynu.ac.jp/index.html

    • Related Report
      2013 Final Research Report
  • [Remarks]

    • URL

      http://ipsr.ynu.ac.jp/

    • Related Report
      2013 Final Research Report

URL: 

Published: 2011-08-05   Modified: 2023-03-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi