2012年度研究成果

著書 (分担執筆)

  1. 山本 博資,古賀 弘樹,有村 光晴,岩本 貢(訳)「情報理論 —基礎と広がり—」 共立出版, 2012. (原著:Thomas M. Cover and Joy A. Thomas: The Elements of Information Theory, 2nd. ed. Wiley-InterScience, 2006. 岩本の担当:第4, 11, 16, 17章)
  2. Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “ Fault Injection and Key Retrieval Expariments on an Evaluation Board,” Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography, Chapter in Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography, ISBN 978-3-642-29655-0, Springer, (Jul., 2012).

学術論文

  1. Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta, “Ciphertext-policy delegatable hidden vector encryption and its application,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E96-A, No. 1, pp. 53-67, 2013/1
  2. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “A New Type of Fault-Based Attack: Faulty Behavior Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A96-A, No.1, pp.177-184, (Jan., 2013).
  3. 小池彩歌, 李陽, 中津大介, 太田和夫, 崎山一男, “複数の要因に対する新たな故障感度解析,” 電子情報通信学会論文誌(A), Vol.J95-A, No.10, pp.751-755, (Oct., 2012).
  4. Mitsugu Iwamoto, Hiroki Koga, and Hirosuke Yamamoto, “Coding theorems for a (2,2)-threshold scheme with detectability of impersonation attacks,” IEEE Trans. on Information Theory, vol.58, no.9, pp.6194-6206, 2012. Preprint is available from http://arxiv.org/abs/1004.4530v3.
  5. A.E. Torujillo, M.N. Miyatake, M. Iwamoto, and H.P. Maena, “A cheating prevention EVC scheme using watermarking techniques,” Revista Facultad de Ingenieria, Univ. Antioquia, no.63, pp.30-42, June, 2012.
  6. Miroslav Knežević, Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Akashi Satoh, Ünal Kocabaş, Junfeng Fan, Toshihiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, and Takafumi Aoki, “Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol.20, No.5, pp.827-840, (May, 2012).
  7. Mitsugu Iwamoto, “A weak security notion for visual secret sharing schemes,” IEEE Trans. on Information Forensics and Secur., vol. 7, no. 2, pp. 372–382, 2012.
  8. Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, and Kazuo Ohta, “Information-Theoretic Approach to Optimal Differential Fault Analysis,” IEEE Trans. Inf. Forensic Secur., vol.7, issue 1, pp.109–120, 2012.
  9. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “New Fault-based Side-Channel Attack using Fault Sensitivity,” IEEE Trans. Inf. Forensic Secur., vol.7, issue 1, pp.88-97, 2012.
  10. Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta, “Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A95-A, No.1, pp.100-110.
  11. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Toward Effective Countermeasures Against An Improved Fault Sensitivity Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A95-A, No.1, pp.234-241.

国際会議

  1. Mitsugu Iwamoto and Junji Shikata, “Information theoretic security for encryption based on conditional Renyi entropies,” International Conference on Information Theoretic Security (ICITS2013), to appear.
  2. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. International Conferences on Information Security and Cryptology 2012 (Inscript’12), Springer-Verlag, (to appear in Nov., 2012).
  3. Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama and Kazuo Ohta, “Boomerang Distinguishers for Full HAS-160 Compression Function,” IWSEC 2012, to appear. (Best Paper Award)
  4. Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta, “Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-based Hash Function,” IWSEC 2012, to appear.
  5. Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta, “Three-Subset Meet-in-the-Middle Attack on Reduced XTEA,” AFRICACRYPT 2012, pp.138-154.
  6. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95-102, (Sep., 2012).
  7. Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta, “On the Security of Dynamic Group Signatures: Preventing Signature Hijacking,” PKC 2012, volume 7293 of LNCS, pp. 715-732. Springer, May, 2012.
  8. Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazumasa Omote.
    “Group Signatures with Message-Dependent Opening,”
    Pairing 2012, LNCS. Springer, to appear.
  9. Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta, “New Truncated Differential Cryptanalysis on 3D Block Cipher,” ISPEC 2012, pp.109-125.

招待講演

  1. Mitsugu Iwamoto, “Security notions of visual secret sharing schemes ,” International Workshop on Advanced Image Technology (IWAIT2013), pp.95-100, 2013 (invited).
  2. Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta, “On the Security of Dynamic Group Signatures,” 神田・公開鍵暗号ワークショップ, (2012年6月). [招待講演]

暗号と情報セキュリティシンポジウム (SCIS)

  1. M. Iwamoto and J. Shikata, “Revisiting Conditional Renyi Entropy and its Application to Encryp- tion: Part I —Properties of Conditional Renyi Entropy—,” 暗号と情報セキュリティシンポジウム (SCIS2013), 1F1–3, 2013.
  2. J. Shikata and M. Iwamoto, “Revisiting Conditional Renyi Entropy and its Application to Encryp- tion: Part II —Fano’s Inequality and Shannon’s Bound—,” 暗号と情報セキュリティシンポジウム (SCIS2013), 1F1–4, 2013.
  3. 駒野雄一,太田和夫,崎山一男,岩本貢, “PUF 出力の一部を用いるパターン照合鍵生成システムの安全性,” 暗号と情報セキュリティシンポジウム (SCIS2013), 1D2–3, 2013.
  4. 山本大,崎山一男,岩本貢, 太田和夫, 武仲正彦, 伊藤孝一, 鳥居直哉, “レスポンス数の向上手法を適用 したラッチ PUF の ASIC 実装評価,” 暗号と情報セキュリティシンポジウム (SCIS2013), 2E2–2, 2013.
  5. 岩井祐樹, 福島崇文, 森山大輔, 松尾真一郎, 駒野雄一, 岩本貢, 太田和夫, 崎山一男, “巡回シフトを用 いた PUF に基づくパターン照合鍵生成システムの実装評価,” 暗号と情報セキュリティシンポジウム (SCIS2013), 2E3–3, 2013.
  6. 中曽根俊貴, 李陽, 佐々木悠, 岩本貢, 太田和夫, 崎山一男, “CC-EMA と CEMA の攻撃性能の比較,” 暗号と情報セキュリティシンポジウム (SCIS2013), 3E3–2, 2013.
  7. M. Iwamoto, K. Ohara, Y. Sakai, and K. Ohta, “Information Theoretic Analysis of a t-resilient First-Price Auction Protocol,” 暗号と情報セキュリティシンポジウム (SCIS2013), 4D1–2, 2013.

そのほか

プレプリント

  1. Yusuke Sakai, Jacob C.N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta, “On the Security of Dynamic Group Signatures: Preventing Signature Hijacking,” Cryptology ePrint Archive, Report 2012/431.
  2. Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama, “Clockwise Collision Analysis — Overlooked Side-Channel Leakage Inside Your Measurements,” Cryptology ePrint Archive, Report 2011/579, 2011.
  3. M. Iwamoto and K. Ohta, “Security Notions for Information Theoretically Secure Encryptions,” arXiv e-print archives, Available from http://arxiv.org/abs/arXiv: 1106.1731v2.

その他,学会口頭発表など

  1. K. Ohara, Y. Sakai, M. Iwamoto, and K. Ohta, “A t-resilient Unconditionally Secure First-Price Auction Protocol,” IWSEC2012 (poster session), Nov., 2012.