研究者業績

Toshiaki Tanaka

  (田中 俊昭)

Profile Information

Affiliation
University of Hyogo
Degree
博士(工学)(Mar, 2007, 九州大学)

Contact information
toshigsis.u-hyogo.ac.jp
J-GLOBAL ID
202101019342165016
researchmap Member ID
R000015855

Papers

 100
  • Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai
    IEICE Trans. Inf. Syst., 97-D(1) 43-52, 2014  Peer-reviewed
  • The 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2012), 1755-1762, Jun, 2012  Peer-reviewed
  • Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka
    International Conference on Security and Cryptography (Secrypt2011), 362-369, 2011  Peer-reviewed
  • Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka
    Sixth International Conference on Availability, Reliability and Security(ARES), 442-447, 2011  Peer-reviewed
  • KURIHARA Jun, KIYOMOTO Shinsaku, WATANABE Ryu, TANAKA Toshiaki
    The Journal of the Institute of Television Engineers of Japan, 64(12) 1921-1932, Dec 1, 2010  
    In this paper, we present an authentication mechanism for ISDB-T broadcast streams, especially a One-Seg broadcast stream, which is suitable for low-power devices. Our method makes it possible to authenticate data streams at a low computational cost. The method requires a small memory for buffering to process the broadcast stream and is resistant to packet-loss. We evaluated the computational cost of our method by computer simulation and theoretical estimation, and we show here that our method achieved good properties for authenticating data streams broadcast through lossy channels, e.g. wireless channels. Furthermore, we developed a mobile phone that can authenticate One-Seg broadcast streams with our method, and we report the effectiveness of our scheme here.

Misc.

 21
  • Nakano Yuto, Kurihara Jun, Kiyomoto Shinsaku, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2010 139-139, Mar 2, 2010  
  • NAKANO Yuto, KURIHARA Jun, KIYOMOTO Shinsaku, TANAKA Toshiaki
    IEICE technical report, 109(114) 153-159, Jun 25, 2009  
    Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based hash functions (SCHs) have not been studied sufficiently yet. In this paper, we present a model of SCHs consisting of two parts: a pre-computation phase and a stream cipher phase. We apply this model to existing broken SCHs, Abacus and Boole, and analyze the vulnerabilities corresponding to existing attacks for each part of our model. By applying our model to these algorithms, weak parts in the algorithms are revealed, and we show that these vulnerabilities can be removed by minor modifications to each part. Furthermore, we clarify the requirements for the pre-computation phase and the stream cipher phase to realize secure SCHs.
  • Kurihara Jun, Kiyomoto Shinsaku, Fukushima Kazuhide, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2009 177-177, Mar 4, 2009  
  • Kurihara Jun, Kiyomoto Shinsaku, Watanabe Ryu, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 592-592, 2008  

Presentations

 9

Teaching Experience

 1

Professional Memberships

 2

Research Projects

 1