• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Constructions for Cryptographic Primitives with Incentives

Research Project

Project/Area Number 17H01695
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Theory of informatics
Research InstitutionTokyo Institute of Technology

Principal Investigator

Tanaka Keisuke  東京工業大学, 情報理工学院, 教授 (20334518)

Co-Investigator(Kenkyū-buntansha) 河内 亮周  三重大学, 工学研究科, 教授 (00397035)
安永 憲司  大阪大学, 情報科学研究科, 准教授 (50510004)
小柴 健史  早稲田大学, 教育・総合科学学術院, 教授 (60400800)
Project Period (FY) 2017-04-01 – 2021-03-31
Project Status Completed (Fiscal Year 2021)
Budget Amount *help
¥15,860,000 (Direct Cost: ¥12,200,000、Indirect Cost: ¥3,660,000)
Fiscal Year 2020: ¥3,120,000 (Direct Cost: ¥2,400,000、Indirect Cost: ¥720,000)
Fiscal Year 2019: ¥4,290,000 (Direct Cost: ¥3,300,000、Indirect Cost: ¥990,000)
Fiscal Year 2018: ¥4,290,000 (Direct Cost: ¥3,300,000、Indirect Cost: ¥990,000)
Fiscal Year 2017: ¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Keywords暗号 / 安全性 / インセンティブ設計 / ゲーム理論 / ブロックチェーン / 暗号通貨 / 暗号理論 / プロトコル / インセンティブ / 計算複雑さ
Outline of Final Research Achievements

We conducted a survey and research on incentive design techniques. Through detailed surveys and comparisons of techniques, we attempted to design models and techniques for incentive-based digital signatures and authentication. In particular, we focused on an element called Secure Message Transmission (SMT), which is closely related to these elements, and showed that even if multiple communication channels are all controlled by an adversary, communication can be performed securely when a rational adversary is considered. In addition, we conducted a survey and research on blockchain. In particular, we returned to the origin of proof-of-work and examined the situation where a time and memory gap occurs between the prover and the verifier.

Academic Significance and Societal Importance of the Research Achievements

インセンティブ付与の重要性が、ナカモトサトシによる原論文(2008)でも言及されている。ビットコインでは、ブロックをチェーンに接続させることに対して報酬が付与され、その額は4年毎に半減する。このような報酬設定は、直観的なアイディアにもとづいて行われており、適切か否かに 関する厳密な議論は行われていない。本研究は、直観的なアイディアによるものではではなく、理論的な考察によりある種の妥当性を示すことに成功している。具体的に、合意形成に用いるための計算において、証明者と検証者で時間とメモリのギャップを生じる状況についての考察に成功している。

Report

(5 results)
  • 2021 Final Research Report ( PDF )
  • 2020 Annual Research Report
  • 2019 Annual Research Report
  • 2018 Annual Research Report
  • 2017 Annual Research Report
  • Research Products

    (40 results)

All 2022 2021 2020 2019 2018 2017

All Journal Article (38 results) (of which Int'l Joint Research: 7 results,  Peer Reviewed: 38 results,  Open Access: 6 results,  Acknowledgement Compliant: 1 results) Presentation (2 results) (of which Int'l Joint Research: 1 results)

  • [Journal Article] CCA Security and Trapdoor Functions via Key-Dependent-Message Security2022

    • Author(s)
      Kitagawa Fuyuki、Matsuda Takahiro、Tanaka Keisuke
    • Journal Title

      Journal of Cryptology

      Volume: 35 Issue: 2 Pages: 9-9

    • DOI

      10.1007/s00145-022-09420-8

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Watermarkable Signature with Computational Function Preserving2021

    • Author(s)
      SUDO Kyohei、HARA Keisuke、TEZUKA Masayuki、YOSHIDA Yusuke、TANAKA Keisuke
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E104.A Issue: 9 Pages: 1255-1270

    • DOI

      10.1587/transfun.2020DMP0022

    • NAID

      130008081801

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-09-01
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions2021

    • Author(s)
      LU Yi、HARA Keisuke、TANAKA Keisuke
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E104.A Issue: 9 Pages: 1206-1218

    • DOI

      10.1587/transfun.2020DMP0009

    • NAID

      130008081881

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-09-01
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Redactable Signature with Compactness from Set-Commitment2021

    • Author(s)
      TEZUKA Masayuki、TANAKA Keisuke
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E104.A Issue: 9 Pages: 1175-1187

    • DOI

      10.1587/transfun.2020DMP0013

    • NAID

      130008081794

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-09-01
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Tightly secure ring signatures in the standard model2021

    • Author(s)
      Hara Keisuke、Tanaka Keisuke
    • Journal Title

      Theoretical Computer Science

      Volume: 892 Pages: 208-237

    • DOI

      10.1016/j.tcs.2021.09.022

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Simple and Generic Constructions of Succinct Functional Encryption2021

    • Author(s)
      Kitagawa Fuyuki、Nishimaki Ryo、Tanaka Keisuke
    • Journal Title

      Journal of Cryptology

      Volume: 34 Issue: 3 Pages: 25-25

    • DOI

      10.1007/s00145-021-09396-x

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Fine-Grained Cryptography Revisited2021

    • Author(s)
      Egashira Shohei、Wang Yuyu、Tanaka Keisuke
    • Journal Title

      Journal of Cryptology

      Volume: 34 Issue: 3 Pages: 23-23

    • DOI

      10.1007/s00145-021-09390-3

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Ring Signature With Unconditional Anonymity in the Plain Model2021

    • Author(s)
      Hara Keisuke、Tanaka Keisuke
    • Journal Title

      IEEE Access

      Volume: 9 Pages: 7762-7774

    • DOI

      10.1109/access.2021.3049240

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Quantum Query Complexity of Unitary Operator Discrimination2019

    • Author(s)
      KAWACHI Akinori、KAWANO Kenichi、LE GALL Francois、TAMAKI Suguru
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E102.D Issue: 3 Pages: 483-491

    • DOI

      10.1587/transinf.2018FCP0012

    • NAID

      130007606941

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2019-03-01
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2019

    • Author(s)
      Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Journal Title

      Theoretical Computer Science

      Volume: 795 Pages: 570-597

    • DOI

      10.1016/j.tcs.2019.08.016

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Fine-grained cryptography revisited2019

    • Author(s)
      Shohei Egashira, Yuyu Wang, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ASIACRYPT 2019)

      Volume: 11923 Pages: 637-666

    • DOI

      10.1007/978-3-030-34618-8_22

    • ISBN
      9783030346171, 9783030346188
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Simple and efficient KDM-CCA secure public key encryption2019

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ASIACRYPT 2019)

      Volume: 11923 Pages: 97-127

    • DOI

      10.1007/978-3-030-34618-8_4

    • ISBN
      9783030346171, 9783030346188
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem2019

    • Author(s)
      Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ASIACRYPT 2019)

      Volume: 11923 Pages: 128-158

    • DOI

      10.1007/978-3-030-34618-8_5

    • ISBN
      9783030346171, 9783030346188
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A t-out-of-n redactable signature scheme2019

    • Author(s)
      Masayuki Tezuka, Xiangyu Su, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (CANS 2019)

      Volume: 11829 Pages: 470-489

    • DOI

      10.1007/978-3-030-31578-8_26

    • ISBN
      9783030315771, 9783030315788
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Proper Usage of the Group Signature Scheme in ISO/IEC 20008-22019

    • Author(s)
      Ishida Ai、Sakai Yusuke、Emura Keita、Hanaoka Goichiro、Tanaka Keisuke
    • Journal Title

      AsiaCCS2019

      Volume: NA Pages: 515-528

    • DOI

      10.1145/3321705.3329824

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] CCA security and trapdoor functions via key-dependent-message security2019

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (CRYPTO 2019)

      Volume: 11694 Pages: 33-64

    • DOI

      10.1007/978-3-030-26954-8_2

    • ISBN
      9783030269531, 9783030269548
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Adaptively secure and succinct functional encryption: Improving security and efficiency, simultaneously2019

    • Author(s)
      Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa
    • Journal Title

      Lecture Notes in Computer Science (CRYPTO 2019)

      Volume: 11694 Pages: 521-551

    • DOI

      10.1007/978-3-030-26954-8_17

    • ISBN
      9783030269531, 9783030269548
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Perfectly secure message transmission against independent rational adversaries2019

    • Author(s)
      Kenji Yasunaga and Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science, Proc. of Decision and Game Theory for Security - 10th International Conference, GameSec 2019

      Volume: 11836 Pages: 563-582

    • DOI

      10.1007/978-3-030-32430-8_33

    • ISBN
      9783030324292, 9783030324308
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Weakened Random Oracle Models with Target Prefix2019

    • Author(s)
      Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (SecITC 2018)

      Volume: 11359 Pages: 344-357

    • DOI

      10.1007/978-3-030-12942-2_26

    • ISBN
      9783030129415, 9783030129422
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption2018

    • Author(s)
      Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E101.A Issue: 9 Pages: 1456-1472

    • DOI

      10.1587/transfun.E101.A.1456

    • NAID

      130007479446

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2018-09-01
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions2018

    • Author(s)
      Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Journal Title

      SCN 2018

      Volume: - Pages: 140-159

    • DOI

      10.1007/978-3-319-98113-0_8

    • ISBN
      9783319981123, 9783319981130
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Fully Anonymous Group Signature with Verifier-Local Revocation2018

    • Author(s)
      Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (SCN 2018)

      Volume: 11035 Pages: 23-42

    • DOI

      10.1007/978-3-319-98113-0_2

    • ISBN
      9783319981123, 9783319981130
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Framework for Achieving KDM-CCA Secure Public-Key Encryption2018

    • Author(s)
      Fuyuki Kitagawa, Keisuke Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ASIACRYPT 2018)

      Volume: 11273 Pages: 127-157

    • DOI

      10.1007/978-3-030-03329-3_5

    • ISBN
      9783030033286, 9783030033293
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Performance analysis of robust watermarking using linear and nonlinear feature matching2018

    • Author(s)
      T. M. Thanh, K. Tanaka, L. H. Dung, N. T. Tai, H. N. Nam
    • Journal Title

      Multimedia Tools and Applications

      Volume: 77 Issue: 2 Pages: 2901-2920

    • DOI

      10.1007/s11042-017-4435-1

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Simple and generic constructions of succinct functional encryption2018

    • Author(s)
      F. Kitagawa, R. Nishimaki, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (PKC 2018)

      Volume: 10770 Pages: 187-217

    • DOI

      10.1007/978-3-319-76581-5_7

    • ISBN
      9783319765808, 9783319765815
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Key dependent message security and receiver selective opening security for identity-based encryption2018

    • Author(s)
      F. Kitagawa, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (PKC 2018)

      Volume: 10769 Pages: 32-61

    • DOI

      10.1007/978-3-319-76578-5_2

    • ISBN
      9783319765778, 9783319765785
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Privacy-preserving equality test towards big data2018

    • Author(s)
      T. K. Saha, T. Koshiba
    • Journal Title

      Lecture Notes in Computer Science (FPS 2017)

      Volume: 10723 Pages: 95-110

    • DOI

      10.1007/978-3-319-75650-9_7

    • ISBN
      9783319756493, 9783319756509
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generic Transformation for Signatures in the Continual Leakage Model2017

    • Author(s)
      Y. Wang, K. Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 9 Pages: 1857-1869

    • DOI

      10.1587/transfun.E100.A.1857

    • NAID

      130006038268

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Group Signature with Deniability: How to Disavow a Signature2017

    • Author(s)
      A. Ishida, K. Emura, G. Hanaoka, Y. Sakai, K. Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 9 Pages: 1825-1837

    • DOI

      10.1587/transfun.E100.A.1825

    • NAID

      130006038287

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] General constructions of rational secret sharing with expected constant-round reconstruction2017

    • Author(s)
      Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, and Kenji Yasunaga
    • Journal Title

      The Computer Journal

      Volume: 印刷中 Pages: 711-728

    • DOI

      10.1093/comjnl/bxw094

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information2017

    • Author(s)
      T. M. Thanh, K. Tanaka
    • Journal Title

      Multimedia Tools and Applications

      Volume: 76 Issue: 11 Pages: 13455-13471

    • DOI

      10.1007/s11042-016-3750-2

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] CCA2 Key-Privacy for Code-Based Encryption in the Standard Model2017

    • Author(s)
      Y. Yoshida, K. Morozov, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (PQCrypto 2017)

      Volume: 10346 Pages: 35-50

    • DOI

      10.1007/978-3-319-59879-6_3

    • ISBN
      9783319598789, 9783319598796
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Generic constructions for fully secure revocable attribute-based encryption2017

    • Author(s)
      K. Yamada, N. Attrapadung, K. Emura, G. Hanaoka, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (ESORICS 2017)

      Volume: 10493 Pages: 532-551

    • DOI

      10.1007/978-3-319-66399-9_29

    • NAID

      130007479446

    • ISBN
      9783319663982, 9783319663999
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Physical implementation of oblivious transfer using optical correlated randomness2017

    • Author(s)
      T. Ito, H. Koizumi, N. Suzuki, I. Kakesu, K. Iwakawa, A. Uchida, T. Koshiba, J. Muramatsu, K. Yoshimura, M. Inubushi, P. Davis
    • Journal Title

      Scientific Reports

      Volume: 7 Issue: 1 Pages: 1-12

    • DOI

      10.1038/s41598-017-08229-x

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient protocols for private database queries2017

    • Author(s)
      T. K. Saha, Mayank, T. Koshiba
    • Journal Title

      Lecture Notes in Computer Science (DBSec 2017)

      Volume: 10359 Pages: 337-348

    • DOI

      10.1007/978-3-319-61176-1_19

    • ISBN
      9783319611754, 9783319611761
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Rational Proofs against Rational Verifiers2017

    • Author(s)
      K. Inasawa, K. Yasunaga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 11 Pages: 2392-2397

    • DOI

      10.1587/transfun.E100.A.2392

    • NAID

      130006191407

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum Query Complexity of Unitary Operator Discrimination2017

    • Author(s)
      Kawachi Akinori、Kawano Kenichi、Le Gall Fran?ois、Tamaki Suguru
    • Journal Title

      COCOON 2017, LNCS

      Volume: 10392 Pages: 309-320

    • DOI

      10.1007/978-3-319-62389-4_26

    • ISBN
      9783319623887, 9783319623894
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Generalized Predecessor Existence Problems for Boolean Finite Dynamical Systems2017

    • Author(s)
      Akinori Kawachi, Mitsunori Ogihara, Kei Uchizawa
    • Journal Title

      Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017)

      Volume: 83

    • DOI

      10.4230/LIPIcs.MFCS.2017.8

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Presentation] How to Prove Work: With Time or Memory2021

    • Author(s)
      Xiangyu Su, Mario Larangeira, Keisuke Tanaka
    • Organizer
      2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
    • Related Report
      2020 Annual Research Report
  • [Presentation] Lightweight Virtual Payment Channels2020

    • Author(s)
      Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
    • Organizer
      CANS 2020: Cryptology and Network Security
    • Related Report
      2020 Annual Research Report
    • Int'l Joint Research

URL: 

Published: 2017-04-28   Modified: 2023-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi