• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2001 Fiscal Year Final Research Report Summary

Design and analysis of public-key encryption algorithms from computationally intractable problems.

Research Project

Project/Area Number 10205220
Research Category

Grant-in-Aid for Scientific Research on Priority Areas (B)

Allocation TypeSingle-year Grants
Research InstitutionKyushu University

Principal Investigator

SAKURAI Kouichi  Kyushu Univ. Dept. Computer Science, Associate Prof., システム情報科学研究院, 助教授 (60264066)

Co-Investigator(Kenkyū-buntansha) OKAMOTO Tatsuaki  NTT-Labs, Information-Security, Research-Fellow, 特別研究員
Project Period (FY) 1998 – 2000
Keywordspublic-key encryption / digital signature / information security / number theory / algorithm / computational complexity / elliptic-curve / lattice-based cryptosystems
Research Abstract

(1) Survey recent results on the gap between the average-case complexity and the worst-case complexity on computationally intractable problems, then consider the cryptographic application of these problem.
(2) Design (hyper) elliptic-curve cryptosystems, and report their practical performances from software-implementation.
(3) Develop new techniques of provable security in public-key encryption schemes, and clarify advantages of applied schemes over the existing schemes.
(4) The investigator, Okamoto organized the international cryptographic conference. ASIACRYPTO2000 (Dec. 2000, Kyoto) as the Program-Chair and the head investigator, SAKURAI worked as a member of the Program-comittee. More than 250-people attended with successful conference.
(5) The investigator, Okamoto opened the 1st workshop, "number-theoretic algorithms and their applications. " More than 100-researchers including mathematicans and computer-scientists attended for discussing. The head investigator, SAKURAI gave a talk as a result of this research-project.

  • Research Products

    (14 results)

All Other

All Publications (14 results)

  • [Publications] SAKURAI, K: "A Progress Report on Lattice Based Public-Key Cryptosystems--Theoretical Security versus Practical Cryptanalysis"IEICE Tran.. E83-D・No.3. 570-579 (2000)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] T.Itoh, M.Burmester, Y.Desmdet, K.SAKURAI, H.Shizuya: "Divertible and subliminal-free zero-knowledge proofs for languages"J.of Cryptology. Vol.12. 197-223 (1999)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] G.Di Crecenzo, K.Sakurai, M.Yung: "Checking programs discreteetly:Demonstrating result-correctness efficiently while concealing it"Algorithms and Computation 9th International Symposium,ISAAC'98 Taejon,Korea,Dec.1998,Proc.LNCS. Vol.1533. 59-68 (1998)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Eiichiro FUJISAKI, Tatsuaki OKAMOTO: "A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring"Ieice Trans.. E84-A・No.1. 179-187 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Okamoto T., Uchiyama S.: "A new public-key cryptosystem as secure as factoring"Advances in Cryptology-Eurocrypt 98 Proceedings,LNCS. Vol.1403. 308-318 (1998)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Okamoto T., Tanaka K., Uchiyama S.: "Quantum public-key cryptosystems"Advances in Cryptology-Crypto 2000 Proceedings,LNCS. Vol.1880. 147-165 (2000)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Okamoto T.: "Advances in Cryptology-ASIACRYPT 2000 Proceedings,LNCS Vol.1976"Springer. 630 (2000)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] SAKURAI, K: "A Progress Report on Lattice Based Public-Key Cryptosystems - Theoretical Security versus Practical Cryptanalysis"IEICE Tran.. E83-D・No.3. 570-579 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] T. Itoh, M. Burmester, Y. Desmdet, K. SAKURAI, and H. Shizuya: "Divertible and subliminal-free zero-knowledge proofs for languages"J. of Cryptology. Vol. 12. 197-223 (1999)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] G. Di Crecenzo, K. Sakurai and M. Yung: "Checking programs discreteetly : Demonstrating result-correctness efficiently while concealing it"Algorithms and Computation 9th International Symposium, ISAAC'98 Taejon, Korea, Dec. 1998, Proc. LNCS. Vol. 1533. 59-68 (1998)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Eiichiro FUJISAKI and Tatsuaki OKAMOTO: "A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring"Ieice Trans.. E84-A・No.1. 179-187 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Okamoto T. Uchiyama S.: "A new public-key cryptosystem as secure as factoring"Advances in Cryptology - Eurocrypt 98 Proceedings, LNCS. Vol. 1403. 308-318 (1998)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Okamoto T. Tanaka K. and Uchiyama S.: "Quantum public-key cryptosystems"Advances in Cryptology - Crypto 2000 Proceedings, LNCS. Vol. 1880. 147-165 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Okamoto T.: "Advances in Cryptology - ASIACRYPT 2000 Proceedings, LNCS Vol. 1976"Springer. 630 (2000)

    • Description
      「研究成果報告書概要(欧文)」より

URL: 

Published: 2003-09-17  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi