双方向通信を伴う情報理論的暗号の研究

メンバー: 渡辺峻
分野: 情報学基礎、計算基盤、数学
所属: 工学研究院情報工学科
キーワード: 情報理論、暗号理論
ウェブサイト:
研究概要

我々の研究室では情報理論の研究を行っています。特に、暗号・セキュリティに関連するテーマを主に取り組んでいます。近年の情報通信技術の発展に伴い、情報セキュリティは益々重要になってきています。現在インターネット等で広く使われている公開鍵暗号は現実的時間内には解読されないという意味での、いわゆる計算量的安全性が保証されています。一方、我々が研究対象としている情報理論的暗号は、攻撃者の計算資源に仮定をおかずに安全性が保証されることから、近年注目を集めています。しかしながら、そのような強い安全性を有するシステムを実現するためには、正規ユーザが相関のある信号を観測する等、様々なリソースを必要とし、それらのリソースを所望のタスクを実現するために如何に効率よく使うかといったことが重要になってきます。本研究室では、所望のタスクを安全に実現するための効率の理論限界を情報理論の立場から解明することを目指しています。特に最近は、ユーザ間で双方向の通信を伴うプロトコルの性能解析に興味を持ち、精力的に取り組んでいます。
主要論文・参考事項
S. Watanabe, "Private and Quantum Capacities of More Capable and Less Noisy Quantum Channels," Physical Review A, vol. 85, no. 1, p. 012326, January 2012.
S. Watanabe, "The Rate-Distortion Function for Product of Two Sources with Side-Information at Decoders," IEEE Transactions on Information Theory, vol. 59, no. 9, pp. 5678-5691, September 2013.
H. Tyagi and S. Watanabe, "A Bound for Multiparty Secret Key Agreement and Implications for A Problem of Secure Computing," in Proceedings of EUROCRYPT 2014, Springer LNCS 8441, pp. 369-386, May 2014.
S. Watanabe and Y. Oohama, "The Optimal Use of Rate-Limited Randomness in Broadcast Channels with Confidential Messages," IEEE Transactions on Information Theory, vol. 61, no. 2, pp. 983-995, February 2015.
お問い合わせ先
東京農工大学・先端産学連携研究推進センター
urac[at]ml.tuat.ac.jp([at]を@に変換してください)
Information Theoretic Security with Interactive Communication

Research members: Shun Watanabe PhD.
Research fields: Principles of Informatics (1), Principles of Informatics (2), Mathematics
Departments: Department of Computer and Information Sciences, Institute of Engineering
Keywords: Information Theory, Cryptography
Web site:
Summary

In our research group, we are studying information theory; in particular, we are studying problems that are related information security. Information technology has advanced significantly these days, and information security technology is becoming very important. One of the most widely used security technology is the so-called public cryptography, and its security is based on difficulty of certain mathematical problems. On the other hand, the security of information theoretic cryptography is proved without any assumption on computational power of attackers. However, to realize such a strong security system, the legitimate parties have to share some resource such as correlated observations. Thus, it is extremely important to use that resource to realize certain security tasks. In our research group, from the view point of information theory, we are pursuing to clarify the fundamental limit of the efficiency of realizing certain security tasks from a given resource. In particular, we are interested in protocols that involve interactive communication, and we are tackling those problems these days.
Reference articles and patents
S. Watanabe, "Private and Quantum Capacities of More Capable and Less Noisy Quantum Channels," Physical Review A, vol. 85, no. 1, p. 012326, January 2012.
S. Watanabe, "The Rate-Distortion Function for Product of Two Sources with Side-Information at Decoders," IEEE Transactions on Information Theory, vol. 59, no. 9, pp. 5678-5691, September 2013.
H. Tyagi and S. Watanabe, "A Bound for Multiparty Secret Key Agreement and Implications for A Problem of Secure Computing," in Proceedings of EUROCRYPT 2014, Springer LNCS 8441, pp. 369-386, May 2014.
S. Watanabe and Y. Oohama, "The Optimal Use of Rate-Limited Randomness in Broadcast Channels with Confidential Messages," IEEE Transactions on Information Theory, vol. 61, no. 2, pp. 983-995, February 2015.
Contact
University Research Administration Center(URAC),
Tokyo University of Agriculture andTechnology
urac[at]ml.tuat.ac.jp
(Please replace [at] with @.)