AIデータの保証に特化した暗号技術の開発

项目来源

日本学术振兴会基金(JSPS)

项目主持人

福光正幸

项目受资助机构

長崎県立大学

立项年度

2023

立项时间

未公开

项目编号

23K11105

项目级别

国家级

研究期限

未知 / 未知

受资助金额

4680000.00日元

学科

情報セキュリティ関連

学科代码

未公开

基金类别

基盤研究(C)

关键词

耐量子計算機暗号 ; 格子 ; 対称鍵 ; グループ署名 ; 集約署名 ; 述語集約署名 ; 緊密な安全性 ; 同期型集約署名 ; リング署名 ; 共通鍵 ; AIデータ ; ディジタル署名 ; 署名サイズ効率 ; 匿名性 ;

参与者

穴田啓晃;長谷川真吾

参与机构

長崎県立大学,情報システム学部;明治学院大学,情報数理学部;福島大学,共生システム理工学類

项目标书摘要:2024年度については,当初の予定通り,格子ベースの集団保証署名の実現と,これら格子ベースの圧縮可能署名と集団保証を基礎として,圧縮可能集団署名の設計を実施できている.一方,最新研究を調査したところ述語集約署名が提唱されていることが判明した.この述語集約署名に対する不正特定機能を実現することが,今後の良い方向性との着想を得た.以上より上述の通り結論付けた.2024年度については,まずは2023年度から実施している格子ベースの集団保証署名を実現すことと,これら格子ベースの圧縮可能署名と集団保証を基礎として,圧縮可能集団署名の設計について検討を行い,さらに,これに適した不正特定機能を実現することであった.この推進方策に対し,集団保証署名については,対称鍵要素を用いたグループ署名や,格子ベースのグループ署名を開発した.特に,格子ベースの方式については,その効率性の評価と共に,国内シンポジウム及び国際会議にて成果報告を実施した.なお,当該研究の国際会議にて「CANDAR Outstanding Papers Award」を受賞した.また,新たな方向性として,「部分体双線形衝突問題」をベースとした署名の設計も検討し,国内学会で発表した.次いで,圧縮可能署名については,2023年度から実施している格子ベースの「集約署名」の開発を継続した.その結果,「緊密な安全性(Tight Security)」と呼ばれる強い安全性を持つことを発見し,この成果を国際会議にて報告済みである.圧縮可能署名と集団保証を基礎とした圧縮可能集団署名の実現に関し,最新研究の論文を調査したところ,近年「述語集約署名(Predicate Aggregate Signature)」と呼ばれる新たな概念が提唱されていることが判明した.これは,当プロジェクトで目指す署名方式として関連性が強かったため,これまでの当プロジェクトの成果を基に,量子コンピュータからの攻撃に耐性のあるとされる格子ベースの方式の開発をはじめ,この成果を国内シンポジウムにて公表している.また,上述の基盤となりうる格子ベースの署名技術における,複数ユーザが存在する環境下でなおかつユーザの署名鍵情報が漏洩した状況での偽造困難性について考察し,国際会議にて発表した.2025年度については,2024年度より実施している格子ベースの述語集約署名の開発を継続し,さらに,この述語集約署名をベースとした不正特定機能について議論することも検討している.Reason:2024年度については,当初の予定通り,格子ベースの集団保証署名の実現と,これら格子ベースの圧縮可能署名と集団保証を基礎として,圧縮可能集団署名の設計を実施できている.一方,最新研究を調査したところ述語集約署名が提唱されていることが判明した.この述語集約署名に対する不正特定機能を実現することが,今後の良い方向性との着想を得た.以上より上述の通り結論付けた。Outline of Research at the Start:攻撃者が不正データを混入することにより,AIからの結果を故意に誘導する「不正データ混入攻撃」への懸念がある.本研究では,データとその提供者の正当性を保証することで,不正データを排除し,AIに与えないという抜本的な解決が可能な新たな暗号技術を開発する.この開発に際し,AIに与える膨大なデータを扱うため,圧縮可能署名(膨大な署名データを1データに圧縮できる署名技術の総称)と,データ提供者のプライバシー保護のため,集団保証署名(複数人からなる集団メンバのうちの誰かが署名データを生成した事実のみを保証する技術の総称)と呼ばれるディジタル署名技術に着目する。

  • 排序方式:
  • 1
  • /
  • 1.Lyubashevsky’s Signature Has Multi-User Security under Adaptive Corruptions and Key Leakages

    • 关键词:
    • Authentication;Crime;Electronic document identification systems;Information leakage;Lattice theory;Network security;Number theory;Public key cryptography;Adaptive corruptions;Lattice signature;Lattice-based;Leakage-resilience;Multi-user setting;Multiusers;Secret key;Signature Scheme;Single users;User setting
    • Fukumitsu, Masayuki;Hasegawa, Shingo
    • 《IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences》
    • 2026年
    • E109.A卷
    • 3期
    • 期刊

    We consider the multi-user security under the adaptive corruptions and key leakages (MUc&l security) for lattice-based signatures. There already exists an MUc&l secure signature based on a number-theoretic assumption, or a leakage-resilient lattice-based signature in the single-user setting. However, MUc&l secure lattice-based signature is not known. We examine the existing lattice-based signature schemes from the viewpoint of MUc&l security. We find that the security of the Lyubashevsky’s signature, which is proven to have the ordinary single-user security only, can be extended to the multi-user security even if we take into account the adaptive corruptions and the key leakages. Our security proof in the multi-user setting makes use of the feature of the SIS problem so that a SIS instance is set to the public parameter and a reduction algorithm can set a public key with a secret key in order to answer a corruption query. We also show that the entropy of the secret key is kept under the bounded leakage with a high probability and then the leakage resilience of signature holds. Copyright © 2026 The Institute of Electronics, Information and Communication Engineers.

    ...
  • 2.Tightly Secure Aggregate Signature with Pre-Communication

    • 关键词:
    • Aggregates;Authentication;Network security;Public key cryptography;Reduction;Aggregate signature;Aggregate signature with pre-communication;Bilinear map;Cryptographic assumptions;DDH assumptions;Key models;Knowledge of secret key model;Pairing-free;Secret key;Security reduction
    • Fukumitsu, Masayuki;Hasegawa, Shingo
    • 《IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences》
    • 2025年
    • E108.A卷
    • 9期
    • 期刊

    Aggregate signatures without the bilinear map is a challenging and important problem in aspects of both practical and theoretical cryptology. In order to construct an aggregate signature which does not use the bilinear map, it is general to restrict some functionality of aggregate signatures or to employ strong cryptographic assumptions. The aggregate signature with the pre-communication (ASwPC) is one of the variants of aggregate signatures to achieve the security from a standard cryptographic assumption without the bilinear map. The ASwPC requires signers to interact with each other to share a temporary randomness before they determine their messages to be signed. After the pre-communication, each signer can start the signing process individually. An instantiation of ASwPC is given based on the discrete logarithm (DL) assumption, and its security is proven in the random oracle and the knowledge of secret key (KOSK) model via a loose security reduction. In this paper, we aim to construct a new ASwPC scheme whose security is proven via a tight security reduction. We employ the DDH assumption rather than the DL assumption. The combination of the property of the decisional assumption and that of the KOSK model enables us to apply the lossy key technique even in the case of ASwPC. Then we can prove the security of our scheme with a tight security reduction. Copyright © 2025 The Institute of Electronics, Information and Communication Engineers.

    ...
  • 3.On Multi-User Security ofLattice-Based Signature Under Adaptive Corruptions andKey Leakages

    • 关键词:
    • Authentication;Crime;Public key cryptography;Adaptive corruptions;Lattice signature;Lattice-based;Leakage-resilience;Multi-user setting;Multiusers;Secret key;Signature Scheme;Single users;User setting
    • Fukumitsu, Masayuki;Hasegawa, Shingo
    • 《18th International Conference on Provable and Practical Security, ProvSec 2024》
    • 2025年
    • September 25, 2024 - September 27, 2024
    • Gold Coast, QLD, Australia
    • 会议

    We consider the multi-user security under the adaptive corruptions and key leakages (MUc&l security) for lattice-based signatures. Although there exists an MUc&l secure signature based on a number-theoretic assumption, or a leakage-resilient lattice-based signature in the single-user setting, MUc&l secure lattice-based signature is not known. We examine the existing lattice-based signature schemes from the viewpoint of MUc&l security, and find that the security of the Lyubashevsky’s signature, which is proven to have the ordinary single-user security only, can be extended to the multi-user security even if we take the adaptive corruptions and the key leakages into account. Our security proof in the multi-user setting makes use of the feature of the SIS problem so that a SIS instance is set to the public parameter and a reduction algorithm can set a public key with a secret key in order to answer a corruption query. We also show that the entropy of the secret key is kept under the bounded leakage with a high probability and then the leakage resilience of signature holds. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.

    ...
  • 4.Tightly Secure Lattice-Based Synchronized Aggregate Signature inStandard Model

    • 关键词:
    • Authentication;Electronic document identification systems;Network security;Public key cryptography;Synchronization;Aggregate signature;Lattice;Lattice-based;Multisignature scheme;Quanta computers;Signature Scheme;Standard model;Synchronized aggregate signature;The standard model;Tightness
    • Anada, Hiroaki;Fukumitsu, Masayuki;Hasegawa, Shingo
    • 《27th International Conference on Information Security and Cryptology, ICISC 2024》
    • 2025年
    • November 20, 2024 - November 22, 2024
    • Seoul, Korea, Republic of
    • 会议

    Synchronized aggregate signature (AS) can aggregate multiple individual signatures into one signature, when the individual signatures are generated at the same period. Although several synchronized AS schemes have been proposed, all of them are not quantum computer resistant. In this paper, we discuss a lattice-based synchronized AS that is secure in the standard model and the certified-key model. The proposed scheme is based on the multi-signature scheme proposed by Fleischhacker, Herold, Simkin and Zhang. We convert their multi-signature scheme into the synchronized AS scheme by separating a public key into two parts and applying the homomorphic vector commitment to each part. Our technique can handle hash values of messages as coefficients of homomorphic operation even if a message is different for each user, and then we can aggregate individual signatures for different messages into one signature. Our result is not only the first lattice-based synchronizedAS but also the first lattice-based AS secure in the standard model. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.

    ...
  • 5.Group Signatures with Designated Traceability over Openers' Attributes from Lattices

    • 关键词:
    • Anonymity;Authentication;Crystal lattices;Image coding;Public key cryptography;Quantum cryptography;Access structure;Attribute;Ciphertext-policy attribute-based encryptions;Generic construction;Group managers;Group signatures;Lattice;Lattice-based;Opener;Symmetric keys
    • Anada, Hiroaki;Fukumitsu, Masayuki;Hasegawa, Shingo
    • 《12th International Symposium on Computing and Networking, CANDAR 2024》
    • 2024年
    • November 26, 2024 - November 29, 2024
    • Naha, Japan
    • 会议

    The group signature with designated traceability (GSdT) is a kind of group signatures (GS) which aim to restrict the opening authority of the group manager; by setting an access structure over openers' attributes at the signing, a signer is able to control openers who can open the signature. A generic construction of GSdT was given when the notion was introduced, then a pairing-based construction and a symmetric-key-based one were presented. Nonetheless, it remains open whether or not a post-quantum GSdT that has full anonymity can be really constructed.In this paper, we give a lattice-based GSdT scheme that has full anonymity for the first time. In our construction, the lattice-based ciphertext-policy attribute-based encryption (CP-ABE) by Tsabary and the lattice-based group signatures (GS) by Libert et al. are employed. The CP-ABE is based on the Regev public-key encryption, while the GS uses a non-interactive zero-knowledge proof to prove the correctness of the encryption in the signing process. Based on the compatibility, we combine and modify them to build up a GSdT scheme. © 2024 IEEE.

    ...
  • 6.Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key Primitives

    • 关键词:
    • Anonymity;Authentication;Boolean functions;Hash functions;Quantum cryptography;Trees (mathematics);Access structure;Accountability;Attribute-based;Group signature scheme;Group signatures;Post quantum;Pseudo-random functions;Symmetric keys;Symmetric-key primitive;Traceability
    • Anada, Hiroaki;Fukumitsu, Masayuki;Hasegawa, Shingo
    • 《21st Annual International Conference on Privacy, Security and Trust, PST 2024》
    • 2024年
    • August 28, 2024 - August 30, 2024
    • Sydney, NSW, Australia
    • 会议

    A group signature scheme in which signers are able to designate openers by specifying access structures over openers' attributes was introduced at CANDAR 2021, which is called GSdT. In this paper, we present a construction of GSdT from only symmetric-key primitives; pseudorandom functions, hash functions and commitments. Due to the features, our GSdT is expected to be secure against computational power of quantum computers. We first introduce syntax and security definitions in the static group model. Then, in our construction, the key ingredient is a non-interactive zero-knowledge proof of knowledge system that is constructed from the primitives in the 'MPC-in-the-head' paradigm, owing the technique that was developed by Katz, Kolesnikov and Wang (ACM-CCS 2018). Our approach starts with their group signature scheme, but non-trivially extends the Merkle tree so that signers can treat (all-AND) boolean formulas as the access structures. According to our estimation, the signing time is less than 3.0 sec and the signature size is less than 0.5 MB in a scenario that the numbers of group members and attributes are 27 and 23, respectively, and security to be attained is 128 bit quantum security. © 2024 IEEE.

    ...
  • 7.Accountable Ring Signatures from Symmetric-Key Primitives*

    • 关键词:
    • Authentication;Electronic document identification systems;Network security;Accountability;Anonymity;Multiparty computation;Post-quantum securities;Pseudo-random functions;Ring signature schemes;Ring signatures;Symmetric keys;Traceability;Zero-knowledge proofs
    • Anada, Hiroaki;Fukumitsu, Masayuki;Hasegawa, Shingo
    • 《11th International Symposium on Computing and Networking, CANDAR 2023》
    • 2023年
    • November 28, 2023 - December 1, 2023
    • Matsue, Japan
    • 会议

    We propose an accountable ring signature scheme (ARS) that is constructed from only symmetric-key primitives; pseudorandom functions, hash functions and commitments. Introducing interaction between a user and an opener in the key-issuing phase, our ARS is a composition of the previous two schemes of the ring and group signatures that were proposed by Katz et al. at ACM-CCS 2018. It attains two non-Trivial features. One is effective use of the Merkle trees to keep the length of a signature logarithmic to the size of a ring. The other is post-quantum security due to the security properties of the building blocks. © 2023 IEEE.

    ...
  • 排序方式:
  • 1
  • /