• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Cryptographic Techniques for Both Protecting and Utilizing Confidential Data

Research Project

Project/Area Number 26330151
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionUniversity of Tsukuba

Principal Investigator

NISHIDE Takashi  筑波大学, システム情報系, 准教授 (70570985)

Co-Investigator(Kenkyū-buntansha) 岡本 栄司  筑波大学, システム情報系(名誉教授), 名誉教授 (60242567)
金山 直樹  筑波大学, システム情報系, 助教 (70339696)
Project Period (FY) 2014-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥4,810,000 (Direct Cost: ¥3,700,000、Indirect Cost: ¥1,110,000)
Fiscal Year 2016: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2015: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2014: ¥2,340,000 (Direct Cost: ¥1,800,000、Indirect Cost: ¥540,000)
Keywords暗号 / 情報セキュリティ / 暗号技術 / 情報基礎
Outline of Final Research Achievements

By utilizing cloud environments, we can outsource computer system maintenance, but simultaneously we encounter the risk of disclosing confidential data. Thus it is important to realize countermeasures against such a threat. However, employing encryption techniques simply prevents outsourcing of computation on confidential data.
In this project, we worked on developing cryptographic techniques by which we can outsource and utilize confidential data simultaneously.

Report

(4 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (26 results)

All 2017 2016 2015 2014

All Journal Article (14 results) (of which Int'l Joint Research: 3 results,  Peer Reviewed: 14 results,  Acknowledgement Compliant: 10 results) Presentation (12 results)

  • [Journal Article] Secure Computation Protocols Using Polarizing Cards2016

    • Author(s)
      Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99-A

    • NAID

      130005154234

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability2016

    • Author(s)
      Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto
    • Journal Title

      Journal of Information Processing

      Volume: 24

    • NAID

      130005415008

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Committed AND Protocol Using Three Cards with More Handy Shuffle2016

    • Author(s)
      Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    • Journal Title

      IEEE International Symposium on Information Theory and its Application

      Volume: 1

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards2016

    • Author(s)
      Fangming Zhao, Takashi Nishide
    • Journal Title

      International Conference on Network and System Security, LNCS

      Volume: 9955

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Size-Hiding Computation for Multiple Parties2016

    • Author(s)
      Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    • Journal Title

      Asiacrypt LNCS

      Volume: 10032

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Revocable Decentralized Multi-Authority Functional Encryption2016

    • Author(s)
      Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim
    • Journal Title

      Indocrypt LNCS

      Volume: 10095

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions2016

    • Author(s)
      Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    • Journal Title

      Journal of Information Processing

      Volume: 24

    • NAID

      130005138297

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability2015

    • Author(s)
      Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto
    • Journal Title

      International Conference on IT Convergence and Security

      Volume: 1 Pages: 1-4

    • DOI

      10.1109/icitcs.2015.7293020

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack2015

    • Author(s)
      Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto
    • Journal Title

      International Conference on Security and Cryptography

      Volume: 1 Pages: 39-52

    • DOI

      10.5220/0005539300390052

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Constructions of Fail-Stop Signatures for Multi-signer Setting2015

    • Author(s)
      Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    • Journal Title

      Asia Joint Conference on Information Security

      Volume: 1 Pages: 112-123

    • DOI

      10.1109/asiajcis.2015.26

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Anonymous Encryption with Partial-order Subset Delegation and Its Application in Privacy Email Systems2014

    • Author(s)
      Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi
    • Journal Title

      IET Information Security

      Volume: 8 Issue: 4 Pages: 240-249

    • DOI

      10.1049/iet-ifs.2013.0045

    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Journal Article] 部分的に小さな法を用いたマルチパーティ計算のビット演算効率化2014

    • Author(s)
      加藤遼,西出隆志,吉浦裕
    • Journal Title

      情報処理学会論文誌 (IPSJ)

      Volume: 55

    • NAID

      110009822838

    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Journal Article] Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search2014

    • Author(s)
      Fangming Zhao, Takashi Nishide, Kouichi Sakurai
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E97-D

    • NAID

      130004519275

    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures2014

    • Author(s)
      Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai
    • Journal Title

      13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

      Volume: isbn978-1-4799-6513-7 Pages: 565-574

    • DOI

      10.1109/trustcom.2014.72

    • Related Report
      2014 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Presentation] TEPLA上での内積暗号の実装と評価2017

    • Author(s)
      神原佑輔, 西出隆志
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市)
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 高速復号可能かつ一般的なアクセス構造を実現した属性ベース暗号2016

    • Author(s)
      土田光,金山直樹,西出隆志,岡本栄司
    • Organizer
      情報セキュリティ研究会
    • Place of Presentation
      電気通信大学(東京都調布市)
    • Year and Date
      2016-03-10
    • Related Report
      2015 Research-status Report
  • [Presentation] TEPLAに基づく暗号文/鍵規定型属性ベース暗号の実装2016

    • Author(s)
      長谷川佳祐,金山直樹,西出隆志,岡本栄司
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本(熊本県熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] サイズを隠す多者間プロトコルの実現(不)可能性について2016

    • Author(s)
      品川和雅,縫田光司, 金山直樹,西出隆志,花岡悟一郎, 岡本栄司
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本(熊本県熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] 共通鍵完全準同型暗号を用いた安全なブルームフィルタ2016

    • Author(s)
      小嶋陸大,品川和雅,金山直樹,西出隆志,岡本栄司
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本(熊本県熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] クラウドを用いたワンタイムプログラムとその電子現金への応用2016

    • Author(s)
      北村拓也,品川和雅,金山直樹,西出隆志,岡本栄司
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本(熊本県熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] 隠し共有ストレージ機能を用いた入出力のサイズを隠す二者間秘密計算の実現(不)可能性2015

    • Author(s)
      品川和雅,縫田光司,金山直樹,西出隆志,花岡悟一郎,岡本栄司
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      長崎ブリックホール(長崎県長崎市)
    • Year and Date
      2015-10-21
    • Related Report
      2015 Research-status Report
  • [Presentation] 複数の鍵発行機関が存在可能な関数型暗号に対する失効機能の実現2015

    • Author(s)
      土田光,金山直樹,西出隆志,岡本栄司, Kwangjo Kim
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市小倉北区浅野2-14-2)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 正多角形カードを用いた秘密計算プロトコル2015

    • Author(s)
      品川和雅,水木敬明,縫田光司,金山直樹,西出隆志,岡本栄司
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市小倉北区浅野2-14-2)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 開示者指定グループ署名2015

    • Author(s)
      中川紗菜美,江村恵太,花岡悟一郎,金山直樹,西出隆志,岡本栄司
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市小倉北区浅野2-14-2)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] Supersingularな楕円曲線における効率的Weilペアリング計算手法とその評価2014

    • Author(s)
      田中和磨,照屋唯紀,金山直樹,西出隆志,岡本栄司
    • Organizer
      情報通信システムセキュリティ研究会
    • Place of Presentation
      東北学院大学(宮城県多賀城市中央1-13-1)
    • Year and Date
      2014-11-27 – 2014-11-28
    • Related Report
      2014 Research-status Report
  • [Presentation] 偏光板カードを用いた暗号プロトコル2014

    • Author(s)
      品川和雅,金山直樹,縫田光司,西出隆志,岡本栄司
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市白石区東札幌6条1-1-1)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2018-03-22  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi