• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2008 Fiscal Year Final Research Report

Research on Public Key Cryptosystems Secure against Side Chanel Attack

Research Project

  • PDF
Project/Area Number 17300002
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Fundamental theory of informatics
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

MIYAJI Atsuko  Japan Advanced Institute of Science and Technology, 情報科学研究科, 教授 (10313701)

Project Period (FY) 2005 – 2008
Keywordsセキュリティ / サイドチャンネル / 公開鍵暗号 / 楕円曲線 / 安全性証明
Research Abstract

非接触型や接触型ICカードの爆発的な普及に伴い,ICカードを利用した電子サービスが広がりつつある.ICカードのサービスでは高速性・小メモリ性を実現できる楕円曲線暗号が脚光を浴びているが,ICカード上のデータ処理はサイドチャネル攻撃による秘密鍵の解読が脅威となっている.近年,べき演算の途中で入力されるメモリ値の消費電力や,アドレス値の違いによる消費電力の違いの利用など,サイドチャネル攻撃は複雑かつ強力になる状況が続いている.
本研究はサイドチャネル攻撃に対して安全かつ効率的な楕円曲線暗号のスカラー倍算のgeneric modelの構築を実現した.

  • Research Products

    (38 results)

All 2009 2008 2007 2006 2005

All Journal Article (25 results) (of which Peer Reviewed: 24 results) Presentation (13 results)

  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The Forth International Conference on Avail ability, Reliability and Security

      Pages: 487-492

    • Peer Reviewed
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A. Miyaji, M. Sukegawa
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science 5594

      Pages: 134-152

    • Peer Reviewed
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S. Hirasawa, A. Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory

      Pages: 2391-2395

    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K. Emura, A. Miyaji, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      Lecture Notes in Computer Science 5451

      Pages: 13-23

    • Peer Reviewed
  • [Journal Article] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The First International Workshop on Recent Innovations and Breakthroughs in Cryptography

      Pages: 769-773

    • Peer Reviewed
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      M.S. Rahman, M. Soshi, A. Miyaji
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing

      Pages: 559-564

    • Peer Reviewed
  • [Journal Article] Security and Access Control for Vehicular Communications Networking and Communications2008

    • Author(s)
      A. Miyaji, S. Zrelli, Y. Shinoda, T. Ernst
    • Journal Title

      IEEE International Conference on Wireless and Mobile Computing

      Pages: 561-566

    • Peer Reviewed
  • [Journal Article] Simple Certificateless Signature with Smart Cards2008

    • Author(s)
      A. Miyaji, K. Omote, K. Kato
    • Journal Title

      International Workshop on Security in Ubiquitous Computing Systems

    • Peer Reviewed
  • [Journal Article] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A. Miyaji, A. Waseda, T. Takagi, M. Soshi
    • Journal Title

      The 2008 International Symposium on Information Theory and its Applications

    • Peer Reviewed
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Trans vol.49,No.9

      Pages: 2975-2988

    • Peer Reviewed
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fundamentals vol.E91-A,No.10

      Pages: 2833-2842

    • Peer Reviewed
  • [Journal Article] Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption2007

    • Author(s)
      A. Miyaji
    • Journal Title

      IPSJ Trans vol.48,No.9

      Pages: 2999-3013

    • Peer Reviewed
  • [Journal Article] The security of RC6 against asymmetric chi-square test attack2007

    • Author(s)
      T. Hinoue, A. Miyaji, T. Wada
    • Journal Title

      IPSJ Trans vol.48,No.9

      Pages: 2966-2975

    • Peer Reviewed
  • [Journal Article] Generalized MMM-algorithm Secure against SPA, DPA, and RPA2007

    • Author(s)
      A. Miyaji
    • Journal Title

      Lecture Notes in Computer Science 4817

      Pages: 282-296

    • Peer Reviewed
  • [Journal Article] Mobile Agent Security with Efficient Oblivious Transfer In International Conference on Security and Cryptography2007

    • Author(s)
      W. Hasegawa, M. Soshi, A. Miyaji
    • Journal Title

      SECRYPT

      Pages: 299-304

    • Peer Reviewed
  • [Journal Article] Evaluation of the security of RC6 against the x^2-attack2007

    • Author(s)
      A. Miyaji, Y. Takano
    • Journal Title

      IEICE Trans., Fundamentals vol.E90-A,No.1

      Pages: 22-28

    • Peer Reviewed
  • [Journal Article] Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA2006

    • Author(s)
      A. Miyaji, H. Mamiya, H. Morimoto
    • Journal Title

      IEICE Trans., Fundamentals vol.89-A,No.8

      Pages: 2207-2215

    • Peer Reviewed
  • [Journal Article] Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae2006

    • Author(s)
      H. Mamiya, A. Miyaji
    • Journal Title

      IPSJ Trans vol.47,No.8

      Pages: 2430-2439

    • Peer Reviewed
  • [Journal Article] An IP Traceback Scheme with Variably Probabilistic Packet Marking2006

    • Author(s)
      T. Terada, M. Soshi, A. Miyaji
    • Journal Title

      The 2006 International Symposium on Information Theory and its Applications

    • Peer Reviewed
  • [Journal Article] 双線形写像に基づく暗号に適した(超)楕円曲線の構造2006

    • Author(s)
      宮地充子
    • Journal Title

      東京大学院大学数理科学研究科「代数幾何・数論及び符号・暗号」研究会報告書

      Pages: 42-58

  • [Journal Article] Efficient Group Signature Scheme based on a Modified Nyberg-Rueppel Signature2005

    • Author(s)
      A. Miyaji, K. Umeda
    • Journal Title

      IPSJ Trans. Vol.46,No.8

      Pages: 1889-1902

    • Peer Reviewed
  • [Journal Article] Java Obfuscation-Approaches to Construct Tamper-Resistant Object-Oriented Programs2005

    • Author(s)
      A. Miyaji, Y. Sakabe, M. Soshi
    • Journal Title

      IPSJ Trans vol.46,No.8

      Pages: 2107-2119

    • Peer Reviewed
  • [Journal Article] n-state quantum coin flipping protocol2005

    • Author(s)
      A. Waseda, M. Soshi, A. Miyaji
    • Journal Title

      International Conference on Information Technology-ITCC2005 VolumeII

      Pages: 776-777

    • Peer Reviewed
  • [Journal Article] On the Success Probability of chi^2-attack on RC62005

    • Author(s)
      A. Miyaji, Y. Takano
    • Journal Title

      Lecture Notes in Computer Science 3089

      Pages: 310-325

    • Peer Reviewed
  • [Journal Article] Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae2005

    • Author(s)
      H. Mamiya, A. Miyaji
    • Journal Title

      ACNS

      Pages: 776-777

    • Peer Reviewed
  • [Presentation] 埋め込み次数を事前に決定できる楕円曲線の改良2009

    • Author(s)
      平澤庄次郎, 宮地充子
    • Organizer
      IEICE Japan Tech. Rep
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      20090309-20090310
  • [Presentation] 埋め込み次数を事前に決定できる楕円曲線2008

    • Author(s)
      平澤庄次郎, 宮地充子
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      名古屋能楽堂
    • Year and Date
      20081113-20081114
  • [Presentation] The recent tendency of research and standardization of elliptic curve cryptosystems2008

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 4th Franco-Japanese Computer Security Workshop
    • Place of Presentation
      慶應義塾大学
    • Year and Date
      2008-12-06
  • [Presentation] Elliptic Curve Cryptosystem for the Privacy Protection: Theory and International Standardization2008

    • Author(s)
      Atsuko Miyaji
    • Organizer
      UK-JAPAN Symposium on "Privacy and Security in the Information Society"
    • Place of Presentation
      東京大学大学院
    • Year and Date
      2008-11-04
  • [Presentation] 3つの基底を用いた効率的な楕円ベキ倍算2007

    • Author(s)
      溝添健次, 宮地充子, 亀井利明
    • Organizer
      IEICE Japan Tech. Rep
    • Place of Presentation
      九州産業大学
    • Year and Date
      20070301-20070302
  • [Presentation] Generalized EBRIP2007

    • Author(s)
      Atsuko Miyaji
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      東京(機会振興会館)
    • Year and Date
      2007-12-19
  • [Presentation] 楕円曲線を用いた暗号の最近の研究動向2007

    • Author(s)
      宮地充子
    • Organizer
      奈良女子大学「魅力ある大学院教育」イニシアティブ, 女性先端科学セミナー
    • Place of Presentation
      奈良女子大学
    • Year and Date
      2007-10-29
  • [Presentation] 双線型写像応用に適した楕円曲線の最新の技術及び標準化動向2007

    • Author(s)
      宮地充子
    • Organizer
      RSA Conference
    • Place of Presentation
      東京
    • Year and Date
      2007-04-25
  • [Presentation] ペアリング利用に適した楕円曲線の研究及び標準化動向2007

    • Author(s)
      宮地充子
    • Organizer
      電子情報通信学会, ソサイエティ大会2007
    • Place of Presentation
      鳥取大学
    • Year and Date
      2007-02-13
  • [Presentation] 数論応用と楕円曲線暗号の構築について2006

    • Author(s)
      宮地充子
    • Organizer
      電子情報通信学会信学技報
    • Place of Presentation
      函館
    • Year and Date
      20061101-20061106
  • [Presentation] 双線形写像暗号に適した楕円曲線の構成2006

    • Author(s)
      宮地充子
    • Organizer
      日本応用数理学会2006年度年会講演予稿集
    • Place of Presentation
      筑波大学
    • Year and Date
      2006-02-16
  • [Presentation] 双線形写像暗号に適した楕円曲線の構成2006

    • Author(s)
      宮地充子
    • Organizer
      日本応用数理学会2006年度年会, 講演予稿集
    • Place of Presentation
      筑波大学
    • Year and Date
      2006-02-09
  • [Presentation] Address-bit DPAに強力なBRIPアルゴリズムの改良2005

    • Author(s)
      宮地充子, 清宮健
    • Organizer
      IEICE Japan Tech. Rep
    • Place of Presentation
      東京(機会振興会館)
    • Year and Date
      2005-12-16

URL: 

Published: 2011-06-18   Modified: 2014-07-25  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi