• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Building non-interactive zero-knowledge proof from probabilistically checkable proof and its application to practical cryptosystems

Research Project

Project/Area Number 25540004
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Theory of informatics
Research InstitutionKyushu University

Principal Investigator

SAKURAI KOUICHI  九州大学, システム情報科学研究科(研究院, 教授 (60264066)

Project Period (FY) 2013-04-01 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Fiscal Year 2014: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Fiscal Year 2013: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Keywords暗号 / 認証 / ゼロ知識証明 / 確率検査証明 / 証明可能安全性 / RSA暗号 / 属性情報ベース電子署名 / Fiat-Shamir変換技法 / 暗号理論 / 確率検証証明 / RSA暗号
Outline of Final Research Achievements

Our target here was the realization of the effective non-interactive zero-knowledge proof system, which had been realized only by the pairing-based construction, in the other construction ( with the RSA) that yield benefit of enlarging its applied area. It is worth noting that existing work in the field of attribute-based encryption scheme that is one of the extensions of ID-based encryption scheme owes its construction to the pairing technique. Our research succeeded to construct an attribute-based signature scheme that does not utilize the pairing technique, which was the problem in our study. We presented this result in ACM AsiaPKC2014.

Report

(3 results)
  • 2014 Annual Research Report   Final Research Report ( PDF )
  • 2013 Research-status Report
  • Research Products

    (12 results)

All 2015 2014 Other

All Presentation (8 results) Remarks (4 results)

  • [Presentation] Attribute-Based Signatures from Proof of Knowledge of Signatures2015

    • Author(s)
      Hiroaki Anada
    • Organizer
      2015年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] CCA-Secure Multi-hop Unidirectional Proxy Re-Encryption from Indistinguishability Obfuscation2015

    • Author(s)
      Jian Weng
    • Organizer
      2015年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] Attack on a public key trace and revoke scheme of a broadcast encryption2015

    • Author(s)
      Jian Weng
    • Organizer
      2015年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] Security Notion and Construction on Bidirectional Proxy Re-Encryption2015

    • Author(s)
      Jian Weng
    • Organizer
      2015年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] Attribute-Based Signatures without Pairings via the Fiat-Shamir Paradigm2014

    • Author(s)
      Hiroaki Anada
    • Organizer
      ACM ASIA Public-Key Cryptography Workshop
    • Place of Presentation
      京都
    • Year and Date
      2014-06-03
    • Related Report
      2014 Annual Research Report
  • [Presentation] Implementation of Efficient Operations over GF(232) using Graphics Processing Units2014

    • Author(s)
      櫻井 幸一
    • Organizer
      The 2014 Asian Conference on Availability, Reliability and Security
    • Place of Presentation
      インドネシア
    • Related Report
      2013 Research-status Report
  • [Presentation] Attribute-Based Signatures without Pairings via the Fiat-Shamir Paradigm2014

    • Author(s)
      穴田 啓晃
    • Organizer
      The 2nd ACM ASIA Public-Key Cryptography Workshop
    • Place of Presentation
      京都
    • Related Report
      2013 Research-status Report
  • [Presentation] Attribute-Based Identification Schemes of Proofs of Knowledge2014

    • Author(s)
      穴田 啓晃
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Research-status Report
  • [Remarks] 九州大学-研究者情報 [櫻井 幸一 (教授) システム情報科学研究院 情報学部門]

    • URL

      http://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220

    • Related Report
      2014 Annual Research Report
  • [Remarks] 櫻井 研究室

    • URL

      http://itslab.csce.kyushu-u.ac.jp/index-j.html

    • Related Report
      2014 Annual Research Report
  • [Remarks] 九州大学-研究者情報 [櫻井 幸一 (教授) システム情報科学研究院 情報学部門]

    • URL

      http://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220

    • Related Report
      2013 Research-status Report
  • [Remarks] 櫻井研究室

    • URL

      http://itslab.inf.kyushu-u.ac.jp

    • Related Report
      2013 Research-status Report

URL: 

Published: 2014-07-25   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi