• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2013 Fiscal Year Final Research Report

Information Theoretic Cryptography with Statistical Cheating Detection and Its Applications

Research Project

  • PDF
Project/Area Number 23760330
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Communication/Network engineering
Research InstitutionThe University of Electro-Communications

Principal Investigator

IWAMOTO Mitsugu  電気通信大学, 先端領域教育研究センター, 准教授 (50377016)

Project Period (FY) 2011 – 2013
Keywords不正検知 / 情報理論的安全性 / 情報理論的暗号 / 秘密分散法 / 視覚復号型秘密分散法
Research Abstract

In this research, we investigated the way of detecting cheating in information theoretic cryptography. In particular, we clarified that the trade-off between share size and the exponent of the success probability in impersonation attack on (2,2)-threshold secret sharing schemes. This result implies how we can easily detect the impersonation by making each share redundant. In addition, we proposed a method of preventing the cheating in visual secret sharing schemes (VSSS). We also discussed how to cheat the visual secret sharing schemes in a practical setting by focusing on the situation where VSSS is decrypted without computers. Other than the above, we clarified several fundamental results on information theoretic cryptography.

  • Research Products

    (17 results)

All 2014 2013 2012 2011 Other

All Journal Article (3 results) (of which Peer Reviewed: 3 results) Presentation (11 results) (of which Invited: 1 results) Remarks (3 results)

  • [Journal Article] Coding theorems for a (2, 2)-threshold scheme with detectability of impersonation attacks2012

    • Author(s)
      M. Iwamoto, H. Koga, and H. Yamamoto
    • Journal Title

      IEEE Trans. on Information Theory

      Volume: vol.58, no.9 Pages: 6194-6206

    • DOI

      10.1109/TIT.2012.2204546

    • Peer Reviewed
  • [Journal Article] A cheating prevention EVC scheme using watermarking techniques2012

    • Author(s)
      A. E. Torujillo, M. N. Miyatake, M. Iwamoto, and H. P. Maena
    • Journal Title

      Revista Facultad de Ingenieria, Univ. Antioquia

      Volume: no.63, pp. 30–42

    • URL

      http://www.redalyc.org/pdf/430/43025100003.pdf

    • Peer Reviewed
  • [Journal Article] A weak security notion for visual secret sharing schemes2012

    • Author(s)
      M. Iwamoto
    • Journal Title

      IEEE Trans. on Information Forensics and Security

      Volume: vol. 7, no. 2 Pages: 372-382

    • DOI

      10.1109/TIFS.2011.2170975

    • Peer Reviewed
  • [Presentation] 自動タイブレークの仕組みを持つ第M+1価格暗号オークション方式2014

    • Author(s)
      西出隆志,岩本貢,岩崎敦,太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2014)
    • Year and Date
      2014-01-22
  • [Presentation] Cheating on Visual Secret Sharing Schemes in Practical Setting2014

    • Author(s)
      P. Lumyong, M. Iwamoto, and K. Ohta
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2014)
    • Year and Date
      2014-01-21
  • [Presentation] Information theoretic security for encryption based on conditional Rényi entropies2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      Proc. of International Conference on Information Theoretic Security (ICITS)
    • Year and Date
      2013-11-28
  • [Presentation] Information Theoretic Analysis of a t-resilient First-Price Auction Protocol2013

    • Author(s)
      M. Iwamoto, K. Ohara, Y. Sakai, and K. Ohta
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2013)
    • Year and Date
      2013-01-25
  • [Presentation] Revisiting Conditional Rényi Entropy and its Application to Encryption : Part I—Properties of Conditional RÅLenyi Entropy—2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2013)
    • Year and Date
      2013-01-22
  • [Presentation] Revisiting Conditional Rényi Entropy and its Application to Encryption : Part II—Fano's Inequality and Shannon's Bound—2013

    • Author(s)
      J. Shikata and M. Iwamoto
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2013)
    • Year and Date
      2013-01-22
  • [Presentation] Security notions of visual secret sharing schemes2013

    • Author(s)
      M. Iwamoto
    • Organizer
      International Workshop on Advanced Image Technology (IWAIT2013)
    • Year and Date
      2013-01-07
    • Invited
  • [Presentation] しきい値法の一般化とその構成法2012

    • Author(s)
      岩本貢
    • Organizer
      電子情報通信学会総合大会
    • Year and Date
      2012-03-22
  • [Presentation] 情報理論的に安全なFirst-Priceオークションプロトコル2012

    • Author(s)
      大原一真,坂井祐介,岩本貢,太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2012)
    • Year and Date
      2012-01-31
  • [Presentation] Security Notions for Information Theoretically Secure Encryptions2011

    • Author(s)
      M. Iwamoto and K. Ohta
    • Organizer
      IEEE–ISIT 2011
    • Year and Date
      2011-08-04
  • [Presentation] 共通鍵暗号方式における情報理論的安全性と計算量的安全性の関係2011

    • Author(s)
      岩本貢,太田和夫
    • Organizer
      電子情報通信学会研究会研究報告
    • Year and Date
      2011-05-20
  • [Remarks] 研究成果等

    • URL

      http://ohta-lab.jp/member/mitsugu/

  • [Remarks] 研究成果等

    • URL

      http://ohta-lab.jp/users/mitsugu/index.html

  • [Remarks] 研究成果等

    • URL

      http://www.ghrdp.uec.ac.jp

URL: 

Published: 2015-06-25  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi