Curriculum Vitaes

Toshiaki Tanaka

  (田中 俊昭)

Profile Information

Affiliation
University of Hyogo
Degree
博士(工学)(Mar, 2007, 九州大学)

Contact information
toshigsis.u-hyogo.ac.jp
J-GLOBAL ID
202101019342165016
researchmap Member ID
R000015855

Papers

 111

Misc.

 33
  • Nakano Yuto, Kurihara Jun, Kiyomoto Shinsaku, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2010 139-139, Mar 2, 2010  
  • Ota Haruki, Kiyomoto Shinsaku, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2010 133-133, Mar 2, 2010  
  • NAKANO Yuto, KURIHARA Jun, KIYOMOTO Shinsaku, TANAKA Toshiaki
    IEICE technical report, 109(114) 153-159, Jun 25, 2009  
    Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based hash functions (SCHs) have not been studied sufficiently yet. In this paper, we present a model of SCHs consisting of two parts: a pre-computation phase and a stream cipher phase. We apply this model to existing broken SCHs, Abacus and Boole, and analyze the vulnerabilities corresponding to existing attacks for each part of our model. By applying our model to these algorithms, weak parts in the algorithms are revealed, and we show that these vulnerabilities can be removed by minor modifications to each part. Furthermore, we clarify the requirements for the pre-computation phase and the stream cipher phase to realize secure SCHs.
  • Kurihara Jun, Kiyomoto Shinsaku, Fukushima Kazuhide, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2009 177-177, Mar 4, 2009  
  • Fukushima Kazuhide, Kiyomoto Shinsaku, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2009(2) 569-569, Mar 4, 2009  
  • Fukushima Kazuhide, Kiyomoto Shinsaku, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2008(1) 159-159, Mar 5, 2008  
  • Kurihara Jun, Kiyomoto Shinsaku, Watanabe Ryu, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 592-592, 2008  
  • 福島和英, 清本晋作, 田中俊昭, 櫻井幸一
    情報処理学会シンポジウム論文集, 2008(8), 2008  
  • Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta
    IPSJ journal, 48(9) 3073-3088, Sep 15, 2007  
    In large-scale networks, users want to be able to communicate securely with each other over a channel that is unreliable. When the existing 2- and 3-party protocols are realized in this situation, there are several problems : a client must hold many passwords and the load on the server concerning password management is heavy. In this paper, we define a new ideal client-to-client general authenticated key exchange functionality, where arbitrary 2-party key exchange protocols are applicable to protocols between the client and server and between servers. We also propose a client-to-client general authenticated key exchange protocol C2C-GAKE as a general form of the client-to-client model, and a client-to-client hybrid authenticated key exchange protocol C2C-HAKE as an example protocol of C2C-GAKE to solve the above problems. In C2C-HAKE, a server shares passwords only with clients in the same realm respectively, public/private keys are used between respective servers, and two clients between different realms share a final session key via the respective servers. Thus, with regard to password management in C2C-HAKE, the load on the server can be distributed to several servers. In addition, we prove that C2C-HAKE securely realizes the above functionality. C2C-HAKE is the first client-to-client hybrid authenticated key exchange protocol that is secure in a universally composable framework with a security-preserving composition property.
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE technical report, 107(209) 1-8, Aug 31, 2007  
    This paper proposes several extensions of fast (k,n)-threshold schemes which use EXCLUSIVE-OR(XOR) operations. Existing fast threshold schemes need to calculate inverse matrices in recovery phase and hence these operations on software/hardware are delayed due to conditional branching in calculation of invese matrices. We introduce a new method to calculate a particular matrix in a recovery algorithm. Our method does not need to make a generator matrix for shares or to calculate inverse matrices of block matrices. The particular matrix which denotes the combination of divided pieces of shares to recover the secret is calculated by rote only from the share indexes. Futhermore, our method can be implemented without "IF" statement (conditional branching) by using word-wise XOR operations, cyclic shift operations and bit shift operations. Thus, our method can be operated more rapidly than existing schemes on software and hardware.
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE technical report, 107(209) 9-15, Aug 31, 2007  
    This paper proposes several extensions of fast (k,n)-threshold schemes which use EXCLUSIVE-OR(XOR) operations. We introduced the new concept of singular point of divided pieces of shares in part one. Several methods using singular point based on fast (k,n)-threshold schemes are proposed in this paper. These comprise a fast threshold ramp scheme and a method to embed additional information into shares. Similar to a ramp scheme based on Shamir's threshold scheme, our fast ramp scheme realizes to reduce each bit-size of shares instead of degradation of security. On the other hand, a method to embed additional information allows only participants who pre-shared the authorities with the dealer to recover not only the secret but also the additional information corresponding to the authority from k shares. Thus, this embedding method can realize a distributed subliminal channel (storage) between the dealer and the trusted participant, simple access control method and so on, which use the property of secret sharing schemes.
  • KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki
    IEICE technical report, 107(44) 23-30, May 11, 2007  
    In Shamir's (k,n)-threshold secret sharing scheme, a heavy computational cost is required to recover the secret from k shares. As a solution to this problem, several fast threshold schemes are proposed. However, there is no fast ideal (k,n)-threshold scheme, where k >_ 4 and n is arbitrary. This paper proposes a new fast (4,n)-threshold scheme using just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret, which is an ideal secret sharing scheme similar to Shamir's scheme. Furthermore, we extend and generalize the (4,n)-threshold scheme to a new fast (k,n)-threshold scheme using XOR operations with arbitrary k and n, which is also an ideal secret sharing scheme.
  • Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka
    IPSJ journal, 47(12) 3137-3148, Dec 15, 2006  
    Copyright protection is a major issue in online content-distribution services and many key-management schemes have been proposed for protecting content. Key-distribution processes impose large burdens even though the communications bandwidth itself is restricted in the distribution of mobile content provided to millions of users. Mobile devices also have low computational capacities. Thus, a new scheme of key management, where the load on the key-distribution server is optimal and loads on clients are practical, is required for services. Tree-based schemes aim at reducing the load on the server and do not take reducing the load on clients into account. The load on clients is minimized in a star-based scheme, on the other hand, while the load on the server increases in proportion to the number of clients. These structures are far from being scalable. We first discuss a relaxation of conventional security requirements for key-management schemes in this paper and define new requirements to improve the efficiency of the schemes. We next propose the τ-gradual key-management scheme. Our scheme satisfies the new security requirements and loads on the server, and it has far fewer clients than conventional schemes. It uses an intermediate configuration between that of a star- and a tree-structure that allows us to continuously change it by controlling the number of clients in a group, m_<max>. The scheme can be classified as τ-star-based, τ-tree-based, or τ-intermediate depending on the parameter, m_<max>. We then present a quantitative evaluation of the load on the server and clients using all our schemes based on practical assumptions. The load on the server and that on clients involves a trade-off with the τ-intermediate scheme. We can construct an optimal key-management structure according to system requirements using our schemes, while maintaining security. We describe a concrete strategy for setting parameter m_<max>. Finally, we present general parameter settings by which loads on both the server and clients using the τ-intermediate scheme are lower than those using the τ-tree-based scheme.
  • Watanabe Ryu, Kubota Ayumi, Tanaka Toshiaki
    5(4) 237-238, Aug 21, 2006  
  • 清本晋作, 田中俊昭, 櫻井幸一
    情報科学技術フォーラム, FIT 2006, 2006  
  • 田中俊昭, 清本晋作, 櫻井幸一
    情報処理, 47(12), 2006  
  • Watanabe Ryu, Kubota Ayumu, Tanaka Toshiaki
    Proceedings of the Society Conference of IEICE, 2005(2) "S-32", Sep 7, 2005  
  • Fukushima Kazuhide, Kiyomoto Shinsaku, Tanaka Toshiaki
    Proceedings of the Society Conference of IEICE, 2005 183-183, Sep 7, 2005  
  • WATANABE Ryu, KUBOTA Ayumu, TANAKA Toshiaki
    IEICE technical report, 105(86) 17-20, May 19, 2005  
    Recently, the number of the problems, such as the cheat action on net auction or the leakage of personal information from Internet providers, was increased as the expansion of the Internet activities. Therefore, an authentication platform on the Internet is required for secure connection. The authors have researched about Identity management mechanisms for the platform in order to protect user personal information. In this paper, we have proposed an ID management mechanism with privacy protection by using cryptographic technique, and described the implementation of the mechanism and its evaluation.
  • KIYOMOTO Shinsaku, OTA Haruki, TANAKA Toshiaki
    IEICE technical report. WBS, Wideband System, 104(733) 25-30, Mar 17, 2005  
    In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies that security protocols are provably secure based on notions of provable security in security protocols. The analyzer only evaluates core properties of security protocols that satisfy the notions, making it faster than previous tools. The analyzer automatically evaluates authentication and key distribution protocols satisfying definitions such as Secure Mutual Authentication, Semantic Security, and Forward Secrecy. Thus, the analyzer is useful for constructing and checking security protocols for many services.
  • 山田明, 三宅優, 竹森敬祐, 田中俊昭, 山本明仁, 三田村好矩
    電子情報通信学会大会講演論文集, 2005, 2005  
  • 山田明, 三宅優, 竹森敬祐, 田中俊昭
    電子情報通信学会大会講演論文集, 2005, 2005  
  • 福島和英, 田端利宏, 田中俊昭, 桜井幸一
    情報処理学会論文誌, 46(8), 2005  
  • KIYOMOTO Shinsaku, OTA Haruki, TANAKA Toshiaki
    Technical report of IEICE. ISEC, 104(315) 1-8, Sep 10, 2004  
    In this paper, we design a security protocol analyzer to verify cryptographic security protocols. Our an-alyzer checks security protocols based upon notions of provable security. The analyzer only evaluate core properties of security protocols that satisfy the notions. Thus, our analyzer will be faster than existing analyzers. The analyzer automatically evaluates authentication and key distribution protocols satisfy definitions such as Secure Mutual Authentication, Semantic Security, and Forward Secrecy. Our analyzer is useful for constructing and checking security protocols for many services.
  • Kiyomoto Shinsaku, Ota Haruki, Tanaka Toshiaki
    Proceedings of the IEICE General Conference, 2004 215-215, Mar 8, 2004  
  • Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao
    Transactions of Information Processing Society of Japan, 44(8) 2013-2020, Aug 15, 2003  
    There has recently been active research on mobile agent technology. Very few, however, address security issues for a practical service model such that a number of service providers are engaged over the heterogeneous network. In this paper, we present a new approach on "access control" to realize global authorization under such environments. In our method, policy files and information related with authentication for an agent are consistently managed and efficiently processed by an authentication server of each network. Furthermore, for the purpose to enhance the security and realize the efficient access control, new interface modules called "secure stub" are proposed. As the result of its evaluation, it can be basically feasible to operate in our proposed system architecture. We believe that the work presented here is significant to the advancement of the existing mobile agent environments supporting secure communications.
  • 山田明, 清本晋作, 田中俊昭, 中尾康二
    電子情報通信学会大会講演論文集, 2002, 2002  
  • 山田明, 清本晋作, 田中俊昭, 中尾康二
    電子情報通信学会技術研究報告, 102(438(OIS2002 36-47)), 2002  
  • 清本晋作, 田中俊昭, 中尾康二, 山田明
    情報処理学会シンポジウム論文集, 2002(9), 2002  
  • TANAKA Toshiaki, NAKAO Kouji, KIYOMOTO Shinsaku
    Technical report of IEICE. ISEC, 101(214) 15-22, Jul 18, 2001  
    Download of multimedia contents is an attractive communication service for high speed networks such as the ADSL.Under such au environment, digital streaming protocols are often used.The difficulty to authenticate the digital streaming data is as follows.First, the overhead of signing and verification processes causes a delay of transmission.Second, authentication must be possible even if some packets in the sequence are missing.To solve the above issues, we propose a practical authentication mechanism for digital streaming service.Our mechanism is based on hash chains of authenticating packets, which contains two layered chaining hierarchies.We also study a comparison with the other mehtods to show that our mechanism is practical and efficient.
  • 山田明, 清本晋作, 田中俊昭, 中尾康二
    情報処理学会研究報告, 2001(124(CSEC-15)), 2001  

Presentations

 11

Teaching Experience

 6

Professional Memberships

 3

Research Projects

 3