• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2013 Fiscal Year Final Research Report

Study on Public Key Encryption with Restricted Plaintext Space

Research Project

  • PDF
Project/Area Number 23656257
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Communication/Network engineering
Research InstitutionNational Institute of Advanced Industrial Science and Technology

Principal Investigator

HANAOKA Goichiro  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 研究グループ長 (30415731)

Co-Investigator(Kenkyū-buntansha) AFFELDT Reynald  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 主任研究員 (40415641)
ATTRAPADUNG Nuttapong  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 主任研究員 (40515300)
NUIDA Koji  独立行政法人産業技術総合研究所, セキュアシステム研究部門, 主任研究員 (20435762)
Project Period (FY) 2011 – 2013
Keywords暗号理論
Research Abstract

The main motivation of this work is to provide a technology which yields confidentiality of communication but prevents those by malicious users, e.g. terrorists. In this work, as a candidate of such a technology, we study public key encryption with restricted plaintext space. Specifically, we construct a concrete scheme, evaluate its security, and implement it. We also study its fundamental theory. These results were preseted in international conferences and journals.

  • Research Products

    (20 results)

All 2014 2013 2012 2011 Other

All Journal Article (11 results) (of which Peer Reviewed: 10 results) Presentation (9 results)

  • [Journal Article] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 8383 Pages: 275-292

    • DOI

      10.1007/978-3-642-54631-0_16

    • Peer Reviewed
  • [Journal Article] Group signature implies public-key encryption with non-interactive opening2014

    • Author(s)
      Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Jacob C. N. Schuldt
    • Journal Title

      Int. J. Inf. Sec

      Volume: Vol. 13(1) Pages: 51-62

    • DOI

      10.1007/s10207-013-0204-y

    • Peer Reviewed
  • [Journal Article] Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7778 Pages: 332-351

    • DOI

      10.1007/978-3-642-36362-7_21

    • Peer Reviewed
  • [Journal Article] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013

    • Author(s)
      Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7778 Pages: 32-50

    • DOI

      10.1007/978-3-642-36362-7_3

    • Peer Reviewed
  • [Journal Article] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7417 Pages: 812-831

    • DOI

      10.1007/978-3-642-32009-5_47

    • Peer Reviewed
  • [Journal Article] Space Efficient Signature Schemes from the RSA Assumption2012

    • Author(s)
      Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7293 Pages: 102-119

    • DOI

      10.1007/978-3-642-30057-8_7

    • Peer Reviewed
  • [Journal Article] Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7293 Pages: 243-261

    • DOI

      10.1007/978-3-642-30057-8_15

    • Peer Reviewed
  • [Journal Article] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7293 Pages: 576-594

    • DOI

      10.1007/978-3-642-30057-8_34

    • Peer Reviewed
  • [Journal Article] How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model2011

    • Author(s)
      Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: Vol. 94-EA(6) Pages: 1293-1305

    • DOI

      10.1587/transfun.E94.A.1293

    • Peer Reviewed
  • [Journal Article] Towards Restricting Plaintext Space in Public Key Encryption2011

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7038 Pages: 193-209

    • DOI

      10.1007/978-3-642-25141-2_13

    • Peer Reviewed
  • [Journal Article] On the Security of Dynamic Group Signatures : Preventing Signature Hijacking

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7293 Pages: 715-732

    • DOI

      10.1007/978-3-642-30057-8_42

  • [Presentation] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      17th International Conference on Practice and Theory in Public Key Cryptography (PKC 2014)
    • Place of Presentation
      Buenos Aires, Argentina
    • Year and Date
      20140326-28
  • [Presentation] Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013)
    • Place of Presentation
      奈良
    • Year and Date
      20130226-0301
  • [Presentation] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013

    • Author(s)
      Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada
    • Organizer
      16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013)
    • Place of Presentation
      奈良
    • Year and Date
      20130226-0301
  • [Presentation] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.2012

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Organizer
      32nd Annual Cryptology Conference (CRYPTO 2012)
    • Place of Presentation
      Santa Barbara, CA, USA
    • Year and Date
      20120819-23
  • [Presentation] Space Efficient Signature Schemes from the RSA Assumption2012

    • Author(s)
      Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Year and Date
      20120521-23
  • [Presentation] Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Year and Date
      20120521-23
  • [Presentation] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Year and Date
      20120521-23
  • [Presentation] On the Security of Dynamic Group Signatures : Preventing Signature Hijacking.2012

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Year and Date
      20120521-23
  • [Presentation] グループ署名の安全性について2012

    • Author(s)
      坂井 祐介, ヤコブ・シュルツ, 江村 恵太, 花岡 悟一郎, 太田 和夫
    • Organizer
      2012年 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      石川県, 金沢エクセルホテル東急
    • Year and Date
      2012-02-02

URL: 

Published: 2015-06-25  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi