• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Information Theoretic Cryptography with Statistical Cheating Detection and Its Applications

Research Project

Project/Area Number 23760330
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Communication/Network engineering
Research InstitutionThe University of Electro-Communications

Principal Investigator

IWAMOTO Mitsugu  電気通信大学, 先端領域教育研究センター, 准教授 (50377016)

Project Period (FY) 2011 – 2013
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2013: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2012: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2011: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords不正検知 / 情報理論的安全性 / 情報理論的暗号 / 秘密分散法 / 視覚復号型秘密分散法 / ケルクホフスの原理 / なりすまし攻撃 / 仮説検定 / 符号化定理 / 統計的手法 / 暗号プロトコル
Research Abstract

In this research, we investigated the way of detecting cheating in information theoretic cryptography. In particular, we clarified that the trade-off between share size and the exponent of the success probability in impersonation attack on (2,2)-threshold secret sharing schemes. This result implies how we can easily detect the impersonation by making each share redundant. In addition, we proposed a method of preventing the cheating in visual secret sharing schemes (VSSS). We also discussed how to cheat the visual secret sharing schemes in a practical setting by focusing on the situation where VSSS is decrypted without computers. Other than the above, we clarified several fundamental results on information theoretic cryptography.

Report

(4 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (45 results)

All 2014 2013 2012 2011 Other

All Journal Article (6 results) (of which Peer Reviewed: 6 results) Presentation (33 results) (of which Invited: 2 results) Book (1 results) Remarks (5 results)

  • [Journal Article] Variety enhancement of PUF responses using the locations of random outputting RS latches2013

    • Author(s)
      D. Yamamoto, K. Sakiyama, M. Iwamoto , K. Ohta, M. Takenaka, and K. Itoh
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: not assigned Issue: 4 Pages: 1-15

    • DOI

      10.1007/s13389-012-0044-0

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Coding theorems for a (2,2)-threshold scheme with detectability of impersonation attacks2012

    • Author(s)
      M. Iwamoto , H. Koga, and H. Yamamoto
    • Journal Title

      IEEE Trans. on Information Theory

      Volume: 58 Issue: 9 Pages: 6194-6206

    • DOI

      10.1109/tit.2012.2204546

    • NAID

      120007137219

    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] A cheating prevention EVC scheme using watermarking techniques2012

    • Author(s)
      A. E. Torujillo, M. N. Miyatake, M. Iwamoto, and H. P. Maena
    • Journal Title

      Revista Facultad de Ingenieria, Univ. Antioquia

      Volume: no.63, pp. 30–42

    • URL

      http://www.redalyc.org/pdf/430/43025100003.pdf

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] A weak security notion for visual secret sharing schemes2012

    • Author(s)
      M. Iwamoto
    • Journal Title

      IEEE Trans. on Information Forensics and Security

      Volume: vol. 7, no. 2 Issue: 2 Pages: 372-382

    • DOI

      10.1109/tifs.2011.2170975

    • Related Report
      2013 Final Research Report 2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] A cheating prevention EVC scheme using watermarking techniques2012

    • Author(s)
      A. E. Torujillo, M. N. Miyatake, M. Iwamoto , and H. P. Maena
    • Journal Title

      Revista Facultad de Ingenieria

      Volume: 63 Pages: 30-42

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Information-Theoretic Approach to Optimal Differential Fault Analysis2012

    • Author(s)
      K. Sakiyama, Y. Li, M. Iwamoto, and K. Ohta,
    • Journal Title

      IEEE Trans. on Information Forensics and Security

      Volume: 7 Pages: 109-120

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Presentation] 自動タイブレークの仕組みを持つ第M+1価格暗号オークション方式2014

    • Author(s)
      西出隆志,岩本貢,岩崎敦,太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2014)
    • Year and Date
      2014-01-22
    • Related Report
      2013 Final Research Report
  • [Presentation] Cheating on Visual Secret Sharing Schemes in Practical Setting2014

    • Author(s)
      P. Lumyong, M. Iwamoto, and K. Ohta
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2014)
    • Year and Date
      2014-01-21
    • Related Report
      2013 Final Research Report
  • [Presentation] ハッシュ関数に対する制限付き誕生日識別攻撃---誕生日下界を上回る衝突攻撃の識別攻撃に対する有効性2014

    • Author(s)
      岩本貢,佐々木悠
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館,東京都
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] Cheating on Visual Secret Sharing Schemes in Practical Setting2014

    • Author(s)
      Pichanee Lumyong, Mitsugu Iwamoto and Kazuo Ohta
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS)
    • Place of Presentation
      城山観光ホテル,鹿児島県
    • Related Report
      2013 Annual Research Report
  • [Presentation] Information theoretic security for encryption based on conditional Rényi entropies2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      Proc. of International Conference on Information Theoretic Security (ICITS)
    • Year and Date
      2013-11-28
    • Related Report
      2013 Final Research Report
  • [Presentation] Information Theoretic Analysis of a t-resilient First-Price Auction Protocol2013

    • Author(s)
      M. Iwamoto, K. Ohara, Y. Sakai, and K. Ohta
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2013)
    • Year and Date
      2013-01-25
    • Related Report
      2013 Final Research Report
  • [Presentation] Revisiting Conditional Rényi Entropy and its Application to Encryption : Part I—Properties of Conditional RÅLenyi Entropy—2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2013)
    • Year and Date
      2013-01-22
    • Related Report
      2013 Final Research Report
  • [Presentation] Revisiting Conditional Rényi Entropy and its Application to Encryption : Part II—Fano's Inequality and Shannon's Bound—2013

    • Author(s)
      J. Shikata and M. Iwamoto
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2013)
    • Year and Date
      2013-01-22
    • Related Report
      2013 Final Research Report
  • [Presentation] Security notions of visual secret sharing schemes2013

    • Author(s)
      M. Iwamoto
    • Organizer
      International Workshop on Advanced Image Technology (IWAIT2013)
    • Year and Date
      2013-01-07
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Invited
  • [Presentation] Limited-birthday distinguishers for hash functions --collisions beyond the birthday bound can be meaningful2013

    • Author(s)
      Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki
    • Organizer
      ASIACRYPT2013
    • Place of Presentation
      Bangalore, India
    • Related Report
      2013 Annual Research Report
  • [Presentation] Information theoretic security for encryption based on conditional Rényi entropies2013

    • Author(s)
      Mitsugu Iwamoto and Junji Shikata
    • Organizer
      International Symposium on Information Theoretic Security (ICITS)
    • Place of Presentation
      Nanyang Technological University, Singapore
    • Related Report
      2013 Annual Research Report
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part I --Properties of Conditional Renyi Entropy-2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2013)
    • Place of Presentation
      京都府
    • Related Report
      2012 Research-status Report
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part II --ano’s Inequality and Shannon’s Bound--2013

    • Author(s)
      J. Shikata and M. Iwamoto
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2013)
    • Place of Presentation
      京都府
    • Related Report
      2012 Research-status Report
  • [Presentation] PUF 出力の一部を用いるパターン照合鍵生成システムの安全性2013

    • Author(s)
      駒野雄一,太田和夫,崎山一男,岩本貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2013)
    • Place of Presentation
      京都府
    • Related Report
      2012 Research-status Report
  • [Presentation] レスポンス数の向上手法を適用 したラッチ PUF の ASIC 実装評価2013

    • Author(s)
      山本大,崎山一男,岩本貢 , 太田和夫 , 武仲正彦 , 伊藤孝一 , 鳥居直哉
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2013)
    • Place of Presentation
      京都府
    • Related Report
      2012 Research-status Report
  • [Presentation] 巡回シフトを用 いた PUF に基づくパターン照合鍵生成システムの実装評価2013

    • Author(s)
      岩井祐樹 , 福島崇文 , 森山大輔 , 松尾真一郎 , 駒野雄一 , 岩本貢 , 太田和夫 , 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2013)
    • Place of Presentation
      京都府
    • Related Report
      2012 Research-status Report
  • [Presentation] CC-EMA と CEMA の攻撃性能の比較2013

    • Author(s)
      中曽根俊貴 , 李陽 , 佐々木悠 , 岩本貢 , 太田和夫 , 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2013)
    • Place of Presentation
      京都府
    • Related Report
      2012 Research-status Report
  • [Presentation] formation Theoretic Analysis of a t -resilient First-Price Auction Protocol2013

    • Author(s)
      M. Iwamoto , K. Ohara, Y. Sakai, and K. Ohta
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2013)
    • Place of Presentation
      京都府
    • Related Report
      2012 Research-status Report
  • [Presentation] しきい値法の一般化とその構成法2012

    • Author(s)
      岩本貢
    • Organizer
      電子情報通信学会総合大会
    • Year and Date
      2012-03-22
    • Related Report
      2013 Final Research Report
  • [Presentation] 情報理論的に安全なFirst-Priceオークションプロトコル2012

    • Author(s)
      大原一真,坂井祐介,岩本貢,太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2012)
    • Year and Date
      2012-01-31
    • Related Report
      2013 Final Research Report
  • [Presentation] Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher2012

    • Author(s)
      T. Nakasone, Y. Li, Y. Sasaki, M. Iwamoto , K. Ohta, and K. Sakiyama
    • Organizer
      International Conference on Information Security and Cryptography (ICISC2012) ,
    • Place of Presentation
      Seoul, Korea
    • Related Report
      2012 Research-status Report
  • [Presentation] A t-resilient Unconditionally Secure First-Price Auction Protocol2012

    • Author(s)
      K. Ohara, Y. Sakai, M. Iwamoto, and K. Ohta
    • Organizer
      IWSEC2012 (poster session)
    • Place of Presentation
      Fukuoka, Japan
    • Related Report
      2012 Research-status Report
  • [Presentation] PUF を用いるパターン照合鍵生成方法の改良2012

    • Author(s)
      駒野雄一,太田和夫,崎山一男,岩本貢
    • Organizer
      2012 年電 子情報通信学会総合大会
    • Place of Presentation
      岡山大学
    • Related Report
      2011 Research-status Report
  • [Presentation] しきい値法の一般化とその構成法2012

    • Author(s)
      岩本貢
    • Organizer
      電子情報通信学会総合大会(公募セッション:ネットワー ク符号加法と秘密分散法)
    • Place of Presentation
      岡山大学
    • Related Report
      2011 Research-status Report
  • [Presentation] 情報理論的に安全なFirst-Price オークションプロトコル2012

    • Author(s)
      大原一真, 坂井祐介, 岩本貢, 太田和夫
    • Organizer
      暗号 と情報セキュリティシンポジウム
    • Place of Presentation
      金沢
    • Related Report
      2011 Research-status Report
  • [Presentation] PUF を用いる証明可能安全なパターン照合鍵生成方法2012

    • Author(s)
      駒野雄一, 太田和夫, 崎山一男, 岩本貢
    • Organizer
      暗号 と情報セキュリティシンポジウム
    • Place of Presentation
      金沢
    • Related Report
      2011 Research-status Report
  • [Presentation] Security Notions for Information Theoretically Secure Encryptions2011

    • Author(s)
      M. Iwamoto and K. Ohta
    • Organizer
      IEEE–ISIT 2011
    • Year and Date
      2011-08-04
    • Related Report
      2013 Final Research Report
  • [Presentation] 共通鍵暗号方式における情報理論的安全性と計算量的安全性の関係2011

    • Author(s)
      岩本貢,太田和夫
    • Organizer
      電子情報通信学会研究会研究報告
    • Year and Date
      2011-05-20
    • Related Report
      2013 Final Research Report
  • [Presentation] Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches2011

    • Author(s)
      D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, T. Ochiai, M. Takenaka, and K. Itoh
    • Organizer
      CHES2012
    • Place of Presentation
      Nara, Japan
    • Related Report
      2011 Research-status Report
  • [Presentation] Security Notions for Information Theoretically Secure Encryptions2011

    • Author(s)
      M. Iwamoto and K. Ohta
    • Organizer
      IEEE ISIT2011
    • Place of Presentation
      St. Petersburg, Russia
    • Related Report
      2011 Research-status Report
  • [Presentation] Variations of Information Theoretic Security Notions2011

    • Author(s)
      M. Iwamoto and K. Ohta
    • Organizer
      7-th Asia-Europe Workshop on Information Theory (AEW7)
    • Place of Presentation
      Boppard, Germany
    • Related Report
      2011 Research-status Report
  • [Presentation] Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches2011

    • Author(s)
      山本大, 崎山一男, 岩本貢, 太田和夫, 落合隆夫, 武仲正彦, 伊藤孝一
    • Organizer
      電子情報通信学会情報 セキュリティ研究会(招待講演)
    • Place of Presentation
      東京
    • Related Report
      2011 Research-status Report
  • [Presentation] 共通鍵暗号方式における情報理論的安全性と計算量的安全性の関係2011

    • Author(s)
      岩本貢, 太田和夫
    • Organizer
      電子情報通 信学会研究会研究報告
    • Place of Presentation
      大阪
    • Related Report
      2011 Research-status Report
  • [Book] 情報理論--基礎と広がり--2012

    • Author(s)
      Thomas M. Cover and Joy A. Thomas (著)山本 博資,古賀 弘樹,有村 光晴,岩本貢 (訳)
    • Total Pages
      560
    • Publisher
      共立出版
    • Related Report
      2012 Research-status Report
  • [Remarks] 研究成果等

    • URL

      http://ohta-lab.jp/member/mitsugu/

    • Related Report
      2013 Final Research Report
  • [Remarks] 研究成果等

    • URL

      http://ohta-lab.jp/users/mitsugu/index.html

    • Related Report
      2013 Final Research Report
  • [Remarks] 研究成果等

    • URL

      http://www.ghrdp.uec.ac.jp

    • Related Report
      2013 Final Research Report
  • [Remarks] 太田岩本研究室ホームページ

    • URL

      http://ohta-lab.jp/member/mitsugu/

    • Related Report
      2012 Research-status Report
  • [Remarks] 電気通信大学 若手研究者グローバル人材育成プログラム

    • URL

      http://www.ghrdp.uec.ac.jp

    • Related Report
      2012 Research-status Report

URL: 

Published: 2011-08-05   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi