• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research for the extensions of searchable encryption schemes

Research Project

Project/Area Number 25330161
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionInstitute of Information Security

Principal Investigator

DOI Hiroshi  情報セキュリティ大学院大学, 情報セキュリティ研究科, 教授 (70338656)

Project Period (FY) 2013-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2015)
Budget Amount *help
¥3,770,000 (Direct Cost: ¥2,900,000、Indirect Cost: ¥870,000)
Fiscal Year 2015: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2014: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords検索可能暗号 / マルチパーティプロトコル / プライバシ保護 / 秘密分散
Outline of Final Research Achievements

In this research, we proposed the extensions of searchable encryption schemes that could specify the searching user and could configure several conditions. Although our extension schemes assumed the existence of multi servers, they had useful properties and were secure and efficient. Furthermore, we researched the improvement of efficiency relevant to the extension schemes. From the above results, we could contribute to the security and usefulness for using encrypted data.

Report

(4 results)
  • 2015 Annual Research Report   Final Research Report ( PDF )
  • 2014 Research-status Report
  • 2013 Research-status Report
  • Research Products

    (6 results)

All 2016 2015 2014

All Journal Article (6 results) (of which Peer Reviewed: 1 results,  Open Access: 1 results,  Acknowledgement Compliant: 6 results)

  • [Journal Article] Proxy Trapdoor-Re-Generation Scheme in Public Key Encryption with Keyword Search - Realization of Provably Secure Organizational Cryptosystem2016

    • Author(s)
      Ryo Fujita, Takeo Mizuno, Hiroshi Doi, Shigeo Tsujii
    • Journal Title

      2016年暗号と情報セキュリティシンポジウムSCIS2016論文集

      Volume: 2A2-5 Pages: 1-8

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] 標数2の有限体上の({1,k},n)階層的秘密分散法の研究2016

    • Author(s)
      島幸司, 土井洋
    • Journal Title

      情報処理学会研究報告コンピュータセキュリティ(CSEC)

      Volume: 2016-CSEC-72 Pages: 1-7

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search2015

    • Author(s)
      Koji TOMIDA, Hiroshi DOI, Masami MOHRI, Yoshiaki SHIRAISHI
    • Journal Title

      Journal of Information Processing

      Volume: 23 Issue: 5 Pages: 562-569

    • DOI

      10.2197/ipsjjip.23.562

    • NAID

      130005100074

    • ISSN
      1882-6652
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] 階層的秘密分散法の高速化に関する研究2015

    • Author(s)
      島幸司, 土井洋
    • Journal Title

      コンピュータセキュリティシンポジウムCSS2015論文集

      Volume: 2015 Pages: 1327-1334

    • NAID

      170000151477

    • Related Report
      2015 Annual Research Report
    • Acknowledgement Compliant
  • [Journal Article] A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function2015

    • Author(s)
      Koji Tomida, Hiroshi Doi, Masami Mohri, Yoshiaki Shiraishi
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: 114 Pages: 175-179

    • NAID

      110010021508

    • Related Report
      2014 Research-status Report
    • Acknowledgement Compliant
  • [Journal Article] 暗号文分割型のIDベース検索可能暗号の構成2014

    • Author(s)
      冨田幸嗣,土井洋,毛利公美,白石善明
    • Journal Title

      コンピュータセキュリティシンポジウム2014論文集

      Volume: 2014 Pages: 551-558

    • NAID

      170000087314

    • Related Report
      2014 Research-status Report
    • Acknowledgement Compliant

URL: 

Published: 2014-07-25   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi