• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of automatic analysis of hardnes assumptions for cryptosystems

Research Project

Project/Area Number 24500015
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionNational Institute of Information and Communications Technology (2013-2015)
Osaka University (2012)

Principal Investigator

Yoshida Maki  国立研究開発法人情報通信研究機構, ネットワークセキュリティ研究所セキュリティアーキテクチャ研究室, 主任研究員 (50335387)

Project Period (FY) 2012-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2015)
Budget Amount *help
¥5,200,000 (Direct Cost: ¥4,000,000、Indirect Cost: ¥1,200,000)
Fiscal Year 2014: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2013: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Fiscal Year 2012: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Keywords暗号 / 困難性仮定 / 正当性検証 / Bilinear Group / Generic Model
Outline of Final Research Achievements

The security of many cryptosystems relies on the hardness assumption of certain computational problems, such as Diffie-Hellman problem and the factoring. The goal of this project is the development of an automatic analysis method that determines whether an attack exists or not and further derives all the possible attacks. We proposed a method focuses on a wide class of the problems on the existing hardness assumptions, and uses a computer algebra system. We further extend our method to analyze the security of cryptosystems.

Report

(5 results)
  • 2015 Annual Research Report   Final Research Report ( PDF )
  • 2014 Research-status Report
  • 2013 Research-status Report
  • 2012 Research-status Report
  • Research Products

    (23 results)

All 2016 2015 2014 2013 2012 Other

All Journal Article (13 results) (of which Peer Reviewed: 8 results,  Open Access: 3 results) Presentation (9 results) (of which Invited: 3 results) Book (1 results)

  • [Journal Article] Efficient Usage of Cover Free Families in Broadcast Encryption2016

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: vol.E99-A,no.6 Pages: 1-8

    • NAID

      130005154246

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On the Impossibility of <i>d</i>-Multiplicative Non-perfect Secret Sharing2015

    • Author(s)
      Maki Yoshida, Kazuya Ohkita, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98.A Issue: 2 Pages: 767-770

    • DOI

      10.1587/transfun.E98.A.767

    • NAID

      130004770935

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking2015

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E98.D Issue: 1 Pages: 58-64

    • DOI

      10.1587/transinf.2014MUP0006

    • NAID

      130004721761

    • ISSN
      0916-8532, 1745-1361
    • Related Report
      2014 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] IHC 評価基準における圧縮率と加法電子透かし法の最適なパラメータとの関係2015

    • Author(s)
      戸塚拓伸, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vo.114, no. 511 Pages: 85-90

    • Related Report
      2014 Research-status Report
  • [Journal Article] Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria2014

    • Author(s)
      Hironobu Tozuka, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation

      Volume: vol.1 Pages: 31-36

    • DOI

      10.1145/2598908.2598917

    • Related Report
      2014 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] IHC 電子透かしコンテストの高画質カテゴリにおける加法 電子透かし法の性能評価2014

    • Author(s)
      戸塚拓伸, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vol.114, no.222 Pages: 53-58

    • Related Report
      2014 Research-status Report
  • [Journal Article] Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria2014

    • Author(s)
      Hironobu Tozuka, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the First International Workshop on Information Hiding and its Criteria for evaluation

      Volume: -

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] 加法電子透かし法のIHC 評価基準による性能評価2014

    • Author(s)
      戸塚拓伸, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会 技術研究報告

      Volume: Vol.113, No.480 Pages: 81-86

    • Related Report
      2013 Research-status Report
  • [Journal Article] Theoretical Performance Analysis of Hybrid Additive-Multiplicative Watermarking2013

    • Author(s)
      Seigo Ikeda, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Technical Report

      Volume: VOL.112, NO.420 Pages: 77-82

    • NAID

      110009727934

    • Related Report
      2012 Research-status Report
  • [Journal Article] Generic Construction of GUC Secure Commitment in the KRK Model2012

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Lecture Notes in Computer Science

      Volume: VOL.7631 Pages: 244-260

    • DOI

      10.1007/978-3-642-34117-5_16

    • ISBN
      9783642341168, 9783642341175
    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] New Hybrid Additive-Multiplicative Watermarking with Better Tradeoff between Image Quality and Detection Accuracy2012

    • Author(s)
      Seigo Ikeda, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of 2012 International Symposium on Information Theory and its Applications

      Volume: - Pages: 797-801

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Optimum General Threshold Secret Sharing2012

    • Author(s)
      Maki Yoshida, Toru Fujiwara, Marc P.C. Fossorier
    • Journal Title

      Lecture Notes in Computer Science

      Volume: VOL.7412 Pages: 187-204

    • DOI

      10.1007/978-3-642-32284-6_11

    • ISBN
      9783642322839, 9783642322846
    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Hybrid Additive-Multiplicative Watermarking for General Embedding Domains2012

    • Author(s)
      Seigo Ikeda, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Technical Report

      Volume: VOL.112, NO.129 Pages: 9-16

    • NAID

      110009625788

    • Related Report
      2012 Research-status Report
  • [Presentation] 形式検証に向けたQUICの安全性定義の検討2015

    • Author(s)
      櫻田 英樹, 米山 一樹, 吉田 真紀, 花谷 嘉一
    • Organizer
      日本応用数理学会2015年度年会FAISオーガナイズド・セッション
    • Place of Presentation
      金沢大学, 石川県金沢市角間町
    • Year and Date
      2015-09-11
    • Related Report
      2015 Annual Research Report
  • [Presentation] UCコミットメントの形式検証による厳密な仮定の導出に向けて2015

    • Author(s)
      吉田真紀
    • Organizer
      2015年 暗号理論ワークショップ
    • Place of Presentation
      東京工業大学, 東京都目黒区大岡山
    • Year and Date
      2015-02-24
    • Related Report
      2014 Research-status Report
    • Invited
  • [Presentation] 暗号プロトコル安全性検証の可視化に向けて2015

    • Author(s)
      吉田真紀, 水野修
    • Organizer
      2015年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉, 福岡県福岡市小倉北区浅野
    • Year and Date
      2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] Toward Exact Assumptions for UC Commitments with Automated Verification2015

    • Author(s)
      Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, and Maki Yoshida
    • Organizer
      The 2015 Symposium on Cryptography and Information Security
    • Place of Presentation
      RIHGA Royal Hotel Kokura, Asano, Kokurakita-ku, Kitakyushu, Fukuoka
    • Year and Date
      2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 暗号プロトコル評価の理論と可視化2015

    • Author(s)
      吉田真紀
    • Organizer
      Small-workshop on Communications between Academia and Industry for Security
    • Place of Presentation
      九州大学西新プラザ, 福岡市早良区西新
    • Year and Date
      2015-01-19
    • Related Report
      2014 Research-status Report
    • Invited
  • [Presentation] 暗号プロトコル評価の理論と可視化2014

    • Author(s)
      吉田真紀
    • Organizer
      CELLOSシンポジウム2014
    • Place of Presentation
      飯田橋グラン・ブルーム, 東京都千代田区富士見
    • Year and Date
      2014-12-18
    • Related Report
      2014 Research-status Report
    • Invited
  • [Presentation] 時限式暗号における時報の受信失敗への対策について2014

    • Author(s)
      吉田真紀, 藤原融
    • Organizer
      2014 年暗号と情報セキュ リティシンポジウム
    • Place of Presentation
      2014 年暗号と情報セキュ リティシンポジウム
    • Related Report
      2013 Research-status Report
  • [Presentation] Externalized Universally Composable の枠組みに対する記号的モデル2014

    • Author(s)
      吉田真紀, 鈴木斎輝, 藤原融
    • Organizer
      日本応用数理学会
    • Place of Presentation
      2009 年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS)
    • Related Report
      2013 Research-status Report
  • [Presentation] ハイブリッド電子透かしの組合せに関する検討

    • Author(s)
      池田成吾, 吉田真紀, 藤原融
    • Organizer
      2013 年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ウェスティン都ホテル京都(京都府)
    • Related Report
      2012 Research-status Report
  • [Book] 汎用的結合可能な安全性, 日本応用数理学会監修/薩摩順吉・大石進一・杉原 正顕(編) 応用数理ハンドブック2013

    • Author(s)
      鈴木斎輝, 吉田真紀
    • Total Pages
      2
    • Publisher
      朝倉書店
    • Related Report
      2013 Research-status Report

URL: 

Published: 2013-05-31   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi