A Study on Code-Based Postquantum Cryptographic Protocols and Their Security Models
Project/Area Number |
24700013
|
Research Category |
Grant-in-Aid for Young Scientists (B)
|
Allocation Type | Multi-year Fund |
Research Field |
Fundamental theory of informatics
|
Research Institution | Kyushu University |
Principal Investigator |
MOROZOV Kirill 九州大学, マス・フォア・インダストリ研究所, 助教 (80443232)
|
Project Period (FY) |
2012-04-01 – 2015-03-31
|
Project Status |
Completed (Fiscal Year 2014)
|
Budget Amount *help |
¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2014: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2012: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
|
Keywords | 耐量子暗号 / 符号理論に基づく暗号 / 暗号プロトコル / 秘密分散法 / 不正者を検知可能な秘密分散法 / robust秘密分散法 / シェア再配布 / 符号理論に基づく暗号方式 / ゼロ知識証明プロトコル / 不正者に対しても検知可能な秘密分散法 / 平文知識証明プロトコル |
Outline of Final Research Achievements |
Under this grant, we studied the following two important applications of coding in cryptography: 1) Code-based cryptographic protocols, which are secure even against attacks with quantum computers (such the protocols are called “post-quantum”). We presented the first proof of plaintext knowledge for the code-based public-key encryption, and applied it to obtain the first code-based verifiable encryption and the first designated confirmer signature. 2) Secret sharing (SS) - an information security technology allowing us to achieve privacy by splitting the secret data into “shares” that can be stored in a distributed manner. We presented new cheater-identifiable SS schemes and new robust SS schemes secure against rushing cheaters with share sizes which are minimal up-to-date, among the constructions of the same class. Finally, we presented a verifiable share redistribution scheme with perfect security when the number of corrupt parties k<n/3, where n is the number of participants.
|
Report
(4 results)
Research Products
(52 results)
-
-
-
-
-
-
-
-
-
-
-
-
[Journal Article] On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary2013
Author(s)
Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
-
Journal Title
Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
Volume: LNCS, vol. 8231
Pages: 258-271
DOI
ISBN
9783642413827, 9783642413834
Related Report
Peer Reviewed
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-