研究者業績

田中 俊昭

Tanaka Toshiaki  (Toshiaki Tanaka)

基本情報

所属
兵庫県立大学 大学院 情報科学研究科 教授
学位
博士(工学)(2007年3月 九州大学)

連絡先
toshigsis.u-hyogo.ac.jp
J-GLOBAL ID
202101019342165016
researchmap会員ID
R000015855

学歴

 2

論文

 100
  • Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai
    IEICE Trans. Inf. Syst. 97-D(1) 43-52 2014年  査読有り
  • 清本晋作, 三宅優, 田中俊昭
    The 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2012) 1755-1762 2012年6月  査読有り
  • 稲村勝樹, 岩村 惠市, 渡辺龍, 西川真, 田中俊昭
    International Conference on Security and Cryptography (Secrypt2011) 362-369 2011年  査読有り
  • Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka
    Sixth International Conference on Availability, Reliability and Security(ARES) 442-447 2011年  査読有り
  • 栗原 淳, 清本 晋作, 渡辺 龍, 田中 俊昭
    映像情報メディア学会誌 : 映像情報メディア = The journal of the Institute of Image Information and Television Engineers 64(12) 1921-1932 2010年12月1日  
    In this paper, we present an authentication mechanism for ISDB-T broadcast streams, especially a One-Seg broadcast stream, which is suitable for low-power devices. Our method makes it possible to authenticate data streams at a low computational cost. The method requires a small memory for buffering to process the broadcast stream and is resistant to packet-loss. We evaluated the computational cost of our method by computer simulation and theoretical estimation, and we show here that our method achieved good properties for authenticating data streams broadcast through lossy channels, e.g. wireless channels. Furthermore, we developed a mobile phone that can authenticate One-Seg broadcast streams with our method, and we report the effectiveness of our scheme here.

MISC

 21
  • Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
    コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 2009 1-6 2011年10月12日  
  • 仲野 有登, 栗原 淳, 清本 晋作, 田中 俊昭
    電子情報通信学会総合大会講演論文集 2010 139-139 2010年3月2日  
  • 仲野 有登, 栗原 淳, 清本 晋作, 田中 俊昭
    電子情報通信学会技術研究報告. SITE, 技術と社会・倫理 : IEICE technical report 109(114) 153-159 2009年6月25日  
    ストリーム暗号を構成要素としたハッシュ関数(Stream-Cipher-based Hash function,SCH)は,高速なハッシュ生成処理を可能とする.しかしながら,SCHの安全性に関する検証は十分に行われていない.そこで本論文では,「事前処理」と「ストリーム暗号」の二つの構成要素から成るSCHのモデル化を提案し,安全性の検討を行う.脆弱性を含む既存のSCH(AbacusおよびBoole)にモデルを適用し,解析を行うことで,脆弱性を持つ構成要素を明らかにする.さらに,脆弱な構成要素に変更を加えることで,既存の攻撃に対して安全性を向上できることを示す.本検討より,安全なSCHを構成するための構成要素の必要条件を導出する.
  • Kurihara Jun, Kiyomoto Shinsaku, Fukushima Kazuhide, Tanaka Toshiaki
    電子情報通信学会総合大会講演論文集 2009 177-177 2009年3月4日  
  • 栗原, 清本 晋作, 渡辺 龍, 田中 俊昭
    平20年信学総全大 592-592 2008年  
  • 福島和英, 清本晋作, 田中俊昭, 櫻井幸一
    情報処理学会シンポジウム論文集 2008(8) 2008年  
  • Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta
    情報処理学会論文誌 48(9) 3073-3088 2007年9月15日  
    In large-scale networks users want to be able to communicate securely with each other over a channel that is unreliable. When the existing 2- and 3-party protocols are realized in this situation there are several problems: a client must hold many passwords and the load on the server concerning password management is heavy. In this paper we define a new ideal client-to-client general authenticated key exchange functionality where arbitrary 2-party key exchange protocols are applicable to protocols between the client and server and between servers. We also propose a client-to-client general authenticated key exchange protocol C2C-GAKE as a general form of the client-to-client model and a client-to-client hybrid authenticated key exchange protocol C2C-HAKE as an example protocol of C2C-GAKE to solve the above problems. In C2C-HAKE a server shares passwords only with clients in the same realm respectively public/private keys are used between respective servers and two clients between different realms share a final session key via the respective servers. Thus with regard to password management in C2C-HAKE the load on the server can be distributed to several servers. In addition we prove that C2C-HAKE securely realizes the above functionality. C2CHAKE is the first client-to-client hybrid authenticated key exchange protocol that is secure in a universally composable framework with a security-preserving composition property.In large-scale networks, users want to be able to communicate securely with each other over a channel that is unreliable. When the existing 2- and 3-party protocols are realized in this situation, there are several problems: a client must hold many passwords and the load on the server concerning password management is heavy. In this paper, we define a new ideal client-to-client general authenticated key exchange functionality, where arbitrary 2-party key exchange protocols are applicable to protocols between the client and server and between servers. We also propose a client-to-client general authenticated key exchange protocol C2C-GAKE as a general form of the client-to-client model, and a client-to-client hybrid authenticated key exchange protocol C2C-HAKE as an example protocol of C2C-GAKE to solve the above problems. In C2C-HAKE, a server shares passwords only with clients in the same realm respectively, public/private keys are used between respective servers, and two clients between different realms share a final session key via the respective servers. Thus, with regard to password management in C2C-HAKE, the load on the server can be distributed to several servers. In addition, we prove that C2C-HAKE securely realizes the above functionality. C2CHAKE is the first client-to-client hybrid authenticated key exchange protocol that is secure in a universally composable framework with a security-preserving composition property.
  • 栗原 淳, 清本 晋作, 福島 和英, 田中 俊昭
    電子情報通信学会技術研究報告. ISEC, 情報セキュリティ 107(209) 1-8 2007年8月31日  
    本論文では,排他的論理和(XOR)を用いて高速に動作する(k,n)閾値秘密分散法(閾値法)において,いくつかの機能拡張を提案する.従来の高速な閾値法における復元手法では,分散情報の生成行列の逆行列の探索を行うため,実装上では条件分岐の多用による処理遅延が問題となる.そこで,復元時に生成行列を使用せず,分散情報のインデックスの値のみから,秘密情報を復元するための分散情報の断片の組み合わせを示す行列を,機械的に導出する手法を提案する.提案手法は,従来手法における逆行列の探索の計算量を削減し,ハードウェアおよびソフトウェアに適した実装が可能である.
  • 栗原 淳, 清本 晋作, 福島 和英, 田中 俊昭
    電子情報通信学会技術研究報告. ISEC, 情報セキュリティ 107(209) 9-15 2007年8月31日  
    本論文では,排他的論理和(XOR)を用いて高速に動作する(k,n)閾値秘密分散法(閾値法)において,いくつかの機能拡張を提案する.本論文では,part 1.で新たに導入した分散情報の構成に関する概念「特異点」を用いて,XORを用いた高速(k,n)閾値法を基にした閾値ランプ型秘密分散法と,分散情報への付加情報埋め込み方式を提案する.高速ランプ法は,従来のShamirの手法に対するランプ法と同様に,安全性をわずかに劣化させる代わりに分散情報のサイズを大幅に削減することを可能とする.また,付加情報の埋め込み方式は,ディーラーと事前に共有した権限を有する管理者のみが,秘密情報に加えて権限に対応する付加情報を復元可能とし,秘密分散法の特徴を用いた秘匿通信やアクセス制御方式を可能とする.
  • 栗原 淳, 清本 晋作, 福島 和英, 田中 俊昭
    電子情報通信学会技術研究報告. ISEC, 情報セキュリティ 107(44) 23-30 2007年5月11日  
    排他的論理和演算のみを用いて高速な秘密情報の分散・復元を可能とする(4,n)閾値秘密分散法を提案する.更に,(4,n)閾値法の分散情報の構成法を一般化して拡張し,(k,n)閾値法の構成法を示す.提案する(k,n)閾値法は,任意の閾値kと任意の分散数nで構成でき,排他的論理和演算のみで高速な分散・復元処理が可能な理想的秘密分散法である.
  • Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka
    情報処理学会論文誌 47(12) 3137-3148 2006年12月15日  
    Copyright protection is a major issue in online content-distribution services and many keymanagement schemes have been proposed for protecting content. Key-distribution processes impose large burdens even though the communications bandwidth itself is restricted in the distribution of mobile content provided to millions of users. Mobile devices also have low computational capacities. Thus a new scheme of key management where the load on the key-distribution server is optimal and loads on clients are practical is required for services. Tree-based schemes aim at reducing the load on the server and do not take reducing the load on clients into account. The load on clients is minimized in a star-based scheme on the other hand while the load on the server increases in proportion to the number of clients. These structures are far from being scalable. We first discuss a relaxation of conventional security requirements for key-management schemes in this paper and define new requirements to improve the efficiency of the schemes. We next propose the τ-gradual key-management scheme. Our scheme satisfies the new security requirements and loads on the server and it has far fewer clients than conventional schemes. It uses an intermediate configuration between that of a star- and a tree-structure that allows us to continuously change it by controlling the number of clients in a group mmax. The scheme can be classified as τ-star-based τ-treebased or τ-intermediate depending on the parameter mmax. We then present a quantitative evaluation of the load on the server and clients using all our schemes based on practical assumptions. The load on the server and that on clients involves a trade-off with the τ- intermediate scheme. We can construct an optimal key-management structure according to system requirements using our schemes while maintaining security. We describe a concrete strategy for setting parameter mmax. Finally we present general parameter settings by which loads on both the server and clients using the τ-intermediate scheme are lower than those using the τ-tree-based scheme.Copyright protection is a major issue in online content-distribution services and many keymanagement schemes have been proposed for protecting content. Key-distribution processes impose large burdens even though the communications bandwidth itself is restricted in the distribution of mobile content provided to millions of users. Mobile devices also have low computational capacities. Thus, a new scheme of key management, where the load on the key-distribution server is optimal and loads on clients are practical, is required for services. Tree-based schemes aim at reducing the load on the server and do not take reducing the load on clients into account. The load on clients is minimized in a star-based scheme, on the other hand, while the load on the server increases in proportion to the number of clients. These structures are far from being scalable. We first discuss a relaxation of conventional security requirements for key-management schemes in this paper and define new requirements to improve the efficiency of the schemes. We next propose the τ-gradual key-management scheme. Our scheme satisfies the new security requirements and loads on the server, and it has far fewer clients than conventional schemes. It uses an intermediate configuration between that of a star- and a tree-structure that allows us to continuously change it by controlling the number of clients in a group, mmax. The scheme can be classified as τ-star-based, τ-treebased, or τ-intermediate depending on the parameter, mmax. We then present a quantitative evaluation of the load on the server and clients using all our schemes based on practical assumptions. The load on the server and that on clients involves a trade-off with the τ- intermediate scheme. We can construct an optimal key-management structure according to system requirements using our schemes, while maintaining security. We describe a concrete strategy for setting parameter mmax. Finally, we present general parameter settings by which loads on both the server and clients using the τ-intermediate scheme are lower than those using the τ-tree-based scheme.
  • 清本晋作, 田中俊昭, 櫻井幸一
    情報科学技術フォーラム FIT 2006 2006年  
  • 田中俊昭, 清本晋作, 櫻井幸一
    情報処理 47(12) 2006年  
  • 山田明, 三宅優, 竹森敬祐, 田中俊昭, 山本明仁, 三田村好矩
    電子情報通信学会大会講演論文集 2005 2005年  
  • 山田明, 三宅優, 竹森敬祐, 田中俊昭
    電子情報通信学会大会講演論文集 2005 2005年  
  • 福島和英, 田端利宏, 田中俊昭, 桜井幸一
    情報処理学会論文誌 46(8) 2005年  
  • Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao
    情報処理学会論文誌 44(8) 2013-2020 2003年8月15日  
    There has recently been active research on mobile agent technology. Very few however address security issues for a practical service model such that a number of service providers are engaged over the heterogeneous network. In this paper we present a new approach on ``access control'' to realize global authorization under such environments. In our method policy files and information related with authentication for an agent are consistently managed and efficiently processed by an authentication server of each network. Furthermore for the purpose to enhance the security and realize the efficient access control new interface modules called ``secure stub'' are proposed. As the result of its evaluation it can be basically feasible to operate in our proposed system architecture. We believe that the work presented here is significant to the advancement of the existing mobile agent environments supporting secure communications.There has recently been active research on mobile agent technology. Very few, however, address security issues for a practical service model such that a number of service providers are engaged over the heterogeneous network. In this paper, we present a new approach on ``access control'' to realize global authorization under such environments. In our method, policy files and information related with authentication for an agent are consistently managed and efficiently processed by an authentication server of each network. Furthermore, for the purpose to enhance the security and realize the efficient access control, new interface modules called ``secure stub'' are proposed. As the result of its evaluation, it can be basically feasible to operate in our proposed system architecture. We believe that the work presented here is significant to the advancement of the existing mobile agent environments supporting secure communications.
  • 山田明, 清本晋作, 田中俊昭, 中尾康二
    電子情報通信学会大会講演論文集 2002 2002年  
  • 山田明, 清本晋作, 田中俊昭, 中尾康二
    電子情報通信学会技術研究報告 102(438(OIS2002 36-47)) 2002年  
  • 清本晋作, 田中俊昭, 中尾康二, 山田明
    情報処理学会シンポジウム論文集 2002(9) 2002年  
  • 山田明, 清本晋作, 田中俊昭, 中尾康二
    情報処理学会研究報告 2001(124(CSEC-15)) 2001年  

講演・口頭発表等

 9

担当経験のある科目(授業)

 1

所属学協会

 2

共同研究・競争的資金等の研究課題

 1