• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A Study on Code-Based Postquantum Cryptographic Protocols and Their Security Models

Research Project

Project/Area Number 24700013
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Fundamental theory of informatics
Research InstitutionKyushu University

Principal Investigator

MOROZOV Kirill  九州大学, マス・フォア・インダストリ研究所, 助教 (80443232)

Project Period (FY) 2012-04-01 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2014: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2012: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords耐量子暗号 / 符号理論に基づく暗号 / 暗号プロトコル / 秘密分散法 / 不正者を検知可能な秘密分散法 / robust秘密分散法 / シェア再配布 / 符号理論に基づく暗号方式 / ゼロ知識証明プロトコル / 不正者に対しても検知可能な秘密分散法 / 平文知識証明プロトコル
Outline of Final Research Achievements

Under this grant, we studied the following two important applications of coding in cryptography: 1) Code-based cryptographic protocols, which are secure even against attacks with quantum computers (such the protocols are called “post-quantum”). We presented the first proof of plaintext knowledge for the code-based public-key encryption, and applied it to obtain the first code-based verifiable encryption and the first designated confirmer signature. 2) Secret sharing (SS) - an information security technology allowing us to achieve privacy by splitting the secret data into “shares” that can be stored in a distributed manner. We presented new cheater-identifiable SS schemes and new robust SS schemes secure against rushing cheaters with share sizes which are minimal up-to-date, among the constructions of the same class. Finally, we presented a verifiable share redistribution scheme with perfect security when the number of corrupt parties k<n/3, where n is the number of participants.

Report

(4 results)
  • 2014 Annual Research Report   Final Research Report ( PDF )
  • 2013 Research-status Report
  • 2012 Research-status Report
  • Research Products

    (52 results)

All 2015 2014 2013 2012 Other

All Journal Article (19 results) (of which Peer Reviewed: 14 results,  Acknowledgement Compliant: 4 results) Presentation (26 results) (of which Invited: 13 results) Book (2 results) Remarks (5 results)

  • [Journal Article] Note on some recent cheater identifiable secret sharing schemes2015

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98-A (8) Pages: 1814-1819

    • NAID

      130005089910

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services2015

    • Author(s)
      Mingwu Zhang, Yong Xia, Ou Yuan, and Kirill Morozov
    • Journal Title

      International Journal of Communication Systems

      Volume: 末定 Issue: 12 Pages: 1863-1872

    • DOI

      10.1002/dac.2817

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Parity Check Based Redistribution of Secret Shares2015

    • Author(s)
      Yvo Desmedt and Kirill Morozov
    • Journal Title

      Proceedings of 2015 IEEE International Symposium on Information Theory (ISIT)

      Volume: なし Pages: 959-963

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces2014

    • Author(s)
      Mingwu Zhang, Chunzhi Wang, and Kirill Morozov
    • Journal Title

      Journal of Supercomputing

      Volume: 70 (3) Issue: 3 Pages: 1405-1432

    • DOI

      10.1007/s11227-014-1234-6

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generic Constructions and Transformations of Decryption Consistent Encryption2014

    • Author(s)
      Mingwu Zhang, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      IETE Journal of Research

      Volume: 60 (3) Issue: 3 Pages: 218-228

    • DOI

      10.1080/03772063.2014.901480

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Revisits and Transformations Among Functional Encryption Systems2014

    • Author(s)
      Mingwu Zhang, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      IETE Technical Review

      Volume: 31 (1) Issue: 1 Pages: 103-114

    • DOI

      10.1080/02564602.2014.891385

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication2014

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Proc. 9th International Workshop on Security (IWSEC 2014), Lecture Notes in Computer Science

      Volume: 8639 Pages: 72-87

    • DOI

      10.1007/978-3-319-09843-2_6

    • ISBN
      9783319098425, 9783319098432
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency2014

    • Author(s)
      Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, and Kouichi Sakurai
    • Journal Title

      Proc. of 4th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2014), Lecture Notes in Computer Science

      Volume: 8804 Pages: 47-58

    • DOI

      10.1007/978-3-319-12060-7_4

    • ISBN
      9783319120591, 9783319120607
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE2014

    • Author(s)
      Cui Yang, Kazukuni Kobara, Kirill Morozov, and Hideki Imai
    • Journal Title

      International Journal of Network Security

      Volume: 16 (1) Pages: 19-28

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Confirmer Signatures from McEliece Assumptions (Extended Abstract)2014

    • Author(s)
      Rong Hu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Proceedings of Symposium on Cryptography and Information Security (SCIS) 2014, Kagoshima, January 21-24, 2014

    • Related Report
      2013 Research-status Report
  • [Journal Article] Cryptanalysis of Some Recent Cheater Identifiable Secret Sharing Schemes2014

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Proceedings of Symposium on Cryptography and Information Security (SCIS) 2014, Kagoshima, January 21-24, 2014

    • Related Report
      2013 Research-status Report
  • [Journal Article] On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary2013

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

      Volume: LNCS, vol. 8231 Pages: 258-271

    • DOI

      10.1007/978-3-642-41383-4_17

    • ISBN
      9783642413827, 9783642413834
    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Proof of plaintext knowledge for code-based public-key encryption revisited2013

    • Author(s)
      Rong Hu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China - May 08 - 10, 2013

      Pages: 535-540

    • DOI

      10.1145/2484313.2484385

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding2013

    • Author(s)
      Rong Hu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      8th Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013

      Pages: 12-18

    • DOI

      10.1109/asiajcis.2013.10

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited (Short Paper)2013

    • Author(s)
      Rong Hu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] On Proof of Plaintext Knowledge for Code-Based Public Key Encryption2013

    • Author(s)
      Rong Hu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      Proc. of Symposium on Cryptography and Information Security (SCIS 2013)

    • Related Report
      2012 Research-status Report
  • [Journal Article] Code-Based Public Key Encryption (Book Section)2013

    • Author(s)
      Kirill Morozov
    • Journal Title

      MI Lecture Note Series : "科学・技術の研究問題への数学アプローチ - 数学モデリングの基礎と展開 -"

      Volume: 46 Pages: 31-38

    • Related Report
      2012 Research-status Report
  • [Journal Article] Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE2013

    • Author(s)
      Cui Yang, Kazukuni Kobara, Kirill Morozov, Hideki Imai
    • Journal Title

      International Journal of Network Security

    • Related Report
      2012 Research-status Report
  • [Journal Article] Zero-Knowledge Protocols for the McEliece Encryption2012

    • Author(s)
      Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      Lecture Notes in Computer Science : Proc. of the 17th Australasian Conference on Information Security and Privacy (ACISP 2012)

      Volume: 7372 Pages: 180-193

    • DOI

      10.1007/978-3-642-31448-3_14

    • ISBN
      9783642314476, 9783642314483
    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Presentation] New results on cheater identifiable secret sharing2015

    • Author(s)
      Rui Xu
    • Organizer
      Symposium on Cryptography and Information Security 2015
    • Place of Presentation
      Kitakyushu
    • Year and Date
      2015-01-22
    • Related Report
      2014 Annual Research Report
  • [Presentation] Improvement of Robust Secret Sharing with Optimal Cheater Resiliency2015

    • Author(s)
      Kirill Morozov
    • Organizer
      Symposium on Cryptography and Information Security 2015
    • Place of Presentation
      Kitakyushu
    • Year and Date
      2015-01-21
    • Related Report
      2014 Annual Research Report
  • [Presentation] Zero-Knowledge Protocols for Code-Based Public-Key Encryption2015

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar of Department of Mathematics, Seoul National University
    • Place of Presentation
      Department of Mathematics, Seoul National University, Gwanak Campus
    • Year and Date
      2015-01-12
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Private k-NN Query on Outsourced Database2015

    • Author(s)
      Rui Xu
    • Organizer
      Workshop among Asian Information Security Laboratories (WAIS) 2015
    • Place of Presentation
      The WooJung College of Information and Communications Hall, Korea University, Seoul
    • Year and Date
      2015-01-10
    • Related Report
      2014 Annual Research Report
  • [Presentation] Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication2015

    • Author(s)
      Kirill Morozov
    • Organizer
      Workshop among Asian Information Security Laboratories (WAIS) 2015
    • Place of Presentation
      The WooJung College of Information and Communications Hall, Korea University, Seoul
    • Year and Date
      2015-01-09
    • Related Report
      2014 Annual Research Report
  • [Presentation] Confirmer Signatures from McEliece Assumptions2015

    • Author(s)
      Rong Hu
    • Organizer
      Workshop among Asian Information Security Laboratories (WAIS) 2015
    • Place of Presentation
      The WooJung College of Information and Communications Hall, Korea University, Seoul
    • Year and Date
      2015-01-09
    • Related Report
      2014 Annual Research Report
  • [Presentation] An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency2014

    • Author(s)
      Partha Sarathi Roy, Avishek Adhikari
    • Organizer
      4th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2014)
    • Place of Presentation
      Defence Institute of Advanced Technology (DIAT), Pune, India
    • Year and Date
      2014-10-20
    • Related Report
      2014 Annual Research Report
  • [Presentation] Code-Based Encryption2014

    • Author(s)
      Kirill Morozov
    • Organizer
      ワークショップ「社会基盤としての高機能暗号とその楕円曲線及び格子による実現」
    • Place of Presentation
      九州大学産学官連携イノベーションプラザ、福岡
    • Year and Date
      2014-09-09
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication2014

    • Author(s)
      Rui Xu
    • Organizer
      9th International Workshop on Security (IWSEC 2014)
    • Place of Presentation
      Hirosaki University
    • Year and Date
      2014-08-28
    • Related Report
      2014 Annual Research Report
  • [Presentation] Cheater Identifiable Secret Sharing Against Rushing Avdersary2014

    • Author(s)
      Rui Xu
    • Organizer
      Symposium on Cryptography and Information Security (SCIS) 2014
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Research-status Report
  • [Presentation] Cryptanalysis of Some Recent Cheater Identifiable Secret Sharing Schemes2014

    • Author(s)
      Rui Xu
    • Organizer
      Symposium on Cryptography and Information Security (SCIS) 2014
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Research-status Report
  • [Presentation] Confirmer Signatures from McEliece Assumptions2014

    • Author(s)
      Rong Hu
    • Organizer
      Symposium on Cryptography and Information Security (SCIS) 2014
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Research-status Report
  • [Presentation] A New Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary2014

    • Author(s)
      Kirill Morozov
    • Organizer
      Workshop around algebraic combinatorics
    • Place of Presentation
      高知大学理学部理学科数学コース
    • Related Report
      2013 Research-status Report
    • Invited
  • [Presentation] Secret Sharing, Proof of Plaintext Knowledge, and Their Applications to Secure Cloud Storage2013

    • Author(s)
      Kirill Morozov
    • Organizer
      2013 International Symposium on Data Security and Identity Privacy in Cloud Computing (DSIP2013)
    • Place of Presentation
      Hubei University of Technology, Wuhan, China
    • Related Report
      2013 Research-status Report
    • Invited
  • [Presentation] On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary2013

    • Author(s)
      Kirill Morozov
    • Organizer
      安全・安心社会基盤構築のための代数構造~サイバー社会の信頼性確保のための数理学~ワークショップ
    • Place of Presentation
      九州先端科学技術研究所、福岡
    • Related Report
      2013 Research-status Report
    • Invited
  • [Presentation] Verifiable Code-Based Encryption2013

    • Author(s)
      Kirill Morozov
    • Organizer
      Dagstuhl Seminar 13371 "Quantum Cryptanalysis"
    • Place of Presentation
      Leibniz Center for Informatics, Saarland, Germany
    • Related Report
      2013 Research-status Report
    • Invited
  • [Presentation] Zero-Knowledge Protocols for Code-Based Public-Key Encryption2013

    • Author(s)
      Kirill Morozov
    • Organizer
      Workshop on Post-Quantum Cryptography and Its Related Topics
    • Place of Presentation
      九州先端科学技術研究所、福岡
    • Related Report
      2013 Research-status Report
    • Invited
  • [Presentation] On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary2013

    • Author(s)
      Rui Xu
    • Organizer
      8th International Workshop on Security, IWSEC 2013
    • Place of Presentation
      Naha, Japan
    • Related Report
      2013 Research-status Report
  • [Presentation] Proof of plaintext knowledge for code-based public-key encryption revisited2013

    • Author(s)
      Rong Hu
    • Organizer
      8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013
    • Place of Presentation
      Hangzhou, China
    • Related Report
      2013 Research-status Report
  • [Presentation] On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding2013

    • Author(s)
      Rong Hu
    • Organizer
      8th Asia Joint Conference on Information Security, AsiaJCIS 2013
    • Place of Presentation
      Seoul, Korea
    • Related Report
      2013 Research-status Report
  • [Presentation] Zero-Knowledge Protocols for the McEliece Cryptosystem2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      School of Computer Science and Technology, University of Science and Technology of China, Hefei, China
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] Zero-Knowledge Protocols for the McEliece Cryptosystem2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      School of Mathematical Science, University of Science and Technology of China, Hefei, China
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] Zero-Knowledge Identification Protocols from Coding2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      State Key Laboratory Of Information Security (SKLOIS), Chinese Academy of Sciences, Beijing, China
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] Zero-Knowledge Protocols for Code-Based Encryption2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      State Key Laboratory Of Information Security (SKLOIS), Chinese Academy of Sciences, Beijing, China
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      State Key Laboratory Of Information Security (SKLOIS), Chinese Academy of Sciences, Beijing, China
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] On proof of plaintext knowledge for code-based public key encryption2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Indo-Japan Joint Workshop on Cryptography
    • Place of Presentation
      九州先端科学技術研究所、福岡
    • Related Report
      2012 Research-status Report
    • Invited
  • [Book] "Code-Based Public-Key Encryption" - a section in the book Nishii et al. (eds.), "A Mathematical Approach to Research Problems of Science and Technology - Theoretical Basis and Developments in Mathematical Modeling", pp. 47-56, Mathematics for Industry, vol. 52014

    • Author(s)
      Kirill Morozov
    • Total Pages
      10
    • Publisher
      Springer
    • Related Report
      2014 Annual Research Report
  • [Book] Code-Based Public-Key Cryptography2014

    • Author(s)
      Mathematical Approach to Research Problems of Science and Technology -Theoretical basis and developments in mathematical modelling-
    • Total Pages
      9
    • Publisher
      Springer
    • Related Report
      2013 Research-status Report
  • [Remarks] Kirill Morozov's Homepage

    • URL

      http://imi.kyushu-u.ac.jp/~morozov/

    • Related Report
      2014 Annual Research Report
  • [Remarks] Kirill Morozov's Google Scholar Profile

    • URL

      https://scholar.google.co.jp/citations?user=NcYfeG4AAAAJ

    • Related Report
      2014 Annual Research Report
  • [Remarks] Kirill Morozov's DBLP Page

    • URL

      http://dblp.uni-trier.de/pers/hd/m/Morozov:Kirill

    • Related Report
      2014 Annual Research Report
  • [Remarks] Kirill Morozov's homepage

    • URL

      http://imi.kyushu-u.ac.jp/~morozov/

    • Related Report
      2013 Research-status Report
  • [Remarks] Kirill Morozov's homepage

    • URL

      http://imi.kyushu-u.ac.jp/~morozov/

    • Related Report
      2012 Research-status Report

URL: 

Published: 2013-05-31   Modified: 2021-04-07  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi