• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2001 Fiscal Year Final Research Report Summary

Secure and reliable communication in distributed systems

Research Project

Project/Area Number 10205203
Research Category

Grant-in-Aid for Scientific Research on Priority Areas (B)

Allocation TypeSingle-year Grants
Research InstitutionGunma University

Principal Investigator

IGARASHI Yoshihide  Gunma University, Faculty of Engineering, Professor, 工学部, 教授 (60006260)

Co-Investigator(Kenkyū-buntansha) MOTEGI Kazuhiro  Gunma University, Faculty of Engineering, Research associate, 工学部, 助手 (00251124)
OSAWA Shingo  Gunma University, Faculty of Engineering, Research associate, 工学部, 助手 (30241863)
NISHITANI Yasuaki  Iwate University, Faculty of Engineering, Professor, 工学部, 教授 (60198463)
Project Period (FY) 1998 – 2000
Keywordsdistributed systems / fault tolerance / information security / parallel algorithms / interconnection networks / cryptography / distributed algorithms / mutual exclusion
Research Abstract

This project is to study the design and analysis of reliable and secure protocols for communication and computation on large scale distributed systems. We proposed some fault tolerant broadcasting schemes in networks, and mutual exclusion algorithms and k-exclusion algorithms on the asynchronous shared memory model. Our mutual exclusion algorithms are improvements of the n-process algorithm by Peterson and the tournament algorithm by Peterson and Fischer. Our k-exclusion algorithms are extensions of our mutual exclusion algorithms. Our algorithms use multi-writer/reader shared variables. This is an unattractive feature, but the structures of the algorithms are simple. The n-exclusion algorithms satisfy not only k-exclusion but also k-lockout avoidance.
We proposed the problem of how to transmit an information-theoretic secure bit using random deals of cards among players in hierarchical groups and a computationally unlimited eavesdropper. We also introduced a refined definition of semantic security. The new definition is valid against not only chosen-plaintext attacks but also chosen-ciphertext attacks. We show that semantic security formalized by the new definition is equivalent to indistinguishability, due to Goldwasser and Micali, for each of chosen-plaintext attacks, non-adaptive chosen ciphertext attacks, and adaptive chosen-ciphertext attacks.
We constructed a distributed processing system where clients can join or leave whenever they want to do so. We implemented some algorithms for solving the discrete logarithm problem on PVM (Parallel Virtual Machine).

  • Research Products

    (11 results)

All Other

All Publications (11 results)

  • [Publications] Nishitani, Y.: "Secure multi-party computation over networks"IEICE Transactions on Information and Systems. E83-D,3. 561-569 (2000)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Yoshikawa, R.: "Secret key exchange using random deals of cards on hierarchical structures"11th International Conference on Algorithms and Computation(ISAAC 2000),Lecture Notes in Computer Science. 1969. 290-301 (2000)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Sakai, H.: "A refined definition of semantic security for public-key encryption schemes"IEICE Transactions on Information and Systems. E84-D,1. 34-39 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Yoshikawa, R.: "Construction of secret key exchange spanning trees by random deals on hierarchical structures"IEICE Transactions on Fundamentals. E84-A,5. 1110-1119 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Obokata, K.: "A lockout avoidance algorithm without using time-stamps for the k-exclusion problem"7th International Computing and Combinatorics Conference(COCOON 2001),Lecture Notes in Computer Science. 2108. 571-575 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 杉原 厚吉他編: "アルゴリズム工学-計算困難問題への挑戦"共立出版. 280 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Nishitani, Y.: "Secure multi-party computation over networks"IEICE Transactions on Information and Systems. Vol. E83-D, No.3. 561-569 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Yoshikawa, R.: "Secret key exchange using random deals of cards on hierarchical structures"11th International Conference on Algorithms and Computation (ISAAC 2000), Taipei, Taiwan, Lecture Notes in Computer Science. Vol. 1969, Springer. 290-301 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Sakai, H.: "A refined definition of semantic security for public-key encryption schemes"IEICE Transactions on Information and Systems. Vol. E84-D, No.1. 34-39 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Yoshikawa, R.: "Construction of secret key exchange spanning trees by random deals on hierarchical structures"IEICE Transactions on Fundamentals. Vol. E84-A, No.5. 1110-1119 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Obokata, K.: "A lockout avoidance algorithm without using time-stamps for the k-exclusion problem"7th International Computing and Combinatorics Conference (CO COON 2001), Guilin, China, Lecture Notes in Computer Science. Vol. 2108, Springer. 571-575 (2001)

    • Description
      「研究成果報告書概要(欧文)」より

URL: 

Published: 2003-09-17  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi