• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Security Evaluation of Pairing-Based Cryptography via Large-Scale Cryptanalysis

Research Project

Project/Area Number 25280048
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypePartial Multi-year Fund
Section一般
Research Field Information security
Research InstitutionThe University of Tokyo (2017)
Kyushu University (2013-2016)

Principal Investigator

Takagi Tsuyoshi  東京大学, 大学院情報理工学系研究科, 教授 (60404802)

Co-Investigator(Kenkyū-buntansha) 安田 貴徳  岡山理科大学, 工学部, 准教授 (00464602)
Project Period (FY) 2013-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥14,950,000 (Direct Cost: ¥11,500,000、Indirect Cost: ¥3,450,000)
Fiscal Year 2016: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
Fiscal Year 2015: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
Fiscal Year 2014: ¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2013: ¥5,330,000 (Direct Cost: ¥4,100,000、Indirect Cost: ¥1,230,000)
Keywords暗号・認証等 / 公開鍵暗号 / ペアリング暗号 / 離散対数問題 / 大規模計算 / 対規模計算
Outline of Final Research Achievements

Pairing-based cryptography provides us new cryptographic protocols, which cannot be constructed by the conventional public-key cryptosystems. In this research project, we investigated the hardness of solving the discrete logarithm problem (DLP) over extension fields which is used for the security estimation of pairing-based cryptography. In particular, we evaluated the secure parameters of elliptic curves used for the pairing-based cryptography by considering the extended TNFS which is the asymptotically fastest algorithm for solving the DLP over extension fields. Moreover, we proposed several pairing-based cryptographic protocols such as anonymous hierarchical IBE with continual-key-leakage tolerance, revocable identity-based signcryption scheme, and so on.

Report

(6 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Annual Research Report
  • 2015 Annual Research Report
  • 2014 Annual Research Report
  • 2013 Annual Research Report
  • Research Products

    (40 results)

All 2018 2017 2016 2015 2014 2013 Other

All Int'l Joint Research (3 results) Journal Article (26 results) (of which Int'l Joint Research: 4 results,  Peer Reviewed: 16 results,  Open Access: 13 results) Presentation (7 results) (of which Int'l Joint Research: 1 results,  Invited: 6 results) Remarks (3 results) Funded Workshop (1 results)

  • [Int'l Joint Research] Xidian University/UESTC(China)

    • Related Report
      2016 Annual Research Report
  • [Int'l Joint Research] Hubei University of Technology/Xidian University/Guilin Univ of Electronic Technology(China)

    • Related Report
      2015 Annual Research Report
  • [Int'l Joint Research] University of Wollongong(Australia)

    • Related Report
      2015 Annual Research Report
  • [Journal Article] World Record Cryptanalysis of a Pairing-Based Cryptography and Its Security Evaluation2017

    • Author(s)
      高木剛, 下山武司, 篠原直行, 林卓也
    • Volume
      J100-B
    • Issue
      9
    • Pages
      582-592
    • DOI

      10.14923/transcomj.2016SHI0003

    • ISSN
      1344-4697
    • Year and Date
      2017-09-01
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Secure and Efficient Pairing at 256-bit Security Level2017

    • Author(s)
      Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi
    • Journal Title

      15th International Conference on Applied Cryptography and Network Security, ACNS 2017

      Volume: LNCS 10355 Pages: 59-79

    • DOI

      10.1007/978-3-319-61204-1_4

    • ISBN
      9783319612034, 9783319612041
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] 256 ビット安全性を持つペアリング暗号の鍵長見積もり2017

    • Author(s)
      井上明子, 安田雅哉, 高木剛, 清村優太郎, 川原祐人, 小林鉄太郎
    • Journal Title

      2017 年暗号と情報セキュリティシンポジウム

      Volume: SCIS2017

    • Related Report
      2016 Annual Research Report
  • [Journal Article] ペアリング暗号を効率的に実装可能な256 ビット安全性を持つペアリングフレンドリ曲線2017

    • Author(s)
      清村優太郎, 川原祐人, 小林鉄太郎, 井上明子, 安田雅哉, 高木剛
    • Journal Title

      2017 年暗号と情報セキュリティシンポジウム

      Volume: SCIS2017

    • Related Report
      2016 Annual Research Report
  • [Journal Article] A Comparison of Three-Dimensional Sieve Methods for Number Field Sieve over GF(p6)2017

    • Author(s)
      Wang Kun, 林卓也, 高木剛
    • Journal Title

      2017 年暗号と情報セキュリティシンポジウム

      Volume: SCIS2017

    • Related Report
      2016 Annual Research Report
  • [Journal Article] Revocable and Strongly Unforgeable Identity-based Signature Scheme in the Standard Model2016

    • Author(s)
      Zhenhua Liu, Xiangsong Zhang, Yupu Hu, and Tsuyoshi Takagi
    • Journal Title

      Security and Communication Networks

      Volume: Vo1.9, No.14 Issue: 14 Pages: 2477-2486

    • DOI

      10.1002/sec.1513

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Efficient Deniably Authenticated Encryption and Its Application to E-Mail2016

    • Author(s)
      Fagen Li, Di Zhong, and Tsuyoshi Takagi
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: Vol.11, No.11 Issue: 11 Pages: 2477-2486

    • DOI

      10.1109/tifs.2016.2585086

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] 拡大体上の離散対数問題に対する数体篩法について2016

    • Author(s)
      井上明子, 林卓也, 高木剛,
    • Journal Title

      2016 年暗号 と情報セキュリティシンポジウム

      Volume: SCIS2016

    • Related Report
      2015 Annual Research Report
  • [Journal Article] Functional Encryption Resilient to Hard-to-Invert Leakage2015

    • Author(s)
      Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu
    • Journal Title

      The Computer Journal

      Volume: Vol.58, No.4 Issue: 4 Pages: 735-749

    • DOI

      10.1093/comjnl/bxt105

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Revocable Identity-based Signcryption Scheme Without Random Oracles2015

    • Author(s)
      Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi
    • Journal Title

      International Journal of Network Security

      Volume: Vol.17, No.2 Pages: 110-122

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}2015

    • Author(s)
      Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi,Tsuyoshi Takagi
    • Journal Title

      IACR Cryptology ePrint Archive

      Volume: 1179

    • Related Report
      2015 Annual Research Report
    • Open Access
  • [Journal Article] 次世代暗号の標準化2015

    • Author(s)
      高木剛
    • Journal Title

      學士會会報

      Volume: 第910号 Pages: 88-92

    • NAID

      40020314009

    • Related Report
      2014 Annual Research Report
  • [Journal Article] An experiment of number field sieve for discrete logarithm problem over GF(p^n)2014

    • Author(s)
      Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
    • Journal Title

      JSIAM Letters

      Volume: Vol.6 Pages: 53-56

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Algorithm for Tate Pairing of Composite Order2014

    • Author(s)
      Yutaro Kiyomura, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E97.A Issue: 10 Pages: 2055-2063

    • DOI

      10.1587/transfun.E97.A.2055

    • NAID

      130004696724

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient System Parameters for Identity-Based Encryption using Supersingular Elliptic Curves2014

    • Author(s)
      Takumi Tomita, Tsuyoshi Takagi
    • Journal Title

      JSIAM Letters

      Volume: Vol.6 Pages: 13-16

    • NAID

      130004540625

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance2014

    • Author(s)
      Mingwu Zhang, Bo Yang, Chunzhi Wang, Tsuyoshi Takagi
    • Journal Title

      Security and Communication Networks

      Volume: Vol.7 Issue: 11 Pages: 1974-1987

    • DOI

      10.1002/sec.912

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Anonymous spatial encryption under affine space delegation functionality with full security2014

    • Author(s)
      Mingwu Zhanga, Bo Yang, Tsuyoshi Takagi
    • Journal Title

      Information Sciences

      Volume: Vol. 277 Pages: 715-730

    • DOI

      10.1016/j.ins.2014.03.012

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Introduction to Public-Key Cryptography2014

    • Author(s)
      Tsuyoshi Takagi
    • Journal Title

      Mathematics for Industry

      Volume: Vol.5 Pages: 35-45

    • DOI

      10.1007/978-4-431-55060-0_3

    • ISBN
      9784431550594, 9784431550600
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] 3次元格子篩において用いられる格子点計算法の評価2014

    • Author(s)
      早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛
    • Journal Title

      コンピュータセキュリティシンポジウム CSS2014

      Volume: 1E3-3 Pages: 135-142

    • NAID

      170000087261

    • Related Report
      2014 Annual Research Report
  • [Journal Article] 双線形性ペアリング写像と公開鍵暗号2014

    • Author(s)
      高木剛
    • Journal Title

      数学

      Volume: 第66巻, 第2号 Pages: 192-197

    • Related Report
      2014 Annual Research Report
  • [Journal Article] 上位ビットを固定した合成数位数の効率的なペアリング2014

    • Author(s)
      清村優太郎, 高木剛
    • Journal Title

      2014年暗号と情報セキュリティシンポジウム, SCIS2014

      Volume: 2E1-3 Pages: 36-36

    • Related Report
      2013 Annual Research Report
  • [Journal Article] An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p^12)2013

    • Author(s)
      Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
    • Journal Title

      Number Theory and Cryptography

      Volume: LNCS 8260 Pages: 108-120

    • DOI

      10.1007/978-3-642-42001-6_8

    • ISBN
      9783642420009, 9783642420016
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Algorithm for Tate Pairing of Composite Order2013

    • Author(s)
      Yutaro Kiyomura, Tsuyoshi Takagi
    • Journal Title

      The 8th International Workshop on Security, IWSEC 2013

      Volume: LNCS 8231 Pages: 201-216

    • DOI

      10.1007/978-3-642-41383-4_13

    • NAID

      130004696724

    • ISBN
      9783642413827, 9783642413834
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure Identity-Based Signcryption in the Standard Model2013

    • Author(s)
      Fagen Li, Tsuyoshi Takagi
    • Journal Title

      Mathematical and Computer Modelling

      Volume: Vol.57, No.11-12 Issue: 11-12 Pages: 2685-2694

    • DOI

      10.1016/j.mcm.2011.06.043

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation2013

    • Author(s)
      Mingwu Zhang, Tsuyoshi Takagi
    • Journal Title

      IEEE Systems Journal

      Volume: Vol.7, No.3 Issue: 3 Pages: 410-419

    • DOI

      10.1109/jsyst.2012.2221893

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 拡大体GF(p^n)上の数体篩法における3次元Lattice Sieveの構成2013

    • Author(s)
      早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛
    • Journal Title

      コンピュータセキュリティシンポジウム CSS2013

      Volume: 4 Pages: 70-77

    • NAID

      170000080748

    • Related Report
      2013 Annual Research Report
  • [Presentation] 代数的群モデルにおける双線型Diffie-Hellman問題の困難性証明2018

    • Author(s)
      水出大河、高安敦、高木剛
    • Organizer
      2018年電子情報通信学会総合大会
    • Related Report
      2017 Annual Research Report
  • [Presentation] 暗号の安全性はどのように評価するか?2016

    • Author(s)
      高木 剛
    • Organizer
      Computer Entertainment Developers Conference - CEDEC 2016
    • Place of Presentation
      横浜パシフィコ
    • Related Report
      2016 Annual Research Report
    • Invited
  • [Presentation] Security Evaluation of Post-Quantum Cryptography2016

    • Author(s)
      Tsuyoshi Takagi
    • Organizer
      ChinaCrypt 2016
    • Place of Presentation
      Hangzhou Institute of Technology, China
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] インターネットは安全?-数学と暗号の不思議な関係-2015

    • Author(s)
      高木 剛
    • Organizer
      数学・数理科学4研究拠点合同市民講演 会 万物共通の言葉「数学」
    • Place of Presentation
      明治大学中野キャンパス
    • Year and Date
      2015-12-12
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] 公開鍵暗号の安全性評価2015

    • Author(s)
      高木 剛
    • Organizer
      「最適モデリング」セミナー,
    • Place of Presentation
      東京大学本郷キャンパス
    • Year and Date
      2015-11-25
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] 格子問題の困難性評価2015

    • Author(s)
      高木 剛
    • Organizer
      電子情報通信学会2015年総合大会
    • Place of Presentation
      立命館大学
    • Year and Date
      2015-03-10
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] A thrilling encounter with Johannes Buchmann2014

    • Author(s)
      Tsuyoshi Takagi
    • Organizer
      A conference in honour of Johannes Buchmann's 60th birthday
    • Place of Presentation
      Darmstadt, Germany
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Remarks] 東京大学大学院情報理工学系研究科数理情報学専攻数理情報第1研究室

    • URL

      http://crypto.mist.i.u-tokyo.ac.jp/index.html

    • Related Report
      2017 Annual Research Report
  • [Remarks] 九州大学マス・フォア・インダストリ研究所 高木研究室

    • URL

      http://imi.kyushu-u.ac.jp/~takagi/

    • Related Report
      2016 Annual Research Report 2015 Annual Research Report 2014 Annual Research Report
  • [Remarks] 九州大学 マス・フォア・インダストリ研究所 高木研究室

    • URL

      http://imi.kyushu-u.ac.jp/~takagi/

    • Related Report
      2013 Annual Research Report
  • [Funded Workshop] Post-Quantum Cryptography 20162016

    • Place of Presentation
      Kyushu University
    • Year and Date
      2016-02-24
    • Related Report
      2015 Annual Research Report

URL: 

Published: 2013-05-21   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi