• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2013 Fiscal Year Final Research Report

R&D of New Cryptographic Technologies with Long-Term Usability

Research Project

  • PDF
Project/Area Number 23500031
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionNational Institute of Information and Communications Technology

Principal Investigator

WANG Lihua  独立行政法人情報通信研究機構, ネットワークセキュリティ研究所セキュリティ基盤研究室, 主任研究員 (00447228)

Research Collaborator WANG Licheng  中国北京郵電大学, State Key Laboratory of Networking and Switching Technology, 准教授
CAO Zhenfu  中国上海交通大学, Department of Computer Science and Engineering, 教授
MAMBO Masahiro  金沢大学, 理工研究域電子情報学系, 教授 (60251972)
SHAO Jun  中国Zhejiang Gongshang University, School of Computer and Information Engineering, 准教授
AONO Yoshinori  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 研究員 (50611125)
BOYEN Xavier  Queensland University of Technology, 准教授
LE Trieu Phong  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 研究員 (40583191)
TANAKA Hidema  防衛大学校, 情報工学科, 准教授 (30328570)
WASEDA Atsushi  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 研究員 (10455454)
NOJIMA Ryo  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 主任研究員 (40446597)
MORIAI Shiho  独立行政法人, 情報通信研究機構・ネットワークセキュリティ研究所・セキュリティ基盤研究室, 室長 (80636192)
Project Period (FY) 2011 – 2013
Keywords暗号系
Research Abstract

The development of quantum computation casts serious threats to the security of most existing public-key cryptosystems. Cryptosystems that are secure against quantum attacks and can be run on traditional computers are desirable and known as post-quantum cryptosystems. On the other hand, public cloud storage service provides several benefits, including availability (being able to access data from anywhere) and reliability, at a relatively low cost. An adoptable cloud storage service should aim to achieve the best of both worlds by providing the security of a private cloud and the functionality of a public cloud.
We investigated cryptographic technologies with long-term usability on the following two issues: Post-Quantum Cryptography (Lattice-based cryptography and non-commutative cryptography) and Practical Cryptography for Cloud Security (proxy re-encryption, threshold encryption, secret sharing scheme, and position authentication using homomorphic encryption, etc.).

  • Research Products

    (16 results)

All 2014 2013 2012 2011 Other

All Journal Article (10 results) (of which Peer Reviewed: 10 results) Presentation (4 results) Remarks (2 results)

  • [Journal Article] Certificate-Based Proxy Decryption Systems with Revocability in the Standard Model2013

    • Author(s)
      Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, and Licheng Wang
    • Journal Title

      Information Science

      Volume: 247 Pages: 188-201

    • DOI

      10.1016/j.ins.2013.06.026

    • Peer Reviewed
  • [Journal Article] Key-Private Proxy Re-encryption under LWE2013

    • Author(s)
      Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang
    • Journal Title

      INDOCRYPT 2013

      Volume: 8250 Pages: 1-18

    • DOI

      10.1007/978-3-319-03515-4_1

    • Peer Reviewed
  • [Journal Article] Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan and Yixian Yang
    • Journal Title

      The computer Journal

      Volume: 56(10) Pages: 1249-1257

    • DOI

      10.1093/comjnl/bxs167

    • Peer Reviewed
  • [Journal Article] Efficient Threshold PKE with Full Security Based on Dual Pairing Vector Spaces2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, and Yixian Yang
    • Journal Title

      International Journal of Communication Systems

    • DOI

      10.1002/dac.259

    • Peer Reviewed
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中 秀磨, 王 立華, 市川 隆一, 岩間 司, 小山 泰弘
    • Journal Title

      IEICE

      Volume: J96-D(8) Pages: 1913-1924

    • Peer Reviewed
  • [Journal Article] Chameleon Hash Functions and One- Time Signature Schemes from Inner Automorphism Groups2013

    • Author(s)
      Ping Pan, Licheng Wang, Yuanju Gan, and Yixian Yang, Lihua Wang
    • Journal Title

      Fundamental Informaticae

      Volume: 126 Pages: 103-119

    • DOI

      10.3233/FI-2013-873

    • Peer Reviewed
  • [Journal Article] Efficient Lattice-Based Signcryption in Standard Model2013

    • Author(s)
      Jianhua Yan, Licheng Wang, Lihua Wang, Yixian Yang, Wenbin Yao
    • Journal Title

      Mathematical Problems in Engineering

    • DOI

      10.1155/2013/702539/

    • Peer Reviewed
  • [Journal Article] Publicly Verifiable Secret Sharing Scheme with Provable SecurityAgainst Chosen Secret Attacks2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan and Yixian Yang
    • Journal Title

      International Journal of Distributed Sensor Networks

    • DOI

      10.1155/2013/902462

    • Peer Reviewed
  • [Journal Article] Identity- Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities2012

    • Author(s)
      Lihua Wang, Licheng Wang, Masahiro Mambo, and Eiji Okamoto
    • Journal Title

      IEICE Transaction on Fundamentals

      Volume: E95-A(1) Pages: 70-88

    • DOI

      10.1587/transfun.E95.A.70

    • Peer Reviewed
  • [Journal Article] CSP-DHIES : A New Public-Key Encryption Scheme From Matrix Conjugation2012

    • Author(s)
      Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, and Yixian Yang
    • Journal Title

      Security and Communication Networks

      Volume: 5(7) Pages: 809-822

    • DOI

      10.1002/sec.376

    • Peer Reviewed
  • [Presentation] PRINCESS : プロキシ再暗号化技術を活用したセキュアなストレージシステム2014

    • Author(s)
      王 立華, 早稲田 篤志, 野島 良, 盛合 志帆
    • Organizer
      2014年暗号と情報セキュリティシンポジウム SCIS2014
    • Place of Presentation
      鹿児島県鹿児島市城山観光ホテル
    • Year and Date
      20140121-24
  • [Presentation] Study on CSP-based Cryptography2012

    • Author(s)
      王 立華
    • Organizer
      代数系および計算機科学基礎研究集会
    • Place of Presentation
      京都府京都市京都大学数理解析研究所
    • Year and Date
      20120220-22
  • [Presentation] A CCA Secure Threshold KEM Scheme2012

    • Author(s)
      Yuanju Gan, Lihua Wang, Ping Pan, Licheng Wang, and Yixian Yang
    • Organizer
      2012年暗号と情報セキュリティシンポジウム SCIS2012
    • Place of Presentation
      石川県金沢市金沢エクセルホテル東急
    • Year and Date
      20120130-0202
  • [Presentation] 電波を使った位置情報認証2011

    • Author(s)
      王 立華, 田中 秀磨, 市川 隆一, 岩間 司, 小山 泰弘
    • Organizer
      第34回情報理論とその応用シンポジウムSITA2011
    • Place of Presentation
      岩手県岩手郡鶯宿ホテル森の風鶯宿
    • Year and Date
      20111129-1202
  • [Remarks]

    • URL

      http://www2/nsri/fund/wang/kakenhi/index.html

  • [Remarks]

    • URL

      http://www.nict.go.jp/nsri/fund/papers.html

URL: 

Published: 2015-07-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi