• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2006 Fiscal Year Final Research Report Summary

Research on treatment to prevent loss of cryptographic key

Research Project

Project/Area Number 16360184
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Communication/Network engineering
Research InstitutionUniversity of Tsukuba

Principal Investigator

OKAMOTO Eiji  University of Tsukuba, Graduate School of Systems and Information Engineering, Professor, 大学院システム情報工学研究科, 教授 (60242567)

Co-Investigator(Kenkyū-buntansha) MIAO Ying  University of Tsukuba, Graduate School of Systems and Information Engineering, Associate Professor, 大学院システム情報工学研究科, 助教授 (10302382)
OKAMOTO Takeshi  University of Tsukuba, Graduate School of Systems and Information Engineering, Lecturer, 大学院システム情報工学研究科, 講師 (00349797)
Project Period (FY) 2004 – 2006
KeywordsPairing / Elliptic curve / Bilinear mapping / Cryptographic key management / (k, n) threshold scheme / Secret sharing scheme (SSS) / 1-out-of-n scheme / Hybrid-P2P model
Research Abstract

We construct efficient secret sharing scheme (SSS) (including "1-out-of-n" cryptosystem) and consider the treatment against the loss of cryptographic key. To make more concretely, we propose Hybrid P2P network model which does not access to the root server in case the system preserves or gathers the share of SSS. Our scheme can give some guarantee for the data integrity even when the system loses both terminal machines (e.g. mobile PC) and removable cryptographic key (e.g. USB key). We solve the above problem mainly using the following two methods : (1) The system uses the work key (not master key) to encrypt the data in mobile PC ; (2) The system uses the authentication code from the root server, which decrypts the encrypted data. Consequently, our system realizes the share's generation and the data recovery related to the (k, n) threshold scheme. The system gives the data integrity for the authentication code between server and client machines. Profitable performance evaluation is al … More so obtained from implementation point of view.
We also propose fast software/hardware implementation to calculate the paring on elliptic curve. Nowadays there are so many applications in the pairing based cryptosystem, e.g. ID-based cryptosystem, short signature, broadcast encryption, etc. However there exist some drawbacks in pairing calculation. This means that the amount of work to calculate the pairing is very large compared to the conventional calculation method. We propose some efficient pairing algorithms for calculation. One of them is a proposal of an efficient (twisted) Ate pairing. The twisted Ate pairing is faster than the conventional Tate pairing. We give the loop-shorten technique of the Eta T pairing. This pairing can be applied to the twisted Ate pairing and computational cost is reduced by 25 to 50 % in terms of software implementation. In addition, we show that the improvement of the twisted Ate pairing is theoretically faster than the Ate pairing when parameter rho is approximately 2. In the same way, we also proposed other efficient pairings and estimate them compared to conventional pairings. Less

  • Research Products

    (24 results)

All 2007 2006 2005 2004

All Journal Article (23 results) Book (1 results)

  • [Journal Article] An ID-SP-M4M scheme and its security analysis2007

    • Author(s)
      王 立華
    • Journal Title

      IEICE Trans. Fundamentals 90・1

      Pages: 91-100

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Multiplication over F_p^m on FPGA : A Survey2007

    • Author(s)
      Jean-Luc Beuchat
    • Journal Title

      Proc. of ARC2007, LCNS, Springer-Verlag 4419

      Pages: 214-225

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] An ID-SP-M4M Scheme and Its Security Analysis2007

    • Author(s)
      Lihua Wang
    • Journal Title

      Institute of Electronics, Information and Communication Engineers of Japan (IEICE) Transactions Fundamentals Vol.E90-A, No.1

      Pages: 91-100

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] Multiplication over F_p^m on FPGA : A Survey2007

    • Author(s)
      Jean-Luc Beuchat
    • Journal Title

      Proc.of ARC2007, LCNS Vol.4419

      Pages: 214-225

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] 送信者に認証機能を付加したブロードキャスト暗号とその応用2006

    • Author(s)
      金沢 史明
    • Journal Title

      情報処理学会論文誌 47・11

      Pages: 2992-3004

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] An efficient ID-based digital signature with message recovery based on pairing2006

    • Author(s)
      Raylin Tso
    • Journal Title

      IACR Cryptology ePrint Archive Report, http://eprint. iacr. org/2006/195 195(査読付電子投稿)

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Anonymous secure communication in wireless mobile ad- hoc networks2006

    • Author(s)
      Mizanur Rahman
    • Journal Title

      Proc. of International Conference on Ubiquitous Convergence Technology (ICUCT2006), LNCS, Springer-Verlag 4412

      Pages: 140-149

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Twisted Ateペアリングの高速化手法の提案2006

    • Author(s)
      松田 誠一
    • Journal Title

      電子情報通信学会、情報セキュリティ研究会、信学技法 106・411

      Pages: 29-34

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Broadcast Encryption with Sender Authentication and its Application2006

    • Author(s)
      Fumiaki Kanazawa
    • Journal Title

      Information Processing Society of Japan (IPSJ) Journal Vol.47, No.11

      Pages: 2992-3004

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] An Efficient ID-based Digital Signature with Message Recovery Based on Pairing2006

    • Author(s)
      Raylin Tso
    • Journal Title

      Cryptology ePrint Archive Report 2006/195

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] Anonymous secure communication in wireless mobile ad-hoc networks2006

    • Author(s)
      Mizanur Rahman
    • Journal Title

      International Conference on Ubiquitous Convergence Technology (ICUCT), Lecture Notes in Computer Science (LNCS) 4412

      Pages: 140-149

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] Proposal for an improvement of computing Twisted Ate pairing2006

    • Author(s)
      Seiichi Matsuda
    • Journal Title

      Information Security (ISEC), IEICE Technical report vol.106, no. 411

      Pages: 29-34

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] How to verify the threshold t of Shamir' s (t, n)-threshold scheme2005

    • Author(s)
      Raylin Tso
    • Journal Title

      Information Processing Society of Japan (IPSJ) Journal 46・8

      Pages: 1824-1833

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] A share-correctable protocol for the Shamir threshold scheme and its application to participant enrollment2005

    • Author(s)
      Raylin Tso
    • Journal Title

      Information Processing Society of Japan (IPSJ) Journal 46・8

      Pages: 1880-1888

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] An ID-based Non Interactive Tripartite Key Agreement Protocol with K-Resilience2005

    • Author(s)
      Raylin Tso
    • Journal Title

      IASTED International Conference Communications and Computer Networks (CCN2005), IASTED Proc.

      Pages: 38-42

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Performance evaluation of efficient algorithms for Tate pairing2005

    • Author(s)
      Seiichi Matsuda
    • Journal Title

      Proc. of PacRim2005 S36-2

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] k-resilient ID-based key distribution schemes from pairing - three party case2005

    • Author(s)
      Takeshi Okamoto
    • Journal Title

      Proc. of International Workshop on Coding and Cryptography (WCC2005)

      Pages: 402-412

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] How to verify the threshold t of Shamir's (t, n)-threshold scheme2005

    • Author(s)
      Raylin Tso
    • Journal Title

      IPSJ Journal Vol.46, No.8

      Pages: 1824-1833

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] A share-correctable protocol for the Shamir threshold scheme and its application to participant enrollment2005

    • Author(s)
      Raylin Tso
    • Journal Title

      IPSJ Journal Vol.46, No.8

      Pages: 1880-1888

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] Performance evaluation of efficient algorithms for Tate pairing2005

    • Author(s)
      Seiichi Matsuda
    • Journal Title

      Proc.of PacRim2005 S36-2

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] k-resilient ID-based key distribution schemes from pairing-three party case2005

    • Author(s)
      Takeshi Okamoto
    • Journal Title

      Proc.of International Workshop on Coding and Cryptography (WCC2005)

      Pages: 402-412

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] Transformation-free proxy cryptosystems and their applications to electronic commerce2004

    • Author(s)
      Lihua Wang
    • Journal Title

      Proc. of 3rd International Conference on Information Security (InfoSecu)

      Pages: 92-98

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Transformation-free proxy cryptosystems and their applications to electronic commerce2004

    • Author(s)
      Lihua Wang
    • Journal Title

      Proc.of 3rd International Conference on Information Security

      Pages: 92-98

    • Description
      「研究成果報告書概要(欧文)」より
  • [Book] 情報セキュリティハンドブック2004

    • Author(s)
      岡本栄司(編集幹事長)
    • Total Pages
      610
    • Publisher
      電子情報通信学会,オーム社
    • Description
      「研究成果報告書概要(和文)」より

URL: 

Published: 2008-05-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi