研究成果

学術論文誌

  • How to Solve Millionaires’ Problem with Two Kinds of Cards
    著者
    T. Nakai, Y. Misawa, Y. Tokushige, M. Iwamoto, and K. Ohta
    雑誌名
    New Generation Computing
    39
    ページ
    73–96
    出版社
    Springer
    発行年
    2021
    Open Access
    Abstract

    Card-based cryptography, introduced by den Boer aims to realize multiparty computation (MPC) by using physical cards. We propose several efficient card-based protocols for the millionaires’ problem by introducing a new operation called Private Permutation (PP) instead of the shuffle used in most of existing card-based cryptography. Shuffle is a useful randomization technique by exploiting the property of card shuffling, but it requires a strong assumption from the viewpoint of arithmetic MPC because shuffle assumes that public randomization is possible. On the other hand, private randomness can be used in PPs, which enables us to design card-based protocols taking ideas of arithmetic MPCs into account. Actually, we show that Yao’s millionaires’ protocol can be easily transformed into a card-based protocol by using PPs, which is not straightforward by using shuffles because Yao’s protocol uses private randomness. Furthermore, we propose entirely novel and efficient card-based millionaire protocols based on PPs by securely updating bitwise comparisons between two numbers, which unveil a power of PPs. As another interest of these protocols, we point out they have a deep connection to the well-known logical puzzle known as “The fork in the road.”

国際会議

  • Efficient Card-Based Cryptographic Protocols for Millionaires’ Problem Utilizing Private Permutations
    著者
    T. Nakai, Y. Misawa, Y. Tokushige, M. Iwamoto, and K. Ohta
    会議名
    CANS 2016
    LNCS 10052
    ページ
    350–364
    出版社
    Springer
    発行年
    2016
    発表日
    Nov. 15, 2016
    Abstract

    We propose several efficient card-based cryptographic protocols for the millionaires’ problem by introducing a new operation called Private Permutation (PP) instead of the shuffle used in existing card-based cryptographic protocols. Shuffles are useful randomization techniques for designing card-based cryptographic protocols for logical gates, and this approach seems to be almost optimal. This fact, however, implies that there is room for improvements if we do not use logical gates as building blocks for secure computing, and we show that such an improvement is actually possible for the millionaires’ problem. Our key technique, PP, is a natural randomization operation for permuting a set of cards behind the player’s back, and hence, a shuffle can be decomposed into two PPs with one communication between them. Thus PP not only allows us to transform Yao’s seminal protocol into a card-based cryptographic protocol, but also enables us to propose entirely novel and efficient protocols by securely updating bitwise comparisons between two numbers. Furthermore, it is interesting to remark that one of the proposed protocols has a remarkably deep connection to the well-known logical puzzle known as “The fork in the road”.

  • An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl
    著者
    Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, and K. Ohta
    会議名
    CT-RSA 2014
    LNCS 8366
    ページ
    424–443
    出版社
    Springer
    発行年
    2014
    Abstract

    In this paper, we study the security of AES-like permutations against the improved rebound attack proposed by Jean et al. at FSE 2012 which covers three full-active rounds in the inbound phase. The attack is very complicated and hard to verify its optimality when the state size is large and rectangle, namely the numbers of rows and columns are different. In the inbound phase of the improved rebound attack, several SuperSBoxes are generated for each of forward analysis and backward analysis. The attack searches for paired values that are consistent with all SuperSBoxes. The attack complexity depends on the order of the SuperSBoxes to be analyzed, and detecting the best order is hard. In this paper, we develop an automated complexity evaluation tool with several fast implementation techniques. The tool enables us to examine all the possible orders of the SuperSBoxes, and provides the best analysis order and complexity. We apply the tool to large block Rijndael in the known-key setting and the Grøstl-512 permutation. As a result, we obtain the first 9-round distinguisher for Rijndael-192 and Rijndael-224. It also shows the impossibility of the improved rebound attack against 9-round Rijndael-160 and 10-round Rijndael-256, and the optimality of the previous distinguisher against the 10-round Grøstl-512 permutation. Moreover, the efficiency of the improved rebound attack depends on the parameter of the ShiftRows operation. Our tool can exhaustively examine all the possible ShiftRows parameters to search for the ones that can resist the attack. We show new parameters for the Grøstl-512 permutation obtained by our tool, which can resist a 10-round improved rebound attack while the specification parameter cannot resist it.

国内会議

  • 秘匿置換を用いたカードベースしきい値関数プロトコル
    著者
    中井 雄士, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    SCIS 2021
    ページ
    2F1-3
    発行年
    2021
    発表日
    2021/01/20
  • カードを用いた複数人での金持ち比べプロトコル
    著者
    徳重 佑樹, 中井 雄士, 岩本 貢, 太田 和夫
    会議名
    SCIS 2017
    ページ
    1A2-1
    発行年
    2017
    発表日
    2017/1/24
  • グループ認証付鍵交換プロトコルのweak-SK-secure性の形式検証
    著者
    徳重 佑樹, 花谷 嘉一, 岩本 貢, 太田 和夫
    会議名
    SCIS 2016
    ページ
    1A1–2
    発行年
    2016
    発表日
    2016/1/19
  • 人間向け暗号/認証プロトコルの統一的安全性評価
    著者
    三澤 裕人, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    SCIS 2016
    ページ
    3E3–5
    発行年
    2016
    発表日
    2016/1/21
  • カード操作の分類とカードベース暗号プロトコル
    著者
    中井 雄士, 三澤 裕人, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    SCIS 2016
    ページ
    4A2–2
    発行年
    2016
    発表日
    2016/1/22
  • ブロックサインの安全性に対するコードブックの影響
    著者
    三澤 裕人, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    CSS 2015
    ページ
    1011–1018
    発行年
    2015
    発表日
    2015/10/23
  • 正規言語を用いた鍵更新可能暗号の安全性解析
    著者
    大宮 翔児, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    SCIS 2015
    ページ
    1D1–4
    発行年
    2015
    発表日
    2015/1/20
  • Joux–Lucksの3-collisions探索アルゴリズムに対する改良および計算量の詳細な検討
    著者
    鴨志田 優一, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    SCIS 2015
    ページ
    2E2–4
    発行年
    2015
    発表日
    2015/1/21
  • カードを用いた効率的な金持ち比べプロトコル
    著者
    中井 雄士, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    SCIS 2015
    ページ
    3F4–2
    発行年
    2015
    発表日
    2015/1/22
  • カードベース暗号プロトコルにおける安全な選択処理
    著者
    徳重 佑樹, 中井 雄士, 岩本 貢, 太田 和夫
    会議名
    SCIS 2015
    ページ
    3F4–3
    発行年
    2015
    発表日
    2015/1/22
  • 簡易なブロックサインに対する暗号理論的安全性解析
    著者
    三澤 裕人, 徳重 佑樹, 岩本 貢, 太田 和夫
    会議名
    SCIS 2015
    ページ
    3F4–4
    発行年
    2015
    発表日
    2015/1/22
  • 同時実行攻撃に耐性を持つシンプルなSecret Handshake
    著者
    土屋 喬文, 徳重 佑樹, 坂井 祐介, 岩本 貢, 太田 和夫
    会議名
    SCIS 2014
    ページ
    2D4–3
    発行年
    2014
    発表日
    2014/1/22
  • Improved Rebound Attack手順の自動探索手法の提案と評価
    著者
    徳重 佑樹, 佐々木 悠, 王 磊, 岩本 貢, 太田 和夫
    会議名
    SCIS 2014
    ページ
    3C4–2
    発行年
    2014
    発表日
    2014/1/23

口頭発表

  • Toward Reducing Shuffling in Card-Based Cryptographic Protocol for Millionaire Problem
    著者
    T. Nakai, Y. Tokushige, M. Iwamoto, and K. Ohta
    発表者
    T. Nakai
    会議名
    IWSEC 2015
    発行年
    2015
    発表日
    2015/08
    開催地
    Nara, Japan
    種別
    Poster
    発表日
    Aug., 2015