• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2018 Fiscal Year Research-status Report

New Paradigm to Construct Public Key Cryptographic Schemes for Lightweight Devices with Provable Security against Quantum Attackers

Research Project

Project/Area Number 18K11292
Research InstitutionThe University of Electro-Communications

Principal Investigator

SANTOSO BAGUS  電気通信大学, 大学院情報理工学研究科, 助教 (40571956)

Co-Investigator(Kenkyū-buntansha) 太田 和夫  電気通信大学, 大学院情報理工学研究科, 教授 (80333491)
Project Period (FY) 2018-04-01 – 2022-03-31
KeywordsQuantum Random Oracle / Quantum Adversary / Binary Structure / Identification Scheme / Secrecy Amplification / Post Encryption
Outline of Annual Research Achievements

In FY 2018, we have achieved several important results. As the first step of the plan, we have successfully construct a new computational problem with binary structure which is also estimated to be secure against quantum adversaries. Our new computational problem is an extension of the Isomorphism of Polynomials problem. One interesting feature of the new computational problem is that it enables us to perform Diffie-Hellman like operation. Its worst case is proven to be at least as hard as the original Isomorphism of Polynomials.
As another result, we also have successfully constructed a novel code-based signature scheme. We constructed the scheme with orientation on implementation, by taking into account the potential problem which may occur when we need to convert the output of hash function into a different basis. Since the scheme is proven secure based on the hardness assumption on a code-based computational problem with binary structure, the new signature scheme also has binary structure and thus is easy to implement on variety of devices.Furthermore, the signature scheme is also ready to be transformed into the one with security against quantum computers, since the security of the signature scheme is proven based on decisional computational problem which is proven to be NP complete.
Finally, we also have proposed a new secrecy amplification method for one-time-pad encryption using affine encoders in the following cases: (1)two nodes of encryption with correlated secret keys, or (2)a single node of encryption with leakage of keys due to side-channel attack.

Current Status of Research Progress
Current Status of Research Progress

2: Research has progressed on the whole more than it was originally planned.

Reason

During FY 2018, we used Kakenhi to purchase new computers, literature references, and to fund trips to conferences to gain the latest information about the related research and to have research discussion with other researchers. Thanks to the funding, during FY 2018 we were able to make our research to progress smoothly.
We have successfully published one article in a top-tier journal IEEE and four papers at two peer-reviewed international conferences. We also have published three papers at the technical reports of a major research society in Japan. Moreover, we have done five oral presentations on our results in two domestic symposiums.

Strategy for Future Research Activity

For FY 2019, we plan to carry out the following tasks:
(1) Construct a concrete cryptographic scheme based on the new computational
problem with binary structure that we have invented in FY 2018. If we can not construct any secure cryptographic scheme based on the new problem, we will go back to the computational problem to find an appropriate modification (without lessening the hardness) such that we can construct a cryptographic scheme and prove its security based on the hardness of the problem.
(2) Convert the security proof for the implementation oriented signature scheme which we have constructed in FY 2018 into security proof against quantum adversaries. First we will prove the security of the scheme against quantum adversaries with no-message attack and then we will prove that any quantum adversary with chosen message attack can be converted into a quantum adversary with no-message attack in our scheme.
(3) Extend the secrecy amplification method into the case where the adversary can launch side-channel attacks on two nodes of encryption. We expect that we need to apply the strong converse theorem in order to prove the security in the sense of strong secrecy.

Causes of Carryover

出張の費用が思ったより値段が低かったので、96,536円が残りました。次年度に更に出張が多くなるので、その旅費のために使うよていである。

  • Research Products

    (14 results)

All 2019 2018

All Journal Article (8 results) (of which Int'l Joint Research: 5 results,  Peer Reviewed: 5 results) Presentation (6 results) (of which Invited: 1 results)

  • [Journal Article] Secrecy Amplification of Distributed Encrypted Sources with Correlated Keys using Post-Encryption-Compression2019

    • Author(s)
      Bagus Santoso and Yasutada Oohama
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 印刷中 Pages: 印刷中

    • DOI

      10.1109/TIFS.2019.2907464

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme2019

    • Author(s)
      Bagus Santoso
    • Journal Title

      IEICE Technical Report

      Volume: 118, No. 478 Pages: 33-38

  • [Journal Article] 任意の環におけるイデアル格子問題に基づいた本人確認方式2019

    • Author(s)
      竹牟禮 薫, バグス サントソ
    • Journal Title

      信学技報

      Volume: 118, No.478 Pages: 39-44

  • [Journal Article] Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures2018

    • Author(s)
      Bagus Santoso, Taiyo Yamaguchi and Tomoyuki Ohkubo
    • Journal Title

      Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. Proceedings.

      Volume: LNCS 11125 Pages: 248-262

    • DOI

      10.1007/978-3-319-99807-7_15

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half2018

    • Author(s)
      Bagus Santoso and Taiyo Yamaguchi
    • Journal Title

      International Symposium on Information Theory and Its Applications, ISITA 2018

      Volume: - Pages: 394-398

    • DOI

      10.23919/ISITA.2018.8664299

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Post Encryption Compression with Affine Encoders for Secrecy Amplification in Distributed Source Encryption with Correlated Keys2018

    • Author(s)
      Bagus Santoso and Yasutada Oohama
    • Journal Title

      International Symposium on Information Theory and Its Applications, ISITA 2018

      Volume: - Pages: 737-741

    • DOI

      10.23919/ISITA.2018.8664297

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System2018

    • Author(s)
      Yasutada Oohama and Bagus Santoso
    • Journal Title

      2018 IEEE International Symposium on Information Theory, ISIT 2018, Vail, CO, USA, June 17-22, 2018

      Volume: - Pages: 581-585

    • DOI

      10.1109/ISIT.2018.8437666

    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Extension of Easy-to-Understand Structure for Chosen-Ciphertext-Attack Security from Decisional Diffie-Hellman Assumption2018

    • Author(s)
      Daisuke Ueda and Bagus Santoso
    • Journal Title

      IEICE Technical Report

      Volume: 118, No. 212 Pages: 43-50

  • [Presentation] A New Family of Isomorphism of Polynomials and Its Applications to Public Key Encryption Scheme2019

    • Author(s)
      Bagus Santoso
    • Organizer
      2019 Symposium on Cryptography and Information Security
  • [Presentation] Another Look at One-More Discrete Logarithm Problem in Generic Model2019

    • Author(s)
      Bagus Santoso and Kazuo Ohata
    • Organizer
      2019 Symposium on Cryptography and Information Security
  • [Presentation] 符号ベース暗号方式と多変数多項式ベース暗号方式を組み合わせた暗号方式の構築法2019

    • Author(s)
      大久保 智之, バグス サントソ
    • Organizer
      2019 Symposium on Cryptography and Information Security
  • [Presentation] 任意の環におけるイデアル格子問題に基づいた本人確認方式2019

    • Author(s)
      竹牟禮 薫, バグス サントソ, 荒井 嵩博
    • Organizer
      2019 Symposium on Cryptography and Information Security
  • [Presentation] Code-based Identification Scheme with Security against Quantum Adversaries under Fully Concurrent Active Attacks2018

    • Author(s)
      Bagus Santoso
    • Organizer
      Symposium on Information Theory and Its Applications (SITA) 2018
  • [Presentation] Quantum Communications, Quantum Computers and Cryptography2018

    • Author(s)
      Bagus Santoso
    • Organizer
      14th Honjo International Foundation Workshop
    • Invited

URL: 

Published: 2019-12-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi