• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Game Theoretic Studies on Cryptographic Protocols

Research Project

Project/Area Number 23500010
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionTokyo Institute of Technology

Principal Investigator

TANAKA Keisuke  東京工業大学, 情報理工学(系)研究科, 准教授 (20334518)

Co-Investigator(Kenkyū-buntansha) YASUNAGA Kenji  金沢大学, 電子情報学系, 助教 (50510004)
Project Period (FY) 2011-04-28 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥5,070,000 (Direct Cost: ¥3,900,000、Indirect Cost: ¥1,170,000)
Fiscal Year 2014: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2013: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2012: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2011: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywords暗号理論 / プロトコル / ゲーム理論 / 安全性 / 安全性証明 / 暗号プロトコル / ビットコミットメント / ナッシュ均衡 / マルチパーティー
Outline of Final Research Achievements

We characterize the properties of two-message oblivious transfer protocols by using a game-theoretic concept. Specifically, we present a single two-player game for two-message oblivious transfer in the game-theoretic framework, where it captures the cryptographic properties of correctness and privacy in the presence of malicious adversaries.
In addition we also focus on bit commitment, and study it from a perspective of game theory. In a similar manner to the work on oblivious transfer, we consider bit commitment in the malicious model. In order to naturally capture the security properties of bit commitment, we characterize them with a single game where both parties are rational. In particular, we define a security notion from a game theoretic viewpoint, and prove the equivalence between it and the standard security notion.

Report

(5 results)
  • 2014 Annual Research Report   Final Research Report ( PDF )
  • 2013 Research-status Report
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (24 results)

All 2015 2014 2013 2012 2011 Other

All Journal Article (7 results) (of which Peer Reviewed: 7 results) Presentation (17 results)

  • [Journal Article] Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model2015

    • Author(s)
      Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, Kenji Yasunaga
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98.A Issue: 3 Pages: 853-862

    • DOI

      10.1587/transfun.E98.A.853

    • NAID

      130004770983

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs2013

    • Author(s)
      Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E96.A Issue: 6 Pages: 1100-1111

    • DOI

      10.1587/transfun.E96.A.1100

    • NAID

      10031193795

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees2013

    • Author(s)
      Tatsuya Akutsu, Daiji Fukagawa, Magnus M. Halldorsson, Atsuhiro Takasu, Keisuke Tanaka
    • Journal Title

      Theoretical Computer Science

      Volume: 470 Pages: 10-22

    • DOI

      10.1016/j.tcs.2012.11.017

    • NAID

      120005241356

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] An Efficient Non-interactive Universally Composable String-Commitment Scheme2012

    • Author(s)
      R.Nishimaki, E.Fujisaki, K.Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E95-A Issue: 1 Pages: 167-175

    • DOI

      10.1587/transfun.E95.A.167

    • NAID

      10030534708

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Multi-Trapdoor Commitment Scheme from the RSA Assumption2012

    • Author(s)
      R.Nishimaki, E.Fujisaki, K.Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E95-A Issue: 1 Pages: 176-184

    • DOI

      10.1587/transfun.E95.A.176

    • NAID

      10030534728

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] Information-Theoretic Secrecy with Access to Decryption Oracles2011

    • Author(s)
      C.Portmann, K.Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E94-A Issue: 7 Pages: 1585-1590

    • DOI

      10.1587/transfun.E94.A.1585

    • NAID

      10029803009

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] Programmability in the Generic Ring and Group Models2011

    • Author(s)
      Mario Larangeira, Keisuke Tanaka
    • Journal Title

      Journal of Internet Services and Information Security

      Volume: 1 (2/3) Pages: 57-73

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Presentation] Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks2014

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      ICISC 2014
    • Place of Presentation
      香港
    • Year and Date
      2014-12-16 – 2014-12-17
    • Related Report
      2014 Annual Research Report
  • [Presentation] Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency2014

    • Author(s)
      Yuyu Wang, Keisuke Tanaka
    • Organizer
      ProvSec2014
    • Place of Presentation
      香港
    • Year and Date
      2014-10-09 – 2014-10-10
    • Related Report
      2014 Annual Research Report
  • [Presentation] Strongly Simulation-Extractable Leakage-Resilient NIZK2014

    • Author(s)
      Yuyu Wang, Keisuke Tanaka
    • Organizer
      ACISP 2014
    • Place of Presentation
      Wollongong, Australia
    • Year and Date
      2014-07-07 – 2014-07-10
    • Related Report
      2014 Annual Research Report
  • [Presentation] Correction of samplable additive errors2014

    • Author(s)
      Kenji Yasunaga
    • Organizer
      2014 IEEE International Symposium on Information Theory (ISIT 2014)
    • Place of Presentation
      ハワイ ホノルル
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA20122013

    • Author(s)
      Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
    • Organizer
      Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013
    • Place of Presentation
      San Francisco, USA
    • Related Report
      2012 Research-status Report
  • [Presentation] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs2012

    • Author(s)
      Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      17th Australasian Conference on Information Security and Privacy (ACISP 2012)
    • Place of Presentation
      Wollongong, Australia
    • Related Report
      2012 Research-status Report
  • [Presentation] A Game-Theoretic Perspective on Oblivious Transfer2012

    • Author(s)
      Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
    • Organizer
      17th Australasian Conference on Information Security and Privacy (ACISP 2012)
    • Place of Presentation
      Wollongong, Australia
    • Related Report
      2012 Research-status Report
  • [Presentation] Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability2012

    • Author(s)
      Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka
    • Organizer
      7th International Workshop on Security, IWSEC2012
    • Place of Presentation
      Fukuoka, Japan
    • Related Report
      2012 Research-status Report
  • [Presentation] Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model2012

    • Author(s)
      Mario Larangeira, Keisuke Tanaka
    • Organizer
      13th International Workshop on Information Security Applications, WISA2012
    • Place of Presentation
      Jeju Island, Korea
    • Related Report
      2012 Research-status Report
  • [Presentation] Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity2011

    • Author(s)
      Akinori Kawachi, Christopher Portmann, Keisuke Tanaka
    • Organizer
      5th International Conference on Information Theoretic Security- ICITS 2011
    • Place of Presentation
      CWI (アムステルダム、オランダ)
    • Related Report
      2011 Research-status Report
  • [Presentation] Leakage-Resilient CCA2 Public-Key Encryption from 4-wise independent hash functions2011

    • Author(s)
      Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      2011 International Conference on Advanced Technologies for Communications - ATC 2011
    • Place of Presentation
      Da Nang University of Technology (Da Nang, ベトナム)
    • Related Report
      2011 Research-status Report
  • [Presentation] Weak Oblivious Transfer from Strong One-Way Functions2011

    • Author(s)
      Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
    • Organizer
      5th International Conference on Provable Security - ProvSec 2011
    • Place of Presentation
      Xi'an Tang Cheng Hotel (西安, 中国)
    • Related Report
      2011 Research-status Report
  • [Presentation] Randomness Leakage in the KEM/DEM Framework2011

    • Author(s)
      Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      5th International Conference on Provable Security - ProvSec 2011
    • Place of Presentation
      Xi'an Tang Cheng Hotel (西安, 中国)
    • Related Report
      2011 Research-status Report
  • [Presentation] Grey-Box Public-Key Steganography

    • Author(s)
      Hirotoshi Takebe, Keisuke Tanaka
    • Organizer
      10th Annual Conference on Theory and Applications of Models of Computation (TAMC2013)
    • Place of Presentation
      The University of Hong Kong, Hong Kong
    • Related Report
      2013 Research-status Report
  • [Presentation] Factoring-Based Proxy Re-Encryption Schemes

    • Author(s)
      Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
    • Organizer
      7th International Conference on Provable Security (Provsec2013)
    • Place of Presentation
      Casa del Rio Hotel, Melaka, Malaysia
    • Related Report
      2013 Research-status Report
  • [Presentation] Game-Theoretic Security for Bit Commitment

    • Author(s)
      Haruna Higo, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      8th International Workshop on Security (IWSEC2013)
    • Place of Presentation
      Okinawaken Shichouson Jichikaikan, Okinawa, Japan
    • Related Report
      2013 Research-status Report
  • [Presentation] Attacks to the Proxy Re-Encryption Schemes from IWSEC2011

    • Author(s)
      Toshiyuki Isshiki, ○Manh Ha Nguyen, Keisuke Tanaka
    • Organizer
      8th International Workshop on Security (IWSEC2013)
    • Place of Presentation
      Okinawaken Shichouson Jichikaikan, Okinawa, Japan
    • Related Report
      2013 Research-status Report

URL: 

Published: 2011-08-05   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi