• 研究課題をさがす
  • 研究者をさがす
  • KAKENの使い方
  1. 課題ページに戻る

2014 年度 実績報告書

非理想的実装をも想定した暗号システムの設計と安全性評価

研究課題

研究課題/領域番号 14F04205
研究機関独立行政法人産業技術総合研究所

研究代表者

花岡 悟一郎  独立行政法人産業技術総合研究所, 情報技術研究部門, 研究グループ長 (30415731)

研究分担者 ZHANG ZONGYANG  独立行政法人産業技術総合研究所, 情報技術研究部門, 外国人特別研究員
研究期間 (年度) 2014-04-25 – 2016-03-31
キーワードside-channel attack / public key encryption / cryptographic problem / security reduction
研究実績の概要

We followed the plan in the original application. Overall, we published several papers on international cryptographic conferences and journals, including the flag-ship cryptographic conference ASIACRYPT 2014, and famous security conference SCN 2014. We also attend several conferences and presented our paper. Our main research achievements can be categorized in the following two aspects.
1.We analyzed the security of public key encryption under the side-channel attacks and proposed a stronger security model, i.e., chosen-ciphertext security under post-challenge attacks. We then gave a generic construction to satisfy the security.
2.We analyzed the security of very basic cryptographic problems, called one-more cryptographic problems. We compared their hardness with existing well-known cryptographic problems, and presented black-box separations.
Through the above research, we explore factors affecting perfect implementations, including bad randomness usage and new attacks, find possible approaches to overcome them, and design more secure and efficient cryptographic protocols that are very useful in the design of advanced security systems and are easy to be implemented in practice.

現在までの達成度 (区分)
現在までの達成度 (区分)

2: おおむね順調に進展している

理由

We did research just as the plans in the application. The main reasons are as follows. 1) We already analyzed the security of public key encryption under side channel attacks, and presented stronger security models. This exactly achieved the research purpose. This also laid a good foundation for the further research in this fiscal year. In the meantime, we did some joint research with several researchers from abroad, which will help to complete our research project. 2) In order to collect enough research information and trace the most updated research in our field, Zhang also attended several famous conferences including workshop for real-world crypto. Zhang also had classes in a summer-school to learn updated knowledge about cryptography.

今後の研究の推進方策

The problems of imperfect randomness and side channel attacks also have great influence on real-world cryptographic protocols in existing security infrastructure. To achieve the above objective (b), I intend to analyze globally deployed cryptographic protocols such as SSL/TLS, the IEEE wireless communication standards (WPA, WPA2) and SSH, disk encryption (including BitLocker, TrueCrypt, and FileVault). I plan to provide a formal analysis of these cryptographic protocols in an appropriate security model, highlight potential weaknesses (especially with respect to weak randomness and side-channel attacks), develop improved protocol specifications supported by formal security arguments, and securely implement them in the real world. This research is an extension and application of the research in previous year. I intend to further apply the above research results to real-world applications, e.g., privacy-preserving database search, which is closely related to a project applied by my host researcher. I plan to design cryptographic protocols that on one hand achieve advanced functionalities for database search, and on the other hand, satisfy higher security guarantees even against imperfect randomness and side-channel attacks. In addition, I will analyze the main bottleneck that affects efficiency and find appropriate techniques to bypass the bottleneck.

  • 研究成果

    (14件)

すべて 2015 2014

すべて 雑誌論文 (7件) (うち査読あり 7件、 オープンアクセス 7件、 謝辞記載あり 7件) 学会発表 (7件) (うち招待講演 3件)

  • [雑誌論文] Post-Challenge Leakage in Public-Key Encryption2015

    • 著者名/発表者名
      Zongyang Zhang, Sherman S.M. Chow and Zhenfu Cao
    • 雑誌名

      Theoretical Computer Science

      巻: 572 ページ: 25-49

    • DOI

      10.1016/j.tcs.2015.01.010

    • 査読あり / オープンアクセス / 謝辞記載あり
  • [雑誌論文] Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More2015

    • 著者名/発表者名
      Yu Chen, Qiong Huang and Zongyang Zhang
    • 雑誌名

      International Journal of Information Security

      巻: なし

    • DOI

      10.1007/s10207-015-0274-0

    • 査読あり / オープンアクセス / 謝辞記載あり
  • [雑誌論文] Publicly Evaluable Pseudorandom Functions and Its Applications2014

    • 著者名/発表者名
      Yu Chen and Zongyang Zhang
    • 雑誌名

      Lecture Notes in Computer Science

      巻: 8632 ページ: 115-134

    • DOI

      10.1007/978-3-319-10879-7_8

    • 査読あり / オープンアクセス / 謝辞記載あり
  • [雑誌論文] All-but-One Dual Projective Hashing and Its Applications2014

    • 著者名/発表者名
      Zongyang Zhang, Yu Chen , Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
    • 雑誌名

      Lecture Notes in Computer Science Volume

      巻: 8479 ページ: 181-198

    • DOI

      10.1007/978-3-319-07536-5_12

    • 査読あり / オープンアクセス / 謝辞記載あり
  • [雑誌論文] Constant-Round Adaptive Zero-Knowledge Proofs for NP2014

    • 著者名/発表者名
      Zongyang Zhang, Zhenfu Cao and Haojin Zhu
    • 雑誌名

      Information Science

      巻: 261 ページ: 219-236

    • DOI

      doi:10.1016/j.ins.2013.07.037

    • 査読あり / オープンアクセス / 謝辞記載あり
  • [雑誌論文] Black-Box Separations for One-More (Static) CDH and Its Generalization2014

    • 著者名/発表者名
      Jiang Zhang, Zhenfeng Zhang, Yu Chen , Yanfei Guo and Zongyang Zhang
    • 雑誌名

      Lecture Notes in Computer Science Volume

      巻: 8874 ページ: 366-385

    • DOI

      10.1007/978-3-662-45608-8_20

    • 査読あり / オープンアクセス / 謝辞記載あり
  • [雑誌論文] Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited2014

    • 著者名/発表者名
      Yu Chen, Qiong Huang, Zongyang Zhang
    • 雑誌名

      Lecture Notes in Computer Science

      巻: 8544 ページ: 274-289

    • DOI

      10.1007/978-3-319-08344-5_18

    • 査読あり / オープンアクセス / 謝辞記載あり
  • [学会発表] Black-Box Separations for One-More (Static) CDH and Its Generalization2015

    • 著者名/発表者名
      Jiang Zhang, Zhenfeng Zhang, Yu Chen , Yanfei Guo and Zongyang Zhang
    • 学会等名
      情報セキュリティ研究会 (ISEC)
    • 発表場所
      機械振興会館・東京
    • 年月日
      2015-05-15 – 2015-05-15
    • 招待講演
  • [学会発表] Black-Box Separations for One-More (Static) CDH and Its Generalization2015

    • 著者名/発表者名
      Jiang Zhang, Zhenfeng Zhang, Yu Chen , Yanfei Guo and Zongyang Zhang
    • 学会等名
      第8回公開鍵暗号の安全な構成とその応用ワークショップ
    • 発表場所
      産業技術総合研究所 臨海副都心センター 別館(バイオ・IT融合研究棟) ・東京
    • 年月日
      2015-02-20 – 2015-02-20
    • 招待講演
  • [学会発表] Black-Box Separations in the Non-Programmable Random Oracle Model: The Cases of Hash-and-Sign Signatures2015

    • 著者名/発表者名
      Zongyang Zhang, Yu Chen , Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
    • 学会等名
      SCIS2015 暗号と情報セキュリティシンポジウム
    • 発表場所
      リーガロイヤルホテル小倉・福岡県北九州市小倉北区
    • 年月日
      2015-01-20 – 2015-01-23
    • 招待講演
  • [学会発表] Black-Box Separations for One-More (Static) CDH and Its Generalization2014

    • 著者名/発表者名
      Jiang Zhang, Zhenfeng Zhang, Yu Chen , Yanfei Guo and Zongyang Zhang
    • 学会等名
      The 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014)
    • 発表場所
      The Ambassador Hotel Kaohsiung・Kaoshiung ・Taiwan
    • 年月日
      2014-12-07 – 2014-12-11
  • [学会発表] Publicly Evaluable Pseudorandom Functions and Its Applications2014

    • 著者名/発表者名
      Yu Chen and Zongyang Zhang
    • 学会等名
      The 9th Conference on Security and Cryptography for Networks (SCN 2014)
    • 発表場所
      Hotel La Bussola・Amalfi・ Italy
    • 年月日
      2014-09-03 – 2014-09-05
  • [学会発表] Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More2014

    • 著者名/発表者名
      Yu Chen, Qiong Huang, Zongyang Zhang
    • 学会等名
      The 19th Australasian Conference on Information Security and Privacy (ACISP 2014)
    • 発表場所
      University of Wollongong (Building 20 Lecture Theatre 3)・Wollongong・Australia
    • 年月日
      2014-07-07 – 2014-07-09
  • [学会発表] All-but-One Dual Projective Hashing and Its Applications2014

    • 著者名/発表者名
      Zongyang Zhang, Yu Chen , Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
    • 学会等名
      The 12th International Conference on Applied Cryptography and Network Security (ACNS 2014)
    • 発表場所
      SwissTech Convention Center・Lausanne・ Switzerland
    • 年月日
      2014-06-10 – 2014-06-13

URL: 

公開日: 2016-06-01  

サービス概要 検索マニュアル よくある質問 お知らせ 利用規程 科研費による研究の帰属

Powered by NII kakenhi