• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on Personal Security Module

Research Project

Project/Area Number 13450162
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field 情報通信工学
Research InstitutionUniversity of Tsukuba (2002-2003)
Toho University (2001)

Principal Investigator

OKAMOTO Eiji  University of Tsukuba, Institute of Information Sciences and Electronics, 電子・情報工学系, 教授 (60242567)

Co-Investigator(Kenkyū-buntansha) MAMBO Masahiro  Tohoku University, Faculty of Department of Computer and mathematical Sciences, Associate Professor, 情報シナジーセンター, 助教授 (60251972)
OKAMOTO Takeshi  University of Tsukuba, Institute of Information Sciences and Electronics, Assistant Professor, 電子・情報工学系, 講師 (00349797)
MIAO Ying  University of Tsukuba, Institute of Policy & Planning Sciences, Assistant Professor, 社会工学系, 講師 (10302382)
でん 天波  東邦大学, 理学部, 助教授
DENG Tian-bo  Toho University, Department of Information Sciences, Associate Professor
とう 天波  東邦大学, 理学部, 助教授
〓 天波  東邦大学, 理学部, 助教授
佐藤 洋一  東邦大学, 理学部, 教授 (20147581)
土井 洋  中央大学, 研究開発機構, 助教授
Project Period (FY) 2001 – 2003
Project Status Completed (Fiscal Year 2003)
Budget Amount *help
¥14,100,000 (Direct Cost: ¥14,100,000)
Fiscal Year 2003: ¥3,800,000 (Direct Cost: ¥3,800,000)
Fiscal Year 2002: ¥3,800,000 (Direct Cost: ¥3,800,000)
Fiscal Year 2001: ¥6,500,000 (Direct Cost: ¥6,500,000)
KeywordsCryptography / Authentication / Public key cryptosystem / ID Information / Multiparty protocol / セキュリティモジュール / ICカード
Research Abstract

Personal Security Module, which realizes encryption and authentication mechanism, is proposed. New ID based key distribution and encryption is used. The ID based key distribution system so far needs two way communications but the new one requires one way communication only because of bilinear property of pairing on Elliptic curve. We proposed new signature scheme for authentication also using the pairing. These are the mechanisms of personal security module and totally it protects security of important information

Report

(4 results)
  • 2003 Annual Research Report   Final Research Report Summary
  • 2002 Annual Research Report
  • 2001 Annual Research Report
  • Research Products

    (34 results)

All Other

All Publications (34 results)

  • [Publications] Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto: "The dynamic-typed access model and decidability of the safety problem"電子情報通信学会英論文誌. Vol.E83,No.1. 190-203 (2004)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] S.Russell, E.Okamoto, E.Dawson, J.Lopez: "Virtual certificates and synthetic certificates : New paradigms for improving public key validation, Computer Communication"Elsevier. Vol.26,No.16. 1826-1838 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] 金岡 晃, 岡本栄司: "IETFにおける侵入検知情報交換方式の問題点と対策"情報処理学会論文誌. Vol.44,No.8. 1830-1837 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] E.Dawson, J.Lopez, J.A.Montenegro, E.Okamoto: "Biometric authentication and authorization infrastructure"Proc.of ITRE2003 (International Conference on Information Technology : Research and Education). 274-278 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto: "A Fast Signature Scheme Based on New On-line Computation"Proc.of ISC'03. 111-121 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Juan M.Gonzalez Nieto, Jason Reid, Ed Dawson, Eiji Okamoto: "Privacy implications of Trusted Computing, Trust and Privacy in Digital Business"DEXA workshop, IEEE. 383-388 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] 土居監修, 内田, 岡本, 菊池, 佐々木, 寺田, 村山編: "情報セキュリティ事典"共立出版. 1072 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto: "The dynamic-typed access model and decidability of the safety problem"IEICE TRANSACTIONS. Vol.E83, No.1. 190-203 (2004)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] S.Russell, E.Oklmoto, E.Dawsor, I.Lopez: "Virtual certificates and synthetic certificates New paradigms for improving public key validation Computer Communication"Elsevier. Vol.26, No.16. 1826-1838 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] E.Dawson, J.Lope z, J.A-.Montenegro, C.Okamoto: "Biometric authentication aid authorization infrastructure"Proc.of ITRE2003 (International Conference on Information Technology : Research and Education). 274-278 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Tokeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto: "A Fast Signature Scheme Based ~on New On-line Computation"Proc.of ISC'03. 111-121 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Juan M.Gonzalez Nieto, Jason Reid, Ed Dawson, Eiji Okamoto: "Privacy Implications of Trusted Computing, Business Trust and Privacy in Digital"DEXA workshop, IEEE. 383-388 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Akira KANAOKA, Eiji OKAMOTO: "The Problems and Countermeasures of Instrusion Detection Exchange Format in IETF"IPSJ Journal. Vol44, No.8. 1830-1837 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Doi, Uchida, Okamoto, Kikuchi, Sasaki, Terada, Murayama: "Dictionary of Information security"KYORITSU. 1072 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto: "The dynamic-typed access model and decidability of the safety problem"電子情報通信学会英論文誌. Vol.E83,No.1. 190-203 (2004)

    • Related Report
      2003 Annual Research Report
  • [Publications] S.Russell, E.Okamoto, E.Dawson, J.Lopez: "Virtual certificates and synthetic certificates : New paradigms for improving public key validation, Computer Communication"Elsevier. Vol.26,No.16. 1826-1838 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] 金岡晃, 岡本栄司: "IETFにおける侵入検知情報交換方式の問題点と対策"情報処理学会論文誌. Vol.44,No.8. 1830-1837 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] E.Dawson, J.Lopez, J.A.Montenegro, E.Okamoto: "Biometric authentication and authorization infrastructure"Proc.of ITRE2003 (International Conference on Information Technology : Research and Education). 274-278 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto: "A Fast Signature Scheme Based on New On-line Computation"Proc.of ISC' 03. 111-121 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Juan M.Gonzalez Nieto, Jason Reid, Ed Dawson, Eiji Okamoto: "Privacy Implications of Trusted Computing, Trust and Privacy in Digital Business"DEXA workshop, IEEE. 383-388 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] 土居監修, 内田, 岡本, 菊池, 佐々木, 寺田, 村山編: "情報セキュリティ事典"共立出版. 1072 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] 千石靖, 服部進実, 岡本栄司: "完全駆除までの期限を考慮したコンピュータウイルス駆除手法"情報処理学会論文誌. Vol.44、No.1. 106-113 (2003)

    • Related Report
      2002 Annual Research Report
  • [Publications] Y.Miao: "Constructions for optimal optical orthogonal codes"Discrete Mathematics. Vol.261. 127-139 (2003)

    • Related Report
      2002 Annual Research Report
  • [Publications] M.Mambo, E.Okamoto, Y.Sengoku, T.Tanaka: "Simple and secure access under the flexible organization management"Proc.of IEEE DEXA'02. TrustBus. 456-460 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] M.Henderson, R.Coulter, E.Dawson, E.Okamoto: "Modeling trust structures for public key infrastructures"Proc.of ACISP'02. LNCS2384. 56-70 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 金岡晃, 岡本栄司: "SePO(Self Protected Object)の提案とその実現方法について"情報処理学会コンピュータセキュリティシンポジウム予稿集. CSS'02. 197-202 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 金岡晃, 岡本栄司: "IDS標準化:実装と評価"情報処理学会コンピュータセキュリティシンポジウム予稿集. CSS'02. 449-454 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 辻井重男, 岡本栄司: "暗号のすべて"電波新聞社. 271 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 土井洋, 岡本栄司, 辻井重男: "擬似乱数列の衝突に関する-考察"電子情報通信学会情報セキュリティ信学技法. ISEC2001-7. 45-48 (2001)

    • Related Report
      2001 Annual Research Report
  • [Publications] Tian-Bo Deng, Eiji Okamoto: "Optimal design and parallel implementation of digital filters with variable magnitude and fractional-delay responses"第16回ディジタル信号処理シンポジウム予稿集. (2001)

    • Related Report
      2001 Annual Research Report
  • [Publications] Mike Burmester, Yvo Desmedt, Masahiro Mambo, Eiji Okamoto: "Formal model of ordered multi-party cryptography and its concrete examples"電子情報通信学会情報セキュリティ信学技法. ISEC2001. (2001)

    • Related Report
      2001 Annual Research Report
  • [Publications] Selwyn Russell, Eiji Okamoto, Ed Dawson, Javier Lopez: "Improving performance in global PKI using virtual certificates and synthetic certificates"2002年暗号と情報セキュリティシンポジウム予稿集. Vol.2. 1149-1154 (2002)

    • Related Report
      2001 Annual Research Report
  • [Publications] 金岡晃, 岡本栄司: "ニューラルネットワークを用いたデータマイニングによるリアルタイムネットワーク異常検出について"2002年暗号と情報セキュリティシンポジウム予稿集. Vol.2. 645-649 (2002)

    • Related Report
      2001 Annual Research Report
  • [Publications] 岡本栄司: "暗号技術の基礎と最近の動向"情報処理学会平成13年度専門講習会予稿集. 2/1-2/5 (2002)

    • Related Report
      2001 Annual Research Report

URL: 

Published: 2001-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi