• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A Study on Hierarchical Delegation of Computation for Cloud Services

Research Project

Project/Area Number 26730068
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionNational Institute of Advanced Industrial Science and Technology

Principal Investigator

MATSUDA Takahiro  国立研究開発法人産業技術総合研究所, 情報技術研究部門, 研究員 (60709492)

Project Period (FY) 2014-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥3,770,000 (Direct Cost: ¥2,900,000、Indirect Cost: ¥870,000)
Fiscal Year 2016: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2015: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2014: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywords暗号技術
Outline of Final Research Achievements

Verifiable delegation of computation is a cryptographic technology in which computation performed by a third party can later be verified. We studied how to make it more efficient and flexible. As our main work, we focused on proxy re-encryption, which is a cryptographic primitive in which the task of changing the destination of ciphertexts (i.e. re-encryption) can be delegated to a third party, and obtained several results on it. In particular, we proposed proxy re-encryption that supports the verifiability of the re-encryption procedure, and one that supports the homomorphic property.

Report

(4 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (9 results)

All 2016 2015

All Journal Article (5 results) (of which Peer Reviewed: 4 results) Presentation (4 results) (of which Int'l Joint Research: 2 results)

  • [Journal Article] Tag-KEM/DEM framework for public-key encryption with non-interactive opening2016

    • Author(s)
      Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka
    • Journal Title

      2016 International Symposium on Information Theory and Its Applications (ISITA 2016), Monterey, CA, USA, October 30 - November 2, 2016

      Volume: - Pages: 231-235

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security2016

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Journal Title

      Public-Key Cryptography - PKC 2016, Lecture Notes in Computer Science

      Volume: 9614 Pages: 3-34

    • DOI

      10.1007/978-3-662-49384-7_1

    • ISBN
      9783662493830, 9783662493847
    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] 準同型暗号における安全な分析の制御について2016

    • Author(s)
      川合豊, 松田隆宏, 平野貴人, 小関義博, 花岡悟一郎
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム(SCIS 2016)予稿集

      Volume: 4E2-2 Pages: 1-6

    • Related Report
      2015 Research-status Report
  • [Journal Article] Time-specific encryption from forward-secure encryption: generic and direct constructions2016

    • Author(s)
      Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai
    • Journal Title

      International Journal of Information Security

      Volume: 未定

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption2015

    • Author(s)
      Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanoaka, Kanta Matsuura
    • Journal Title

      Topics in Cryptology-CT-RSA 2015, Lecture Notes in Computer Science

      Volume: 9048 Pages: 410-428

    • DOI

      10.1007/978-3-319-16715-2_22

    • ISBN
      9783319167145, 9783319167152
    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Presentation] Tag-KEM/DEM framework for public-key encryption with non-interactive opening2016

    • Author(s)
      Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      2016 International Symposium on Information Theory and Its Applications (ISITA 2016)
    • Place of Presentation
      Monterey, California, USA
    • Year and Date
      2016-10-31
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security2016

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      19th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2016)
    • Place of Presentation
      Taipei, Taiwan
    • Year and Date
      2016-03-07
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] 準同型暗号における安全な分析の制御について2016

    • Author(s)
      川合豊, 松田隆宏, 平野貴人, 小関義博, 花岡悟一郎
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ(熊本県熊本市)
    • Year and Date
      2016-01-22
    • Related Report
      2015 Research-status Report
  • [Presentation] Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption2015

    • Author(s)
      Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanoaka, Kanta Matsuura
    • Organizer
      The Cryptographers' Track at the RSA Conference 2015 (CT-RSA 2015)
    • Place of Presentation
      Moscone Center, San Fransisco, Carifornia, USA
    • Year and Date
      2015-04-24
    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2023-03-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi