• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Construction and Analysis of Information Theoretically Secure Multicast Communication

Research Project

Project/Area Number 26420345
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Communication/Network engineering
Research InstitutionThe University of Electro-Communications

Principal Investigator

Iwamoto Mitsugu  電気通信大学, 大学院情報理工学研究科, 准教授 (50377016)

Co-Investigator(Kenkyū-buntansha) 太田 和夫  電気通信大学, 大学院情報理工学研究科, 教授 (80333491)
Project Period (FY) 2014-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥4,940,000 (Direct Cost: ¥3,800,000、Indirect Cost: ¥1,140,000)
Fiscal Year 2016: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2015: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Fiscal Year 2014: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywords放送型暗号 / セキュアネットワーク符号化 / 秘密分散法 / 情報理論的安全性 / ネットワーク符号化
Outline of Final Research Achievements

We discussed how to unify broadcast encryption (BE) and secure network coding (SNC), and clarified that it is possible when the network is (t,d)-combinatorial network where a source node is connected to t intermediate nodes, and each sink node is connected to t intermediate nodes. Furthermore, the proposed scheme is highly practical compared to the original BE. For instance, 834TB and 809TB are necessary for encryption and decryption keys, respectively, to implement (≦100, ≦3)-BE by traditional method. On the other hand, in the case of (5,3)-combinatorial network, 2.6TB and 75GB are enough for encryption and decryption keys, respectively, by the proposed scheme. Key lengths of proposed scheme are not short, but are more practical compared to the traditional BE.

Report

(4 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (24 results)

All 2017 2016 2015 2014 Other

All Journal Article (1 results) (of which Peer Reviewed: 1 results,  Acknowledgement Compliant: 1 results) Presentation (18 results) (of which Int'l Joint Research: 4 results,  Invited: 1 results) Remarks (5 results)

  • [Journal Article] Efficient Card-based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations2017

    • Author(s)
      T. Nakai, Y. Misawa, Y. Tokushige, M. Iwamoto, and K. Ohta
    • Journal Title

      Springer Lecture Notes in Computer Science

      Volume: 10052 Pages: 350-364

    • DOI

      10.1007/978-3-319-48965-0_30

    • ISBN
      9783319489643, 9783319489650
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Presentation] Steganalysis of Bit Replacement Steganography for a Proactive Secret Image Sharing2017

    • Author(s)
      A. Espejel-Trujillo, M. Iwamoto
    • Organizer
      SCIS2017
    • Place of Presentation
      ロワジール ホテル 那覇(沖縄県那覇市)
    • Related Report
      2016 Annual Research Report
  • [Presentation] マルチパーティ計算に関する安全性概念の定式化について2017

    • Author(s)
      岩本貢
    • Organizer
      SCIS2017
    • Place of Presentation
      ロワジール ホテル 那覇(沖縄県那覇市)
    • Related Report
      2016 Annual Research Report
  • [Presentation] 秘密分散型放送暗号2017

    • Author(s)
      岩本貢,渡邉洋平
    • Organizer
      SCIS2017
    • Place of Presentation
      ロワジール ホテル 那覇(沖縄県那覇市)
    • Related Report
      2016 Annual Research Report
  • [Presentation] カード操作の分類とカードベース暗号プロトコル2016

    • Author(s)
      中井雄士,三澤裕人,徳重佑樹,岩本貢, 太田和夫,
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2016),
    • Place of Presentation
      Kumamoto, Japan
    • Year and Date
      2016-01-22
    • Related Report
      2015 Research-status Report
  • [Presentation] Proactive Secret Image Sharing with Quality and Payload Trade-off in Stego-images2016

    • Author(s)
      A. E. Trujillo and M. Iwamoto,
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2016),
    • Place of Presentation
      Kumamoto, Japan
    • Year and Date
      2016-01-21
    • Related Report
      2015 Research-status Report
  • [Presentation] Joux-Lucks のマルチコリジョン探索アルゴリズムのMicroMint への応用2016

    • Author(s)
      鴨志田優一,岩本貢, 太田和夫,
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2016),
    • Place of Presentation
      Kumamoto, Japan
    • Year and Date
      2016-01-21
    • Related Report
      2015 Research-status Report
  • [Presentation] 人間向け暗号/認証プロトコルの統一的安全性評価2016

    • Author(s)
      三澤裕人,徳重佑樹,岩本貢, 太田和夫,
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2016),
    • Place of Presentation
      Kumamoto, Japan
    • Year and Date
      2016-01-21
    • Related Report
      2015 Research-status Report
  • [Presentation] Application of Joux-Lucks Search Algorithm for Multi-Collisions to MicroMint2016

    • Author(s)
      Y. Kamoshida, M. Iwamoto, and K. Ohta
    • Organizer
      IWSEC2016
    • Place of Presentation
      お茶の水ソラシティ(東京都千代田区)
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Efficient Card-based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations2016

    • Author(s)
      T. Nakai, Y. Misawa, Y. Tokushige, M. Iwamoto, and K. Ohta
    • Organizer
      CANS2016
    • Place of Presentation
      Milan, Italy
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] ブロックサインの安全性に対するコードブックの影響2015

    • Author(s)
      三澤裕人,徳重佑樹,岩本貢, 太田和夫
    • Organizer
      コンピューターセキュリティシンポジウム,
    • Place of Presentation
      Nagasaki, Japan
    • Year and Date
      2015-10-23
    • Related Report
      2015 Research-status Report
  • [Presentation] Comparison of Security on Coded Signs with Public/Private Code Book2015

    • Author(s)
      Y. Misawa, Y. Tokushige, M. Iwamoto and K. Ohta
    • Organizer
      International Workshop on Information Security, IWSEC2015, (poster session)
    • Place of Presentation
      Nara, Japan
    • Year and Date
      2015-08-26
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Toward Reducing Shuffling in Card-based Cryptographic Protocol for Millionaire Problem2015

    • Author(s)
      T. Nakai, Y. Tokushige, M. Iwamoto and K. Ohta,
    • Organizer
      International Workshop on Information Security, IWSEC2015, (poster session)
    • Place of Presentation
      Nara, Japan
    • Year and Date
      2015-08-26
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Construction of symmetric-key encryption with guessing secrecy2015

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2015),
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-06-15
    • Related Report
      2015 Research-status Report
  • [Presentation] 推測成功確率に基づいた安全性基準をみたす秘密分散法2015

    • Author(s)
      岩本貢,四方順司
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2015)
    • Place of Presentation
      北九州市,福岡県
    • Year and Date
      2015-01-21
    • Related Report
      2014 Research-status Report
  • [Presentation] Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario2014

    • Author(s)
      P. Lumyong, M. Iwamoto, and K. Ohta,
    • Organizer
      International Symposium on Information Theory and its Applications (ISITA2014)
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-29
    • Related Report
      2014 Research-status Report
  • [Presentation] Secret Sharing Schemes Based on Min-entropies2014

    • Author(s)
      P. Lumyong, M. Iwamoto, and K. Ohta
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2014)
    • Place of Presentation
      Honolulu, USA
    • Year and Date
      2014-07-01
    • Related Report
      2014 Research-status Report
  • [Presentation] Privacy-Preserving Smart Metering with Verifiability for Both Billing and Energy Management2014

    • Author(s)
      K. Ohara, Y. Sakai, F. Yoshida, M. Iwamoto, and K. Ohta
    • Organizer
      The 2nd ACM ASIA Public-Key Cryptography Workshop (ASIAPKC2014)
    • Place of Presentation
      Kyoto, Japan
    • Year and Date
      2014-06-03
    • Related Report
      2014 Research-status Report
  • [Presentation] 秘密分散法と視覚復号型秘密分散法 ― 共通点と相違点2014

    • Author(s)
      岩本貢
    • Organizer
      電子情報通信学会マルチメディア 情報ハイディング・エンリッチメント研究会
    • Place of Presentation
      葛飾区,東京都
    • Year and Date
      2014-05-16
    • Related Report
      2014 Research-status Report
    • Invited
  • [Remarks] 太田・岩本研究室

    • URL

      http://ohta-lab.jp/

    • Related Report
      2015 Research-status Report
  • [Remarks] 太田・岩本研究室(個人ページ)

    • URL

      http://ohta-lab.jp/member/mitsugu/

    • Related Report
      2015 Research-status Report
  • [Remarks] 個人ページ(岩本貢)

    • URL

      http://ohta-lab.jp/users/mitsugu/index.html

    • Related Report
      2015 Research-status Report
  • [Remarks] 太田岩本研究室ホームページ

    • URL

      http://ohta-lab.jp

    • Related Report
      2014 Research-status Report
  • [Remarks] 個人ページ(岩本貢)

    • URL

      http://ohta-lab.jp/member/mitsugu/

    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2023-03-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi