• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of Information-Theoretic Security Based on Guessing Secrecy

Research Project

Project/Area Number 17H01752
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Information security
Research InstitutionThe University of Electro-Communications

Principal Investigator

Iwamoto Mitsugu  電気通信大学, 大学院情報理工学研究科, 教授 (50377016)

Co-Investigator(Kenkyū-buntansha) 四方 順司  横浜国立大学, 大学院環境情報研究院, 教授 (30345483)
渡邉 洋平  電気通信大学, 大学院情報理工学研究科, 助教 (40792263)
Project Period (FY) 2017-04-01 – 2021-03-31
Project Status Completed (Fiscal Year 2021)
Budget Amount *help
¥18,330,000 (Direct Cost: ¥14,100,000、Indirect Cost: ¥4,230,000)
Fiscal Year 2020: ¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2019: ¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2018: ¥4,290,000 (Direct Cost: ¥3,300,000、Indirect Cost: ¥990,000)
Fiscal Year 2017: ¥4,940,000 (Direct Cost: ¥3,800,000、Indirect Cost: ¥1,140,000)
Keywords推測秘匿性 / 情報理論的安全性 / 暗号理論 / 推測アルゴリズム / 情報理論的暗号理論 / 共通鍵暗号 / 秘密分散法
Outline of Final Research Achievements

In this study, we investigated the recently proposed information-theoretic security notion called guessing secrecy for developing information-theoretic security. First, we proposed several definitions of guessing secrecy and investigated their relationship. Then, by proposing several cryptographic protocols satisfying guessing secrecy, we found that the existence of the security gap depends on the protocols. We also measured the computation time required to guess a key of AES under a probing attack and clarified the relationship between guessing and computation time. Besides the study of guessing secrecy, we proposed several cryptographic protocols that satisfy perfect secrecy, especially secret sharing and multi-party computation.

Academic Significance and Societal Importance of the Research Achievements

情報理論的暗号において近年提案された推測秘匿性をテーマとした理論研究を行った.情報理論的暗号は通常,完全秘匿性を要求することが多い.その強力な安全性の代償として,機能や効率に問題がある.そこで完全秘匿性を緩めた安全性概念として推測秘匿性を研究することは重要である.本研究では,推測秘匿性の基礎的・基本的性質やプロトコルを明らかにし,鍵を実際に推測する際の計算時間なども検討した.このように,推測と安全性という暗号理論における基本的な関係を多角的に考察することができた点に学術的な意義がある.推測秘匿性の研究に関連して,完全秘匿性をもつ暗号プロトコルもいくつか提案することができたことも有意義であった.

Report

(5 results)
  • 2021 Final Research Report ( PDF )
  • 2020 Annual Research Report
  • 2019 Annual Research Report
  • 2018 Annual Research Report
  • 2017 Annual Research Report
  • Research Products

    (65 results)

All 2021 2020 2019 2018 2017 Other

All Journal Article (18 results) (of which Int'l Joint Research: 2 results,  Peer Reviewed: 18 results,  Open Access: 3 results) Presentation (39 results) (of which Int'l Joint Research: 10 results,  Invited: 6 results) Book (1 results) Remarks (7 results)

  • [Journal Article] A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule2020

    • Author(s)
      Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, and Kazuo Ohta
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 382-386

    • DOI

      10.34385/proc.65.C01-10

    • NAID

      230000012603

    • ISSN
      2188-5079
    • Year and Date
      2020-10-18
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs2020

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 377-381

    • DOI

      10.34385/proc.65.C01-9

    • NAID

      230000012660

    • ISSN
      2188-5079
    • Year and Date
      2020-10-18
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Key-Updatable Public-Key Encryption with Keyword Search (Or: How to Realize PEKS with Efficient Key Updates for IoT Environments)2020

    • Author(s)
      H. Anada, A. Kanaoka, N. Matsuzaki, and Y. Watanabe
    • Journal Title

      International Journal of Information Security

      Volume: 19 Issue: 1 Pages: 15-38

    • DOI

      10.1007/s10207-019-00441-2

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing2019

    • Author(s)
      K. Ohara, Y. Watanabe, M. Iwamoto, and K. Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E102.A Issue: 9 Pages: 1079-1090

    • DOI

      10.1587/transfun.E102.A.1079

    • NAID

      130007699566

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2019-09-01
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Private PEZ Protocols for Symmetric Functions2019

    • Author(s)
      Y. Abe, M. Iwamoto, and K. Ohta
    • Journal Title

      Proc. Theory of Cryptography Conference (TCC2019)

      Volume: LNCS11891 Pages: 372-392

    • DOI

      10.1007/978-3-030-36030-6_15

    • ISBN
      9783030360290, 9783030360306
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices2019

    • Author(s)
      K. Emura, S. Katsumata, and Y. Watanabe
    • Journal Title

      Proceedings of ESORICS 2019

      Volume: LNCS 11736 Pages: 113-133

    • DOI

      10.1007/978-3-030-29962-0_6

    • ISBN
      9783030299613, 9783030299620
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes2019

    • Author(s)
      Reo Eriguchi, Noboru Kunihiro, and Mitsugu Iwamoto
    • Journal Title

      Proc. IEEE International Symposium on Information Theory (ISIT2019)

      Volume: 2019-July Pages: 3047-3051

    • DOI

      10.1109/isit.2019.8849591

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Identity-based Encryption with Hierarchical Key-insulation in the Standard Model2019

    • Author(s)
      Junji Shikata and Yohei Watanabe
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 87-5 Issue: 5 Pages: 1005-1033

    • DOI

      10.1007/s10623-018-0503-4

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model2019

    • Author(s)
      Sato Shingo、Shikata Junji
    • Journal Title

      Proc. Cryptography and Coding (IMACC 2019)

      Volume: LNCS11929 Pages: 317-341

    • DOI

      10.1007/978-3-030-35199-1_16

    • ISBN
      9783030351984, 9783030351991
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Implementation and Analysis of Fully Homomorphic Encryption in Resource-Constrained Devices2019

    • Author(s)
      Amonrat Prasitsupparote, Yohei Watanabe, Junichi Sakamoto, Junji Shikata, and Tsutomu Matsumoto
    • Journal Title

      International Journal of Digital Information and Wireless Communications (IJDIWC)

      Volume: 8 (4) Issue: 4 Pages: 288-303

    • DOI

      10.17781/p002535

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Card-Based Majority Voting Protocols with Three Inputs Using Three Cards2018

    • Author(s)
      Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, Kazuo Ohta
    • Journal Title

      Proc. International Symposium on Information Theory and Its Applications (ISITA2018)

      Volume: - Pages: 218-222

    • DOI

      10.23919/isita.2018.8664324

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Proactive Secret Image Sharing Scheme with Resistance to Machine Learning Based Steganalysis2018

    • Author(s)
      Anjelina Espejel-Trujillo, Mitsugu Iwamoto, and Mariko Nakano-Miyatake
    • Journal Title

      Multimedia Tools And Applications

      Volume: 77 Issue: 12 Pages: 15161-15179

    • DOI

      10.1007/s11042-017-5097-8

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences2018

    • Author(s)
      Amonrat Prasitsupparote, Norio Konno, and Junji Shikata
    • Journal Title

      Entropy

      Volume: 20 (10) Issue: 10 Pages: 729-729

    • DOI

      10.3390/e20100729

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Security Formalizations and Their Relationships for Encryption and Key Agreement in Information Theoretic Cryptography2018

    • Author(s)
      M. Iwamoto, K. Ohta, and J. Shikata
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: Vol. 64, No. 1 Issue: 1 Pages: 654-685

    • DOI

      10.1109/tit.2017.2744650

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Broadcast Encryption with Guessing Secrecy2017

    • Author(s)
      Watanabe Yohei
    • Journal Title

      Information Theoretic Security

      Volume: LNCS100681 Pages: 39-57

    • DOI

      10.1007/978-3-319-72089-0_3

    • ISBN
      9783319720883, 9783319720890
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations2017

    • Author(s)
      T. Nakai, S. Shirouchi, M. Iwamoto and K. Ohta
    • Journal Title

      Information Theoretic Security (ICITS2017), Springer

      Volume: LNCS 10681 Pages: 153-165

    • DOI

      10.1007/978-3-319-72089-0_9

    • ISBN
      9783319720883, 9783319720890
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Tighter Bounds on Entropy of Secret Keys in Authentication Codes2017

    • Author(s)
      J. Shikata
    • Journal Title

      Proc. of 2017 IEEE Information Theory Workshop (ITW2017)

      Volume: - Pages: 259-263

    • DOI

      10.1109/itw.2017.8278016

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Timed-Release Computational Secret Sharing and Threshold Encryption2017

    • Author(s)
      Y. Watanabe and J. Shikata
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 印刷中 Issue: 1 Pages: 17-54

    • DOI

      10.1007/s10623-016-0324-2

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Presentation] 紛失通信ベース三者間秘匿積集合プロトコルにおけるラウンド数の削減2021

    • Author(s)
      清水 聖也, 安部 芳紀, 中井 雄士, 品川 和雅, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム 2021
    • Related Report
      2020 Annual Research Report
  • [Presentation] AES鍵スケジュールからの固定ビット数漏洩を用いた鍵復元アルゴリズムの性能評価2021

    • Author(s)
      植村 友紀, 渡邉 洋平, 李 陽, 三浦 典之, 岩本 貢, 崎山 一男, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム 2021
    • Related Report
      2020 Annual Research Report
  • [Presentation] A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule2020

    • Author(s)
      T. Uemura, Y.Watanabe, Y. Li, N. Miura, M. Iwamoto, K. Sakiyama, and K. Ohta
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Related Report
      2020 Annual Research Report
    • Int'l Joint Research
  • [Presentation] How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs2020

    • Author(s)
      Y. Abe, M. Iwamoto, and K. Ohta
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Related Report
      2020 Annual Research Report
    • Int'l Joint Research
  • [Presentation] [招待講演] 対称関数を効率的に計算するPrivate PEZ プロトコル (from TCC 2019)2020

    • Author(s)
      安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      IEICE 情報セキュリティ研究会
    • Related Report
      2020 Annual Research Report
    • Invited
  • [Presentation] より少ない漏洩の下で安全な動的検索可能暗号への変換手法2020

    • Author(s)
      渡邉 洋平, 大原 一真, 岩本 貢, 太田 和夫
    • Organizer
      コンピュータセキュリティシンポジウム CSS2020
    • Related Report
      2020 Annual Research Report
  • [Presentation] 効率的な格子問題に基づくSemi-Adaptive安全な内積暗号2020

    • Author(s)
      宮澤智輝, 佐藤慎悟, 四方順司
    • Organizer
      コンピュータセキュリティシンポジウム
    • Related Report
      2020 Annual Research Report
  • [Presentation] 鍵のランダムな漏洩に対するAES鍵スケジュール復元アルゴリズム2020

    • Author(s)
      植村友紀, 李陽, 三浦典之, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 気泡検出器を用いたゼロ知識非破壊検査2020

    • Author(s)
      品川和雅, 三浦典之, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 任意の始集合を持つ関数を計算するprivate PEZプロトコル2020

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] フォワード安全かつ検索時通信量が最適な動的検索可能暗号2020

    • Author(s)
      渡邉洋平
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 任意の関数を計算するprivate PEZプロトコルの改善2019

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      コンピューターセキュリティシンポジウム (CSS) 2019
    • Related Report
      2019 Annual Research Report
  • [Presentation] (強)フォワード安全な動的検索可能暗号の効率的な構成2019

    • Author(s)
      渡邉洋平, 大原一真, 岩本貢, 太田和夫
    • Organizer
      コンピューターセキュリティシンポジウム (CSS) 2019
    • Related Report
      2019 Annual Research Report
  • [Presentation] How to improve the private PEZ protocol for general functions2019

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
    • Organizer
      The 14th International Workshop on Security (IWSEC2019), poster session
    • Related Report
      2019 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 格子問題に基づくSemi-Adaptive安全な内積暗号2019

    • Author(s)
      宮澤智輝, 佐藤慎悟, 四方順司
    • Organizer
      情報処理学会, 研究報告コンピュータセキュリティ(CSEC)
    • Related Report
      2019 Annual Research Report
  • [Presentation] Efficient Threshold Public-Key Encryption from CBDH2019

    • Author(s)
      Masahiro Ebina, Yohei Watanabe, Junji Shikata
    • Organizer
      International Workshop on Information Security (IWSEC 2019)
    • Related Report
      2019 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 初期文字列が29 文字の4 入力多数決Private PEZプロトコル2019

    • Author(s)
      安部 芳紀, 山本 翔太, 岩本 貢, 太田 和夫
    • Organizer
      情報理論・情報セキュリティ・ワイドバンドシステム合同研究会
    • Related Report
      2018 Annual Research Report
  • [Presentation] 効率的でフォワード安全な動的検索可能暗号2019

    • Author(s)
      渡邉洋平, 岩本貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 不正検知可能な3入力多数決カードプロトコル2019

    • Author(s)
      安部 芳紀, 山本 翔太, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 4入力多数決を計算する効率的なPrivate PEZプロトコル2019

    • Author(s)
      山本 翔太, 安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Three-Party Private Set Operation Protocols Using Polynomials and OPPRF2019

    • Author(s)
      Wenjia Wang, Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta,
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 非一様ランダム鍵を用いた情報理論的に安全な信頼性の低い調停者付き認証符号について2019

    • Author(s)
      小林大輝, 四方順司
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] エントロピーロスの小さいロバストファジー抽出器の構成に関する一考察2019

    • Author(s)
      山田憲一, 四方順司
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 秘密計算の安全性~プライバシーを保ちつつどこまで計算できるか2018

    • Author(s)
      岩本貢
    • Organizer
      第8回バイオメトリクスと認識・認証シンポジウム(SBRA)
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] いくつかの理想的な秘密分散法を用いた最適な複数割り当て法2018

    • Author(s)
      江利口礼央, 國廣昇, 岩本貢
    • Organizer
      情報理論とその応用シンポジウム (SITA2018)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Implementation and Analysis of Fully Homomorphic Encryption in Wearable Devices2018

    • Author(s)
      Amonrat Prasitsupparote, Yohei Watanabe, and Junji Shikata
    • Organizer
      The Fourth International Conference on Information Security and Digital Forensics (ISDF 2018), The Society of Digital Information and Wireless Communications
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 相関のある情報を用いたMultiple Access Wiretap Channelにおける秘匿通信について2018

    • Author(s)
      小川善功, 田中亮大, 四方順司
    • Organizer
      第21回コンピュータセキュリティシンポジウム(CSS 2018)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Toward Lightweight Authentication: Application of Aggregate MACs for IoT2018

    • Author(s)
      Junji Shikata
    • Organizer
      The 4th French-Japanese Cybersecurity Workshop
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] ロバスト秘密分散法 CFOR 方式における精密な安全性解析2018

    • Author(s)
      鈴木慎之介, 渡邉洋平, 岩本 貢, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] 3 枚のカードで実現可能な 3 入力多数決プロトコ ル2018

    • Author(s)
      黒木慶久, 古賀優太, 渡邉洋平, 岩本 貢, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] カードを用いた複数人でのマッチングプロト コル2018

    • Author(s)
      古賀優太, 鈴木 慎之介, 渡邉 洋平, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Annual Research Report
  • [Presentation] Cooperative Jammingを用いた主通信路に雑音のあるWiretap Channel IIにおける暗号通信について2018

    • Author(s)
      飯塚寛貴, 田中亮大, 四方順司
    • Organizer
      電子情報通信学会, ISEC
    • Related Report
      2017 Annual Research Report
  • [Presentation] Worst-case guessing secrecy is meaningful in secret sharing schemes2017

    • Author(s)
      Mitsugu Iwamoto
    • Organizer
      International Conference on Information Theoretic Security (ICITS)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Broadcast Encryption with Guessing Secrecy2017

    • Author(s)
      Watanabe Yohei
    • Organizer
      International Conference on Information Theoretic Security (ICITS)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations2017

    • Author(s)
      Nakai Takeshi、Shirouchi Satoshi、Iwamoto Mitsugu、Ohta Kazuo
    • Organizer
      International Conference on Information Theoretic Security (ICITS)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Secret sharing schemes under guessing secrecy2017

    • Author(s)
      Mitsugu Iwamoto
    • Organizer
      Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling, Kyushu University.
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 情報理論的安全性 ―さまざまな視点から―2017

    • Author(s)
      岩本貢
    • Organizer
      誤り訂正符号のワークショップ
    • Related Report
      2017 Annual Research Report
    • Invited
  • [Presentation] Wiretap Channel IIにおける能動的攻撃を考慮した暗号通信について2017

    • Author(s)
      田中亮大,四方順司
    • Organizer
      コンピュータセキュリティシンポジウム2017 (CSS2017)
    • Related Report
      2017 Annual Research Report
  • [Presentation] 非一様ランダム鍵を用いた情報理論的に安全な調停者付き認証符号について2017

    • Author(s)
      石川美穂, 四方順司
    • Organizer
      電子情報通信学会, ISEC
    • Related Report
      2017 Annual Research Report
  • [Book] Information Theoretic Security2017

    • Author(s)
      Junji Shikata (ed.)
    • Total Pages
      233
    • Publisher
      Springer-Verlag
    • ISBN
      9783319720890
    • Related Report
      2017 Annual Research Report
  • [Remarks] 岩本・渡邉研究室

    • URL

      https://iw-lab.jp

    • Related Report
      2019 Annual Research Report
  • [Remarks] 電気通信大学 教員総覧

    • URL

      http://kjk.office.uec.ac.jp/Profiles/11/0001044/profile.html

    • Related Report
      2019 Annual Research Report
  • [Remarks] 太田・岩本研究室

    • URL

      http://ohta-lab.jp

    • Related Report
      2018 Annual Research Report
  • [Remarks] 岩本貢ホームページ

    • URL

      http://ohta-lab.jp/users/mitsugu/index.html

    • Related Report
      2018 Annual Research Report
  • [Remarks] 電気通信大学 教員情報

    • URL

      http://kjk.office.uec.ac.jp/Profiles/11/0001044/profile.html

    • Related Report
      2018 Annual Research Report
  • [Remarks] Ohta-Iwamoto Laboratory

    • URL

      http://ohta-lab.jp/member/mitsugu/

    • Related Report
      2017 Annual Research Report
  • [Remarks] Mitsugu Iwamoto's Home Page

    • URL

      http://ohta-lab.jp/users/mitsugu/index.html

    • Related Report
      2017 Annual Research Report

URL: 

Published: 2017-04-28   Modified: 2023-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi