研究者業績

Jun Kurihara

  (栗原 淳)

Profile Information

Affiliation
Associate Professor, Graduate School of Information Science, University of Hyogo
Software Engineer, Zettant Inc.
Degree
PhD in Engineering(Sep, 2012, Tokyo Institute of Technology)
ME(Mar, 2006, Tokyo Institute of Technology)
BE(Mar, 2004, Tokyo Institute of Technology)

J-GLOBAL ID
201901005849225399
researchmap Member ID
B000351973

External link


Papers

 37

Misc.

 8
  • Jun Kurihara, Takeshi Kubo
    Arxiv preprint, Apr 28, 2021  
    The traditional Domain Name System (DNS) lacks fundamental features of security and privacy in its design. As concerns of privacy increased on the Internet, security and privacy enhancements of DNS have been actively investigated and deployed. Specially for user's privacy in DNS queries, several relay-based anonymization schemes have been recently introduced, however, they are vulnerable to the collusion of a relay with a full-service resolver, i.e., identities of users cannot be hidden to the resolver. This paper introduces a new concept of a multiple-relay-based DNS for user anonymity in DNS queries, called the mutualized oblivious DNS ($\mu$ODNS), by extending the concept of existing relay-based schemes. The $\mu$ODNS introduces a small and reasonable assumption that each user has at least one trusted/dedicated relay in a network and mutually shares the dedicated one with others. The user just sets the dedicated one as his next-hop, first relay, conveying his queries to the resolver, and randomly chooses its $0$ or more subsequent relays shared by other entities. Under this small assumption, the user's identity is concealed to a target resolver in the $\mu$ODNS even if a certain (unknown) subset of relays collude with the resolver. That is, in $\mu$ODNS, users can preserve their privacy and anonymity just by paying a small cost of sharing its resource. Moreover, we present a PoC implementation of $\mu$ODNS that is publicly available on the Internet. We also show that by measurement of round-trip-time for queries, and our PoC implementation of $\mu$ODNS achieves the performance comparable to existing relay-based schemes.
  • The journal of the Institute of Electronics, Information and Communication Engineers, 103(2) 155-161, Feb, 2020  
  • Jun Kurihara, Takeshi Kubo
    Oct, 2017  
  • KURIHARA Jun, MATSUMOTO Ryutaroh, UYEMATSU Tomohiko
    IEICE ESS Fundamentals Review, 9(1) 14-23, 2015  
    In this paper, we first introduce Shamir’s construction of the (k; n)-threshold scheme as a typical linear secret-sharing scheme and explain the construction of the (k; l; n)-threshold ramp scheme proposed by Yamamoto and Blakley-Meadows as its extension. Then, by generalizing threshold ramp schemes with a linear code C1 and its subcode C2, we represent a linear secret-sharing scheme in terms of C1 and C2. As examples, we represent Shamir’s (k; n)-threshold scheme and the (k; l; n)-threshold ramp scheme of Yamamoto and Blakley-Meadows using linear codes. Furthermore, we show that in linear secret-sharing schemes, the maximum amount of information leakage of a secret message and their strong security are characterized by the relative generalized Hamming weights (RGHW’s) of C1 and C2 when every share is an element of a finite field.
  • Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu
    CoRR, abs/1301.5482, Jan, 2013  

Presentations

 50

Teaching Experience

 4

Research Projects

 10