• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2009 Fiscal Year Final Research Report

Research on Encryption and Signatures with Information-theoretic Security and Their Application

Research Project

  • PDF
Project/Area Number 19700008
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Fundamental theory of informatics
Research InstitutionYokohama National University

Principal Investigator

SHIKATA Junji  Yokohama National University, 大学院・環境情報研究院, 准教授 (30345483)

Project Period (FY) 2007 – 2009
Keywords情報セキュリティ / 暗号理論 / 情報理論的安全性 / 暗号 / ステガノグラフィ / 認証 / 署名
Research Abstract

Today, cryptographic primitives such as encryption and digital signature schemes are fundamental and important to establish various and complex systems in the modern society of computers and networks. Considering security of the systems in the future, it is desirable to provide cryptographic primitives whose security can be guaranteed for a long time. In this research project, we successfully developed such cryptographic primitives concerning to encryption, signatures and their applications. Since our contribution lies in proposing new mechanisms of cryptographic primitives whose security does not depend on any computational model, we hope that our research results can contribute to the development of construction of security systems in the future.

  • Research Products

    (18 results)

All 2010 2009 2008 2007 Other

All Journal Article (9 results) (of which Peer Reviewed: 4 results) Presentation (7 results) Remarks (2 results)

  • [Journal Article] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 3A1-4

  • [Journal Article] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 2B4-3

  • [Journal Article] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      T. Seito, T. Aikawa, J. Shikata, T. Matsumoto
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 2B2-4

  • [Journal Article] Unconditionally Secure Blind Signatures2009

    • Author(s)
      Y. Hara, T. Seito, J. Shikata, T. Matsumoto
    • Journal Title

      Information Theoretic Security, ICITS 2007 - Selected Papers 4883

      Pages: 23-43

    • Peer Reviewed
  • [Journal Article] Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment2009

    • Author(s)
      Y. Hara, T. Ishiwata, J. Shikata, T. Matsumoto
    • Journal Title

      Formal to Practical Security 5458

      Pages: 116-137

    • Peer Reviewed
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集(CDROM) 3B3-3

  • [Journal Article] Unconditionally Secure Steganography Against Active Attacks2008

    • Author(s)
      Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      IEEE Transactions on Information Theory 54(6)

      Pages: 2690-2705

    • Peer Reviewed
  • [Journal Article] On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems2008

    • Author(s)
      Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling
    • Journal Title

      T. Data Hiding and Multimedia Security 3, Springer

      Pages: 23-32

    • Peer Reviewed
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤武暢, 二井将太, 四方順司, 松本勉
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム論文集(CDROM) 1E1-5

  • [Presentation] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-21
  • [Presentation] Information-theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-20
  • [Presentation] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-20
  • [Presentation] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津
    • Year and Date
      2009-01-22
  • [Presentation] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2008年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-22
  • [Presentation] Construction Methodology of Unconditionally Secure Signature Schemes2007

    • Author(s)
      Junji Shikata
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-03-26
  • [Presentation] Unconditionally Secure Blind Signatures2007

    • Author(s)
      Y. Hara, T. Seito, J. Shikata, T. Matsumoto
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-03-25
  • [Remarks]

    • URL

      http://er-web.jmk.ynu.ac.jp/html/SHIKATA_Junji/ja.html

  • [Remarks]

    • URL

      http://ipsr.ynu.ac.jp/

URL: 

Published: 2011-06-18   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi