• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on efficient data authentication techniques using a homomorphic authentication code

Research Project

Project/Area Number 25730083
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

Omote Kazumasa  北陸先端科学技術大学院大学, 情報科学研究科, 准教授 (50417507)

Project Period (FY) 2013-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2015)
Budget Amount *help
¥3,250,000 (Direct Cost: ¥2,500,000、Indirect Cost: ¥750,000)
Fiscal Year 2015: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2014: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2013: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Keywordsデータ認証 / 準同型性 / 認証子 / ネットワーク符号 / セキュアクラウドストレージ / セキュアクラウド / クラウド
Outline of Final Research Achievements

In this research, we proposed the data authentication schemes which enabled data repair securely and efficiently by using network coding and homomorphic authentication code in untrusted storages. In these schemes, we constructed a new homomorphic authentication code which was able to deal with the different private keys for plural users, and we also achieved "direct repair" function of data which enables data repair by healthy servers without data owner. Furthermore, by using our proposed homomorphic authentication code, we constructed a practical secure cloud system which satisfied both direct repair and dynamic operations of data and we also constructed a fair trade system of data.

Report

(4 results)
  • 2015 Annual Research Report   Final Research Report ( PDF )
  • 2014 Research-status Report
  • 2013 Research-status Report
  • Research Products

    (24 results)

All 2016 2015 2014 2013 Other

All Journal Article (7 results) (of which Peer Reviewed: 7 results,  Acknowledgement Compliant: 3 results,  Open Access: 4 results) Presentation (15 results) (of which Int'l Joint Research: 3 results) Remarks (2 results)

  • [Journal Article] D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability2016

    • Author(s)
      Kazumasa Omote and Tran Phuong Thao
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E99.D Issue: 4 Pages: 816-829

    • DOI

      10.1587/transinf.2015ICP0014

    • NAID

      130005141347

    • ISSN
      0916-8532, 1745-1361
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation2016

    • Author(s)
      Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote and Takeshi Takahashi
    • Journal Title

      IEEE Transactions on Emerging Topics in Computing

      Volume: 4 Issue: 1 Pages: 88-101

    • DOI

      10.1109/tetc.2015.2400131

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] ND-POR: A POR Based on Network Coding and Dispersal Coding2015

    • Author(s)
      Kazumasa Omote and Tran Phuong Thao
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E98.D Issue: 8 Pages: 1465-1476

    • DOI

      10.1587/transinf.2015EDP7011

    • NAID

      130005090411

    • ISSN
      0916-8532, 1745-1361
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Self-healing wireless sensor networks2015

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: - Issue: 10 Pages: 2547-2568

    • DOI

      10.1002/cpe.3434

    • NAID

      120005624453

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] MD-POR: Multi-source and Direct Repair for Network Coding-based Proof of Retrievability2015

    • Author(s)
      Kazumasa Omote and Tran Phuong Thao
    • Journal Title

      International Journal of Distributed Sensor Networks

      Volume: 2015 Issue: 6 Pages: 1-15

    • DOI

      10.1155/2015/586720

    • NAID

      120005624450

    • Related Report
      2015 Annual Research Report 2014 Research-status Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users2014

    • Author(s)
      Keita Emura,Atsuko Miyaji,Kazumasa Omote
    • Journal Title

      Journal of Applied Mathematics

      Volume: 2014 Pages: 1-18

    • DOI

      10.1155/2014/983040

    • NAID

      120005624449

    • Related Report
      2014 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Methods for Restricting Message Space in Public-Key Encryption2013

    • Author(s)
      Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Jacob C. N. Schuldt
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E96.A Issue: 6 Pages: 1156-1168

    • DOI

      10.1587/transfun.E96.A.1156

    • NAID

      10031193799

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Presentation] DD-POR: Dynamic Operations and Direct Repair in Network Coding-based Proof of Retrievability2015

    • Author(s)
      Kazumasa Omote and Tran Phuong Thao
    • Organizer
      The 21st Annual International Computing and Combinatorics Conference
    • Place of Presentation
      Beijing, China
    • Year and Date
      2015-08-04
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] POR-2P: Network Coding-Based POR for Data Provision-Payment System2015

    • Author(s)
      Kazumasa Omote and Tran Phuong Thao
    • Organizer
      The 10th International Conference on Risks and Security of Internet and Systems
    • Place of Presentation
      Mytilene, Greece
    • Year and Date
      2015-07-20
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] SW-SSS: Slepian-Wolf Coding-based Secret Sharing Scheme2015

    • Author(s)
      Kazumasa Omote and Tran Phuong Thao
    • Organizer
      The 8th Conference on Computational Intelligence in Security for Information Systems
    • Place of Presentation
      Burgos, Spain
    • Year and Date
      2015-06-15
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] An Approach to Detect Remote Access Trojan in the Early Stage of Communication2015

    • Author(s)
      Dan Jiang,Kazumasa Omote
    • Organizer
      The 29th IEEE International Conference on Advanced Information Networking and Applications
    • Place of Presentation
      Gwangju,Korea
    • Year and Date
      2015-03-25 – 2015-03-27
    • Related Report
      2014 Research-status Report
  • [Presentation] S-POR: An Extremely Simple Network Coding-based Proof of Retrievability2015

    • Author(s)
      Kazumasa Omote,Tran Phuong Thao
    • Organizer
      Computer Security (CSEC) IPSJ SIG vol.2015-CSEC-68
    • Place of Presentation
      法政大学(東京都小金井市)
    • Year and Date
      2015-03-05 – 2015-03-06
    • Related Report
      2014 Research-status Report
  • [Presentation] 脆弱性評価及びOpcodeを用いたDrive-by-Download攻撃予測手法の提案2015

    • Author(s)
      安達貴志,面和成
    • Organizer
      The 32nd Symposium on Cryptography and Information Security
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県・北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 動的解析ログのAPIを用いた機能に基づくマルウェア分類2015

    • Author(s)
      川口直人,面和成
    • Organizer
      The 32nd Symposium on Cryptography and Information Security
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 実用的かつ効率的なネットワーク符号ベースのPOR方式2014

    • Author(s)
      面和成, Tran Thao Phuong
    • Organizer
      Computer Security Symposium (CSS 2014)/anti Malware engineering WorkShop (MWS 2014)
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report
  • [Presentation] 秘匿多肢選択マッチングプロトコルの提案と評価2014

    • Author(s)
      面和成
    • Organizer
      Computer Security Symposium (CSS 2014)/anti Malware engineering WorkShop (MWS 2014)
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report
  • [Presentation] 初期段階におけるRemote Access Trojanの検知手法2014

    • Author(s)
      蒋丹,面和成
    • Organizer
      Computer Security Symposium (CSS 2014)/anti Malware engineering WorkShop (MWS 2014)
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report
  • [Presentation] MDNC: Multi-source and Direct Repair in Network Coding-based Proof of Retrievability Scheme2014

    • Author(s)
      Kazumasa Omote,Tran Thao Phoung
    • Organizer
      The 15th International Workshop on Information Security Applications
    • Place of Presentation
      Jeju Island,Korea
    • Year and Date
      2014-08-20 – 2014-08-22
    • Related Report
      2014 Research-status Report
  • [Presentation] ナイーブベイズを用いたDrive-by-Download攻撃予測に関する評価2014

    • Author(s)
      安達貴志,面和成
    • Organizer
      Computer Security (CSEC) IPSJ SIG Vol.2014-CSEC-65
    • Place of Presentation
      ホルトホール大分(大分県大分市)
    • Year and Date
      2014-05-22 – 2014-05-23
    • Related Report
      2014 Research-status Report
  • [Presentation] A new Efficient and Secure POR Scheme Based on Network Coding2014

    • Author(s)
      Kazumasa Omote,Tran Thao Phoung
    • Organizer
      The 28th IEEE InternationalConference on Advanced Information Networking and Applications
    • Place of Presentation
      Victoria,Canada
    • Year and Date
      2014-05-13 – 2014-05-16
    • Related Report
      2014 Research-status Report
  • [Presentation] A New Effcient and Secure POR Scheme Based on Network Coding2014

    • Author(s)
      Kazumasa Omote and Tran Thao Phoung
    • Organizer
      The 28th IEEE International Conference on Advanced Information Networking and Applications
    • Place of Presentation
      victria, Canada
    • Related Report
      2013 Research-status Report
  • [Presentation] Self-healing Schemes Suitable for Various WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Organizer
      The 6th International Conference on Internet and Distributed Computing Systems
    • Place of Presentation
      Hangzhou, China
    • Related Report
      2013 Research-status Report
  • [Remarks] 面研究室

    • URL

      http://www.jaist.ac.jp/is/labs/omote-lab/index.html

    • Related Report
      2015 Annual Research Report 2014 Research-status Report
  • [Remarks] 面研究室(北陸先端科学技術大学院大学)

    • URL

      http://www.jaist.ac.jp/is/labs/omote-lab/index.html

    • Related Report
      2013 Research-status Report

URL: 

Published: 2014-07-25   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi