• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2012 Fiscal Year Final Research Report

Mathematical Foundation and Implantation Methods for Pairing-Based Cryptography

Research Project

  • PDF
Project/Area Number 22300026
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Computer system/Network
Research InstitutionKyushu University

Principal Investigator

TAKAGI Tsuyoshi  九州大学, マス・フォア・インダストリ研究所, 教授 (60404802)

Project Period (FY) 2010 – 2012
Keywords暗号・認証 / 公開鍵暗号 / ペアリング暗号 / 高速実装 / 暗号プロトコル
Research Abstract

Pairing-based cryptography (PBC) provides us new cryptographicprotocols which cannot be constructed by the conventional public-key cryptosystems. In this research, we implemented ηT pairing and R-ate pairing on real-life computing environments such as mobilephones and GPGPU, and eventually we showed that PBC has become as efficient as RSA or elliptic curve cryptography on those devices. Moreover, we investigated the further development of ID-based encryption, and then we proposed an ID-based signcryption which is provably secure in the standard model.

  • Research Products

    (14 results)

All 2012 2011 2010 Other

All Journal Article (10 results) (of which Peer Reviewed: 10 results) Presentation (2 results) Book (1 results) Remarks (1 results)

  • [Journal Article] Efficient Signcryption in the Standard Model2012

    • Author(s)
      Fagen Li, Mingwu Zhang, Tsuyoshi Takagi
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: Vol.24, No.17 Pages: 1977-1989

    • DOI

      DOI:10.1002/cpe.1823

    • Peer Reviewed
  • [Journal Article] 携帯電話におけるペアリング暗号の実装2012

    • Author(s)
      井山政志, 清本晋作, 福島和英, 田中俊昭, 高木剛
    • Journal Title

      電子情報通信学会和文論文誌

      Volume: Vol.J95-A, No.7 Pages: 579-587

    • URL

      http://ci.nii.ac.jp/naid/10031083671

    • Peer Reviewed
  • [Journal Article] Further Improvement of an Identity-Based Signcryption Scheme in the Standard Model2012

    • Author(s)
      Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi
    • Journal Title

      Computers & Electrical Engineering

      Volume: Vol.38,No.2 Pages: 413-421

    • DOI

      DOI:10.1016/j.compeleceng.2011.11.001

    • Peer Reviewed
  • [Journal Article] Geometric Area based Keys and Policies in Functional Encryption Systems2011

    • Author(s)
      Mingwu Zhang, Tsuyoshi Takagi, GeoEnc
    • Journal Title

      16th Australasian Conference on Information Security and Privacy, ACISP 2011

      Volume: 6812 Pages: 241-258

    • DOI

      DOI:10.1007/978-3-642-22497-3_16

    • Peer Reviewed
  • [Journal Article] Efficient Implementation of the nT Pairing on GPU2011

    • Author(s)
      Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
    • Journal Title

      9th International Conference on Applied Cryptography and Network Security, ACNS 2011

      Pages: 119-133

    • URL

      http://eprint.iacr.org/2011/540.pdf

    • Peer Reviewed
  • [Journal Article] Anonymous Encryption with Partial-Order Subset Delegation Functionality, Fifth International Conference on Provable Security2011

    • Author(s)
      Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi
    • Journal Title

      ProvSec 2011

      Volume: LNCS 6980 Pages: 154-169

    • DOI

      DOI:10.1007/978-3-642-24316-5_12

    • Peer Reviewed
  • [Journal Article] Efficient Identity-Based Signcryption in the Standard Model2011

    • Author(s)
      Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi
    • Journal Title

      Fifth International Conference on Provable Security, ProvSec 2011

      Volume: LNCS 6980 Pages: 120-137

    • DOI

      DOI:10.1007/978-3-642-24316-5_10

    • Peer Reviewed
  • [Journal Article] Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 32011

    • Author(s)
      Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi
    • Journal Title

      IEICE Transaction

      Volume: Vol.E94-A, No.1 Pages: 150-155

    • DOI

      DOI:10.1587/transfun.E94.A.150

    • Peer Reviewed
  • [Journal Article] Efficient Implemen- tation of Pairing-based Cryptography on BREW Mobile Phones2010

    • Author(s)
      Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi
    • Journal Title

      The 5th International Workshop on Security, IWSEC 2010

      Volume: LNCS 6434 Pages: 326-336

    • DOI

      DOI:10.1007/978-3-642-16825-3_22

    • Peer Reviewed
  • [Journal Article] Cryptanalysis of Efficient Proxy Signature Schemes for Mobile Communication2010

    • Author(s)
      Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
    • Journal Title

      Science China Information Sciences

      Volume: Vol.53, No.10 Pages: 2016-2021

    • DOI

      DOI:10.1007/s11432-010-4012-y

    • Peer Reviewed
  • [Presentation] センサノード MICAz におけるペアリング暗号の高速実装2012

    • Author(s)
      高木剛
    • Organizer
      2012 年暗号と情報セキュリティシンポジウム, チュートリアル講演
    • Place of Presentation
      金沢エクセルホテル
    • Year and Date
      2012-02-01
  • [Presentation] Fault Attacks on Multivariate Public-Key Cryptosystems2011

    • Author(s)
      Tsuyoshi Takagi
    • Organizer
      International Conference on Coding and Cryptography
    • Place of Presentation
      Ewha Womans University, ソウル, 韓国
    • Year and Date
      2011-08-26
  • [Book] 6th International Conference on Provable Security - ProvSec 20122012

    • Author(s)
      Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
    • Total Pages
      335
    • Publisher
      Springer Verlag
  • [Remarks]

    • URL

      http://imi.kyushu-u.ac.jp/~takagi/

URL: 

Published: 2014-08-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi