• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2017 Fiscal Year Final Research Report

Development of Practical and Error-Resilient Encryption and Authentication Mechanisms for Cloud-based Security Systems

Research Project

  • PDF
Project/Area Number 15K16006
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionNational Institute of Advanced Industrial Science and Technology

Principal Investigator

SCHULDT Jacob  国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 主任研究員 (80750893)

Research Collaborator PATERSON Kenneth  University of London, Royal Holloway
DEGABRIELE Jean Paul  University of London, Royal Holloway
WOODAGE Joanne  University of London, Royal Holloway
WEE Hoeteck  Ecole Normale Superieure
MATSUDA Takahiro  National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
HANAOKA Goichiro  National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
MORITA Hiraku  National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
IWATA Tetsu  Nagoya University, Department of Computational Science and Engineering
Project Period (FY) 2015-04-01 – 2018-03-31
Keywordspublic key encryption / signatures / related randomness / related key attacks
Outline of Final Research Achievements

The advantages provided by the cloud computing paradigm have led to a rapid adaptation, and a large number of cloud-based systems and services are in use today. However, recent results illustrate that the standard approach to securing these systems is insufficient due to the unique properties of a cloud-based environment, and attacks on real-world implementations have been demonstrated. This research develops encryption and authentication mechanisms, which are central to the construction of practical security systems, that address security concerns in a cloud-based system. Specifically, the focus is on security using weak or maliciously manipulated randomness and security against leakage and tampering attacks, which are relevant for both virtual machines providing a cloud service and the devices accessing this service.

Free Research Field

Information Security

URL: 

Published: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi