研究者業績

栗原 淳

Jun Kurihara

基本情報

所属
兵庫県立大学 大学院 情報科学研究科 准教授
株式会社ゼタント ソフトウェアエンジニア
学位
博士(工学)(2012年9月 東京工業大学)
修士(2006年3月 東京工業大学)
学士(2004年3月 東京工業大学)

J-GLOBAL ID
201901005849225399
researchmap会員ID
B000351973

外部リンク


論文

 38
  • Toru HASEGAWA, Yuki KOIZUMI, Junji TAKEMASA, Jun KURIHARA, Toshiaki TANAKA, Timothy WOOD, K. K. RAMAKRISHNAN
    IEICE Transactions on Information and Systems 108-D(6) 2025年6月  査読有り招待有り
  • Koki Nakano, Jun Kurihara, Toshiaki Tanaka
    Proceedings of the 2024 International Symposium on Information Theory and Its Applications (ISITA 2024) 2024年11月  査読有り
  • Riki Aoshima, Jun Kurihara, Toshiaki Tanaka
    Proceedings of the 2024 International Symposium on Information Theory and Its Applications (ISITA 2024) 2024年11月  査読有り
  • Itaru Kurihara, Jun Kurihara, Toshiaki Tanaka
    IEEE Access 12 69163-69171 2024年5月  査読有り
  • Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai
    Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 6 204 LNDECT 385-394 2024年4月10日  査読有り
  • Jun Kurihara, Toshiaki Tanaka, Takeshi Kubo
    Computer Networks 237 110078 2023年12月  査読有り筆頭著者責任著者
  • Ryu Watanabe, Ayumu Kubota, Jun Kurihara
    Advanced Information Networking and Applications Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3 655 LNNS 585-596 2023年3月  査読有り
  • Ryu Watanabe, Ayumu Kubota, Jun Kurihara
    Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) 449 LNNS 167-179 2022年4月  査読有り
  • KURIHARA Jun, NAKAMURA Toru, WATANABE Ryu
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E104-A(9) 1271-1283 2021年9月  査読有り筆頭著者責任著者
    <p>This paper investigates an adversarial model in the scenario of private information retrieval (PIR) from n coded storage servers, called Byzantine adversary. The Byzantine adversary is defined as the one altering b server responses and erasing u server responses to a user's query. In this paper, two types of Byzantine adversaries are considered; 1) the classic omniscient type that has the full knowledge on n servers as considered in existing literature, and 2) the reasonable limited-knowledge type that has information on only b+u servers, i.e., servers under the adversary's control. For these two types, this paper reveals that the resistance of a PIR scheme, i.e., the condition of b and u to correctly obtain the desired message, can be expressed in terms of a code parameter called the coset distance of linear codes employed in the scheme. For the omniscient type, the derived condition expressed by the coset distance is tighter and more precise than the estimation of the resistance by the minimum Hamming weight of the codes considered in existing researches. Furthermore, this paper also clarifies that if the adversary is limited-knowledge, the resistance of a PIR scheme could exceed that for the case of the omniscient type. Namely, PIR schemes can increase their resistance to Byzantine adversaries by allowing the limitation on adversary's knowledge.</p>
  • Yuji Koike, Takuya Hayashi, Jun Kurihara, Takanori Isobe
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1) 182-189 2021年  査読有り
  • Kurihara Jun, Nakamura Toru
    IEICE Communications Express 9(7) 342-347 2020年7月1日  査読有り
    <p>In private information retrieval (PIR) from coded storage servers, consider the case where some of servers are Byzantine adversaries and unresponsive. There have been proposed several specialized schemes guaranteeing that the user can correctly obtain the desired message even in the adversarial situation. However, to the best of our knowledge, such resistance to the adversaries in PIR schemes based on arbitrary codes have been not precisely characterized. In this paper, we reveal that the exact resistance to Byzantine and unresponsive servers is expressed in terms of the coset distance of linear codes in linear PIR schemes based on arbitrary storage code.</p>
  • Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami
    IEICE Transactions on Communications 102-B(9) 1813-1821 2019年9月  査読有り
  • Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara
    43rd IEEE Conference on Local Computer Networks, LCN 2018, Chicago, IL, USA, October 1-4, 2018 303-306 2018年10月  査読有り
  • Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara
    Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN 2017, Berlin, Germany, September 26-28, 2017 176-177 2017年9月  査読有り
  • Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami
    2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016 1-6 2016年12月  査読有り
  • KURIHARA Jun, YOKOTA Kenji, TAGAMI Atsushi
    IEICE Transactions on Communications 99(12) 2520-2531 2016年12月  査読有り
    <p>Content-centric networking (CCN) is an emerging networking architecture that is being actively investigated in both the research and industrial communities. In the latest version of CCN, a large number of interests have to be issued when large content is retrieved. Since CCN routers have to search several tables for each incoming interest, this could cause a serious problem of router workload. In order to solve this problem, this paper introduces a novel strategy of "grouping" multiple interests with common information and "packing" them to a special interest called the list interest. Our list interest is designed to co-operate with the manifest of CCN as its dual. This paper demonstrates that by skipping and terminating several search steps using the common information in the list interest, the router can search its tables for the list interest-based request with dramatically smaller complexity than the case of the standard interest-based request. Furthermore, we also consider the deployment of list interests and design a novel TCP-like congestion control method for list interests to employ them just like standard interests.</p>
  • Jun Kurihara, Kenji Yokota, Atsushi Tagami
    Proceedings of the 3rd ACM Conference on Information-Centric Networking, ICN '16, Kyoto, Japan, September 26-28, 2016 186-194 2016年9月  査読有り
  • Kenji Yokota, Kohei Sugiyama, Jun Kurihara, Atsushi Tagami
    30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016 124-131 2016年3月  査読有り
  • Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami
    12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015 531-536 2015年10月  査読有り
  • Jun Kurihara, Kenji Yokota, Kazuaki Ueda, Atsushi Tagami
    12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015 500-505 2015年10月  査読有り
  • Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu
    IEEE Transactions on Information Theory 61(7) 3912-3936 2015年7月  査読有り
  • Jun Kurihara, Ersin Uzun, Christopher A. Wood
    2015 IFIP Networking Conference (IFIP Networking) 1-9 2015年5月  査読有り
  • Kurihara Jun, Miyake Yutaka
    IEICE Communications Express 2(10) 442-446 2013年10月  査読有り
    This paper proposes a coding scheme to securely store a secret file in a distributed storage system that uses an arbitrary regenerating code. Our scheme encodes the secret file to the input of a certain regenerating code by using the coset coding scheme with a maximum rank distance (MRD) code. We show that our scheme can protect the secret file from being leaked to an eavesdropper in the distributed storage system. Existing security schemes for distributed storage systems are based on specific regenerating codes, and they cannot be used with other regenerating codes. In contrast, our scheme can guarantee the security against the eavesdropper independently of the construction of the underlying regenerating code.
  • KURIHARA Jun, UYEMATSU Tomohiko, MATSUMOTO Ryutaroh
    IEICE transactions on fundamentals of electronics, communications and computer sciences 95(11) 2067-2075 2012年11月1日  査読有り
    This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using the relative dimension/length profile (RDLP) and the relative generalized Hamming weight (RGHW). We first describe the equivocation &Delta;m of the secret vector $\vec{s}$=[s1,...,sl] given m shares in terms of the RDLP of linear codes. We also characterize two thresholds t1 and t2 in the secret sharing schemes by the RGHW of linear codes. One shows that any set of at most t1 shares leaks no information about $\vec{s}$, and the other shows that any set of at least t2 shares uniquely determines $\vec{s}$. It is clarified that both characterizations for t1 and t2 are better than Chen et al.'s ones derived by the regular minimum Hamming weight. Moreover, this paper characterizes the strong security in secret sharing schemes based on linear codes, by generalizing the definition of strongly-secure threshold ramp schemes. We define a secret sharing scheme achieving the &alpha;-strong security as the one such that the mutual information between any r elements of (s1,...,sl) and any &alpha;-r+1 shares is always zero. Then, it is clarified that secret sharing schemes based on linear codes can always achieve the &alpha;-strong security where the value &alpha; is precisely characterized by the RGHW.
  • Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto
    2012 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012 533-540 2012年7月9日  査読有り
  • Kurihara J, Uyematsu T, Matsumoto R
    IEEE International Symposium on Information Theory - Proceedings 1483-1487 2012年7月  査読有り
  • Jun Kurihara, Tomohiko Uyematsu
    49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park & Retreat Center, Monticello, IL, USA, 28-30 September, 2011 951-957 2011年9月  査読有り
  • KURIHARA Jun, UYEMATSU Tomohiko
    IEICE transactions on fundamentals of electronics, communications and computer sciences 94(6) 1375-1380 2011年6月1日  査読有り
    This paper presents a novel technique to realize Karnin et al.'s (k,n)-threshold schemes over binary field extensions as a software. Our realization uses the matrix representation of finite fields and matrix-vector multiplications, and enables rapid operations in software implementation. The theoretical evaluation and computer simulation reveal that our realization of Karnin et al.'s scheme achieves much faster processing time than the ordinary symbol oriented realization of the scheme. Further, we show that our realization has comparable performance to the existing exclusive-OR-based fast schemes of Fujii et al. and Kurihara et al.
  • Jun Kurihara, Tomohiko Uyematsu
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION THEORY, RELIABILITY, AND QUALITY OF SERVICE (CTRQ 2011) 35-39 2011年4月  査読有り
  • 栗原 淳, 清本 晋作, 渡辺 龍, 田中 俊昭
    映像情報メディア学会誌 : 映像情報メディア = The journal of the Institute of Image Information and Television Engineers 64(12) 1921-1932 2010年12月1日  査読有り
    In this paper, we present an authentication mechanism for ISDB-T broadcast streams, especially a One-Seg broadcast stream, which is suitable for low-power devices. Our method makes it possible to authenticate data streams at a low computational cost. The method requires a small memory for buffering to process the broadcast stream and is resistant to packet-loss. We evaluated the computational cost of our method by computer simulation and theoretical estimation, and we show here that our method achieved good properties for authenticating data streams broadcast through lossy channels, e.g. wireless channels. Furthermore, we developed a mobile phone that can authenticate One-Seg broadcast streams with our method, and we report the effectiveness of our scheme here.
  • Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka
    SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 334-343 2010年7月  査読有り
  • Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka
    e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers 222 CCIS 188-202 2010年2月  査読有り
  • Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS 5927 32-+ 2009年12月  査読有り
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE transactions on fundamentals of electronics, communications and computer sciences 92(8) 1808-1821 2009年8月1日  査読有り
    Shamir's (k, n)-threshold secret sharing scheme (threshold scheme) has two problems: a heavy computational cost is required to make shares and recover the secret, and a large storage capacity is needed to retain all the shares. As a solution to the heavy computational cost problem, several fast threshold schemes have been proposed. On the other hand, threshold ramp secret sharing schemes (ramp scheme) have been proposed in order to reduce each bit-size of shares in Shamir's scheme. However, there is no fast ramp scheme which has both low computational cost and low storage requirements. This paper proposes a new (k, L, n)-threshold ramp secret sharing scheme which uses just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret at a low computational cost. Moreover, by proving that the fast (k, n)-threshold scheme in conjunction with a method to reduce the number of random numbers is an ideal secret sharing scheme, we show that our fast ramp scheme is able to reduce each bit-size of shares by allowing some degradation of security similar to the existing ramp schemes based on Shamir's threshold scheme.
  • Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
    Proceedings of the 2008 Information Security Conference 5222 455-470 2008年9月  査読有り
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE transactions on fundamentals of electronics, communications and computer sciences 91(9) 2365-2378 2008年9月  査読有り
    In Shamir's (k,n)-threshold secret sharing scheme (threshold scheme) [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k,n)-threshold scheme, where k and n are arbitrary. This paper proposes a new fast (k,n)-threshold scheme which uses just EXCLUSIVE-OR (XOR) operations to make n shares and recover the secret from k shares. We prove that every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret in the proposed scheme. Moreover, the proposed scheme is an ideal secret sharing scheme similar to Shamir's scheme, in which every bitsize of shares equals that of the secret. We also evaluate the efficiency of the scheme, and show that our scheme realizes operations that are much faster than Shamir's.
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE transactions on fundamentals of electronics, communications and computer sciences 91(1) 127-138 2008年1月1日  査読有り
    In Shamir's (k, n)-threshold secret sharing scheme [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k, n)-threshold scheme, where k&ge;3 and n is arbitrary. This paper proposes a new fast (3, n)-threshold scheme by using just EXCLUSIVE-OR (XOR) operations to make shares and recover the secret, which is an ideal secret sharing scheme similar to Shamir's scheme. Furthermore, we evaluate the efficiency of the scheme, and show that it is more efficient than Shamir's in terms of computational cost. Moreover, we suggest a fast (k, n)-threshold scheme can be constructed in a similar way by increasing the sets of random numbers constructing pieces of shares.
  • Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka
    IJCSNS International Journal of Computer Science and Network Security 7(11) 7-15 2007年11月  査読有り

MISC

 8

講演・口頭発表等

 51

担当経験のある科目(授業)

 4

所属学協会

 2

共同研究・競争的資金等の研究課題

 10