• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on Public Key Encryption with Restricted Plaintext Space

Research Project

Project/Area Number 23656257
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Communication/Network engineering
Research InstitutionNational Institute of Advanced Industrial Science and Technology

Principal Investigator

HANAOKA Goichiro  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 研究グループ長 (30415731)

Co-Investigator(Kenkyū-buntansha) AFFELDT Reynald  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 主任研究員 (40415641)
ATTRAPADUNG Nuttapong  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 主任研究員 (40515300)
NUIDA Koji  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 主任研究員 (20435762)
Project Period (FY) 2011 – 2013
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥3,770,000 (Direct Cost: ¥2,900,000、Indirect Cost: ¥870,000)
Fiscal Year 2013: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2012: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2011: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywords暗号理論 / 公開鍵暗号 / ゼロ知識証明 / 証明可能安全性 / 選択暗号文攻撃 / 公開鍵暗号基盤
Research Abstract

The main motivation of this work is to provide a technology which yields confidentiality of communication but prevents those by malicious users, e.g. terrorists. In this work, as a candidate of such a technology, we study public key encryption with restricted plaintext space. Specifically, we construct a concrete scheme, evaluate its security, and implement it. We also study its fundamental theory. These results were preseted in international conferences and journals.

Report

(4 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (24 results)

All 2014 2013 2012 2011

All Journal Article (11 results) (of which Peer Reviewed: 11 results) Presentation (13 results)

  • [Journal Article] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 8383 Pages: 275-292

    • DOI

      10.1007/978-3-642-54631-0_16

    • ISBN
      9783642546303, 9783642546310
    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Methods for restricting message space in public-key encryption2013

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E96-A(1) Issue: 1 Pages: 1156-1168

    • DOI

      10.1007/s10207-013-0204-y

    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7778 Pages: 332-351

    • DOI

      10.1007/978-3-642-36362-7_21

    • ISBN
      9783642363610, 9783642363627
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Journal Title

      Public Key Cryptography - PKC 2013, Lecture Notes in Computer Science

      Volume: 7778 Pages: 332-351

    • DOI

      10.1007/978-3-642-36362-7_3

    • ISBN
      9783642363610, 9783642363627
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2013

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 7293 Pages: 715-732

    • DOI

      10.1007/978-3-642-30057-8_42

    • ISBN
      9783642300561, 9783642300578
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.2012

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Journal Title

      Advances in Cryptology - CRYPTO 2012, Lecture Notes in Computer Science

      Volume: 7,417 Pages: 812-831

    • DOI

      10.1007/978-3-642-32009-5_47

    • ISBN
      9783642320088, 9783642320095
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Space Efficient Signature Schemes from the RSA Assumption2012

    • Author(s)
      Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      PKC2012

      Volume: 7,293 Pages: 102-119

    • DOI

      10.1007/978-3-642-30057-8_7

    • ISBN
      9783642300561, 9783642300578
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Bagus Sanotoso, Goichiro Hanaoka, Jacob C.N. Schuldt, and Noboru Kunihiro
    • Journal Title

      PKC2012

      Volume: 7,293 Pages: 243-261

    • DOI

      10.1007/978-3-642-30057-8_15

    • ISBN
      9783642300561, 9783642300578
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7293 Pages: 576-594

    • DOI

      10.1007/978-3-642-30057-8_34

    • ISBN
      9783642300561, 9783642300578
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model2011

    • Author(s)
      Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E94-A Issue: 6 Pages: 1293-1305

    • DOI

      10.1587/transfun.E94.A.1293

    • NAID

      10029802310

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2013 Final Research Report 2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] Towards Restricting Plaintext Space in Public Key Encryption2011

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7038 Pages: 193-209

    • DOI

      10.1007/978-3-642-25141-2_13

    • ISBN
      9783642251405, 9783642251412
    • Related Report
      2013 Final Research Report 2011 Research-status Report
    • Peer Reviewed
  • [Presentation] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      17th International Conference on Practice and Theory in Public Key Cryptography (PKC 2014)
    • Place of Presentation
      Buenos Aires, Argentina
    • Related Report
      2013 Final Research Report
  • [Presentation] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      Public Key Cryptography 2014
    • Place of Presentation
      Buenos Aires, Argentina
    • Related Report
      2013 Annual Research Report
  • [Presentation] Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013)
    • Place of Presentation
      奈良
    • Related Report
      2013 Final Research Report 2012 Research-status Report
  • [Presentation] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013

    • Author(s)
      Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada
    • Organizer
      16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013)
    • Place of Presentation
      奈良
    • Related Report
      2013 Final Research Report 2012 Research-status Report
  • [Presentation] グループ署名の安全性について2012

    • Author(s)
      坂井 祐介, ヤコブ・シュルツ, 江村 恵太, 花岡 悟一郎, 太田 和夫
    • Organizer
      2012年 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      石川県, 金沢エクセルホテル東急
    • Year and Date
      2012-02-02
    • Related Report
      2013 Final Research Report 2011 Research-status Report
  • [Presentation] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.2012

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Organizer
      32nd Annual Cryptology Conference (CRYPTO 2012)
    • Place of Presentation
      Santa Barbara, CA, USA
    • Related Report
      2013 Final Research Report
  • [Presentation] Space Efficient Signature Schemes from the RSA Assumption2012

    • Author(s)
      Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Related Report
      2013 Final Research Report 2012 Research-status Report
  • [Presentation] Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Related Report
      2013 Final Research Report 2012 Research-status Report
  • [Presentation] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Related Report
      2013 Final Research Report
  • [Presentation] On the Security of Dynamic Group Signatures : Preventing Signature Hijacking.2012

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Related Report
      2013 Final Research Report
  • [Presentation] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Organizer
      32nd Annual Cryptology Conference (CRYPTO 2012)
    • Place of Presentation
      Santa Barbara, CA, USA
    • Related Report
      2012 Research-status Report
  • [Presentation] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Related Report
      2012 Research-status Report
  • [Presentation] On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Related Report
      2012 Research-status Report

URL: 

Published: 2011-08-05   Modified: 2023-03-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi