• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on Cryptographic Primitives with Easily Verifiable Security

Research Project

Project/Area Number 26280046
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypePartial Multi-year Fund
Section一般
Research Field Information security
Research InstitutionNational Institute of Advanced Industrial Science and Technology

Principal Investigator

Hanaoka Goichiro  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 研究チーム長 (30415731)

Co-Investigator(Kenkyū-buntansha) 縫田 光司  東京大学, 大学院情報理工学系研究科, 准教授 (20435762)
江村 恵太  国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員 (30597018)
Attrapadun Nutt (ATTRAPADUN Nutt)  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 主任研究員 (40515300)
吉田 真紀  国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員 (50335387)
松田 隆宏  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 主任研究員 (60709492)
松尾 真一郎  国立研究開発法人情報通信研究機構, 社会還元促進部門, 統括 (20553960)
Project Period (FY) 2014-04-01 – 2019-03-31
Project Status Completed (Fiscal Year 2018)
Budget Amount *help
¥17,160,000 (Direct Cost: ¥13,200,000、Indirect Cost: ¥3,960,000)
Fiscal Year 2018: ¥3,380,000 (Direct Cost: ¥2,600,000、Indirect Cost: ¥780,000)
Fiscal Year 2017: ¥3,380,000 (Direct Cost: ¥2,600,000、Indirect Cost: ¥780,000)
Fiscal Year 2016: ¥3,380,000 (Direct Cost: ¥2,600,000、Indirect Cost: ¥780,000)
Fiscal Year 2015: ¥3,380,000 (Direct Cost: ¥2,600,000、Indirect Cost: ¥780,000)
Fiscal Year 2014: ¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Keywords暗号・認証 / 暗号・認証等 / 暗号
Outline of Final Research Achievements

Due to the complicated functionalities of advanced cryptographic primitives, the security proofs for these are likewise highly complex, and as a consequence, critical flaws are often found in these proofs. In this research, we investigated design methodologies for constructing cryptographic primitives with security proofs that can
easily be verified by third parties. As a result, we showed new techniques for evaluating the security of cryptographic primitives, and proposed concrete advanced cryptographic schemes with highly reliable security.

Academic Significance and Societal Importance of the Research Achievements

暗号技術の安全性は専門的な研究者であっても正確に把握することは困難であり、したがって一般的な開発者や利用者にとっては、その実態を理解することは一層難しい状況となっている。本研究は、方式設計の段階から、安全性の検証が容易となるように暗号技術を構成するための手法について検討を行うものであり、本研究によって得られた知見により、従来に比べて信頼性の高いセキュリティ技術の実現に寄与できるものと考えられる。

Report

(6 results)
  • 2018 Annual Research Report   Final Research Report ( PDF )
  • 2017 Annual Research Report
  • 2016 Annual Research Report
  • 2015 Annual Research Report
  • 2014 Annual Research Report
  • Research Products

    (18 results)

All 2018 2017 2016 2015 2014

All Presentation (18 results) (of which Int'l Joint Research: 12 results)

  • [Presentation] Attribute-Based Signatures for Unbounded Languages from Standard Assumptions2018

    • Author(s)
      Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
    • Organizer
      ASIACRYPT 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Memory Lower Bounds of Reductions Revisited2018

    • Author(s)
      Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      EUROCRYPT 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO2018

    • Author(s)
      Ai Ishida, Yusuke Sakai, Goichiro Hanaoka
    • Organizer
      ISITA 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening2018

    • Author(s)
      Yusuke Sakai, Goichiro Hanaoka
    • Organizer
      ISITA 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption2018

    • Author(s)
      Junrichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura
    • Organizer
      ISITA 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Fully Anonymous Group Signature with Verifier-Local Revocation2018

    • Author(s)
      Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      SCN 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions2018

    • Author(s)
      Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      SCN 2018
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations2017

    • Author(s)
      Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka
    • Organizer
      Selected Areas in Cryptography - SAC 2017 - 24th International Conference
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Key Management for Versatile Pay-TV Services2017

    • Author(s)
      Kazuto Ogawa, Sakurako Tamura, Goichiro Hanaoka
    • Organizer
      Security and Trust Management - 13th International Workshop, STM 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones2016

    • Author(s)
      Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      ASIACRYPT 2016
    • Place of Presentation
      Hanoi, Vietnam
    • Year and Date
      2016-12-04
    • Related Report
      2016 Annual Research Report
  • [Presentation] Size-Hiding Computation for Multiple Parties2016

    • Author(s)
      Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    • Organizer
      ASIACRYPT 2016
    • Place of Presentation
      Hanoi, Vietnam
    • Year and Date
      2016-12-04
    • Related Report
      2016 Annual Research Report
  • [Presentation] Attribute-Based Encryption for Range Attributes2016

    • Author(s)
      Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada
    • Organizer
      SCN 2016
    • Place of Presentation
      Amalfi, Italy
    • Year and Date
      2016-08-31
    • Related Report
      2016 Annual Research Report
  • [Presentation] On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions2016

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      PKC 2016
    • Place of Presentation
      Taipei, Taiwan
    • Year and Date
      2016-03-06
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption2015

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      ASIACRYPT 2015
    • Place of Presentation
      Auckland, New Zealand
    • Year and Date
      2015-11-29
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs2015

    • Author(s)
      Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
    • Organizer
      ASIACRYPT 2015
    • Place of Presentation
      Auckland, New Zealand
    • Year and Date
      2015-11-29
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms2015

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      TCC 2015
    • Place of Presentation
      Warsaw
    • Year and Date
      2015-03-23 – 2015-03-25
    • Related Report
      2014 Annual Research Report
  • [Presentation] Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks2014

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      ICISC 2014
    • Place of Presentation
      Seoul
    • Year and Date
      2014-12-03 – 2014-12-05
    • Related Report
      2014 Annual Research Report
  • [Presentation] Compact Public Key Encryption with Minimum Ideal Property of Hash Functions2014

    • Author(s)
      Kazuki Yoneyama, Goichiro Hanaoka
    • Organizer
      ProvSec 2014
    • Place of Presentation
      Hong Kong
    • Year and Date
      2014-10-09 – 2014-10-10
    • Related Report
      2014 Annual Research Report

URL: 

Published: 2014-04-04   Modified: 2020-03-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi