研究者業績

栗原 淳

Jun Kurihara

基本情報

所属
兵庫県立大学 大学院 情報科学研究科 准教授
株式会社ゼタント ソフトウェアエンジニア
学位
博士(工学)(2012年9月 東京工業大学)
修士(2006年3月 東京工業大学)
学士(2004年3月 東京工業大学)

J-GLOBAL ID
201901005849225399
researchmap会員ID
B000351973

外部リンク


論文

 34
  • Itaru Kurihara, Jun Kurihara, Toshiaki Tanaka
    IEEE Access 12 69163-69171 2024年5月  査読有り
  • Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai
    Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 6 204 LNDECT 385-394 2024年4月10日  査読有り
  • Jun Kurihara, Toshiaki Tanaka, Takeshi Kubo
    Computer Networks 237 110078 2023年12月  査読有り筆頭著者責任著者
  • Ryu Watanabe, Ayumu Kubota, Jun Kurihara
    Advanced Information Networking and Applications Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3 655 LNNS 585-596 2023年3月  査読有り
  • Ryu Watanabe, Ayumu Kubota, Jun Kurihara
    Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) 449 LNNS 167-179 2022年4月  査読有り
  • KURIHARA Jun, NAKAMURA Toru, WATANABE Ryu
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E104-A(9) 1271-1283 2021年9月  査読有り筆頭著者責任著者
    <p>This paper investigates an adversarial model in the scenario of private information retrieval (PIR) from n coded storage servers, called Byzantine adversary. The Byzantine adversary is defined as the one altering b server responses and erasing u server responses to a user's query. In this paper, two types of Byzantine adversaries are considered; 1) the classic omniscient type that has the full knowledge on n servers as considered in existing literature, and 2) the reasonable limited-knowledge type that has information on only b+u servers, i.e., servers under the adversary's control. For these two types, this paper reveals that the resistance of a PIR scheme, i.e., the condition of b and u to correctly obtain the desired message, can be expressed in terms of a code parameter called the coset distance of linear codes employed in the scheme. For the omniscient type, the derived condition expressed by the coset distance is tighter and more precise than the estimation of the resistance by the minimum Hamming weight of the codes considered in existing researches. Furthermore, this paper also clarifies that if the adversary is limited-knowledge, the resistance of a PIR scheme could exceed that for the case of the omniscient type. Namely, PIR schemes can increase their resistance to Byzantine adversaries by allowing the limitation on adversary's knowledge.</p>
  • Yuji Koike, Takuya Hayashi, Jun Kurihara, Takanori Isobe 0001
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1) 182-189 2021年  査読有り
  • Kurihara Jun, Nakamura Toru
    IEICE Communications Express 9(7) 342-347 2020年7月1日  査読有り
    <p>In private information retrieval (PIR) from coded storage servers, consider the case where some of servers are Byzantine adversaries and unresponsive. There have been proposed several specialized schemes guaranteeing that the user can correctly obtain the desired message even in the adversarial situation. However, to the best of our knowledge, such resistance to the adversaries in PIR schemes based on arbitrary codes have been not precisely characterized. In this paper, we reveal that the exact resistance to Byzantine and unresponsive servers is expressed in terms of the coset distance of linear codes in linear PIR schemes based on arbitrary storage code.</p>
  • Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami
    IEICE Transactions 102-B(9) 1813-1821 2019年9月  査読有り
  • Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara
    43rd IEEE Conference on Local Computer Networks, LCN 2018, Chicago, IL, USA, October 1-4, 2018 303-306 2018年10月  査読有り
  • Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara
    Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN 2017, Berlin, Germany, September 26-28, 2017 176-177 2017年9月  査読有り
  • Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami
    2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016 1-6 2016年12月  査読有り
  • KURIHARA Jun, YOKOTA Kenji, TAGAMI Atsushi
    IEICE Transactions on Communications 99(12) 2520-2531 2016年12月  査読有り
    <p>Content-centric networking (CCN) is an emerging networking architecture that is being actively investigated in both the research and industrial communities. In the latest version of CCN, a large number of interests have to be issued when large content is retrieved. Since CCN routers have to search several tables for each incoming interest, this could cause a serious problem of router workload. In order to solve this problem, this paper introduces a novel strategy of "grouping" multiple interests with common information and "packing" them to a special interest called the list interest. Our list interest is designed to co-operate with the manifest of CCN as its dual. This paper demonstrates that by skipping and terminating several search steps using the common information in the list interest, the router can search its tables for the list interest-based request with dramatically smaller complexity than the case of the standard interest-based request. Furthermore, we also consider the deployment of list interests and design a novel TCP-like congestion control method for list interests to employ them just like standard interests.</p>
  • Jun Kurihara, Kenji Yokota, Atsushi Tagami
    Proceedings of the 3rd ACM Conference on Information-Centric Networking, ICN '16, Kyoto, Japan, September 26-28, 2016 186-194 2016年9月  査読有り
  • Kenji Yokota, Kohei Sugiyama, Jun Kurihara, Atsushi Tagami
    30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016 124-131 2016年3月  査読有り
  • Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami
    12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015 531-536 2015年10月  査読有り
  • Jun Kurihara, Kenji Yokota, Kazuaki Ueda, Atsushi Tagami
    12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015 500-505 2015年10月  査読有り
  • Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu
    IEEE Transactions on Information Theory 61(7) 3912-3936 2015年7月  査読有り
  • Jun Kurihara, Ersin Uzun, Christopher A. Wood
    2015 IFIP Networking Conference (IFIP Networking) 1-9 2015年5月  査読有り
  • Kurihara Jun, Miyake Yutaka
    IEICE Communications Express 2(10) 442-446 2013年10月  査読有り
    This paper proposes a coding scheme to securely store a secret file in a distributed storage system that uses an arbitrary regenerating code. Our scheme encodes the secret file to the input of a certain regenerating code by using the coset coding scheme with a maximum rank distance (MRD) code. We show that our scheme can protect the secret file from being leaked to an eavesdropper in the distributed storage system. Existing security schemes for distributed storage systems are based on specific regenerating codes, and they cannot be used with other regenerating codes. In contrast, our scheme can guarantee the security against the eavesdropper independently of the construction of the underlying regenerating code.
  • KURIHARA Jun, UYEMATSU Tomohiko, MATSUMOTO Ryutaroh
    IEICE transactions on fundamentals of electronics, communications and computer sciences 95(11) 2067-2075 2012年11月1日  査読有り
    This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using the relative dimension/length profile (RDLP) and the relative generalized Hamming weight (RGHW). We first describe the equivocation &Delta;m of the secret vector $\vec{s}$=[s1,...,sl] given m shares in terms of the RDLP of linear codes. We also characterize two thresholds t1 and t2 in the secret sharing schemes by the RGHW of linear codes. One shows that any set of at most t1 shares leaks no information about $\vec{s}$, and the other shows that any set of at least t2 shares uniquely determines $\vec{s}$. It is clarified that both characterizations for t1 and t2 are better than Chen et al.'s ones derived by the regular minimum Hamming weight. Moreover, this paper characterizes the strong security in secret sharing schemes based on linear codes, by generalizing the definition of strongly-secure threshold ramp schemes. We define a secret sharing scheme achieving the &alpha;-strong security as the one such that the mutual information between any r elements of (s1,...,sl) and any &alpha;-r+1 shares is always zero. Then, it is clarified that secret sharing schemes based on linear codes can always achieve the &alpha;-strong security where the value &alpha; is precisely characterized by the RGHW.
  • Kurihara J, Uyematsu T, Matsumoto R
    2012 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012 533-540 2012年7月9日  査読有り
  • Kurihara J, Uyematsu T, Matsumoto R
    IEEE International Symposium on Information Theory - Proceedings 1483-1487 2012年7月  査読有り
  • Jun Kurihara, Tomohiko Uyematsu
    49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park & Retreat Center, Monticello, IL, USA, 28-30 September, 2011 951-957 2011年9月  査読有り
  • KURIHARA Jun, UYEMATSU Tomohiko
    IEICE transactions on fundamentals of electronics, communications and computer sciences 94(6) 1375-1380 2011年6月1日  査読有り
    This paper presents a novel technique to realize Karnin et al.'s (k,n)-threshold schemes over binary field extensions as a software. Our realization uses the matrix representation of finite fields and matrix-vector multiplications, and enables rapid operations in software implementation. The theoretical evaluation and computer simulation reveal that our realization of Karnin et al.'s scheme achieves much faster processing time than the ordinary symbol oriented realization of the scheme. Further, we show that our realization has comparable performance to the existing exclusive-OR-based fast schemes of Fujii et al. and Kurihara et al.
  • Jun Kurihara, Tomohiko Uyematsu
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION THEORY, RELIABILITY, AND QUALITY OF SERVICE (CTRQ 2011) 35-39 2011年4月  査読有り
    In order to provide reliable and secure communication against eavesdroppers and jammers over networks, Universal Secure Error-Correcting Network Codes (USECNC) based on Maximum-Rank-Distance (MRD) codes have been introduced. This code can be applied to any underlying network codes. However, Shioji et al. introduced a reasonable network model against the code. In their model, an attacker eavesdrops information symbols from some links, where the set of eavesdropping links is re-selected during one packet transmission. The MRD-code-based USECNC cannot guarantee the security against eavesdroppers under this model. Inspired by Shioji et al.' s result, this paper considers the model such that the set of links that jamming (error) symbols are injected into is re-selected for each time slot. We show that the MRDcode- based USECNC cannot guarantee the error-correcting capability under the model of time-varying jamming links, even if the number of jamming links is limited to only one. Furthermore, by introducing a restriction on the field of local coding vectors in the network coding, we propose a simple solution to the problem of time-varying jamming links for MRD-code-based USECNC.
  • 栗原 淳, 清本 晋作, 渡辺 龍, 田中 俊昭
    映像情報メディア学会誌 : 映像情報メディア = The journal of the Institute of Image Information and Television Engineers 64(12) 1921-1932 2010年12月1日  査読有り
    In this paper, we present an authentication mechanism for ISDB-T broadcast streams, especially a One-Seg broadcast stream, which is suitable for low-power devices. Our method makes it possible to authenticate data streams at a low computational cost. The method requires a small memory for buffering to process the broadcast stream and is resistant to packet-loss. We evaluated the computational cost of our method by computer simulation and theoretical estimation, and we show here that our method achieved good properties for authenticating data streams broadcast through lossy channels, e.g. wireless channels. Furthermore, we developed a mobile phone that can authenticate One-Seg broadcast streams with our method, and we report the effectiveness of our scheme here.
  • Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka
    SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 334-343 2010年7月  査読有り
  • Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka
    e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers 222 CCIS 188-202 2010年2月  査読有り
  • Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS 5927 32-+ 2009年12月  査読有り
    In this paper, we introduce the RAKAPOSHI stream cipher The algorithm is based On Dynamic Linear Feedback Shift, Registers, with a simple and potentially scalable design, mid is particularly suitable for hardware applications with restricted resources The RAKAPOSHI stream cipher offers 128-bit security, and aims to complement, the current eSTREAM portfolio of hardware-oriented stream ciphers
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE transactions on fundamentals of electronics, communications and computer sciences 92(8) 1808-1821 2009年8月1日  査読有り
    Shamir's (k, n)-threshold secret sharing scheme (threshold scheme) has two problems: a heavy computational cost is required to make shares and recover the secret, and a large storage capacity is needed to retain all the shares. As a solution to the heavy computational cost problem, several fast threshold schemes have been proposed. On the other hand, threshold ramp secret sharing schemes (ramp scheme) have been proposed in order to reduce each bit-size of shares in Shamir's scheme. However, there is no fast ramp scheme which has both low computational cost and low storage requirements. This paper proposes a new (k, L, n)-threshold ramp secret sharing scheme which uses just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret at a low computational cost. Moreover, by proving that the fast (k, n)-threshold scheme in conjunction with a method to reduce the number of random numbers is an ideal secret sharing scheme, we show that our fast ramp scheme is able to reduce each bit-size of shares by allowing some degradation of security similar to the existing ramp schemes based on Shamir's threshold scheme.
  • Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
    INFORMATION SECURITY, PROCEEDINGS 5222 455-470 2008年9月  査読有り
    In Shamir&apos;s (k, n)-threshold secret sharing scheme (threshold scheme), a heavy computational cost is required to make n shares and recover the secret. As a solution to this problem, several fast threshold schemes have been proposed. This paper proposes a new (k,n)-threshold scheme. For the purpose to realize high performance, the proposed scheme uses just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret. We prove that the proposed scheme is a perfect secret sharing scheme, every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret. Moreover, we show that the proposed scheme is an ideal secret sharing scheme similar to Shamir&apos;s scheme, which is a perfect scheme such that every bit-size of shares equals that of the secret. We also evaluate the efficiency of the scheme, and show that our scheme realizes operations that are much faster than Shamir&apos;s. Furthermore, from the aspect of both computational cost and storage usage, we also introduce how to extend the proposed scheme to a new (k, L, n)-threshold ramp scheme similar to the existing ramp scheme based on Shamir&apos;s scheme.
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE transactions on fundamentals of electronics, communications and computer sciences 91(9) 2365-2378 2008年9月  査読有り
    In Shamir's (k,n)-threshold secret sharing scheme (threshold scheme) [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k,n)-threshold scheme, where k and n are arbitrary. This paper proposes a new fast (k,n)-threshold scheme which uses just EXCLUSIVE-OR (XOR) operations to make n shares and recover the secret from k shares. We prove that every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret in the proposed scheme. Moreover, the proposed scheme is an ideal secret sharing scheme similar to Shamir's scheme, in which every bitsize of shares equals that of the secret. We also evaluate the efficiency of the scheme, and show that our scheme realizes operations that are much faster than Shamir's.
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE transactions on fundamentals of electronics, communications and computer sciences 91(1) 127-138 2008年1月1日  査読有り
    In Shamir's (k, n)-threshold secret sharing scheme [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k, n)-threshold scheme, where k&ge;3 and n is arbitrary. This paper proposes a new fast (3, n)-threshold scheme by using just EXCLUSIVE-OR (XOR) operations to make shares and recover the secret, which is an ideal secret sharing scheme similar to Shamir's scheme. Furthermore, we evaluate the efficiency of the scheme, and show that it is more efficient than Shamir's in terms of computational cost. Moreover, we suggest a fast (k, n)-threshold scheme can be constructed in a similar way by increasing the sets of random numbers constructing pieces of shares.

MISC

 38
  • 栗原頂, 栗原淳, 田中俊昭
    電子情報通信学会 総合大会 2023 (A-2-2) 2023年3月10日  
  • 渡辺, 龍, 窪田, 歩, 栗原, 淳
    コンピュータセキュリティシンポジウム2022論文集 44-49 2022年10月17日  
    Beyond 5G での活用も考慮したモバイルネットワークのユースケースの一つとして,低消費電力かつ計算能力の低い IoT 端末を多数接続する Massive IoT 環境が挙げられる.本環境下で効率的にネットワーク資源を利用するためには,多数の IoT 端末からアップロードされるデータの圧縮・通信量の削減が必要である.本検討では,Multi-access Edge Computing (MEC) 環境を想定し,エッジノードを用いた Massive IoT 環境におけるデータ圧縮について検討する.特に,近年注目が集まりつつある,軽量かつ IoT センシングデータ等を効率的に圧縮できる,重複削除によるストリームデータ圧縮手法 “Generalized Deduplication (GD)” の適用を考慮する.基本的な GD のアルゴリズムは,1 対 1 でのストリーム送受信を前提としている.そのため本報告では,その手法を拡張して,1 対多(エッジノード対 IoT 端末)の MEC 環境に適した,効率的なアルゴリズムを提案する.具体的には,1 対多環境における GD 活用での辞書構築に関する検討と,その効率についての基礎的な評価について報告する. One of the use cases of mobile networks that can be considered for use in Beyond 5G is a massive IoT environment where many IoT terminals with low power consumption and computing power are connected. In order to efficiently use network resources in this environment, it is necessary to compress and reduce the amount of data uploaded by a large number of IoT terminals. In this study, we consider data compression in a Massive IoT environment using edge nodes, assuming a Multi-access Edge Computing (MEC) environment. In particular, we consider the application of "Generalized De-duplication (GD)", a stream data compression method based on duplicate deletion, which has been attracting attention in recent years for its lightweight and efficient compression of IoT sensing data and other data. The basic GD algorithm assumes one-to-one stream transmission and reception. In this report, we propose an extension of the GD algorithm that is suitable for one-to-multi (edge node and IoT terminals) MEC environments and has more efficient performance. Specifically, we examine dictionary construction for GD utilization in a one-to-multi environment and report a basic evaluation of the efficiency of the proposed algorithm.
  • Jun Kurihara, Takeshi Kubo
    2021年4月28日  
    The traditional Domain Name System (DNS) lacks fundamental features of security and privacy in its design. As concerns of privacy increased on the Internet, security and privacy enhancements of DNS have been actively investigated and deployed. Specially for user's privacy in DNS queries, several relay-based anonymization schemes have been recently introduced, however, they are vulnerable to the collusion of a relay with a full-service resolver, i.e., identities of users cannot be hidden to the resolver. This paper introduces a new concept of a multiple-relay-based DNS for user anonymity in DNS queries, called the mutualized oblivious DNS ($\mu$ODNS), by extending the concept of existing relay-based schemes. The $\mu$ODNS introduces a small and reasonable assumption that each user has at least one trusted/dedicated relay in a network and mutually shares the dedicated one with others. The user just sets the dedicated one as his next-hop, first relay, conveying his queries to the resolver, and randomly chooses its $0$ or more subsequent relays shared by other entities. Under this small assumption, the user's identity is concealed to a target resolver in the $\mu$ODNS even if a certain (unknown) subset of relays collude with the resolver. That is, in $\mu$ODNS, users can preserve their privacy and anonymity just by paying a small cost of sharing its resource. Moreover, we present a PoC implementation of $\mu$ODNS that is publicly available on the Internet. We also show that by measurement of round-trip-time for queries, and our PoC implementation of $\mu$ODNS achieves the performance comparable to existing relay-based schemes.
  • 渡辺 龍, 窪田 歩, 栗原 淳
    信学技報 IN2020-68 120(414) 85-90 2021年3月  
  • KURIHARA Jun, KUBO Takeshi
    電子情報通信学会技術研究報告(Web) 121(102(NS2021 32-56)) 2021年  

講演・口頭発表等

 3
  • 渡辺龍, 窪田歩, 栗原淳, 櫻井幸一
    情報処理学会 コンピュータセキュリティ研究会 2024年3月19日
  • 金山知美, 田中俊昭, 栗原 淳
    電子情報通信学会 総合大会 2024 2024年3月7日
  • 栗原頂, 栗原淳, 田中俊昭
    コンピュータセキュリティシンポジウム2023論文集 2023年11月1日
    秘密分散法は,秘密情報を漏洩や破壊から保護する技術である.この手法は,秘密情報を符号化して 複数のシェアを生成する.そして,各シェアを別の記憶媒体に分散することで情報を保護する.また,分散されたシェアのうち,特定の部分集合からのみ秘密情報を復号できる.これまで,秘密分散法のうち,線形性を有する「線形秘密分散法」について,Perfect Security,????-strong Security という 2 つの安全性が考えられてきた.前者は,秘密情報全体に対する安全性を議論しており,後者は秘密情報の部分集合に対する安全 性を議論している.しかし,秘密情報を構成する個々の要素に対する安全性は考えられていない.そこで, 本稿では秘密情報の個々の要素に着目し,新たな安全性の尺度「Individual Insecurity Threshold(IIT)」を与える.IITはシェアの集合の大きさで与えられ,IIT以下のシェアの任意の集合からは,秘密情報の各要素は 復号されることはない.さらに本稿では,IIT が符号パラメータ RGHW(Relative Generalized Hamming Weight)により表現できることを明らかにする.また,既存の線形秘密分散法の IIT を一定以上に担保可能とする,秘密情報のPrecoding 手法を与える.最後に,ユニバーサルセキュアネットワーク符号化へと拡張し,Universal IIT を与える.そして,このUniversal IITは,線形秘密分散法のIIT 同様に,符号パラメータ RGRW(Relative Generalized Rank Weight)により表現できることを示す.

所属学協会

 2

共同研究・競争的資金等の研究課題

 8