Summary of Research Project Results Under the JSPS FY2000
"Research for the future Program"



1.Research Institution UNIVERSITY OF TOKYO
 
2.Research Area Physical and Engineering Science
 
3.Research Field Advanced Multimedia Information and Communication Systems
 
4.Term of Project FY1996〜FY2000
 
5.Project Number 96P00604
 
6.Title of Project Advanced Information Security Techniques for Multimedia Networks

7.Projetct Leader
Name Institution,Department Title of Position
Hideki Imai University of Tokyo, Institute of Industrial Science Professor

8.Core Members

Names Institution,Department Title of Position
Shigeo Tsujii Chuo University, Science and Engineering Professor
Masao Kasahara Osaka Gakuin University, Faculty of Informatics Professor

9.Cooperating Researchers

Names Institution,Department Title of Position
Kanta Matsuura University of Tokyo, Institute of Industrial Science Lecture
Kazukuni Kobara University of Tokyo, Institute of Industrial Science Research Associate
Kouichirou Wakasugi Kyoto Institute of Technology, Electronics and Information Science Associate Professor

10.Summary of Research Results

This project is aimed at enhancing the security of multimedia networks. The crypto technologies, including encryption and authentication, play very important roles in a multimedia network. So it cannot be secured without enhancing the security of underlining crypto-primitives and crypto-infrastructures.
As representative results of a study on crypto-primitives, we proposed MCMP (Multipurpose Crypto Microprocessor) and asymmetric digital watermarking. The MCMP can be used to control the copyright and the redistribution of contents. The asymmetric digital watermarking makes it possible a robust implementation of an extraction algorithm in a device that might be held by a malicious user.
As a result of a study on crypto-infrastructure, we proposed several approaches to main the long-term security that is necessary for making multimedia networks secure. One proposal uses witness, another uses information theory. This is the first innovative result information theoretically secure crypto-infrastructure is available.

11.Key Words

(1)Information Security、(2)Cryptography、(3)Authentication
(4)Multimedia、(5)Contents Distribution、(6)Copyright Protection
(7)Electronic Commerce、(8)Digital Watermark、(9)Crypto Microprocessor

12.References

[Reference Articles]
Author Title of Article
J. Chao, O. Nakamura, K. Sobataka and S. Tsujii Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings,
Journal Volume Year Pages Concerned
AISACRYPT1998, LNCS 1514   1998 96-109

Author Title of Article
J. Chao, K. Matsuo, H. Kawashiro and S. Tsujii Construction of Hyperelliptic Curves with CM and Its Applications to Cryptosystems
Journal Volume Year Pages Concerned
AISACRYPT2000, LNCS 1976   2000 259-273

Author Title of Article
K. Kobara and H. Imai "Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC-
Journal Volume Year Pages Concerned
PKC2001   2001  

Author Title of Article
S. Kiuchi, Y. Murakami and M. Kasahara New Multiplicative Knapsack-Type Public Key Cryptosystems
Journal Volume Year Pages Concerned
IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security E84-A 2001  

Author Title of Article
D. Suzuki, Y. Murakami, R. Sakai and M. Kasahara A New Product-Sum Type Public Key Cryptosystem Based on Reduced Bases
Journal Volume Year Pages Concerned
IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security E84-A 2001  

Author Title of Article
M. Mihaljevic, Y. Zheng and H. Imai A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q)
Journal Volume Year Pages Concerned
IEICE Trans. Fundamentals E82-A 1999 40-47

Author Title of Article
M. Mihaljevic and H. Imai A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time Variant Table
Journal Volume Year Pages Concerned
IEICE Trans. Fundamentals E82-A 1999 32-39

Author Title of Article
J. Muller-Quade and H. Imai Quantum Protocols for Parties Separated by No Man's Land,
Journal Volume Year Pages Concerned
2000 International Symposium on Information Theory and Its Applications (ISITA2000), Honolulu   2000  

Author Title of Article
A. Nascimento, J. Muller-Quade and H. Imai Quantum Identification Protocol with Technologically Bounded Parties,
Journal Volume Year Pages Concerned
International Workshop on Coding and Cryptography   2001  

Author Title of Article
J. Muller-Quade and H. Imai Temporary Assumptions for Quantum Multi-Party Protocols
Journal Volume Year Pages Concerned
Los Alamos arXiv quant-ph/0010111      

Author Title of Article
A. Kusanagi and H. Imai An Image Correction Scheme for Video Watermarking Extraction
Journal Volume Year Pages Concerned
to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security E-84A No.1 2001  

Author Title of Article
Y. Watanabe and H. Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret
Journal Volume Year Pages Concerned
Public Key Cryptography-PKC'99, LNCS 1560: H. Imai and Y. Zheng eds., Berlin : Springer-Verlag   1999 290-305

Author Title of Article
Y. Watanabe and H. Imai Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks
Journal Volume Year Pages Concerned
IPSJ Trans 48 No.8 2000 2228-2236

Author Title of Article
G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks
Journal Volume Year Pages Concerned
ASIACRYPT'99, LNCS 1726   1999  

Author Title of Article
G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks
Journal Volume Year Pages Concerned
to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security E-84A No.1 2001  

Author Title of Article
T. Nishioka, G. Hanaoka and H. Imai A New Digital Signature Scheme on ID-based Key-Sharing Infrastructures,
Journal Volume Year Pages Concerned
to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security E-84A No.1 2001  

Author Title of Article
G. Hanaoka, J. Shikata, Y. Zheng and H. Imai Unconditionally Secure ID-Based Digital Signature Scheme
Journal Volume Year Pages Concerned
ASIACRYPT 2000, Kyoto   2000  

Author Title of Article
J. Shikata, Y. Zheng, J. Suzuki and H. Imai Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithms for Non-Supersingular Elliptic Curves
Journal Volume Year Pages Concerned
Advances in Cryptology ASIACRYPT'99, LNCS 1716,   1999 86-102

Author Title of Article
M. Mihaljevic, M. P. C. Fossorier and H. Imai On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms
Journal Volume Year Pages Concerned
IEICE Trans. Fundamentals E84-A No.4 2001  

Author Title of Article
M. Mihaljevic, M. P. C. Fossorier and H. Imai Algorithm for Cryptanalysis of Certain Keystream Generators Suitable High-Speed Software and Hardware Implementations
Journal Volume Year Pages Concerned
to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security E84-A 2001  

Author Title of Article
G. Hanaoka, Y. Zheng and H. Imai LITESET: a Light-Weight Secure Electronic Transactions
Journal Volume Year Pages Concerned
ACISP'98, LNCS 1432   1998 215-226

Author Title of Article
G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
Journal Volume Year Pages Concerned
IEICE Trans. Fundamentals E-83A No.8 2000 1681-1690

Author Title of Article
Y. Watanabe and H. Imai Reducing the Round Complexity of a Sealed-Bid Auction Protocol with an Off-Line TTP
Journal Volume Year Pages Concerned
CCS'00   2000  

[Reference Books]
Author Title of Book
H Imai and Y. Zheng Public Key Cryptography-PKC'98 (Lecture Notes in Computer Science 1431)
Publisher Year Pages
Springer-Verlag 1998  

Author Title of Book
H Imai and Y. Zheng Public Key Cryptography-PKC'99 (Lecture Notes in Computer Science 1560)
Publisher Year Pages
Springer-Verlag 1999  


back