太田 和夫《研究成果》
2002年までの研究成果はこちら(旧サイトへ)
著書(分担執筆)
学術論文(査読あり)
- Yusuke Sakai, Keita Emura, Jacob Schuldt, Goichiro Hanaoka, Kazuo Ohta, “Constructions of Dynamic and Non-dynamic Threshold Public-key Encryption Schemes with Decryption Consistency,” Theoretical Computer Science. 再録決定 ISSN:0304-3975 (http://www.journals.elsevier.com/theoretical-computer-science/).
- Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro, “A Limitation on Security Evaluation of Cryptographic Primitives with Fixed Keys,” Security and Communication Networks (http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122).
- 中曽根俊貴, 李陽, 岩本貢, 太田和夫, 﨑山一男, “クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵”, 電子情報通信学会論文誌(A), (2014)
- Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki, “A Silicon-level ountermeasure against Fault Sensitivity Analysis and Its Evaluation”, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., (2014).
- Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker, “Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest”, J. Cryptographic Engineering, 4/ 1, pp.1-16, (Apr., 2014).
- Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta, “Practical DFA Strategy for AES Under Limited-Access Conditions”, Journal of Information Processing, 22/ 2, pp.142-151, (Feb., 2014).
- Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, and Kouichi Itoh, “Variety Enhancement of PUF Responses Using the Locations of Random Outputting RS Latches”, J. Cryptographic Engineering, 3/ 4, pp.197-211, (Nov., 2013).
- Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “A New Type of Fault-Based Attack: Fault Behavior Analysis”, IEICE Trans. Fundam. Electron. Commun Comput. Sci., A96-A/ 1, pp.177-184, (Jan., 2013).
- Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta, “Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E96-A(1), pp.53-67, (Jan., 2013).
- 小池彩歌, 李陽, 中津大介, 太田和夫, 崎山一男, “複数の要因に対する新たな故障感度解析”, 電子情報通信学会論文誌(A), J95-A,/ 10, pp.751-755, (Oct., 2012).
- Mebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta:
“Proxiable Designated Verifier Signature,” Information and Media Technologies 6 (4): 1164-1174 (2011), reprinted from: Journal of Information Processing 19: 430-440 (2011).
- Miroslav Knežević, Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Akashi Satoh, Unal Kocabaş, Junfeng Fan, Toshihiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, and Takafumi Aoki, “Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates,” to appear in IEEE Transactions on VLSI, 13 pages, 2011.
- Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta, “Power Analysis against a DPA-resistant S-box Implementation Based on the Fourier Transform,” IEICE Trans. Fundamentals, Vol.A94-A, No.1, pp.191-199, (Jan., 2011).
- Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka, “An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness,” IEICE Trans. Fundamentals, Vol.A94-A, No.1, pp.92-103, (Jan., 2011).
- Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, and Noboru Kunihiro, “Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC,” IEICE Trans. Inf. & Syst., Vol.E93-D, No.5, pp.1087-1095, (May., 2010).
- Kazuo Sakiyama and Kazuo Ohta, “On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL,” IEICE Trans. Fundamentals, Vol.E93-A, No.1, pp.172-179, (Jan., 2010).
解説論文
- 﨑山 一男, 太田 和夫, “暗号への脅威「サイドチャネル攻撃」とその対策,”「科学」報告・解説, 岩波書店, Vol.78, No.10, pp.1080-1083, (2008年10月).
国際会議プロシーディングス等(査読あり)
- M. Iwamoto, T. Omino, Y. Komano, and K. Ohta, “A New Model of Client–Server Communications under Information Theoretic Security,” IEEE Information Theory Workshop (ITW2014), to appear (Nov., 2014).
- P. Lumyong, M. Iwamoto, and K. Ohta, “Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario,” International Symposium on Information Theory and Its Applications (ISITA2014), to appear (Oct., 2014).
- Kazuma Ohara, Yusuke Sakai, Fumiaki Yoshida, Mitsugu Iwamoto, Kazuo Ohta, “Privacy-preserving smart metering with verifiability for both billing and energy management,” ASIAPKC’14, Proceedings of the 2nd ACM Wookshop on ASIA Public-Key Cryptography, June 3, 2014, Kyoto, Japan, pp.23-32.
- Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta, “Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions”, International Conference on Applied Cryptography and Network Security (ACNS 2014), LNCS/ Springer-Verlag, pp.235-252, (Jun., 2014).
- Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama, “Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum” Annual International Conference on the Theory and Applications of Cryptology (Africacrypt 2014), Lecture Notes in Computer Science (LNCS) – Springer (to appear), May. 2014.
- Li Yang, Kazuo Ohta, and Kazuo Sakiyama, “Revisit Fault Sensitivity Analysis on WDDL-AES,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’11), IEEE, pp.XX-YY, (to appear in Jun., 2011).
- Yoshikazu Hanatani, Miyako Ohkubo, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta, “A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication,” In Proc. Real-Life Cryptographic Protocols and Standarization (RLCPS’11), LNCS ZZZZ, Springer-Verlag, pp.XXX-YYY, (Feb., 2011).
- Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, and Kazuo Sakiyama, “(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach,” In Proc. RSA Conference 2011, Cryptographer’s Track (CT-RSA’11), LNCS 6558, Springer-Verlag, pp.197-212, (Mar., 2011).
- Yu Sasaki, Li Yang, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “New Approach of Super-Sbox Analysis on AES-Based Permutations: Applications to ECHO and Grostl,” In Proc. Advances in Cryptology — ASIACRYPT’10, LNCS 6477, Springer-Verlag, pp.38-55, (Dec., 2010).
- Junko Takahashi, Toshinori Fukunaga, and Kazuo Sakiyama, “Fault Analysis on Stream Cipher MUGI,” In Proc. International Conference on Information Security and Cryptology (ICISC’10), LNCS XXXX, Springer-Verlag, pp.YYY-ZZZ, (Dec. 2010).
- Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta, “Rigorous Security Requirements for Designated Verifier Signatures,” Inscrypt 2010: 318-335, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6584, Springer 2011, ISBN 978-3-642-21517-9.
- Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama, “Proxiable Designated Verifier Signature,” SECRYPT 2010: 344-353, Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE – The International Joint Conference on e-Business and Telecommunications. SciTePress 2010, ISBN 978-989-8425-18-8.
- Daisuke Nakatsu, Li Yang, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’10), LNCS 6513, Springer-Verlag, pp.258-272, (Aug., 2010).
- Li Yang, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitive Analysis,” In Proc. Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320-334, (Aug., 2010).
- Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knežević, Eric Xu Guo, Shin’ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Unal Kocabaş, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama and Kazuo Ohta, “Prototyping Platform for Performance Evaluation of SHA-3 Candidates,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’10), IEEE, pp.60-63, (Jun., 2010).
- Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059-1064, (Mar., 2010).
- Masami Izumi, Jun Ikegami, Kazuo Sakiyama and Kazuo Ohta, “Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.981-984, (Mar., 2010).
- Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of An ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” In Proc. RSA Conference 2010, Cryptographer’s Track (CT-RSA’10), LNCS 5985, Springer-Verlag, pp.284-301, (Mar., 2010).
学会口頭発表(上記以外のもの, 査読なし)
- 徳重佑樹,花谷嘉一,岩本貢,太田和夫,”グループ認証付鍵交換プロトコルの weak-SK-secure 性の形式検証,” 2016年 暗号と情報セキュリティシンポジウム (SCIS2016), 1A1-2, (Jan., 2016).
- 平野貴人,川合豊,太田和夫,岩本貢,”共通鍵暗号型の秘匿部分一致検索(その1),” 2016年 暗号と情報セキュリティシンポジウム (SCIS2016), 2A1-4, (Jan., 2016).
- 早坂健一郎,川合豊,平野貴人,太田和夫,岩本貢,”共通鍵暗号型の秘匿部分一致検索(その2),” 2016年 暗号と情報セキュリティシンポジウム (SCIS2016), 2A1-5, (Jan., 2016).
- 鴨志田優一,岩本貢,太田和夫,”Joux-Lucksのマルチコリジョン探索アルゴリズムのMicroMintへの応用,” 2016年 暗号と情報セキュリティシンポジウム (SCIS2016), 3D1-3, (Jan., 2016).
- 三澤裕人,徳重佑樹,岩本貢,太田和夫,”人間向け暗号/認証プロトコルの統一的安全性評価,” 2016年 暗号と情報セキュリティシンポジウム (SCIS2016), 3E3-5, (Jan., 2016).
- 中井雄士,三澤裕人,徳重佑樹,岩本貢,太田和夫,”カード操作の分類とカードベース暗号プロトコル,” 2016年 暗号と情報セキュリティシンポジウム (SCIS2016), 4A2-2, (Jan., 2016).
- 三澤裕人, 徳重佑樹,岩本貢,太田和夫,”ブロックサインの安全性に対するコードブックの影響,”コンピュータセキュリティシンポジウム2015(CSS2015),3C2-2,8 pages,2015年10月,長崎県.
- 徳重佑樹,三澤裕人, 吉田文晶, 上床昌也, 岩本貢,太田和夫,”物理的復元が容易な音響秘密分散法,” 電子情報通信学会マルチメディア情報ハイディング・エンリッチメント研究会 (EMM),6 pages, 2015年5月,京都府.
- Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta, “Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions” International Conference on Applied Cryptography and Network Security (ACNS 2014), Lecture Notes in Computer Science (LNCS) – Springer (to appear), Jun. 2014. (予定)
- 内藤祐介(三菱電機), 米山一樹(NTT), 太田和夫(電気通信大学), “マルチステージゲームでのランダムオラクルとの置き換えの再考,” 暗号と情報セキュリティシンポジウム(SCIS2014), 2B4-1, 2014.
- 平野貴人(三菱電機株式会社), 伊藤隆(三菱電機株式会社), 川合豊(三菱電機株式会社), 服部充洋(三菱電機株式会社), 松田規(三菱電機株式会社), 太田和夫(電気通信大学), 坂井祐介(電気通信大学), “暗号化索引追加後のSearchable Symmetric Encryptionの安全性の関係,” 暗号と情報セキュリティシンポジウム(SCIS2014), 3B3-3, 2014.
- Yasuhide Sakai, Yu Sasaki, Lei Wang, Kazuo Ohta, and Kazuo Sakiyama, “Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL,” Industrial Track Session, ACNS2011, 14 pages, (to present in June., 2011).
- Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “New Differential Fault Analysis on Trivium Based on Setup-Time Violations,” ISEC2010-122, pp.333-339, (Mar., 2011).
- 山本大, 崎山一男, 岩本貢, 太田和夫, 落合隆夫, 武仲正彦, 伊藤孝一, “ラッチの乱数出力位置を利用したPUFによるID生成/認証システムの信頼性向上手法,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 2D1-1, 8 pages, (Jan., 2011)
- 岩井祐樹, 太田和夫, 崎山一男, “故障感度解析を利用したPUFの実現について,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 2D1-3, 8 pages, (Jan., 2011).
- 高柳真如, 佐々木悠, 李陽, 太田和夫, 崎山一男, “7 及び8 ラウンド既知鍵AES識別機の実装,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 2B2-4, 7 pages, (Jan., 2011).
- 落合隆夫, 山本大, 伊藤孝一, 武仲正彦, 鳥居直哉, 内田大輔, 永井利明, 若菜伸一, 岩本貢, 太田和夫, 崎山一男, “電磁波解析における局所性と放射磁界方向について,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 2D3-3, 8 pages, (Jan., 2011).
- 李陽, 太田和夫, 崎山一男, “Self-Template Fault Sensitivity Analysis,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-1, 8 pages, (Jan., 2011).
- 阪本光, 李陽, 太田和夫, 崎山一男, “楕円曲線暗号実装に対するFault Sensitivity Analysis,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-2, 8 pages, (Jan., 2011).
- 五味澤重友, 王磊, 太田和夫, 山口和彦, 崎山一男, “HMAC-MD5へのフォールト解析攻撃,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-3, 8 pages, (Jan., 2011).
- 松田和也, 川合豊, 崎山一男, 太田 和夫, “再暗号化鍵匿名性を満たすIDベースプロキシ再暗号化方式,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 3F3-6, 8 pages, (Jan., 2011).
- 中津大介, 太田和夫, 崎山一男, “AES-128 に対する複数ラウンドCPA,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 3D4-1, 8 pages, (Jan., 2011).
- 酒井靖英, 佐々木悠, 王磊, 崎山一男, 太田和夫, “158stepの5-pass HAVALと1-Block 3-pass HAVALへの原像攻撃,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 4B1-2, 8 pages, (Jan., 2011).
- 名渕大樹, 岩本貢, 崎山一男, 太田和夫, “Joux-Lucksの3-collisions探索アルゴリズムに関する計算量の詳細な検討,” 2011年 暗号と情報セキュリティシンポジウム (SCIS2011), 4B1-4, 8 pages, (Jan., 2011).
- Naoyuki Takayanagi, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Effective Verification for Known-Key Distinguisher by Using Extended Differential Path,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.284-287, (Oct., 2010).
- Qi Li, Kazuo Sakiyama, Lei Wang, and Kazuo Ohta, “Another Differential Fault Analysis on Trivium,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.247-252, (Oct., 2010).
- 岩本貢, 李陽, 崎山一男, 太田和夫, “回転操作が可能な視覚復号型秘密分散法の一般的構成法,” ISEC2010-49, pp.67-74, (Sept., 2010).
- 花谷嘉一, 大久保美也子, 松尾真一郎, 太田和夫, 崎山一男, “CryptoVerifを用いたRFID向け相互認証プロトコルの安全性証明の検討,” 日本応用数理学会2010年度年会 FAISセッション, (Sept., 2010).
- Shin’ichiro Matsuo, Miroslav Knežević, Patrick Schaumont, Ingrid Verbauwhede, Akashi Satoh, Kazuo Sakiyama and Kazuo Ohta, “How Can We Conduct Fair and Consistent Hardware Evaluation for SHA-3 Candidate?” The Second SHA-3 Candidate Conference, (Aug., 2010).
- Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grostl,” The Second SHA-3 Candidate Conference, (Aug., 2010).
- 小林和幸, 池上淳, 松尾真一郎, 崎山一男, 太田和夫, “SASEBO-GIIを用いたSHA-3候補のハードウェア性能評価,”第15回共同研究成果報告会, pp.29-30, (Jun., 2010).
- 太田和夫, 王磊, 崎山一男, “強識別不可能性理論とSHA-3プロジェクト ~ハッシュ関数設計のための理論研究と実装研究の現状~,” ISEC2009-104, pp.159-166, (Mar., 2010).
- 塙知剛, 川合豊, 崎山一男, 太田和夫, “HB-MAC 認証プロトコルに対する受動的攻撃,” 2010年 暗号と情報セキュリティシンポジウム (SCIS’10), 1E2-1, 6 pages, (Jan., 2010).
Cryptology ePrint Archive
- Miyako Ohkubo, Shin’ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta, “Robust RFID Authentication Protocol with Formal Proof and Its Feasibility,” Cryptology ePrint Archive, Report 2010/393, 2010.
- Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Efficient Differential Fault Analysis for AES,” Cryptology ePrint Archive, Report 2010/336, 2010.
- Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” Cryptology ePrint Archive, Report 2010/032, 2010.
- Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, and Kazuo Ohta, “Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII,” Cryptology ePrint Archive, Report 2010/010, 2010.
講演・パネルディスカッション等