• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Flexible and Efficient Authentication with Hash Chains

Research Project

Project/Area Number 24500092
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Computer system/Network
Research InstitutionHiroshima City University

Principal Investigator

SOSHI Masakazu  広島市立大学, 情報科学研究科, 准教授 (00293142)

Co-Investigator(Kenkyū-buntansha) MIYAJI Atsuko  北陸先端科学技術大学院大学, 情報科学研究科, 教授 (10313701)
Project Period (FY) 2012-04-01 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥4,940,000 (Direct Cost: ¥3,800,000、Indirect Cost: ¥1,140,000)
Fiscal Year 2014: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2013: ¥2,080,000 (Direct Cost: ¥1,600,000、Indirect Cost: ¥480,000)
Fiscal Year 2012: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywordsセキュリティ / プロトコル / 認証 / ネットワーク / ハッシュ関数 / ユビキタス
Outline of Final Research Achievements

Hash functions are efficiently computable and are important cryptographic primitive. Especially, hash chains, which repeatedly apply a hash function to an initial value, are one of the most important cryptographic techniques when we develop authentication protocols. In this work we proposed simple and efficient authentication schemes with several novel elaborate hash chains. Furthermore, we devise, for example, a key generation scheme and path authentication based on our hash chain constructions.

Report

(4 results)
  • 2014 Annual Research Report   Final Research Report ( PDF )
  • 2013 Research-status Report
  • 2012 Research-status Report
  • Research Products

    (41 results)

All 2015 2014 2013 2012 Other

All Journal Article (20 results) (of which Peer Reviewed: 20 results,  Open Access: 2 results,  Acknowledgement Compliant: 1 results) Presentation (20 results) (of which Invited: 5 results) Book (1 results)

  • [Journal Article] Self-healing wireless sensor networks2015

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: - Issue: 10 Pages: 2547-2568

    • DOI

      10.1002/cpe.3434

    • NAID

      120005624453

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA2015), IEEE

      Volume: NA Pages: 564-570

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      The 17th International Conference on Information and Security Cryptology, ICISC 2014, , Lecture Notes in Computer Science, 8949(2015), Springer-Verlag

      Volume: 8949 Pages: 271-285

    • NAID

      120005723611

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A new (n; n) blockcipher hash function using Feistel Network: Apposite for RFID Security2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      International Conference on Computational Intelligence in Data Mining (ICCIDM 2014), Lecture Notes in Computer Science, Volume 33(2015), Springer-Verlag

      Volume: 33 Pages: 519-528

    • NAID

      120005678257

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generic constructions of secure-channel free searchable encryption with adaptive security2014

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, and Kazumasa Omote
    • Journal Title

      Wiley Security and Communication Networks

      Volume: - Issue: 8 Pages: 1547-1560

    • DOI

      10.1002/sec.1103

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] ユビキタスネットワークにおけるセキュリティ技術- 積極的利用を促すセキュリティ技術-2014

    • Author(s)
      宮地充子
    • Journal Title

      電気評論

      Volume: 夏季増刊号特集 Pages: 12-15

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Provable Secure Batch Authentication Scheme for EPCGen2 Tags2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, Volume 8782(2014), Springer-Verlag

      Volume: 8782 Pages: 103-116

    • NAID

      120005657979

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Scalable and Secure RFID Ownership Transfer Protocol2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: NA Pages: 343-350

    • NAID

      120007005446

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RFID Path Authentication, Revisited2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA2014), IEEE

      Volume: NA Pages: 245-252

    • NAID

      120007005447

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An efficient and adaptive IP traceback scheme2014

    • Author(s)
      Kayoko Iwamoto, Masakazu Soshi, and Takashi Satoh.
    • Journal Title

      IEEE International Workshop on Internet of Things Services (IoTS)

      Volume: NA Pages: 235-240

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] An efficient batch verification system for large scale VANET2013

    • Author(s)
      Jiageng Chen, Mohammad S.I. Mamun, Atsuko Miyaji
    • Journal Title

      Intl. J. of Security and Communication Networks SCN

      Volume: N.A.

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] A privacy-preserving efficient RFID authentication protocol from SLPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications

      Volume: N.A.

    • NAID

      120005661887

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] A fully-secure RFID authentication protocol from exact LPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: none Pages: 102-109

    • NAID

      120006675368

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Self-healing Schemes Suitable for Various WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag

      Volume: 8223 Pages: 92-105

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Dynamic Attribute-based Signcryption without RandomOracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: 2(3) Pages: 199-211

    • NAID

      120004664487

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Novel Hybrid IP Traceback Scheme with Packet Counters2012

    • Author(s)
      Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji
    • Journal Title

      The 5th International Conference on Internet and Dsitributed Computing Systems, IDCS 2012,Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7646 Pages: 71-84

    • NAID

      120005147911

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] How to Enhance the Security on the Least Significant Bit2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      The 4th International Symposium on Cyberspace Safety and Security , CANS 2012, Springer-Verlag

      Volume: 7712 Pages: 263-279

    • NAID

      120005147913

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] An Optimized Signature Verification System for Vehicle Ad hoc NETwork2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 8th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM2012, IEEE

      Volume: なし Pages: 1-8

    • NAID

      120006675329

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Secure and private RFID authentication protocol under SLPN problem2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 6th International Conference on Network and System Security , NSS 2012, Springer-Verlag

      Volume: 7645 Pages: 476-489

    • NAID

      120005147914

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Consideration for multi-threshold multi-secret sharing schemes2012

    • Author(s)
      Atsushi Waseda and Masakazu Soshi
    • Journal Title

      International Symposium on Information Theory and Applications (ISITA 2012)

      Volume: 96-A Pages: 265-269

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Presentation] ハッシュ連鎖の柔軟な構成法とそれによる鍵生成法.2015

    • Author(s)
      西山翔稀, 双紙正和
    • Organizer
      信学技報, ICSS2014-98 (2015-03), pp.211-216
    • Place of Presentation
      名桜大学(沖縄)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] VANETにおけるグループone-way cross-networksを用いた経路認証手法の検討2015

    • Author(s)
      北山翔馬, 双紙正和
    • Organizer
      信学技報, ICSS2014-87 (2015-03), pp.145-150
    • Place of Presentation
      名桜大学(沖縄)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] 偽陽性の生じない Space-Time Encoding Schemes2014

    • Author(s)
      白石良介, 佐藤敬, 下泉政樹, 双紙正和
    • Organizer
      信学技報, vol. 114, no. 380, ISEC2014-71, pp. 11-15
    • Place of Presentation
      機械振興会館
    • Year and Date
      2014-12-09
    • Related Report
      2014 Annual Research Report
  • [Presentation] Further Application on RFID with Privacy-Preserving2014

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 1st International Conference on Future Data and Security Engineering, FDSE 2014
    • Place of Presentation
      Ho Chi Minh City, Vietnam
    • Year and Date
      2014-11-19 – 2014-11-21
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] 安全・安心社会を実現するセキュリティ基盤2014

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会第13 回情報科学技術フォーラム
    • Place of Presentation
      筑波大学(茨木県つくば市)
    • Year and Date
      2014-09-03 – 2014-09-04
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] 情報セキュリティの標準化動向について- ISO/IEC JTC1/SC27/WG2 2014 年4月香港会議報告 -2014

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊健司, 渡辺創, 松尾真一郎
    • Organizer
      第27回電子情報通信学会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] 車車間通信における自律分散型認証手法の提案2014

    • Author(s)
      日浦博昭, 北山翔馬, 双紙正和, 大場充
    • Organizer
      情報処理学会研究報告,2014-CSEC-66, No.8
    • Place of Presentation
      サン・リフレ函館 (函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] 時空符号化方式におけるDDoS攻撃経路の再構成2014

    • Author(s)
      佐藤敬, 三角大地, 下泉政樹, 双紙正和
    • Organizer
      信学技報,ICSS2014-49 (2014-7), pp.315-319
    • Place of Presentation
      サン・リフレ函館 (函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] DDoS攻撃における space-time encoding の効率化.

    • Author(s)
      双紙正和
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      弘前大学
    • Related Report
      2013 Research-status Report
  • [Presentation] P2P型ネットワークにおけるハッシュ木構成法の評価

    • Author(s)
      浅枝智之, 樋口太平, 双紙正和
    • Organizer
      信学技報
    • Place of Presentation
      名桜大学
    • Related Report
      2013 Research-status Report
  • [Presentation] VANETにおけるグループ One-Way Cross-Networks

    • Author(s)
      北山翔馬, 双紙正和
    • Organizer
      信学技報
    • Place of Presentation
      名桜大学
    • Related Report
      2013 Research-status Report
  • [Presentation] Cryptographic Approach to Enhance the Security against Recent Threats

    • Author(s)
      Atsuko Miyaji
    • Organizer
      NSC-JST Workshop on ``Information and Communication Technology"
    • Place of Presentation
      JST Tokyo
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] 情報のグローバル化とプライバシー

    • Author(s)
      宮地 充子
    • Organizer
      情報処理学会 第75回 全国大会
    • Place of Presentation
      東北大学 川内キャンパス
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] Improved Elliptic Curve Scalar Multiplication Using Triple Formula

    • Author(s)
      Atsuko Miyaji and Cuinan Yang
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Related Report
      2012 Research-status Report
  • [Presentation] 効率的な倍ブロック長ハッシュ関数に関する一考察

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Related Report
      2012 Research-status Report
  • [Presentation] An Optimized ID based Group Signature Verification System and its impact in VANET

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2012 Research-status Report
  • [Presentation] (n,n)ブロック暗号を用いた倍ブロック長ハッシュ関数の提案

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2012 Research-status Report
  • [Presentation] VANETにおける経路認証について

    • Author(s)
      双紙正和, 三吉雄大
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2012 Research-status Report
  • [Presentation] P2Pシステムにおけるハッシュ木の効率的な構築法の検討

    • Author(s)
      樋口太平, 双紙正和, 浅枝智之
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      東京電機大学
    • Related Report
      2012 Research-status Report
  • [Presentation] ショートホップトレースバック方式の提案

    • Author(s)
      古川真之, 双紙正和
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      東京電機大学
    • Related Report
      2012 Research-status Report
  • [Book] 一般教育の情報2013

    • Author(s)
      北上始(編),双紙正和(共著)
    • Total Pages
      211
    • Publisher
      あいり出版
    • Related Report
      2013 Research-status Report

URL: 

Published: 2013-05-31   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi