• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2011 Fiscal Year Final Research Report

Computationally sound symbolic analysis of security and assistance of redesign for cryptographic protocols

Research Project

  • PDF
Project/Area Number 21700015
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Fundamental theory of informatics
Research InstitutionOsaka University

Principal Investigator

YOSHIDA Maki  大阪大学, 大学院・情報科学研究科, 助教 (50335387)

Project Period (FY) 2009 – 2011
Keywords暗号プロトコル / 安全性 / 汎用的結合可能性 / 形式的検証 / 計算量的に健全
Research Abstract

The purpose of this work is to develop a method to analysis universally composable security of cryptographic protocols and assist redesign insecure protocols.

  • Research Products

    (21 results)

All 2012 2011 2010 2009

All Journal Article (10 results) (of which Peer Reviewed: 10 results) Presentation (11 results)

  • [Journal Article] Toward Digital Watermarking for Cryptographic Data2011

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E94-A, No.1 Pages: 270-272

    • Peer Reviewed
  • [Journal Article] 評価者間類似度計算の改善による汚染コンテンツダウンロード抑制効果向上2010

    • Author(s)
      山中広明, 岡村真吾, 藤原融, 吉田真紀, 石原靖哲, 秋山豊和, 加藤精一, 下條真司
    • Journal Title

      情報処理学会論文誌

      Volume: Vol.51 No.8 Pages: 1428-1442

    • Peer Reviewed
  • [Journal Article] All-or-nothing Property for Efficient Symbolic Analysis2010

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Computational and Symbolic Proofs of Security

    • Peer Reviewed
  • [Journal Article] Expiration Dated Fingerprinting2010

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IJICIC

      Volume: Vol.6, No.3 Pages: 1271-1278

    • Peer Reviewed
  • [Journal Article] 公理的安全性の枠組みにおける汎用的結合可能な相互認証と鍵交換の記号的安全性2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Journal Title

      日本応用数理学会論文誌

      Volume: 第20巻,第1号 Pages: 11-32

    • Peer Reviewed
  • [Journal Article] The Vector Decomposition Problem2010

    • Author(s)
      Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E93-A, No.1 Pages: 188-193

    • Peer Reviewed
  • [Journal Article] Watermarking Cryptographic Data2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP2009)

      Volume: A02-02(CD-ROM)

    • Peer Reviewed
  • [Journal Article] Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking2009

    • Author(s)
      Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, and Toru Fujiwara
    • Journal Title

      the8th International Workshop on Digital Watermarking(IWDW2009)

      Volume: LNCS5703 Pages: 279-293

    • Peer Reviewed
  • [Journal Article] Development of a Verification Tool for Composable Security2009

    • Author(s)
      Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Computational and Symbolic Proofs of Security

    • Peer Reviewed
  • [Journal Article] Flexible Timed-release Encryption2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E92-A, No.1 Pages: 222-225

    • Peer Reviewed
  • [Presentation] 画質劣化を抑えた加法と乗法のハイブリッド電子透かし2012

    • Author(s)
      池田成吾, 吉田真紀, 藤原融
    • Organizer
      2012年暗号と情報セキュリティシンポジウム予稿集
    • Year and Date
      20120200
  • [Presentation] Generic Construction of GUC Secure Commitment Protocol in the PKI Model2012

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Organizer
      Proceedings of the2012Symposium on Cryptography and Information Security
    • Year and Date
      20120100
  • [Presentation] EUC安全なメッセージ認証のためのmulti-messageプロトコルに対する記号的基準2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      IEICE Tech. Rep.
    • Year and Date
      20111100
  • [Presentation] Recovery of Tampered Pixels for Statistical Fragile Watermarking2011

    • Author(s)
      aki Yoshida, Kazuya Ohkita, Toru Fujiwara
    • Organizer
      IEICE Tech. Rep.
    • Year and Date
      20110700
  • [Presentation] On the Impossibility of d-Multiplicative Non-perfect Secret Sharing2011

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      IEICE Tech. Rep.
    • Year and Date
      20110500
  • [Presentation] Static Adversaryに対してEUC安全な認証の記号的基準について2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会技術研究報告
    • Year and Date
      20110300
  • [Presentation] Bilinear Groupに関する困難性仮定への攻撃導出-Cryptology ePrint Archive上の仮定に攻撃は存在するか?-2011

    • Author(s)
      岡前直由, 吉田真紀, 雲嶋健太, 阿部正幸, 大久保美也子, 藤原融
    • Organizer
      2011年暗号と情報セキュリティシンポジウム予稿集
    • Year and Date
      20110100
  • [Presentation] Generic Modelにおける困難性仮定への攻撃の数式処理を用いた導出2010

    • Author(s)
      雲嶋健太, 吉田真紀, 阿部正幸, 大久保美也子, 藤原融
    • Organizer
      電子情報通信学会技術研究報告
    • Year and Date
      20101100
  • [Presentation] Computationally Sound Symbolic Analysis for EUC Security of Key Exchange2010

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Organizer
      日本応用数理学会2010年度年会
    • Year and Date
      20100900
  • [Presentation] 汎用的結合可能な相互認証に対する記号的識別不可能性を用いた記号的基準2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2010年暗号と情報セキュリティシンポジウム予稿集
    • Year and Date
      20100100
  • [Presentation] 汎用的結合可能な安全性の形式的検証のためのpattern拡張に関する一考察2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年度年会
    • Year and Date
      20090900

URL: 

Published: 2013-07-31  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi