| 1.Research Institution | UNIVERSITY OF TOKYO | |
| 2.Research Area | Physical and Engineering Science | |
| 3.Research Field | Advanced Multimedia Information and Communication Systems | |
| 4.Term of Project | FY1996〜FY2000 | |
| 5.Project Number | 96P00604 | |
| 6.Title of Project | Advanced Information Security Techniques for Multimedia Networks |
| Name | Institution,Department | Title of Position |
| Hideki Imai | University of Tokyo, Institute of Industrial Science | Professor |
8.Core Members
| Names | Institution,Department | Title of Position |
| Shigeo Tsujii | Chuo University, Science and Engineering | Professor |
| Masao Kasahara | Osaka Gakuin University, Faculty of Informatics | Professor |
9.Cooperating Researchers
| Names | Institution,Department | Title of Position |
| Kanta Matsuura | University of Tokyo, Institute of Industrial Science | Lecture |
| Kazukuni Kobara | University of Tokyo, Institute of Industrial Science | Research Associate |
| Kouichirou Wakasugi | Kyoto Institute of Technology, Electronics and Information Science | Associate Professor |
10.Summary of Research Results
|
This project is aimed at enhancing the security of multimedia networks. The crypto technologies, including encryption and authentication, play very important roles in a multimedia network. So it cannot be secured without enhancing the security of underlining crypto-primitives and crypto-infrastructures. As representative results of a study on crypto-primitives, we proposed MCMP (Multipurpose Crypto Microprocessor) and asymmetric digital watermarking. The MCMP can be used to control the copyright and the redistribution of contents. The asymmetric digital watermarking makes it possible a robust implementation of an extraction algorithm in a device that might be held by a malicious user. As a result of a study on crypto-infrastructure, we proposed several approaches to main the long-term security that is necessary for making multimedia networks secure. One proposal uses witness, another uses information theory. This is the first innovative result information theoretically secure crypto-infrastructure is available. |
11.Key Words
(1)Information Security、(2)Cryptography、(3)Authentication
(4)Multimedia、(5)Contents Distribution、(6)Copyright Protection
(7)Electronic Commerce、(8)Digital Watermark、(9)Crypto Microprocessor
12.References
| Author | Title of Article | |||
| J. Chao, O. Nakamura, K. Sobataka and S. Tsujii | Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings, | |||
| Journal | Volume | Year | Pages Concerned | |
| AISACRYPT1998, LNCS 1514 | 1998 | 96-109 | ||
| Author | Title of Article | |||
| J. Chao, K. Matsuo, H. Kawashiro and S. Tsujii | Construction of Hyperelliptic Curves with CM and Its Applications to Cryptosystems | |||
| Journal | Volume | Year | Pages Concerned | |
| AISACRYPT2000, LNCS 1976 | 2000 | 259-273 | ||
| Author | Title of Article | |||
| K. Kobara and H. Imai | "Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC- | |||
| Journal | Volume | Year | Pages Concerned | |
| PKC2001 | 2001 | |||
| Author | Title of Article | |||
| S. Kiuchi, Y. Murakami and M. Kasahara | New Multiplicative Knapsack-Type Public Key Cryptosystems | |||
| Journal | Volume | Year | Pages Concerned | |
| IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security | E84-A | 2001 | ||
| Author | Title of Article | |||
| D. Suzuki, Y. Murakami, R. Sakai and M. Kasahara | A New Product-Sum Type Public Key Cryptosystem Based on Reduced Bases | |||
| Journal | Volume | Year | Pages Concerned | |
| IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security | E84-A | 2001 | ||
| Author | Title of Article | |||
| M. Mihaljevic, Y. Zheng and H. Imai | A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) | |||
| Journal | Volume | Year | Pages Concerned | |
| IEICE Trans. Fundamentals | E82-A | 1999 | 40-47 | |
| Author | Title of Article | |||
| M. Mihaljevic and H. Imai | A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time Variant Table | |||
| Journal | Volume | Year | Pages Concerned | |
| IEICE Trans. Fundamentals | E82-A | 1999 | 32-39 | |
| Author | Title of Article | |||
| J. Muller-Quade and H. Imai | Quantum Protocols for Parties Separated by No Man's Land, | |||
| Journal | Volume | Year | Pages Concerned | |
| 2000 International Symposium on Information Theory and Its Applications (ISITA2000), Honolulu | 2000 | |||
| Author | Title of Article | |||
| A. Nascimento, J. Muller-Quade and H. Imai | Quantum Identification Protocol with Technologically Bounded Parties, | |||
| Journal | Volume | Year | Pages Concerned | |
| International Workshop on Coding and Cryptography | 2001 | |||
| Author | Title of Article | |||
| J. Muller-Quade and H. Imai | Temporary Assumptions for Quantum Multi-Party Protocols | |||
| Journal | Volume | Year | Pages Concerned | |
| Los Alamos arXiv quant-ph/0010111 | ||||
| Author | Title of Article | |||
| A. Kusanagi and H. Imai | An Image Correction Scheme for Video Watermarking Extraction | |||
| Journal | Volume | Year | Pages Concerned | |
| to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security | E-84A No.1 | 2001 | ||
| Author | Title of Article | |||
| Y. Watanabe and H. Imai | Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret | |||
| Journal | Volume | Year | Pages Concerned | |
| Public Key Cryptography-PKC'99, LNCS 1560: H. Imai and Y. Zheng eds., Berlin : Springer-Verlag | 1999 | 290-305 | ||
| Author | Title of Article | |||
| Y. Watanabe and H. Imai | Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks | |||
| Journal | Volume | Year | Pages Concerned | |
| IPSJ Trans | 48 No.8 | 2000 | 2228-2236 | |
| Author | Title of Article | |||
| G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai | An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks | |||
| Journal | Volume | Year | Pages Concerned | |
| ASIACRYPT'99, LNCS 1726 | 1999 | |||
| Author | Title of Article | |||
| G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai | Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks | |||
| Journal | Volume | Year | Pages Concerned | |
| to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security | E-84A No.1 | 2001 | ||
| Author | Title of Article | |||
| T. Nishioka, G. Hanaoka and H. Imai | A New Digital Signature Scheme on ID-based Key-Sharing Infrastructures, | |||
| Journal | Volume | Year | Pages Concerned | |
| to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security | E-84A No.1 | 2001 | ||
| Author | Title of Article | |||
| G. Hanaoka, J. Shikata, Y. Zheng and H. Imai | Unconditionally Secure ID-Based Digital Signature Scheme | |||
| Journal | Volume | Year | Pages Concerned | |
| ASIACRYPT 2000, Kyoto | 2000 | |||
| Author | Title of Article | |||
| J. Shikata, Y. Zheng, J. Suzuki and H. Imai | Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithms for Non-Supersingular Elliptic Curves | |||
| Journal | Volume | Year | Pages Concerned | |
| Advances in Cryptology ASIACRYPT'99, LNCS 1716, | 1999 | 86-102 | ||
| Author | Title of Article | |||
| M. Mihaljevic, M. P. C. Fossorier and H. Imai | On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms | |||
| Journal | Volume | Year | Pages Concerned | |
| IEICE Trans. Fundamentals | E84-A No.4 | 2001 | ||
| Author | Title of Article | |||
| M. Mihaljevic, M. P. C. Fossorier and H. Imai | Algorithm for Cryptanalysis of Certain Keystream Generators Suitable High-Speed Software and Hardware Implementations | |||
| Journal | Volume | Year | Pages Concerned | |
| to appear in IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security | E84-A | 2001 | ||
| Author | Title of Article | |||
| G. Hanaoka, Y. Zheng and H. Imai | LITESET: a Light-Weight Secure Electronic Transactions | |||
| Journal | Volume | Year | Pages Concerned | |
| ACISP'98, LNCS 1432 | 1998 | 215-226 | ||
| Author | Title of Article | |||
| G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai | An Optimization of Credit-Based Payment for Electronic Toll Collection Systems | |||
| Journal | Volume | Year | Pages Concerned | |
| IEICE Trans. Fundamentals | E-83A No.8 | 2000 | 1681-1690 | |
| Author | Title of Article | |||
| Y. Watanabe and H. Imai | Reducing the Round Complexity of a Sealed-Bid Auction Protocol with an Off-Line TTP | |||
| Journal | Volume | Year | Pages Concerned | |
| CCS'00 | 2000 | |||
| Author | Title of Book | ||
| H Imai and Y. Zheng | Public Key Cryptography-PKC'98 (Lecture Notes in Computer Science 1431) | ||
| Publisher | Year | Pages | |
| Springer-Verlag | 1998 | ||
| Author | Title of Book | ||
| H Imai and Y. Zheng | Public Key Cryptography-PKC'99 (Lecture Notes in Computer Science 1560) | ||
| Publisher | Year | Pages | |
| Springer-Verlag | 1999 | ||