Directory of Researchers

SHIRAISHI Yoshiaki
Graduate School of Engineering / Department of Electrical and Electronic Engineering
Associate Professor
Other Natural Science Field
Last Updated :2022/04/15

Researcher Profile and Settings

Affiliation

  • <Faculty / Graduate School / Others>

    Graduate School of Engineering / Department of Electrical and Electronic Engineering
  • <Related Faculty / Graduate School / Others>

    Faculty of Engineering / Department of Electrical and Electronic Engineering, Center for Mathematical and Data Sciences

Teaching

  • Graduate School of Engineering / Department of Electrical and Electronic Engineering, 2021, Knowledge Assisted Coding
  • Faculty of Engineering / Department of Electrical and Electronic Engineering, 2021, Design of Electric Systems and Equipments A
  • Faculty of Engineering / Department of Electrical and Electronic Engineering, 2021, Creative Seminar
  • Faculty of Engineering / Department of Electrical and Electronic Engineering, 2021, Information Theory
  • Faculty of Engineering / Department of Electrical and Electronic Engineering, 2021, Design of Electric Systems and Equipments B
  • Faculty of Engineering / Department of Electrical and Electronic Engineering, 2021, Computer Programming Practice IA
  • Faculty of Engineering / Department of Electrical and Electronic Engineering, 2021, Computer Programming Practice I
  • Faculty of Engineering / Department of Electrical and Electronic Engineering, 2021, Computer Programming Practice IB

Research Activities

Research Interests

  • usable security
  • machine learning applications
  • information security
  • information and communication system security
  • authentication / authorization
  • blockchain applications
  • privacy enhancement technology
  • Cyper Threat Intelligence
  • cyber attack analysis
  • cybersecurity
  • cryptography
  • computer networks
  • computer security
  • network security

Research Areas

  • Informatics / Information security
  • Manufacturing technology (mechanical, electrical/electronic, chemical engineering) / Communication and network engineering
  • Informatics / Information networks
  • Informatics / Computer systems
  • Informatics / Information theory

Committee Memberships

  • May 2021 - Mar. 2022, 情報処理学会コンピュータセキュリティシンポジウム(CSS2021)実行委員会, 2020委員
  • Jan. 2021 - Jan. 2022, Organizing Committee of Symposium on Cryptography and Information Security (SCIS), Publicity co-chairs
  • Oct. 2019 - Mar. 2021, 情報処理学会コンピュータセキュリティシンポジウム2020(CSS2020)実行委員会, 副実行委員長
  • Dec. 2018 - Aug. 2019, AsiaJCIS2019実行委員会, 実行委員長
  • Jun. 2017 - May 2019, 電子情報通信学会 情報通信システムセキュリティ研究専門委員会, 専門委員長
  • Jun. 2015 - May 2017, 電子情報通信学会 情報通信システムセキュリティ研究専門委員会, 副専門委員長
  • Jun. 2015 - May 2017, 電子情報通信学会関西支部, 庶務幹事
  • Jun. 2013 - May 2015, 電子情報通信学会 情報通信システムセキュリティ研究専門委員会, 幹事
  • Jun. 2011 - May 2013, 電子情報通信学会 情報通信システムセキュリティ研究専門委員会, 幹事補佐
  • 2010, 情報処理学会, コンピュータセキュリティシンポジウム2010(CSS2010)実行委員, 情報処理学会
  • 2010, 電子情報通信学会, ライフログ処理技術とその活用システム特集号(和文論文誌D)編集委員会 編集幹事, 電子情報通信学会
  • 2009, 電子情報通信学会, 2010年暗号と情報セキュリティシンポジウム(SCIS2010)実行委員, 電子情報通信学会
  • 2009, 電子情報通信学会, ライフインテリジェンスとオフィス情報システム研究専門委員会 専門委員, 電子情報通信学会
  • 2009, 電子情報通信学会, 和文論文誌D編集委員会 編集委員, 電子情報通信学会
  • 2007 - 2009, 電子情報通信学会, 情報セキュリティ研究専門委員会 幹事, 電子情報通信学会
  • 2006 - 2007, 電子情報通信学会, 情報セキュリティ研究専門委員会 幹事補佐, 電子情報通信学会

Awards

  • Jan. 2022 暗号と情報セキュリティシンポジウムSCISイノベーション論文賞

  • Mar. 2021 電子情報通信学会, 教育功労賞

  • Oct. 2020 情報処理学会コンピュータセキュリティシンポジウム, 最優秀デモンストレーション賞

  • May 2017 電子情報通信学会情報セキュリティ研究専門委員会, 活動貢献感謝状

  • May 2017 電子情報通信学会関西支部, 活動功労賞

  • Jan. 2015 情報処理学会高度交通システム研究会優秀論文賞

    MATSUKAWA Tomoki, YAMAMOTO Taisuke, FUKUTA Youji, HIROTOMO Masanori, MOHRI Masami, SHIRAISHI Yoshiaki

    “Reading Out Scheme for Digitally Signed Random Network Coded Communication on VANET”, 2014-ITS-56(6), pp.1-7, March, 2014.

    Japan society

  • Aug. 2013 情報処理学会マルチメディア、分散、協調とモバイル(DICOMO2013)シンポジウム優秀論文賞

    成瀬 猛, 毛利 公美, SHIRAISHI Yoshiaki

    前方秘匿性を満たす属性失効機能付き属性ベース暗号

    Japan society

  • 2008 情報処理学会マルチメディア,分散,協調とモバイル(DICOMO2008)シンポジウム優秀論文賞

  • 2007 情報処理学会マルチメディア,分散,協調とモバイル(DICOMO2007)シンポジウム優秀論文賞

  • 2006 電子情報通信学会2005年暗号と情報セキュリティシンポジウム(SCIS2005)論文賞

  • 2003 電子情報通信学会暗号と情報セキュリティシンポジウム(SCIS)20周年記念賞

  • 2002 電子情報通信学会オフィスシステム研究賞

Published Papers

  • Ryusei NAGASAWA, Keisuke FURUMOTO, Makoto TAKITA, Yoshiaki SHIRAISHI, Takeshi TAKAHASHI, Masami MOHRI, Yasuhiro TAKANO, Masakatu MORII

    Corresponding, Institute of Electronics, Information and Communications Engineers (IEICE), 01 May 2021, IEICE Transactions on Information and Systems, E104.D (5), 556 - 561, English

    [Refereed]

    Scientific journal

  • Related Paper Search by Pretrained Language Model -Paper Navigation System for Computer Security Symposium-

    Yusuke TOMITA, Masami MOHRI, Yoshiaki SHIRAISHI

    Last, Mar. 2021, 情報処理学会第83回全国大会, 3, 469 - 470, Japanese

    Research society

  • Service Container Enabling Authentication and Authorization to Websites

    Tsukasa IWAHARA, Masami MOHRI, Yoshiaki SHIRAISHI

    Last, Mar. 2021, 情報処理学会第83回全国大会, 3, 467 - 468, Japanese

    Research society

  • An Application of Secret Search using Homomorphic Encryption to Log analysis

    Tsubasa INOUE, Youji FUKUTA, Masanori HIROTOMO, Yoshiaki SHIRAISHI

    Last, Mar. 2021, 情報処理学会第83回全国大会, 3, 401 - 402, Japanese

    Research society

  • A Whitelist Composition Method for Detecting Tampering of Programs Running on IoT Devices

    Takuya Nishimoto, Youji Fukuta, Masanori Hirotomo, Yoshiaki Shiraishi

    Last, Mar. 2021, 電子情報通信学会総合大会, 57, Japanese

    Research society

  • Two-Layered QR Codes and Their Principles

    川原大弥, 山崎康平, 瀧田 愼, 白石善明, 森井昌克

    21 Jan. 2021, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム), 120 (324), 81 - 86, Japanese

    Symposium

  • Windows APIコールログからのマルウェアの動作再現 ~ 主要なWin32 APIへの対応と動作再現後の状態復元の検討 ~

    松田尚也, 福田洋治, 廣友雅徳, 白石善明

    Last, 21 Jan. 2021, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム), 120 (no.324), 75 - 80, Japanese

    Symposium

  • Development of Hologram QR Codes – Two-Layered QR Codes and Their Principles –

    Hiroya Kawahara, Kohei Yamasaki, Makoto Takita, Yoshiaki Shiraishi, Masakatu Morii

    Jan. 2021, 暗号と情報セキュリティシンポジウム予稿集, (2E4-1), 1 - 8, Japanese

    Symposium

  • Multi-Labeling by Topic Models for Security Information Retrieval

    Yuki Osada, Makoto Takita, Keisuke Furumoto, Yoshiaki Shiraishi, Takeshi Takahashi, Masami Mohri, Yasuhiro Takano, Masakatu Morii

    Corresponding, Jan. 2021, 暗号と情報セキュリティシンポジウム予稿集, (2C3-3), 1 - 8, Japanese

    Symposium

  • Thin Tharaphe Thein, Yuki Ezawa, Shunta Nakagawa, Keisuke Furumoto, Yoshiaki Shiraishi, Masami Mohri, Yasuhiro Takano, Masakatu Morii

    Information Processing Society of Japan, Dec. 2020, Journal of Information Processing, 28 (0), 1025 - 1029, English

    [Refereed]

    Scientific journal

  • SoK: Ontology Utilization in Security Field towards Data-driven Society

    Ryoya Furukawa, Yoshiaki Shiraishi, Masakatu Morii

    Dec. 2020, 情報処理学会論文誌, 61 (12), 1802 - 1813, Japanese

    [Refereed]

    Scientific journal

  • Shinobu OGISO, Masami MOHRI, Yoshiaki SHIRAISHI

    Last, IEEE, 20 Oct. 2020, 2020 International Symposium on Networks, Computers and Communications (ISNCC), English

    [Refereed]

    International conference proceedings

  • Malicious Domain Detection Based on Decision Tree

    Thin Tharaphe Thein, Yoshiaki Shiraishi, Masakatu Morii

    19 Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 17 - 20, English

    Symposium

  • A Secure Computation Protocol of Inner Product Using HQC Cryptosystem (II)

    Taiga Nakayama, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi

    Last, Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 1110 - 1117, Japanese

    Symposium

  • A Countermeasure against Ransomware and Their Implementation

    Ryosuke Kokado, Masato Ikegami, Yusuke Sumida, Hiroshi Kitani, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 926 - 931, Japanese

    Symposium

  • A Discovery of a Method for Attacking against Bluetooth Low Energy and its Prevention

    Kentaro Ishii, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 906 - 911, Japanese

    Symposium

  • Applying Outlier Detection to Improving Modeling Accuracy of Topic Models for Multi-Labeling Security Reports

    Yuki Osada, Makoto Takita, Keisuke Furumoto, Yoshiaki Shiraishi, Takeshi Takahashi, Masami Mohri, Yasuhiro Takano, Masakatu Morii

    Corresponding, Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 847 - 852, Japanese

    Symposium

  • Partition-Then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topic Model

    Ryusei Nagasawa, Keisuke Furumoto, Makoto Takita, Yoshiaki Shiraishi, Takeshi Takahashi, Masami Mohri, Yasuhiro Takano, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 840 - 846, Japanese

    Symposium

  • Effective DoS Attacks against Wireless LAN Devices and Countermeasures

    Keito Kubota, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 826 - 831, English

    Symposium

  • Evaluation of Kr00k in the Real Environment and Its Improvements

    Keito Kubota, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 820 - 825, Japanese

    Symposium

  • A Survey on Wireless Secure-Transmission Techniques

    Yasuhiro Takano, Yoshiaki Shiraishi, Masakatsu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 815 - 819, Japanese

    Symposium

  • IoT Honeypot Using Raspberry Pi

    Kosuke Sakagawa, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi

    Last, Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 661 - 664, Japanese

    Symposium

  • Predicting Malware Outbreak Using Large-Scale Time-Series Data

    Naoto Yoshimura, Masato Ikegami, Yusuke Sumida, Hiroshi Kitani, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 653 - 660, Japanese

    Symposium

  • RAMBleed Attack against OpenSSL

    Chihiro Tomita, Makoto Takita, Masanori Hirotomo, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 416 - 421, Japanese

    Symposium

  • Effective RAMBleed Attack on DRAM

    Kazuhiro Nishio, Makoto Takita, Masanori Hirotomo, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 410 - 415, Japanese

    Symposium

  • Transparent Provable Data Possession Scheme Based on Discrete Logarithm Problem for Cloud Storage

    Shinobu Ogiso, Masami Mohri, Yoshiaki Shiraishi

    Last, Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 389 - 395, Japanese

    Symposium

  • User-Managed Access-Based Cross Domain Authorization Framework with Hyperledger Fabric

    Yuki Ezawa, Shohei Kakei, Yoshiaki Shiraishi, Makoto Takita, Masami Mohri, Masakatu Morii

    Corresponding, Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 137 - 144, Japanese

    Symposium

  • Definition of Event Dependent Model and Implementation of Damage Prediction System of Unlawful Access Using It

    Kotone Tomiie, Ryosuke Kokado, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2020, コンピュータセキュリティシンポジウム2020論文集, 109 - 114, Japanese

    Symposium

  • HQC暗号を応用した秘匿内積計算プロトコル

    中山太雅, 廣友雅徳, 福田洋治, 毛利公美, 白石善明

    Last, 04 Sep. 2020, 電子情報通信学会技術研究報告(情報理論), 120 (157), 31 - 36, Japanese

    Symposium

  • Kenta Nomura, Yoshiaki Shiraishi, Masami Mohri, Masakatu Morii

    Institute of Electrical and Electronics Engineers (IEEE), Aug. 2020, IEEE Access, 8, 144458 - 144467

    [Refereed]

    Scientific journal

  • Shohei Kakei, Yoshiaki Shiraishi, Masami Mohri, Toru Nakamura, Masayuki Hashimoto, Shoichi Saito

    Institute of Electrical and Electronics Engineers (IEEE), Jul. 2020, IEEE Access, 8, 135742 - 135757

    [Refereed]

    Scientific journal

  • Mazen Alowish, Yoshiaki Shiraishi, Yasuhiro Takano, Masami Mohri, Masakatu Morii

    Institute of Electrical and Electronics Engineers (IEEE), Jul. 2020, IEEE Access, 8, 135138 - 135151

    [Refereed]

    Scientific journal

  • TAKANO Yasuhiro, Hsuan-Jung Su, SHIRAISHI Yoshiaki, MORII Masakatu

    Dec. 2019, IEEE Trans. on Signal Processing, 68, 300 - 313, English

    [Refereed]

    Scientific journal

  • 分散型認証基盤に向けたスマートコントラクトを用いた相互認証方式の提案

    掛井 将平, 白石 善明, 毛利 公美, 中村 徹, 橋本 真幸, 齋藤 彰一

    Oct. 2019, コンピュータセキュリティシンポジウム2019 論文集, Japanese

    Symposium

  • Yuki Ezawa, Makoto Takita, Yoshiaki Shiraishi, Shohei Kakei, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Masakatu Morii

    Data is accumulated daily in a society where the Internet has infiltrated. In order to further develop the industry, it is effective to establish a framework that can share and use data resources widely. If the IoT devices and various services trade data without human intervention, they will be able to provide new services that enrich our lives. If an authentication and authorization system that can openly confirm the data owners and give authority to them is constructed, various services, not limited to a single service, can authenticate and authorize the devices, and the data sharing will be promoted. In this paper, we propose a system that uses blockchain as a database for storing credentials and authority information and allows users and services to perform authentication and authorization based on that information.

    09 Sep. 2019, 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 111 - 118, English

    [Refereed]

    International conference proceedings

  • HPKI認証の特長を考慮した在宅医療介護システムにおける患者情報の開示先制御

    竹尾 淳, 稲吉 陽一朗, 白石 善明, 加藤 昇平, 矢口 隆明, 岩田 彰

    15 Jun. 2019, 情報処理学会論文誌, 60 (6), 1228 - 1237, Japanese

    [Refereed]

    Scientific journal

  • 組織に対する脅威レポートのオントロジーを用いた生成

    永井 達也, 瀧田 愼, 古本 啓祐, 白石 善明, 毛利 公美, 髙野 泰洋, 森井 昌克

    Mar. 2019, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-79, 95 - 100, Japanese

    Symposium

  • 出力クラスを明示的に誘導可能な敵対的生成モデルを利用した脅威情報分析手法の検討

    古本 啓祐, 金原 秀明, 高橋 健志, 白石 善明, 井上 大介

    Mar. 2019, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-81, 105 - 110, Japanese

    Symposium

  • 自己主権型身分証明のためのブロックチェーンを用いた擬似ランダム関数に基づく認証方式

    土田 敏生, 瀧田 愼, 白石 善明, 毛利 公美, 髙野 泰洋, 森井 昌克

    Mar. 2019, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-86, 161 - 166, Japanese

    Symposium

  • 脅威情報のモデル化のためのセキュリティレポートからのイベント情報の抽出

    中川 舜太, 永井 達也, 金原 秀明, 古本 啓祐, 瀧田 愼, 白石 善明, 高橋 健志, 毛利 公美, 髙野 泰洋, 森井 昌克

    Mar. 2019, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-78, 89 - 94, Japanese

    Symposium

  • ブロックチェーンを用いた認証・認可システムとデータ流通プラットフォームの一実現法 ~ IoTデバイス向けWebベースクラウドストレージ ~

    江澤 友基, 掛井 将平, 瀧田 愼, 白石 善明, 毛利 公美, 髙野 泰洋, 森井 昌克

    Mar. 2019, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-87, 167 - 172, Japanese

    Symposium

  • Windows APIコールのログからのマルウェアの動作再現の検討

    末吉 真也, 福田 洋治, 廣友 雅徳, 毛利 公美, 白石 善明

    Mar. 2019, 情報処理学会第81回全国大会, 4ZA-02, Japanese

    Symposium

  • TPMのAIK証明書と関連付く公開鍵証明書の発行について

    末吉 真也, 福田 洋治, 廣友 雅徳, 毛利 公美, 掛井 将平, 白石 善明

    Mar. 2019, 情報処理学会第81回全国大会, 6ZA-05, Japanese

    Symposium

  • Encoder-Decoderモデルを用いたセキュリティレポートに出現する用語の説明文の生成

    乾 智裕, 永井 達也, 中川 舜太, 古本 啓祐, 瀧田 愼, 白石 善明, 毛利 公美, 髙野 泰洋, 森井 昌克

    Mar. 2019, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-80, 101 - 104, Japanese

    Symposium

  • 高密度パリティ検査行列を用いた2元シンドローム復号問題に基づく認証方式について(II)

    伊東 春香, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    電子情報通信学会, Jan. 2019, 暗号と情報セキュリティシンポジウム, 3B2-6, Japanese

    Symposium

  • Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.

    Shunta Nakagawa, Tatsuya Nagai, Hideaki Kanehara, Keisuke Furumoto, Makoto Takita, Yoshiaki Shiraishi, Takeshi Takahashi 0001, Masami Mohri, Yasuhiro Takano, Masakatu Morii

    Corresponding, 2019, IEICE Trans. Inf. Syst., 102-D (9), 1679 - 1682

    [Refereed]

    Scientific journal

  • Tatsuya Nagai, Makoto Takita, Keisuke Furumoto, Yoshiaki Shiraishi, Kelin Xia, Yasuhiro Takano, Masami Mohri, Masakatu Morii

    2019, JIP, 27, 802 - 809

    [Refereed]

    Scientific journal

  • Authentication Scheme Using Pre-Registered Information on Blockchain.

    Toshiki Tsuchida, Makoto Takita, Yoshiaki Shiraishi, Masami Mohri, Yasuhiro Takano, Masakatu Morii

    2019, IEICE Transactions, 102-D (9), 1676 - 1678

    [Refereed]

    Scientific journal

  • Estimating and Forwarding Unreceived Symbols for Random Network Coded Communication

    SHIRAISHI Yoshiaki, FUKUTA Youji, HIROTOMO Masanori, MOHRI Masami

    2019, Proc. of 11th International Conference on Computational Intelligence and Communication Networks, English

    [Refereed]

    International conference proceedings

  • 話題誘導するトピックモデルを用いたセキュリティレポートからの攻撃傾向の把握

    永井 達也, 乾 智裕, 瀧田 愼, 古本 啓祐, 白石 善明, 髙野 泰洋, 毛利 公美, 森井 昌克

    Nov. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-58, 31 - 36, Japanese

    Symposium

  • 匿名性を考慮したTPMを用いるSSLクライアント認証

    掛井 将平, 白石 善明, 毛利 公美, 森井 昌克

    Nov. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-67, 79 - 84, Japanese

    Symposium

  • 高密度パリティ検査行列を用いた2元シンドローム復号問題に基づく認証方式について

    伊東 春香, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    Nov. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-62, 49 - 54, Japanese

    Symposium

  • 機械学習による脆弱性記述に基づく深刻度推定

    中川 舜太, 永井 達也, 金原 秀明, 古本 啓祐, 瀧田 愼, 白石 善明, 高橋 健志, 毛利 公美, 髙野 泰洋, 森井 昌克

    Nov. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-64, 61 - 66, Japanese

    Symposium

  • 監査者に提出する証拠を選択可能としたクラウドストレージのデータ所有証明

    小木曽 仁, 毛利 公美, 白石 善明

    Nov. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-65, 67 - 72, Japanese

    Symposium

  • ブロックチェーンに格納した認証情報を用いる認証方式

    土田 敏生, 瀧田 愼, 白石 善明, 髙野 泰洋, 毛利 公美, 森井 昌克

    Nov. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-61, 45 - 48, Japanese

    Symposium

  • ITO Haruka, HIROTOMO Masanori, FUKUTA Youji, MOHRI Masami, SHIRAISHI Yoshiaki

    The Institute of Electronics, Information and Communication Engineers, Nov. 2018, IEICE Trans. on Information and Systems, Vol.E101-D (No.11), 2688 - 2697, English

    [Refereed]

    Scientific journal

  • OpenIDで認証情報を発行するブロックチェーンを用いた認証・認可システム

    江澤 友基, 掛井 将平, 瀧田 愼, 白石 善明, 髙野 泰洋, 毛利 公美, 森井 昌克

    Nov. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-60, 39 - 44, Japanese

    Symposium

  • ITO Daiki, NOMURA Kenta, KAMIZONO Masaki, SHIRAISHI Yoshiaki, TAKANO Yasuhiro, MOHRI Masami, MORII Masakatu

    Corresponding, The Institute of Electronics, Information and Communication Engineers, Nov. 2018, IEICE Trans. on Information and Systems, Vol.E101-D (No.11), 2658 - 2664, English

    [Refereed]

    Scientific journal

  • 話題誘導するトピックモデルを用いたセキュリティレポート分類

    永井 達也, 乾 智裕, 瀧田 愼, 古本 啓祐, 白石 善明, 髙野 泰洋, 毛利 公美, 森井 昌克

    情報処理学会, Oct. 2018, コンピュータセキュリティシンポジウム, 2C3-5, Japanese

    Symposium

  • ブロックチェーンを用いた認証・認可システムの設計と実装

    江澤 友基, 瀧田 愼, 白石 善明, 髙野 泰洋, 毛利 公美, 森井 昌克

    情報処理学会, Oct. 2018, コンピュータセキュリティシンポジウム, 3B3-1, Japanese

    Symposium

  • スレットインテリジェンスのためのダイアモンドモデルに基づく脅威情報分析システム

    伊藤 大貴, 永井 達也, 野村 健太, 近藤 秀紀, 神薗 雅紀, 白石 善明, 古本 啓祐, 瀧田 愼, 毛利 公美, 高野 泰洋, 森井 昌克

    Oct. 2018, 電子情報通信学会論文誌(D), Vol.J101-D (No.10), 1427 - 1437, Japanese

    [Refereed]

    Scientific journal

  • モデル化した攻撃活動のグラフ表現による分析の検討

    中川 舜太, 永井 達也, 伊藤 大貴, 野村 健太, 神薗 雅紀, 白石 善明, 瀧田 愼, 髙野 泰洋, 毛利 公美, 森井 昌克

    Sep. 2018, 情報科学技術フォーラム, L-015, Japanese

    Symposium

  • マルチ環境解析とJavaScript解析を組み合せた悪性Webサイトのクローキング分析手法

    西尾 祐哉, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    Sep. 2018, 情報処理学会論文誌, 59 (9), 1624 - 1638, Japanese

    [Refereed]

    Scientific journal

  • A Machine Learning-based Approach for Classifying Applications from Encrypted Traffic

    GOUNOT William, NISHIZAWA Akito, SHIRAISHI Yoshiaki, MORII Masakatu

    Jul. 2018, IEICE Technical Report (Information and Communication System Security), ICSS2018-42, 305 - 310, Japanese

    Symposium

  • ブロックチェーンを用いた認証システムの検討

    江澤 友基, 瀧田 愼, 白石 善明, 髙野 泰洋, 毛利 公美, 森井 昌克

    Jun. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2018-8, 47 - 54, Japanese

    Symposium

  • Structured Threat Information eXpressionで記述された情報のモデル化

    近藤 秀紀, 永井 達也, 伊藤 大貴, 野村 健太, 神薗 雅紀, 白石 善明, 古本 啓祐, 瀧田 愼, TAKANO YASUHIRO, 毛利 公美, MORII MASAKATU

    電子情報通信学会, 07 Mar. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), 117 (481), 145 - 150, Japanese

    Symposium

  • LDAを用いたセキュリティレポートのマルチラベル分類

    岡田 豪起, 永井 達也, 瀧田 愼, 古本 啓祐, 白石 善明, TAKANO YASUHIRO, 毛利 公美, MORII MASAKATU

    電子情報通信学会, 07 Mar. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), 117 (481), 151 - 156, Japanese

    Symposium

  • 在宅医療介護連携システムにおける緊急時を考慮したHPKI 認証に基づく個人情報の開示先制御

    稲吉 陽一朗, 白石 善明, 竹尾 淳, 加藤 昇平, 矢口 隆明, 岩田 彰

    Mar. 2018, 情報処理学会第80回全国大会, (7X-02), Japanese

    Symposium

  • マルチホップ無線ネットワーク上での分散秘密の配付について

    土田 敏生, 瀧田 愼, 古本 啓祐, 白石 善明, TAKANO YASUHIRO, 毛利 公美, MORII MASAKATU

    Mar. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2017-64, 79 - 84, Japanese

    Symposium

  • Windows APIコールログからのマルウェアの動作再現について

    港 和人, 福田 洋治, 廣友 雅徳, 毛利 公美, 白石 善明

    Mar. 2018, 情報処理学会第80回全国大会, (6W-01), 527 - 528, Japanese

    Symposium

  • LDPC 符号を用いたリング署名方式について

    伊東 春香, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    Mar. 2018, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2017-85, 215 - 220, Japanese

    Symposium

  • HPKI認証の特長を考慮した在宅医療介護システムにおける患者情報の開示先制御

    稲吉 陽一朗, 白石 善明, 竹尾 淳, 加藤 昇平, 矢口 隆明, 岩田 彰

    Dec. 2017, 情報処理学会研究報告(コンピュータセキュリティ), Vol.2017-CSEC-79 (No.3), 8 pages, Japanese

    Symposium

  • Androidアプリケーションのライブラリからみた脆弱性分析

    古川 凌也, 永井 達也, 熊谷 裕志, 神薗 雅紀, 白石 善明, TAKANO YASUHIRO, 毛利 公美, 星澤 裕二, MORII MASAKATU

    Dec. 2017, 情報処理学会論文誌, Vol.58 (No.12), 1843 - 1855, Japanese

    [Refereed]

    Scientific journal

  • Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes

    土田 敏生, 伊東 春香, 瀧田 愼, 廣友 雅徳, 野村 健太, 白石 善明, 毛利 公美, 福田 洋治, MORII MASAKATU

    電子情報通信学会, 20 Nov. 2017, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), 117 (316), 23 - 27, Japanese

    Symposium

  • ダイアモンドモデルに基づく脅威情報分析のためのインタフェースについて

    近藤 秀紀, 永井 達也, 古本 啓祐, 伊藤 大貴, 野村 健太, 神薗 雅紀, 白石 善明, TAKANO YASUHIRO, 毛利 公美, MORII MASAKATU

    Nov. 2017, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2017-50, 71 - 76, Japanese

    Symposium

  • グループ暗号通信のためのマルチホップ無線ネットワーク上での分散秘密の配布

    土田 敏生, 瀧田 愼, 古本 啓祐, 白石 善明, TAKANO YASUHIRO, 毛利 公美, MORII MASAKATU

    Nov. 2017, 電気関係学会関西連合大会, (G10-10), 299 - 300, Japanese

    Symposium

  • Windows APIのログからのマルウェアの疑似復元の検討

    近藤 秀紀, 永井 達也, 古本 啓祐, 瀧田 愼, 白石 善明, TAKANO YASUHIRO, 毛利 公美, MORII MASAKATU

    Nov. 2017, 電気関係学会関西連合大会, (G11-16), 332 - 333, Japanese

    Symposium

  • Named Data Networking 上の Raptor 符号化によるコンテンツ配信の評価環境

    西澤 昭人, 古本 啓祐, 瀧田 愼, 白石 善明, TAKANO YASUHIRO, 毛利 公美, MORII MASAKATU

    Nov. 2017, 電気関係学会関西連合大会, (G10-2), 284 - 285, Japanese

    Symposium

  • 無線物理層セキュリティを用いたIoTネットワークの検討

    TAKANO YASUHIRO, SHIRAISHI Yoshiaki, MORII MASAKATU

    Oct. 2017, コンピュータセキュリティシンポジウム, Japanese

    Symposium

  • Yoshiaki Shiraishi, Masaki Kamizono, Masanori Hirotomo, Masami Mohri

    In the case of drive-by download attacks, most malicious web sites identify the software environment of the clients and change their behavior. Then we cannot always obtain sufficient information appropriate to the client organization by automatic dynamic analysis in open services. It is required to prepare for expected incidents caused by re-accessing same malicious web sites from the other client in the organization. To authors' knowledge, there is no study of utilizing analysis results of malicious web sites for digital forensic on the incident and hedging the risk of expected incident in the organization. In this paper, we propose a system for evaluating the impact of accessing malicious web sites by using the results of multi-environment analysis. Furthermore, we report the results of evaluating malicious web sites by the multi-environment analysis system, and show how to utilize analysis results for forensic analysis and risk hedge based on actual cases of analyzing malicious web sites.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 2017, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E100D (10), 2449 - 2457, English

    [Refereed]

    Scientific journal

  • LDPC 符号を用いたゼロ知識証明型認証方式について(II)

    伊東 春香, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    情報処理学会, Oct. 2017, コンピュータセキュリティシンポジウム, (1E4-3), 264 - 271, Japanese

    Symposium

  • Exploit Kit で構築された悪性 Web サイトの URL に関する考察

    西尾 祐哉, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    情報処理学会, Oct. 2017, コンピュータセキュリティシンポジウム, (3D2-4), 1151 - 1155, Japanese

    Symposium

  • Yoshiaki Shiraishi, Masanori Hirotomo, Masami Mohri, Taisuke Yamamoto

    The application of Intelligent Transport Systems (ITS) transmits data with road-to-vehicle communication (RVC) and inter-vehicle communication (IVC). Digital signature is essential to provide security for RVC and IVC. The public key certificate is used to verify that a public key belongs to an individual prover such as user or terminal. A certificate revocation list (CRL) is used for verifying validity of the public key certificate. A certificate authority (CA) publishes a CRL and distributes it to vehicles. CRL distribution traffic disturbs ITS application traffic because of sharing wireless channel between them. To distribute it on low bit rate will help to ease the disturbance. Although multiplex transmitting is effective in reliable communication, a duplication of received packets is waste of bandwidth as a consequence. This paper proposes a CRL distribution scheme based on random network coding which can reduce duplicate packets. The simulation results show that the number of duplicate packets of the proposed scheme is less than that of a simple error correction (EC)-based scheme and the proposed one can distribute CRL to more vehicles than EC-based ones.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 2017, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E100D (10), 2440 - 2448, English

    [Refereed]

    Scientific journal

  • Kenta Nomura, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    Internet of Things (IoT) has been widely applied in various fields. IoT data can also be put to cloud, but there are still concerns regarding security and privacy. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is attracted attention in cloud storage as a suitable encryption scheme for confidential data share and transmission. In CP-ABE, the secret key of a user is associated with a set of attributes; when attributes satisfy the access structure, the ciphertext is able to be decrypted. It is necessary that multiple authorities issue and manage secret keys independently. Authorities that generate the secret key can be regarded as managing the attributes of a user in CP-ABE. CP-ABE schemes that have multiple authorities have been proposed. The other hand, it should consider that a user's operation at the terminals is not necessary when a user drop an attribute and key is updated and the design of the communication system is a simple. In this paper, we propose CP-ABE scheme that have multiple key authorities and can revoke attribute immediately with no updating user's secret key for attribute revocation. In addition, the length of ciphertext is fixed. The proposed scheme is IND-CPA secure in DBDH assumption under the standard model. We compare the proposed scheme and the other CP-ABE schemes and show that the proposed scheme is more suitable for cloud storage.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 2017, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E100D (10), 2420 - 2431, English

    [Refereed]

    Scientific journal

  • Yoshiaki Shiraishi, Kenta Nomura, Masami Mohri, Takeru Naruse, Masakatu Morii

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on cloud storage systems. In ABE, to revoke users' attributes, it is necessary to make them unable to decrypt ci-phertexts. Some CP-ABE schemes for efficient attribute revocation have been proposed. However, they have not been given a formal security proof against a revoked user, that is, whether they satisfy forward secrecy has not been shown or they just do not achieve fine-grained access control of shared data. We propose an attribute revocable attribute-based encryption with the forward secrecy for fine-grained access control of shared data. The proposed scheme can use both "AND" and "OR" policy and is IND-CPA secure under the Decisional Parallel Bilinear Diffie-Hellman Exponent assumption in the standard model.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 2017, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E100D (10), 2432 - 2439, English

    [Refereed]

    Scientific journal

  • Masanori Hirotomo, Yuya Nishio, Masaki Kamizono, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi

    The malicious websites used by drive-by download attacks change their behavior for web client environments. To analyze the behavior of malicious websites, the singleenvironment analysis cannot obtain sufficient information. Hence, it is difficult to analyze the whole aspect of malicious websites. Also, the code obfuscation and cloaking are used in malicious websites to avoid to be analyzed their behavior. In this paper, we propose an analyzing method that combines decoding of the obfuscation code with dynamic analysis using multi-environment analysis system in order to analyze the behavior of the malicious websites in detail. Furthermore, we present two approaches to improve the multi-environment analysis. The first one is automation of traffic log analysis to reduce the cost of analyzing huge traffic logs between the environments and malicious websites. The second one is multimodal analysis for finding the URL of malicious websites.

    Institute of Electrical and Electronics Engineers Inc., 05 Sep. 2017, Proceedings - 12th Asia Joint Conference on Information Security, AsiaJCIS 2017, 48 - 54, English

    [Refereed]

    International conference proceedings

  • HPKI認証を用いた在宅医療介護連携システムにおける個人情報の開示先制御

    稲吉 陽一朗, 白石 善明, 竹尾 淳, 加藤 昇平, 矢口 隆明, 岩田 彰

    Sep. 2017, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム), LOIS2017-19, 51 - 56, Japanese

    Symposium

  • Kenta Nomura, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    We focus on the construction of the digital signature scheme for local broadcast, which allows the devices with limited resources to securely transmit broadcast message. A multi-group authentication scheme that enables a node to authenticate its membership in multi verifiers by the sum of the secret keys has been proposed for limited resources. This paper presents a transformation which converts a multi-group authentication into a multi-group signature scheme. We show that the multi-group signature scheme converted by our transformation is existentially unforgeable against chosen message attacks (EUF-CMA secure) in the random oracle model if the multi-group authentication scheme is secure against impersonation under passive attacks (IMP-PA secure). In the multi-group signature scheme, a sender can sign a message by the secret keys which multiple certification authorities issue and the signature can validate the authenticity and integrity of the message to multiple verifiers. As a specific configuration example, we show the example in which the multi-group signature scheme by converting an error correcting code-based multi-group authentication scheme.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Aug. 2017, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E100D (8), 1770 - 1779, English

    [Refereed]

    Scientific journal

  • ドライブ・バイ・ダウンロード攻撃によるインシデントを再現するフォレンジック支援システム

    奥田 裕樹, 福田 洋治, 白石 善明, 井口 信和

    Jul. 2017, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2017-17, 81 - 86, Japanese

    Symposium

  • サイト構造のクラスタリングを用いた悪性サイトの識別

    永井 達也, 神薗 雅紀, 白石 善明, 毛利 公美, TAKANO YASUHIRO, MORII MASAKATU

    Jul. 2017, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2017-19, 93 - 98, Japanese

    Symposium

  • LDPC 符号を用いたゼロ知識証明型認証方式について

    伊東 春香, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    Jun. 2017, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2017-7, 37 - 42, Japanese

    Symposium

  • Representation for Attack Activity to Associate Threat Information

    ITO DAIKI, NOMURA KENTA, KAMIZONO MASAKI, SHIRAISHI YOSHIAKI, TAKANO YASUHIRO, MOHRI MASAMI, HOSHIZAWA YUJI, MORII MASAKATU

    Mar. 2017, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), vol. 116 (no. 522, ICSS2016-64), 147 - 152, Japanese

    Symposium

  • 脅威情報の統合的分析に向けた攻撃活動のモデル化

    野村 健太, 伊藤 大貴, 神薗 雅紀, 白石 善明, TAKANO YASUHIRO, 毛利 公美, 星澤 裕二, MORII MASAKATU

    Mar. 2017, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2016-47, 7 - 12, Japanese

    Symposium

  • 悪性サイトを攻撃ツールにより分類するWebクローラー

    永井 達也, 神薗 雅紀, 白石 善明, 毛利 公美, TAKANO YASUHIRO, 星澤 裕二, MORII MASAKATU

    Mar. 2017, 情報処理学会第79回全国大会, (1W-05), 537 - 538, Japanese

    Symposium

  • Mazen Alowish, Yasuhiro Takano, Yoshiaki Shiraishi, Masakatu Morii

    Safety on roadways is expected to be achieved by using vehicular ad-hoc networks (VANETs). A VANET includes dynamically moving vehicles that communicate for a certain purpose. The routing procedure in the VANET protocol is required to deliver requested data packets to the vehicles in a short period of time. Conventionally, routing algorithms like the ad-hoc on-demand vector (AODV) routing, the greedy perimeter stateless routing (GPSR), the direct-sequenced distance-vector (DSDV) routing and the dynamic source routing (DSR) have been utilized in most of ad-hoc networks. However, it is well known that the conventional routing algorithms have problems in utilizing for the VANET. For example, the DSR cannot restore link breakages often experienced in the VANET. The DSDV routing protocol consumes a higher bandwidth for message exchanges and imposes excessive overheads. This paper verifies that the cluster based routing (CBR) protocol proposed by Yuyi et al. can overcome the known problems. According to evaluation results obtained by computer simulations implemented with the OMNeT++, the CBR routing protocol outperforms the AODV, GPSR, and DSR protocols in the sense of the packet delivery ratio and the message overheads.

    Engineering and Technology Publishing, 01 Feb. 2017, Journal of Communications, 12 (2), 137 - 144, English

    [Refereed]

    Scientific journal

  • Daiki Ito, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    Many physical devices and sensors make it possible to obtain more localized data and applications which provide more localized information for users will appear. Generally, those applications use a storage server for computing location-dependent data. Traffic of Internet of Things (IoT) devices may cause concentration, when data is stored into a server. It is desirable that each location-dependent data is stored in each area, because each data request can be processed there and each user can get the data from a nearby server. This paper proposes the virtual storage with Key-Value Stores over Named Data Networking. In proposed system, the location-dependent data is cached in local servers, which are located at network edge, and each user can get the data from a nearby local server. We evaluate the proposed system by simulation from the views of delay time and energy consumption. We compare the proposed system with the conventional system, in which all data is stored in a certain server and all users retrieve it from the server. We show that the proposed system can reduce the both of delay time and energy consumption compared with the conventional system.

    IEEE, 2017, 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 95 - 102, English

    [Refereed]

    International conference proceedings

  • Kenta Nomura, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    By exchanging the information on the status and the surrounding environment between devices, devices can determine the optimal action. We focus on the construction of a digital signature scheme for local broadcast, which allows the devices with limited resources to securely transmit broadcast messages. A multi-group authentication scheme that enables a node to authenticate its membership in multi verifiers by the sum of the secret keys has been proposed for its use on devices with limited resources. This paper proposes a multi-group signature scheme by converting the multi-group authentication via the Fiat-Shamir transform. In the proposed scheme, a sender can sign a message by the secret keys which multiple certification authorities issue and the signature can validate the authenticity and integrity of the message to multiple verifiers. By comparing the proposed scheme with a code-based signature scheme, where a sender signs a message by individual secret key as many times as the number of the secret key and each of verifiers verify each signature, the proposed scheme provides efficient multi-group signature in terms of the amount of transmitted data.

    IEEE, 2017, 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 449 - 454, English

    [Refereed]

    International conference proceedings

  • 電子鑑識の動向とネットワークフォレンジック

    福田 洋治, 白石 善明, 毛利 公美

    Nov. 2016, 電気関係学会関西連合大会, (G11-6), 342 - 343, Japanese

    [Invited]

    Symposium

  • リンクマイニングによる悪性Webサイトの検知性能

    TAKANO YASUHIRO, 伊藤 大貴, 永井 達也, 神薗 雅紀, 毛利 公美, 白石 善明, 星澤 裕二, MORII MASAKATU

    Nov. 2016, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2016-44, 31 - 35, Japanese

    Symposium

  • 近隣サービスで同時検証するためのマルチグループ署名

    野村 健太, 毛利 公美, 白石 善明, MORII MASAKATU

    情報処理学会, Oct. 2016, コンピュータセキュリティシンポジウム, (2C1-3), 332 - 339, Japanese

    Symposium

  • 廣友 雅徳, 阿比留 咲紀, 一ノ瀬 渚, 福田 洋治, 毛利 公美, 白石 善明

    Oct. 2016, 電子情報通信学会論文誌D, Vol.J99-D (No.10), 1050 - 1054, Japanese

    [Refereed]

    Scientific journal

  • 悪性Webサイトを分析するためのマルチ環境解析における通信ログ解析の効率化

    西尾 祐哉, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    情報処理学会, Oct. 2016, コンピュータセキュリティシンポジウム, (2F2-2), 496 - 502, Japanese

    Symposium

  • リンク構造を用いた悪性Webサイトの検知法

    伊藤 大貴, 永井 達也, TAKANO YASUHIRO, 神薗 雅紀, 毛利 公美, 白石 善明, 星澤 裕二, MORII MASAKATU

    情報処理学会, Oct. 2016, コンピュータセキュリティシンポジウム, (3B4-2), 1229 - 1233, Japanese

    Symposium

  • 福田 洋治, 白石 善明, 毛利 公美

    Oct. 2016, 電子情報通信学会論文誌D, Vol.J99-D (No.10), 1022 - 1033, Japanese

    [Refereed]

    Scientific journal

  • 局所的な同報通信のためのマルチグループ署名方式

    野村 健太, 毛利 公美, 白石 善明, MORII MASAKATU

    Jun. 2016, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2016-5, 25 - 30, Japanese

    Symposium

  • マルチ環境解析を用いた悪性Webサイトの分析について

    西尾 祐哉, 廣友 雅徳, 福田 洋治, 毛利 公美, 白石 善明

    Jun. 2016, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2016-11, 57 - 62, Japanese

    Symposium

  • マルチ環境でのDrive-by-Download攻撃のリンク構造解析について

    永井 達也, 神薗 雅紀, 白石 善明, 毛利 公美, 星澤 裕二, MORII MASAKATU

    Jun. 2016, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), ICSS2016-12, 63 - 68, Japanese

    Symposium

  • Named Data Networking上の仮想ストレージとエリア限定情報配信

    ITO DAIKI, MOHRI MASAMI, SHIRAISHI YOSHIAKI, MORII MASAKATU

    Jun. 2016, 電子情報通信学会技術研究報告(情報通信システムセキュリティ), vol. 116 (no. 80, ICSS2016-7), 33 - 38, Japanese

    Symposium

  • Shohei Kakei, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    TPM-embedded devices can be used as authentication tokens by issuing certificates to signing keys generated by TPM. TPM generates Attestation Identity Key (AIK) and Binding Key (BK) that are RSA keys. AIK is used to identify TPM. BK is used to encrypt data so that specific TPM can decrypt it. TPM can use for device authentication by linking a SSL client certificate to TPM. This paper proposes a method of an AIK certificate issuance with OpenID and a method of the SSL client certificate issuance to specific TPM using AIK and BK. In addition, the paper shows how to implement device authentication system using the SSL client certificate related to TPM.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Apr. 2016, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E99D (4), 1052 - 1061, English

    [Refereed]

    Scientific journal

  • Storage-Efficient Packet Classification for Resource-Constrained Devices

    Kitamura Yuta, Mohri Masami, Shiraishi Yoshiaki

    Mar. 2016, IEICE Technical Report (Information Communication System Security), (ICSS2015-49), 13 - 18, Japanese

    Symposium

  • A Blind Signature-based Pre-Shared Key Exchange for Cyber-Physical Systems

    Isobe Kohei, Mohri Masami, Shiraishi Yoshiaki

    Mar. 2016, IEICE Technical Report (Information Communication System Security), (ICSS2015-69), 135 - 140, Japanese

    Symposium

  • LT Network Codes Enabled Information-Centric Networking

    Otsuka Yusuke, Kitamura Yuta, Isobe Kohei, Mohri Masami, Shiraishi Yoshiaki

    Feb. 2016, 情報処理学会研究報告(高度交通システムとスマートコミュニティ研究会), 2016-ITS-64 (2), Japanese

    Symposium

  • Makoto Sato, Masami Mohri, Hiroshi Doi, Yoshiaki Shiraishi

    Information Centric Networking (ICN) is a promising paradigm for the future architecture of the Internet. Content Centric Networking (CCN) is an instantiation of the ICN paradigm. The challenging areas of CCN include congestion control, availability, security, etc. We focus on security, especially secure communications. Some schemes applying identity-based encryption (IBE) for content encryption over CCN have been proposed. However, such schemes generally have the key escrow problem that the private key generator which issues decryption keys to receivers can decrypt any ciphertext passively. We propose an IBE scheme approach to the problem by combining partial-double encryption, interest trace back, cut-through fragment forwarding and multi-path routing. Our scheme is IND-ID-CPA secure in the random oracle model.

    Information Processing Society of Japan, 15 Jan. 2016, Journal of Information Processing, 24 (1), 2 - 8, English

    [Refereed]

    Scientific journal

  • Haiyan Tian, Yusuke Otsuka, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    Information-Centric Networking advocates ubiquitous in-network caching to enhance content distribution. Nonsafety application in vehicular communications is emerging beyond the initial safety application. However, content distribution based on TCP/IP Internet service in vehicular networks suffers from typical issue of low delivery ratio in urban environments, where high buildings block or attenuate the radio propagation as well as short radio coverage range. In order to solve this issue to deliver proximity marketing files, in this paper we propose in-network caching scheme in vehicular networks in accordance with traffic features, in which every vehicle is treated as either a subscriber to request a file or as a cache node to supply other nodes so as to accelerate file transmission effectively. Cache strategy of leave copy everywhere is uncoordinated and distributed, which fits the random and dynamic vehicular network. The performance evaluation is carried out by comparing the proposed scheme with the legacy solution of TCP/IP based scheme using simulation tools of OMNeT++ and Veins and SUMO, which is supplied with real-world urban map associated with random but reasonable traffic routes generated by our designed software for every vehicle. The simulation results validate the proposed scheme in four aspects: robustness resisting obstacle buildings, reliability and scalability in different traffic loads, low utilization ratios of RSUs and Internet resource, and efficiency of cache functions.

    HINDAWI PUBLISHING CORP, 2016, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, English

    [Refereed]

    Scientific journal

  • Daiki Ito, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    Recently, cloud storage systems have been used for various purposes. For example, they are used for content delivery because it is possible to improve responses distributing data for end users by geographically distributed multiple storage nodes. Applications can use them as infrastructures for computing. In the cases, it is desirable that each client node can retrieve the desired data from a nearby storage node for the faster response for end users. In Internet-scaled cloud storage systems, Key-Value Stores(KVS) is used to manage data and it provides REST(Representational State Transfer) API, in which each data has a unique URI(Uniform Resource Identifier) and clients can access the data by the defined methods. The architecture has a high affinity to the CCN (Content-Centric Networking) architecture, on which each data has a unique "Name" to identify it. Over the CCN architecture, data is cached in intermediate-nodes relaying it and the communication is not based on server's IP address but data's "Name." Therefore each client node retrieves desired data from a nearby node caching it. In this paper, in order to improve the response for end users, we propose the cloud storage with KVS over the CCN architecture as a new cloud system. The response time of proposed system is measured with a simple simulation. The results show that the proposed system has better performance than the cloud storage built in distributed data centers over the TCP/IP architecture.

    IEEE, 2016, 2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016 (UEMCON), 6, English

    [Refereed]

    International conference proceedings

  • Koji Tomida, Hiroshi Doi, Masami Mohri, Yoshiaki Shiraishi

    It has been shown that identity-based encryption with keyword search (IBEKS) can be constructed from level-2 anonymous hierarchical identity-based encryption (A-HIBE). A-HIBE is more complicated than nonanonymous HIBE (NA-HIBE). We have shown the definition of Ciphertext Divided A-HIBE (CD-A-HIBE). The basic idea of CD-A-HIBE is to make it possible to regard NA-HIBE as A-HIBE by dividing ciphertext into two parts so as not to leak the information of identity from the original ciphertext of NA-HIBE. We also have shown a concrete construction of CD-A-HIBE from BB1-HIBE, which is one of the NA-HIBE schemes and transformed BB1-CD-A-HIBE to IBEKS whose ciphertext is divided (CD-IBEKS). Then, the computational cost of CD-IBEKS is shown to be often more reasonable than that of IBEKS. In this paper, we show what type of NA-HIBE not limited to BB1-HIBE can be used for constructing CD-A-HIBE and how to transform a certain type of NA-HIBE to CD-A-HIBE generally. Then, we prove that these CD-A-HIBE schemes have indistinguishability and anonymity. The general transformation from CD-A-HIBE to CD-IBEKS is also shown. We prove that these CD-IBEKS schemes have indistinguishability.

    Information Processing Society of Japan, 15 Sep. 2015, Journal of Information Processing, 23 (5), 562 - 569, English

    [Refereed]

    Scientific journal

  • Security Measures to Share De-identified Data among Multi-centers for Longitudinal Studies

    Shiraishi Yoshiaki, Nakai Toshiharu, Mohri Masami, Fukuta Youji, Hirotomo Masaminori, Morii Masakatu

    Sep. 2015, 第14回情報科学技術フォーラム講演論文集, 4, 61 - 64, Japanese

    [Refereed]

    Symposium

  • Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Military Networks

    Nomura Kenta, Mohri Masami, Shiraishi Yoshiaki, Morii Masakatu

    情報処理学会, Jul. 2015, マルチメディア,分散,協調とモバイル(DICOMO2015)シンポジウム, 1589 - 1599, Japanese

    [Refereed]

    Symposium

  • On Anxiety Factors in Indirect Use for Cloud Type Medical Systems

    Fukuta Youji, Shiraishi Yoshiaki, Hirotomo Masaminori, Mohri Masami

    Jul. 2015, 電子情報通信学会技術研究報告(情報通信システムセキュリティ研究会), (ICSS2015-34), 143 - 149, Japanese

    Symposium

  • Vehicular Cloud Storage Based on Key-Value Storage over Content-Centric Network

    Ito Daiki, Mohri Masami, Shiraishi Yoshiaki, Morii Masakatu

    情報処理学会, Jul. 2015, マルチメディア,分散,協調とモバイル(DICOMO2015)シンポジウム, 1772 - 1779, Japanese

    [Refereed]

    Symposium

  • Nakai Toshiharu, Müller Henning, Bagarinao Epifanio, Tomida Koji, Shiraishi Yoshiaki, Niinimaki Marko

    Jun. 2015, International Journal of Research Studies in Computing, 4 (1), English

    [Refereed]

    Scientific journal

  • 預託データの非集中化機能について

    FUKUTA Youji, SHIRAISHI YOSHIAKI, HIROTOMO Masanori, MOHRI Masami

    Mar. 2015, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム研究会), 13 - 17, Japanese

    Symposium

  • 即時認証機能付きセッション鍵交換と視聴覚メディアの効果

    磯部 光平, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2015, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム研究会), 7 - 12, Japanese

    Symposium

  • 情報システム・サービスの利用者の利用意図による安心感・納得感・利用意図の関係について

    奥村 香保里, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2015, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム研究会), 123 - 128, Japanese

    Symposium

  • 情報システム・サービスの利用者の安心感と納得感の要因に関する調査

    奥村 香保里, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2015, 情報処理学会論文誌, 56 (3), 932 - 941, Japanese

    [Refereed]

    Scientific journal

  • ミリタリーネットワークのための複数の属性管理機関を持つ属性失効機能付き属性ベース暗号

    NOMURA Kenta, MOHRI Masami, SHIRAISHI Yoshiaki, MORII Masakatu

    Mar. 2015, 情報処理学会第77回全国大会, 469 - 470, Japanese

    Symposium

  • エリア限定コンピューティングのためのVehicular Cloud Storageの検討

    ITO Daiki, OTSUKA Yusuke, MOHRI Masami, SHIRAISHI Yoshiaki, MORII Masakatu

    Mar. 2015, 情報処理学会第77回全国大会, 151 - 152, Japanese

    Symposium

  • エリア限定コンテンツ配信のための無線マルチホップキャッシュネットワーク

    大塚 祐輔, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2015, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム研究会), 1 - 6, Japanese

    Symposium

  • Towards Usage Reduction of Infrastructure Resource for Regional Content Distribution

    TIAN Haiyan, OTSUKA Yusuke, MOHRI Masami, SHIRAISHI Yoshiaki, MORII Masakatu

    Mar. 2015, Proc. of The 77th National Convention of Information Processing Society of Japan, 57 - 58, English

    Symposium

  • Takeru Naruse, Masami Mohri, Yoshiaki Shiraishi

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set of attributes assigned to users is embedded in user's secret key. A user is able to decrypt if his attributes satisfy the ciphertext's access structure. In CP-ABE, processes of user's attribute revocation and grant are concentrated on the authority and the data owner. In this paper, we propose a ciphertext-policy attribute-based encryption scheme delegating attribute revocation processes to Cloud Server by proxy re-encryption. The proposed scheme does not require generations of new secret key when granting attributes to a user and supports any Linear Secret Sharing Schemes (LSSS) access structure. We prove that the proposed scheme is secure against attack by unauthorized users and Cloud Server.

    SPRINGER HEIDELBERG, Mar. 2015, HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 5 (1), English

    [Refereed]

    Scientific journal

  • Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking

    SATO Makoto, MOHRI Masami, DOI Hiroshi, SHIRAISHI YOSHIAKI

    Mar. 2015, IEICE Technical Report (Information Communication System Security), 169 - 174, English

    Symposium

  • Drive-by-Download攻撃のリンク構造解析

    大力 悠司, 神薗 雅紀, 毛利 公美, SHIRAISHI Yoshiaki, MORII MASAKATU

    Mar. 2015, 電子情報通信学会技術研究報告(情報通信システムセキュリティ研究会), 43 - 48, Japanese

    Symposium

  • Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data

    NARUSE Takeru, MOHRI Masami, SHIRAISHI Yoshiaki

    Mar. 2015, IEICE Technical Report (Information Communication System Security), 181 - 186, English

    Symposium

  • A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function

    TOMIDA Koji, DOI Hiroshi, MOHRI Masami, SHIRAISHI YOSHIAKI

    Mar. 2015, IEICE Technical Report (Information Communication System Security), 175 - 179, English

    Symposium

  • A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology

    MIYAZAKI Hitoshi, MOHRI Masami, SHIRAISHI Yoshiaki

    Mar. 2015, IEICE Technical Report (Information Communication System Security), 139 - 144, English

    Symposium

  • Ciphertext Diverge-Merge Scheme of Identity-Based Encryption for Cloud-Based File Transmission Service

    SATO Makoto, MOHRI Masami, DOI Hiroshi, SHIRAISHI YOSHIAKI

    Feb. 2015, International Journal of Digital Information and Wireless Communications, 5 (1), 52 - 59, English

    [Refereed]

    Scientific journal

  • 情報システム・サービスの利用者の利用意図による安心感・納得感の関係について

    奥村 香保里, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    電子情報通信学会, Jan. 2015, 2015年暗号と情報セキュリティシンポジウム(SCIS2015), 4D1 - 2, Japanese

    Symposium

  • Haiyan Tian, Masami Mohri, Yusuke Otsuka, Yoshiaki Shiraishi, Masakatu Morii

    ICN/CCN advocates ubiquitous in-network caching to enhance content distribution. Non-safety application in vehicular communication is emerging beyond the initial safety application. However, it suffers from a typical issue of low delivery ratio in urban environments, where high buildings block and attenuate the radio propagation from RSU infrastructures as well as other technical issues. In this paper, LCE in-network caching strategy with LRU algorithm in vehicular networks is proposed according to traffic characteristics in metropolitan areas. We compare this scheme with the legacy TCP/IP based scheme by simulation tools of OMNeT++ & Veins and SUMO. The simulation results validate that the proposed scheme could achieve stronger robustness against obstacles, higher file capture rate and less dependency on RSU infrastructure.

    IEEE, 2015, 2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015-August, 551 - 556, English

    [Refereed]

    International conference proceedings

  • Yoshiaki Shiraishi, Masakatu Morii, Masami Mohri, Hitoshi Miyazaki

    While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is required depending on a type of applications. Asokan et al. have proposed a multi-party fair exchange protocol for mesh topology. This scheme can be adapted to all kinds of topologies but requires much communication costs, which is 4n(n-1) passes in the all n-participators honest cases and 8n(2)-n-10 passes in the worst case. In previous works, more efficient and multi-functional schemes specialized for a kind of topologies have been proposed but most of these are for ring topology and star topology. Zhou et al. have proposed an efficient multi-party contract signing protocol for line topology. It is shown the two protocols such that a simple protocol which is completed with 4(n-1) passes in the all honest cases and 5n-3 passes in the worst case and an optimized protocol which is completed with 3(n-1) passes in the all honest cases and 4n-2 passes in the worst. This result means that a fair exchange protocol for line topology is efficient in a number of communications nevertheless a certified email protocol specialized for line topology has not been proposed. That is, a certified email protocol run on line topology is only a protocol for mesh proposed by Asokan et al. adapted to line topology, therefore there is large room for reducing a number of communications by specializing for a certified email protocol. In this paper, we propose a three-party certified email protocol for line topology towards a design of n-party protocol. The proposed protocol has such basic properties of certified email as fairness, non-repudiation, trusted third party invisibility and timeliness, as same as the previous works. Our scheme is completed with eight passes in the case of all honest and twelve passes in the worst. The communication cost is less than the Asokan et al.'s scheme with 24 (n=3) passes even if the all n-participators are honest.

    IEEE, 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 260 - 265, English

    [Refereed]

    International conference proceedings

  • Yuta Kitamura, Akira Iwata, Masami Mohri, Yoshiaki Shiraishi

    Packet classification is an essential function in Internet routers that provides advanced network services such as virtual private networks (VPNs) and quality of service (QoS). Decision tree-based packet classification algorithms such as HiCuts and HyperCuts allow the tradeoff between storage and throughput in the experimental result with the real life rulesets. However, the memory consumption of these algorithms remains high when high throughput is required. In this paper, we propose the tree data structure whose storage is small maintaining high throughput. It is based on the two ideas: The first is to use Level Ordered Unary Degree Sequence (LOUDS) which is a succinct representation of a tree structure. A general tree of n nodes is usually represented in pointer form, requiring 64n bits in 64-bit architecture, whereas LOUDS requires 2n+o(n) bits. Because LOUDS can access any child node from its parent one in constant time, the tree traversal is fast. The second is reducing the information contained in the tree node. This also reduces storage requirements without affecting search speed. The proposed data structure requires up to approximately one ninth less memory than pointer-formed tree, and the time complexity of a packet classification is equivalent to the pointer-formed tree.

    IEEE, 2015, PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 487 - 490, English

    [Refereed]

    International conference proceedings

  • Kenta Nomura, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii

    Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal access to ciphertext by the third party. It is expected that commanders could control whether the user can decrypt the ciphertext or not. Besides, it is essential that a key authority distributing keys to users is decentralized to several authorities for avoiding the invasion from enemy. Thus, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) as a suitable encryption scheme for confidential data share and transmission is attracted attention under the military environment. In CP-ABE, the secret key of a user is associated with a set of atrributes; when attributes satisfy the access structure, the ciphertext is able to be decrypted. In this paper, we propose a CP-ABE scheme which can revoke attribute immediately with no updating user's secret key for attribute revocation. In addition, the length of key and ciphertext are fixed. Furthermore the proposed scheme has been compared with other CP-ABE schemes in key size, ciphertext size to validate its efficiency.

    IEEE, 2015, PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 491 - 494, English

    [Refereed]

    International conference proceedings

  • 複数のSNSと連携する災害時支援システムのアプリケーション開発のためのデータ入出力統合フレームワーク

    OKAZAKI RYOSUKE, HIROTOMO MASANORI, MOHRI MASAMI, SHIRAISHI YOSHIAKI

    Dec. 2014, 電子情報通信学会論文誌D, J97-D (12), 1696 - 1700, Japanese

    [Refereed]

    Scientific journal

  • 当事者のプライバシーを考慮したログの保管とその監査の手法

    FUKUTA Youji, SHIRAISHI YOSHIAKI, MOHRI Masami

    Dec. 2014, 電子情報通信学会論文誌D, J97-D (12), 1729 - 1732, Japanese

    [Refereed]

    Scientific journal

  • イベント・アクション制御に基づくファイルシステムの提案

    FUKUTA Youji, SHIRAISHI YOSHIAKI, MOHRI Masami

    Dec. 2014, 電子情報通信学会論文誌D, J97-D (12), 1701 - 1704, Japanese

    [Refereed]

    Scientific journal

  • Windows APIフックを用いた通信監視による不正なPDFファイルの検知

    SHIRAISHI YOSHIAKI, KAMIZONO MASAKI, HIROTOMO MASANORI, MOHRI MASAMI

    Dec. 2014, 電子情報通信学会論文誌D, J97-D (12), 1719 - 1721, Japanese

    [Refereed]

    Scientific journal

  • 前方秘匿性を満たす属性失効機能付き属性ベース暗号

    成瀬 猛, 毛利 公美, SHIRAISHI Yoshiaki

    Oct. 2014, 情報処理学会論文誌, 55 (10), 2256 - 2264, Japanese

    [Refereed]

    Scientific journal

  • 情報システム・サービスの利用者の安心感・納得感・利用意図の関係について

    奥村 香保里, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    情報処理学会, Oct. 2014, コンピュータセキュリティシンポジウム2014(CSS2014), 1222 - 1229, Japanese

    Symposium

  • 暗号文分割型のIDベース検索可能暗号の構成

    TOMIDA Koji, DOI Hiroshi, MOHRI Masami, SHIRAISHI YOSHIAKI

    情報処理学会, Oct. 2014, コンピュータセキュリティシンポジウム2014(CSS2014), 551 - 558, Japanese

    Symposium

  • プライバシー情報を登録する利用者の安心感の要因に関する調査

    奥村 香保里, 毛利 公美, 白石 善明, 岩田 彰

    Sep. 2014, 情報処理学会論文誌, 55 (9), 2159 - 2167

    [Refereed]

  • 医療クラウドサービスの間接的利用の不安因子について

    FUKUTA Youji, SHIRAISHI YOSHIAKI, 廣友 雅徳, MOHRI Masami

    情報処理学会/電子情報通信学会, Sep. 2014, 第13回情報科学技術フォーラム, 4, 59 - 62, Japanese

    [Refereed]

    Symposium

  • Dual-Purpose Information Sharing System for Direct User Support in Both Ordinary and Emergency Times

    OKAZAKI RYOSUKE, HIROTOMO MASANORI, MOHRI MASAMI, SHIRAISHI YOSHIAKI

    情報処理学会, Aug. 2014, 情報処理学会論文誌, 55 (8), 1778 - 1786, Japanese

    [Refereed]

    Scientific journal

  • 情報システム・サービスの利用者の安心感と納得感の関係について

    奥村 香保里, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Jul. 2014, 情報処理学会研究報告(セキュリティ心理学とトラスト研究会), 2013-SPT-10 (29), Japanese

    Symposium

  • 視聴覚メディアによる即時認証機能を付加した鍵交換方式

    磯部 光平, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Jul. 2014, マルチメディア,分散,協調とモバイル(DICOMO2014)シンポジウム予稿集, 2001 - 2004, Japanese

    [Refereed]

    Symposium

  • 検索可能暗号の検索応答時間を一定にする簡潔データ構造を用いた索引手法

    北村 優汰, 毛利 公美, 中井 敏晴, SHIRAISHI Yoshiaki, 岩田 彰

    Jul. 2014, マルチメディア,分散,協調とモバイル(DICOMO2014)シンポジウム予稿集, 752 - 757, Japanese

    [Refereed]

    Symposium

  • 簡潔データ構造を用いたパケットフィルタリングのリスト表現

    北村 優汰, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Jun. 2014, 電子情報通信学会技術研究報告(情報通信システムセキュリティ研究会), 114 (71), 61 - 65, Japanese

    Symposium

  • Webベース暗号化ファイル送受信システムとそのOpenIDへの対応

    磯部 光平, 廣友 雅徳, 福田 洋治, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Jun. 2014, 電子情報通信学会技術研究報告(情報通信システムセキュリティ研究会), 114 (71), 67 - 72, Japanese

    Symposium

  • 臨床研究のための個人識別情報非可視型連結可能システム

    平井 徹也, 福田 洋治, 廣友 雅徳, 毛利 公美, 中井 敏晴, SHIRAISHI Yoshiaki

    Mar. 2014, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム研究会), 113 (479), 149 - 154, Japanese

    Symposium

  • 当事者のプライバシーを考慮したログの保管とその監査について

    日比野 歩, 福田 洋治, SHIRAISHI Yoshiaki, 毛利 公美

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 601 - 602, Japanese

    Research society

  • 情報システム・サービスの利用者の安心感と納得感に関する調査

    奥村 香保里, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2014, 情報処理学会研究報告(セキュリティ心理学とトラスト研究会), 2013-SPT-8 (16), Japanese

    Symposium

  • 検索可能暗号を高速化するための簡潔データ構造を用いた索引手法

    北村 優汰, 福田 洋治, 廣友 雅徳, 毛利 公美, 中井 敏晴, SHIRAISHI Yoshiaki

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 405 - 406, Japanese

    Research society

  • マルチ環境解析を利用した悪性Webサイトアクセス時のリスク分析支援

    義則 隆之, 神薗 雅紀, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 607 - 608, Japanese

    Research society

  • マルチ環境解析を利用した悪性Webサイトアクセスが及ぼす影響の分析支援

    義則 隆之, 篠田 昭人, 神薗 雅紀, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2014, 電子情報通信学会技術研究報告(情報通信システムセキュリティ研究会), 113 (502), 161 - 166, Japanese

    Symposium

  • ネットワーク符号化通信における近隣ノードの未受信シンボル推定に基づく再符号化手法

    大塚 祐輔, 山本 泰資, 廣友 雅徳, 福田 洋治, 毛利 公美, SHIRAISHI Yoshiaki

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 367 - 368, Japanese

    Research society

  • ネットワーク符号化を用いたリンクロス推定と中間ノードにおけるバッファリングについて

    赤池 瑞希, 福田 洋治, SHIRAISHI Yoshiaki, 毛利 公美

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 365 - 366, Japanese

    Research society

  • ネットワーク上でデータと所有者を直接的に紐付けできるステガノグラフィを用いたデータ共有

    福本 真輝, 宮嵜 仁志, 奥村 香保里, 福田 洋治, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 643 - 644, Japanese

    Research society

  • クラウド型ファイル送信サービスのためのIDベース暗号方式とその評価

    佐藤 誠, 毛利 公美, 土井 洋, SHIRAISHI Yoshiaki

    Mar. 2014, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム研究会), 113 (479), 137 - 141, Japanese

    Symposium

  • An Application Framework for Order-Stamping System Using TPM

    SHOHEI KAKEI, MASAMI MOHRI, SHIRAISHI YOSHIAKI

    Mar. 2014, 電子情報通信学会論文誌D, J79-D (3), 514 - 522, Japanese

    [Refereed]

    Scientific journal

  • TPMを用いたSSLクライアント認証 ~ OpenIDによる公開鍵証明書の発行とSSLクライアント証明書による端末認証の実現 ~

    篠田 昭人, 福田 洋治, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2014, 電子情報通信学会技術研究報告(情報通信システムセキュリティ研究会), 113 (502), 25 - 30, Japanese

    Symposium

  • Reading Out Scheme for Digitally Signed Random Network Coded Communication on VANET

    MATSUKAWA Tomoki, YAMAMOTO Taisuke, FUKUTA Youji, HIROTOMO Masanori, MOHRI Masami, SHIRAISHI Yoshiaki

    Mar. 2014, Technocal Report of Information Processing Society of Japan (Intelligent Transport Systems), 2014-ITS-56 (6), English

    Symposium

  • OpenIDを用いたTPMの公開鍵証明書発行とSSLクライアント認証

    篠田 昭人, 福田 洋治, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 597 - 598, Japanese

    Research society

  • OpenIDに対応したWebサービスIDで認証可能なWebベース暗号化ファイル送受信システム

    磯部 光平, 廣友 雅徳, 福田 洋治, 毛利 公美, SHIRAISHI Yoshiaki

    Mar. 2014, 情報処理学会第76回全国大会講演論文集, 595 - 596, Japanese

    Research society

  • IDベース暗号とIDベース署名を用いた配達証明付きデータ送信の一般的な構成

    宮嵜 仁志, 毛利 公美, 土井 洋, SHIRAISHI Yoshiaki, 岩田 彰

    Mar. 2014, 電子情報通信学会技術研究報告(情報通信システムセキュリティ研究会), 113 (502), 19 - 24, Japanese

    Symposium

  • Certificate Revocation List Distribution with Low Frequency Transmission Type Network Coded Communication Using Estimated Unreceived Symbols Broadcast for ITS

    YAMAMOTO Taisuke, HIROTOMO Masanori, MOHRI Masami, SHIRAISHI Yoshiaki

    Mar. 2014, Technocal Report of Information Processing Society of Japan (Intelligent Transport Systems), 2014-ITS-56 (5), English

    Symposium

  • ステガノグラフィを用いた第三者の仲介不要なセッション鍵共有方式

    宮嵜 仁志, 福本 真輝, 奥村 香保里, 福田 洋治, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki

    Jan. 2014, 情報処理学会研究報告(コンシューマ・デバイス&システム研究会), 2014-CDS-9 (21), Japanese

    Symposium

  • OpenIDにより利用者認証を分離したTPMの公開鍵証明書発行方式

    篠田 昭人, 福田 洋治, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki

    Jan. 2014, 情報処理学会研究報告(コンシューマ・デバイス&システム研究会), 2014-CDS-9 (22), Japanese

    Symposium

  • Koji Tomida, Masami Mohri, Yoshiaki Shiraishi

    Data sharing on the cloud server is used because of the low management cost and its convenience. It is desirable for data to be stored on the cloud server in encrypted form for its confidentiality. To address the problem of searching on encrypted data, many searchable encryption schemes have been proposed. The searchable encryption enables the server to perform the keyword search on encrypted data without learning anything about the keyword and the original data. Some schemes have a function of access control over the encrypted data. But in these schemes the number of users providing the encrypted data to the server or performing the keyword search on encrypted data is limited. We propose a searchable encryption scheme with access control which does not limit the number of users providing and searching on the encrypted data. © 2014 Springer-Verlag.

    Springer Verlag, 2014, Lecture Notes in Electrical Engineering, 276, 113 - 118, English

    [Refereed]

    International conference proceedings

  • Makoto Sato, Masami Mohri, Hiroshi Doi, Yoshiaki Shiraishi

    File transfer service demands that what users have to do is as little as possible and that no one can see the contents of a file except for a sender and a receiver of the file. In identity-based cryptography (IBC), one can use receiver's identity (ID) as a public key. There is no need to maintain public key certificates and to communicate preliminarily to get public keys. However, in common identity-based encryption (IBE), the decryption right is concentrated on the Private Key Generator (PKG) which generates every user's private key. Therefore, the PKG is asked for complete trust which is difficult to find in many realistic scenarios. In this paper, we propose an encryption scheme which encrypts a message doubly. By using our scheme, the decryption right is distributed to three servers, and the only receiver can decrypt ciphertext. © 2014 Springer-Verlag.

    Springer Verlag, 2014, Lecture Notes in Electrical Engineering, 276, 139 - 144, English

    [Refereed]

    International conference proceedings

  • Takeru Naruse, Masami Mohri, Yoshiaki Shiraishi

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set of attributes assigned to users is embedded in user's secret key. A user is able to decrypt if his attributes satisfy the ciphertext's access structure. In CP-ABE, processes of user's attribute revocation and grant are concentrated on the authority and the data owner. In this paper, we propose a ciphertext-policy attribute-based encryption scheme delegating attribute revocation processes to Cloud Server by proxy re-encryption. The proposed scheme does not require generations of new secret key when granting attributes to a user and supports any Linear Secret Sharing Schemes (LSSS) access structure. © 2014 Springer-Verlag.

    Springer Verlag, 2014, Lecture Notes in Electrical Engineering, 276, 119 - 125, English

    [Refereed]

    International conference proceedings

  • Yuta Kitamura, Akira Iwata, Masami Mohri, Yoshiaki Shiraishi

    Packet filtering is a function to determine whether a packet is allowed to forward or not by applying rules to a packet. Filtering packets can improve security and performance. Linear search is the simplest and a storage-efficient algorithm. The time to filter a packet grows linearly with the number of rules. If an action list which stores actions (allow or drop) for all manner of packet headers is pre-computed from a rule set, routers can filter a packet in constant time. The list is called Direct Accessible Filter (DAF) in this paper. However, DAF requires large storage. This paper proposes DAF using succinct data structures which are low storage requirement and support fast query. We apply succinct representation techniques to DAF and aim at low storage requirement. Theoretical and experimental results show that DAF using succinct data structure enjoys low storage requirement and constant search speed.

    IEEE, 2014, 2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 514 - 518, English

    [Refereed]

    International conference proceedings

  • ネットワーク上でデータと所有者を直接的に紐付けできるステガノグラフィを用いたデータ共有

    福本 真輝, 宮嵜 仁志, 奥村 香保里, 福田 洋治, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki

    Dec. 2013, 第11回情報学ワークショップ(WiNF2013)論文集, (6-A-2), Japanese

    Symposium

  • ネットワーク符号化を用いたノード間リンクロス率の推定手法の評価について

    福田 洋治, SHIRAISHI Yoshiaki, 毛利 公美

    Nov. 2013, 電子情報通信学会技術研究報告(ライフインテリジェンスとオフィス情報システム研究会), 113 (327), 45 - 50, Japanese

    Symposium

  • 挙動を変える悪性Webサイトのマルチ環境解析

    義則 隆之, 神薗 雅紀, 廣友 雅徳, 毛利 公美, SHIRAISHI Yoshiaki

    Oct. 2013, コンピュータセキュリティシンポジウム2013(CSS2013)予稿集, 396 - 403, Japanese

    Symposium

  • “Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency”の紹介

    奥村 香保里, SHIRAISHI Yoshiaki, 岩田 彰

    Oct. 2013, 情報処理学会研究報告(セキュリティ心理学とトラスト研究会), 2013-SPT-7 (9), Japanese

    Symposium

  • “Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes”の紹介

    宮嵜 仁志, SHIRAISHI Yoshiaki, 岩田 彰

    Oct. 2013, 情報処理学会研究報告(セキュリティ心理学とトラスト研究会), 2013-SPT-7 (5), Japanese

    Symposium

  • プロセッサ抽象化API利用アプリケーションの並列処理タスクへのプロセッシングエレメントの動的な配分機構のAndroid実装

    SAKAKIBARA Hiroaki, SHIRAISHI YOSHIAKI, IWATA AKIRA

    情報処理学会/電子情報通信学会, Sep. 2013, 第12回情報科学技術フォーラム, 4, 105 - 110, Japanese

    [Refereed]

    International conference proceedings

  • スマートハウスにおける電力変動からの不正アクセス検知の検討

    OKUMURA AKIHIRO, SHIRAISHI YOSHIAKI, IWATA AKIRA

    情報処理学会/電子情報通信学会, Sep. 2013, 第12回情報科学技術フォーラム, 4, 87 - 90, Japanese

    [Refereed]

    International conference proceedings

  • 複数サーバに復号権限を分散したWebベースファイル送受信システム

    佐藤 誠, 毛利 公美, 土井 洋, SHIRAISHI Yoshiaki

    Jul. 2013, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム予稿集, 2075 - 2082, Japanese

    [Refereed]

    Symposium

  • A Dynamic Processor Resources Allocation Scheme for Energy Saving

    SAKAKIBARA HIROAKI, SHIRAISHI YOSHIAKI, IWATA AKIRA

    情報処理学会, Jul. 2013, 情報処理学会論文誌 コンシューマ・デバイス&システム, 3 (3), 11 - 19, Japanese

    [Refereed]

    Scientific journal

  • 前方秘匿性を満たす属性失効機能付き属性ベース暗号

    成瀬 猛, 毛利 公美, SHIRAISHI Yoshiaki

    Jul. 2013, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム予稿集, 215 - 221, Japanese

    [Refereed]

    Symposium

  • 暗号プロトコルの実装を支援するためのアプリケーションフレームワーク

    宮嵜 仁志, 毛利 公美, SHIRAISHI Yoshiaki

    Jul. 2013, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム予稿集, 264 - 270, Japanese

    [Refereed]

    Symposium

  • プライバシー情報を登録する利用者の安心感の要因に関する調査

    奥村 香保里, SHIRAISHI Yoshiaki, 岩田 彰

    Jul. 2013, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム予稿集, 858 - 864, Japanese

    [Refereed]

    Symposium

  • データ入出力統合フレームワークによる複数のSNSと連携するアプリケーション開発の支援

    岡崎 亮介, 毛利 公美, SHIRAISHI Yoshiaki

    Jul. 2013, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム予稿集, 1913 - 1921, Japanese

    [Refereed]

    Symposium

  • アクセス制御機能付き検索可能暗号のIDベース暗号からの構成

    冨田 幸嗣, 宮嵜 仁志, 毛利 公美, SHIRAISHI Yoshiaki

    Jul. 2013, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム予稿集, 208 - 214, Japanese

    [Refereed]

    Symposium

  • 掛井 将平, 毛利 公美, 白石 善明, 野口 亮司

    信頼できる時刻情報によりデータがいつから存在していたかを証明するタイムスタンプ技術がある.しかし,時刻情報だけでは順序関係が分からないこ とから,データの紛失の検知や全て揃っていることの保証はできない.本稿ではセキュリティチップTPMを用いたVirtual Monotonic Counterが出力する信頼できる通し番号によりデータの順序関係を保証する順序認証システムを提案する.提案システムの実装で手間となるTPMの利用部分を隠蔽し,Java開発者であればシステムの実装が可能となるライブラリを開発した.ライブラリを用いて順序認証システムを試作したところステップ数が約75%削減された.

    情報処理学会, 06 Mar. 2013, 第75回全国大会講演論文集, 2013 (1), 595 - 596, Japanese

  • TPMを用いたVirtual Monotonic Counterの階層型接続による順序認証方式

    掛井 将平, 毛利 公美, 白石 善明, 野口 亮司

    Jan. 2013, 2013年暗号と情報セキュリティシンポジウム(SCIS2013)予稿集, Japanese

  • Tetsuya Hirai, Masanori Hirotomo, Masami Mohri, Yoshiaki Shiraishi

    The massive disappearance of data is caused by natural disaster, terrorism, fire accidents and so on. If data is stored on an online storage service, the information system can be resumed speedily. To create web applications, Representational State Transfer (REST)-based APIs are offered in some online storage services. However, to modify the system, we have to migrate application data to the online storage service, and have to change file reading/writing operation to related application codes. In this paper, we propose a conversion method from the operations for local file system into HTTP requests for online storage by converting the source code. In the execution of converted code, the file reading/writing operation through networks causes the access delay. Thus, we present a cache function that stores and operates data on local storage in order to reduce the access delay. © 2013 Springer Science+Business Media.

    2013, Lecture Notes in Electrical Engineering, 214 (214), 223 - 231, English

    [Refereed]

    International conference proceedings

  • Shohei Kakei, Tomohiko Wakita, Masami Mohri, Yoshiaki Shiraishi, Ryoji Noguchi

    Public Key Infrastructure Time-Stamp Protocol (PKI TSP) is standardized in RFC3161. In the PKI TSP, a TSA (Time Stamping Authority), which is a trusted third party, authenticates the time-stamp. In this model, the time-stamp authentication depends on the TSA, and a client must be in online status. This paper proposes an offline time-stamp scheme. The proposed scheme authenticates the time-stamp, even when a client cannot communicate with the TSA. The TSA delegates the authority of time-stamp authentication to a client which has been authenticated by a certification authority (CA) using a TPM (Trusted Platform Module). Then a client authenticates the time-stamp using the TPM. The paper also shows that the proposed scheme using the TPM can detect the falsification and forgery of the time.

    Information Processing Society of Japan, 15 Sep. 2012, IPSJ Journal, 53 (9), 2117 - 2129, Japanese

    [Refereed]

    Scientific journal

  • センターから端末への動的なコードの配布・実行・検証機構

    白石 善明, 佐々木 啓, 福田 洋治, 毛利 公美

    Sep. 2012, 第11回情報科学技術フォーラム講演論文集, 4, 45 - 50

    [Refereed]

  • TPMを用いたオフライン型タイムスタンプシステム

    掛井 将平, 毛利 公美, 白石 善明, 野口 亮司

    データに対するアクセス権限を持つ者は容易に情報を持ち出せる。アクセス権限を持つ者が情報漏えいをしていないことを示すために,アプリケーションに対して不正な操作をしていないことをログによって示すことを考える。ログの法的証明力を高めるための要件の一つにログの記録日時を証明することが挙げられている。本稿では,端末利用者のアプリケーションに対する操作のログの記録日時を証明する要素技術となるタイムスタンプシステムを提案する。RFC3161で標準化されたタイムスタンプ技術があるが,端末がインターネットに接続できないときは日時を証明できない。本システムはインターネット接続できないオフライン状態でも記録日時が証明できる特徴を持つ。

    27 Jun. 2012, マルチメディア,分散,協調とモバイル(DICOMO2012)シンポジウム予稿集, 2305 - 2314, Japanese

  • ActionScriptによるηTペアリング演算ライブラリー

    毛利 公美, 伴 拓也, 白石 善明

    Last, Apr. 2012, 電子情報通信学会論文誌, J95-D (4), 799 - 811

    [Refereed]

    Scientific journal

  • 掛井 将平, 脇田 知彦, 毛利 公美, 白石 善明, 野口 亮司

    RFC3161準拠のタイムスタンプシステムでは,時刻認証の度に外部と通信する必要があり,災害時などのネットワークアクセスができない状況では時刻認証ができない.我々は既に,ローカルでの時刻認証を目的として,セキュリティチップTPMを用いたオフライン型タイムスタンプの提案とその安全性の評価をしている.本稿では,TPM搭載端末上でオフライン型タイムスタンプシステムのクライアントを実装するためのJavaライブラリについて述べる.本ライブラリはIAIKが公開しているTPMのライブラリを利用してタイムスタンプ関連の処理やTPM関連の処理を実装している.本ライブラリを用いることで,十数行のコードでオフライン型タイムスタンプシステムのクライアントを実装することができる.

    06 Mar. 2012, 第74回全国大会講演論文集, 619 - 620, Japanese

  • Tomoki Matsukawa, Taisuke Yamamoto, Youji Fukuta, Masanori Hirotomo, Masami Mohri, Yoshiaki Shiraishi

    There are various studies and developments to notice the traffic information to drivers in the field of Intelligent Transport System (ITS) so that they can prevent traffic accidents. Vehicles must be timely transmitted information with integrity, since it influences an action of vehicles indirectly. Digital signature provides reliability for the information. In high vehicle density area, the vehicles may receive many packets. If each vehicle verifies all signatures of received packets, the transmission delay increases. Increasing of the expired packets causes decrease of the received rate. In this paper, we propose a method for controlling the number of verification dynamically in order to decrease the transmission delay. The proposed method can suppress fall of the received rate.

    IEEE, 2012, 2012 12TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS (ITST-2012), 624 - 628, English

    [Refereed]

    International conference proceedings

  • A Distribution Scheme of Certificate Revocation List by Inter-vehicle Communication Using a Random Network Coding

    Taisuke Yamamoto, Youji Fukuta, Masami Mohri, Masanori Hirotomo, Yoshiaki Shiraishi

    Intelligent Transport System (ITS) is for resolving traffic accidents and congestion by using information and communications technology. It is important to ensure the reliability of data in ITS. Public key encryption and digital signature are used for data security. Certification authority (CA) issues a certificate for a public key and manages a certificate revocation list (CRL). While a vehicle moves, it cannot always access the network infrastructure such as road side unit (RSU). If the distribution of CRL is slowly, a vehicle cannot verify the validity of a certificate correctly. This paper proposes a CRL distribution scheme by inter-vehicle communication using random network coding in the situations near intersections with high vehicle density.

    IEEE, 2012, 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 392 - 395, English

    [Refereed]

    International conference proceedings

  • Shohei Kakei, Masami Mohri, Yoshiaki Shiraishi, Ryoji Noguchi

    Some time-stamping services are on business for protection of a document. A user can get the time-stamp just by connecting a terminal to the internet. However, if the user cannot connect to the internet, the document cannot be protected. Without regard to the internet access, if the user can get the time-stamp anywhere, time-stamping can use in many other situations. This paper proposes an offline time-stamping scheme. The scheme generates the time-stamp in a user's terminal using TPM. TPM is a security chip. In this scheme, TPM is used for preventing a terminal user from generating a time-stamp containing falsified time. This paper shows an example of a design and an implementation of an offline time-stamping system based on the scheme. The system is designed in the REST-over-HTTP style. By using HTTP, the development is simplified because it is not necessary to build an interface, API, or others for each system a developer need to build. The implemented system can issue a time-stamp about 1,140ms under the experimental environment.

    IEEE, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2012), 404 - 409, English

    [Refereed]

    International conference proceedings

  • Shohei Kakei, Masami Mohri, Yoshiaki Shiraishi, Ryoji Noguchi

    Digital time-stamp is a component for making a digital evidence of data. It proves that there has been a data since a particular time, and the data has not been falsified after time-stamping. A PKI-based time-stamping scheme is standardized in RFC3161. In the scheme, Time Stamping Authority (TSA), which is a trusted third party, issues a digital time-stamp and a client cannot requests time-stamp to TSA without internet access. This paper proposes an offline time-stamping scheme using TPM. TPM is a security chip equipped with a terminal and provides an extra layer of security to the terminal. The proposed scheme can make time-stamp that is detectable with falsification and forgery. The implementation of the proposed scheme requires the knowledge of TPM. This paper shows the Java library for easy development of the offline time-stamping using TPM.

    IEEE, 2012, 2012 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE 2012), 64 - 69, English

    [Refereed]

    International conference proceedings

  • 掛井 将平, 脇田 知彦, 毛利 公美, 白石 善明, 野口 亮司

    タイムスタンプサービスとは,電子データがある時刻において存在し,それ以降改ざんされていないことをTSA(Time Stamp Authority)により保証するサービスである.我々は既に,規模拡張性/頑強性/外部秘匿性を持つ階層型タイムスタンプサービスの提案を行い,そのモデルの安全性について議論した.本稿では,提案モデルに基づいたオフライン型タイムスタンプサービスについて述べる.まず,サービスのシステム構成を示し,サービスを構成する主体の機能要件を定義した.そして,REST(Representational State Transfer)アーキテクチャスタイルによるTSAサービスの実装とクライアントにおけるTPMを用いた安全なタイムスタンプの生成について述べる.

    12 Oct. 2011, コンピュータセキュリティシンポジウム2011 論文集, 199 - 204, Japanese

  • グループ化した蓄積情報を活用する知識継承の一手法

    白石 善明, 福山 悠, 毛利 公美

    Sep. 2011, 第10回情報科学技術フォーラム講演論文集, 4, 147 - 152

    [Refereed]

  • 掛井将平, 脇田知彦, 毛利公美, 白石善明, 野口亮司

    タイムスタンプサービスとは,電子データがある時刻において存在し,それ以降改ざんされていないことをTSA(Time Stamp Authority)により保証するサービスである.時刻保証要求者は時刻保証が必要になる度にTSAに要求を出さなければならない.一般的に外部に設置されているTSAに処理が集中する従来の二者間モデルでは大量のデータに対する時刻保証は容易ではない.また,端末がオフライン中の時刻保証も困難である.時刻保証を要求した事実を外部に秘匿しておきたい場合もある. 本稿では,まず,TSAの負荷分散を目的としたタイムスタンプサービスの二種類のTSAによるモデルを提案し,その安全性について議論する.そして,そのモデルに基づいた,スケーラブルな時刻保証,端末がオフライン中の時刻保証,時刻保証事実の外部秘匿の3点を目的とした端末内での時刻保証を実現するTPMを用いた一方式を提案し,安全性を評価する.

    30 Jun. 2011, マルチメディア、分散協調とモバイルシンポジウム2011論文集, 2011, 1002 - 1015, Japanese

  • A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service

    Y.SHIRAISHI, M.MOHRI, Y.FUKUTA

    Jun. 2011, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2 (2), 83 - 94, English

    [Refereed]

    Scientific journal

  • 社会ネットワーク分析を用いたスパム対策:固有ベクトル中心性に基づくメールフィルタリン

    白石 善明, 福田 洋治, 溝渕 昭二, 鈴木 貴史

    Mar. 2010, 情報処理学会論文誌, 51 (3), 1083 - 1093, Japanese

    [Refereed]

    Scientific journal

  • 情報共有を円滑にするための明示的な返信を不要とするコミュニケーションツール

    矢田久美子, 白石善明, 毛利公美

    Corresponding, 2010, 第9回情報科学技術フォーラム講演論文集, 4, 147 - 150

    [Refereed]

    International conference proceedings

  • プライアブル・デバイス -しなやかにカスタマイズできる端末と利用者主導によるユーザビリティの向上-

    白石善明

    2010, 情報処理, 51 (5), 525

    [Refereed]

    Scientific journal

  • 矢口隆明, 岩田彰, 白石善明, 横山淳一

    2010, 日本医療情報学会論文誌「医療情報学」, 29 (2)

    [Refereed]

    Scientific journal

  • 在宅介護サービスにおける現場知を基にしたチームケアの知識流通システムの開発と評価

    矢口 隆明, 岩田 彰, 白石 善明

    2009, 情報文化学会誌, 16 (2), 12 - 20

    [Refereed]

  • アプリケーションの実装時組み込み型手順提示機構の提案と評価

    矢田久美子, 白石善明, 毛利公美

    2009, 第8回情報科学技術フォーラム講演論文集, 4, 101 - 108

    [Refereed]

    International conference proceedings

  • A filter check system for defeating attacks which employ IP source address spoofing

    Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii

    To secure network layer is needed for stable IP network as infrastructure. As TCP SYN flooding attack shows, sender of attack packet generally masquerades as others by spoofing source IP address in the packet. IP network becomes more secure, if backbone network through which IP spoofing packet does not flow can be realized. Egress filtering is a way of not flowing IP spoofing packet into backbone network. Each customer network should activate egress filtering for being an effective stratagem. From not only the view point of IP network security but also suppression of threat to be springboard, egress filter must be applied in all customer networks. However, no tool is ready for easily checking egress filtering. In this paper, we show an egress filter check system which can obtain results of egress filter check on routers in a path to arbitrary host.

    Lead, INT INST INFORMATICS & SYSTEMICS, 2007, WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 289 - +, English

    [Refereed]

    International conference proceedings

  • A Categorizing-Guessed-Values Approach for the Key Recovery Attack against WEP

    Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii

    Oct. 2006, Proceedings of International Symposium on Information Theory and its Applications (ISITA2006), 403 - 408, English

    [Refereed]

    International conference proceedings

  • 組織内システムにおいてエンティティの行動を管理するネットワークサービスアクセス制御

    福田洋治, 白石善明, 森井昌克

    2006, 電子情報通信学会論文誌, Vol.J89-D (No.12), 2564 - 2578

    [Refereed]

  • メモリ上に展開されたコードを使うウイルス解析支援システム

    市川幸宏, 伊沢亮一, 白石善明, 森井昌克

    2006, 情報処理学会論文誌, Vol.47 (No.8), 2524 - 2534

    [Refereed]

  • Access control by service connector with single sign-on function

    Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii

    In operation of server hosts in client/server model, allowing to connect a service with public is a frequent cause of illegal access. An administrator takes on heavy work load in conventional model of service provision, because access control is implemented in each application level. In this paper, we propose a model for access control using an application gateway which has functions of single sign-on, user authentication and service provisions. We call the application gateway service connector. The proposed model can improve security on server host and realize centralized user management and access-log analysis, and it has an effect to reduce a load of administrator.

    Lead, INT INST INFORMATICS & SYSTEMICS, 2005, WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 255 - 259, English

    [Refereed]

    International conference proceedings

  • T Ohigashi, Y Shiraishi, M Morii

    In this paper, we present an attack to break WEP that avoids weak IVs used in the FMS attack. Our attack is a known IV attack that doesn't need the specific pattern of the TVs. This attack transforms most TVs of WEP into weak TVs. If we attempt to avoid all weak TVs used in our attack, the rate at which TVs are avoided is too large to use practical. When using a 128-bit session key, the efficiency of our attack is 2(72.1) in the most effective case. This implies that our attack can recover a 128-bit session key within realistically possible computational times.

    SPRINGER-VERLAG BERLIN, 2005, COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 3802, 17 - 26, English

    [Refereed]

    Scientific journal

  • Port randomized VPN by mobile codes

    Y Shiraishi, Y Fukuta, M Morii

    A key advantage of SSL VPN is that no specialized client software is required. When a user requests access to a server, the SSL client module, which is a Java applet code, is downloaded into the host at first. However, it is quite likely that not all applications run well, because a client can not connect with a server through an HTTPS tunnel in some applications as we know. Moreover, there is the possibility that we can not use the VPN connections when the SSL port is under Denial of Service (DoS) or Distributed DoS (DDoS) attack. In this paper, we propose a port randomized VPN architecture such that any application can use the VPN and the VPN has strength against DoS or DDoS attack. The proposed VPN uses the same Java applet as existing SSL VPNs use, but the function of the applet, which we call mobile code, is dynamically changed by Java Remote Method Invocation (RMI). The VPN client applet can cooperate with a VPN server and a firewall in server side.

    Lead, IEEE, 2004, CCNC 2004: 1ST IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, PROCEEDINGS, 671 - 673, English

    [Refereed]

    International conference proceedings

  • An Improved Internal-State Reconstruction Method of a Stream Cipher RC4

    Yoshiaki Shiraishi, Toshihiro Ohigashi, Masakatu Morii

    Dec. 2003, Proceedings of The IASTED International Conference on Communication, Network, and Information Security(CNIS 2003), 132 - 135, English

    [Refereed]

    International conference proceedings

  • Remote access VPN with port protection function by mobile codes

    Y Shiraishi, Y Fukuta, M Morii

    Concern about SSL VPN technology as a class of VPNs has been growing recently because a key advantage of SSL VPN is that it requires no specialized client software. When a user requests access to a server, the SSL client module, a Java applet code, is downloaded into the host first. However, it is quite likely that not all applications run well because a client can not connect with a server through an HTTPS tunnel in some applications. This study proposes a remote access VPN architecture that allows any application to use the VPN. The proposed VPN uses the same Java applet as existing SSL VPNs, but the function of the applet, which we call mobile code, is changed dynamically by Java Remote Method Invocation (RMI). The VPN client applet can cooperate with a VPN server and a firewall in server side. As a result, the proposed VPN has strength against Denial of Service (DoS) attacks.

    Lead, SPRINGER-VERLAG BERLIN, 2003, INFORMATION SECURITY APPLICATIONS, 2908, 16 - 26, English

    [Refereed]

    International conference proceedings

  • パケット往復時間の予測誤差を使った乱数生成法

    白石善明, 孝富士武史, 森井昌克

    Lead, 2003, 情報処理学会論文誌, Vol.44 (No.8), 2170 - 2177, Japanese

    [Refereed]

    Scientific journal

  • Webサーバリモート監視システムの実装および評価

    竹森, 敬祐, 田中, 俊昭, 中尾, 康二, 大東, 俊博, 三宅, 崇之, 白石, 善明, 森井, 昌克

    Aug. 2002, 情報処理学会論文誌, 43 (8), 2542 - 2551, Japanese

    [Refereed]

    Scientific journal

  • ネットワークのサービス品質管理を容易化するセキュリティプロトコルの一方式

    白石善明, 福田洋治, 森井昌克

    Lead, 2002, 電子情報通信学会論文誌D-I, Vol.J85-D-I (No.7), 614 - 625, Japanese

    [Refereed]

    Scientific journal

  • 非線形コンバイナ型乱数生成器の特性-線形複雑度,相互情報量,無相関性について-

    白石 善明, 森井 昌克, 植松, 友彦, 坂庭 好一

    Lead, Oct. 2000, 電子情報通信学会論文誌(A), J83-A (10), 1169 - 1179, Japanese

    [Refereed]

  • Yoshiaki SHIRAISHI, Yoshinori SHIRAKAWA, Chikara OHTA, Naoto SONE, Masakatu MORII

    Lead, The Institute of Systems, Control and Information Engineers, 2000, Transactions of the Institute of Systems, Control and Information Engineers, 13 (4), 168 - 178, Japanese

    [Refereed]

    Scientific journal

  • 広域インターネット上での静止および動画像配送実験

    森井昌克, 白石善明, 曽根直人, 岩田賢一, 太田能, 大家隆広

    1998, 画像電子学会誌, Vol.27 (No.3), 253 - 262

    [Refereed]

    Scientific journal

MISC

  • fMRIによる高齢者向け体力測定に用いられる運動認知機能計測方法の神経基盤評価

    中井敏晴, 田中あゆ子, 國見充展, 木山幸子, 白石善明

    11 Sep. 2013, 日本医学放射線学会秋季臨床大会抄録集, 49th, S532-S533, Japanese

  • 連結可能匿名化された医療情報の安全管理措置の検討

    平井徹也, 福田洋治, 廣友雅徳, 毛利公美, 中井敏晴, 白石善明

    Mar. 2013, 情報処理学会全国大会講演論文集, 75th (4), 4.919 - 4.920, Japanese

    [Refereed]

    Report scientific journal

  • 視覚運動変換型の認知機能計測用Webシステムの開発

    杉浦圭, 福田洋治, 毛利公美, 中井敏晴, 田中あゆ子, 白石善明

    06 Mar. 2012, 情報処理学会全国大会講演論文集, 74th (3), 3.173-3.174, Japanese

  • Development of software to present the same tests of physical strength of visuomotor transformation at the cognitive processing of concept formation for the analysis in brain activity using fMRI

    Sugiura Kei, Fukuta Youji, Mohri Masami, Nakai Toshiharu, Tanaka Ayuko, Shiraishi Yoshiaki

    It has been focused for effect of exercise on dementia. We want to clarify the relationship between exercise and brain function in order to evaluate cognitive function needed to body movements using fMRI. However, physical fitness cannot apply to measurement in fMRI due to physical limitations of MRJ. This paper proposes software to present the same tests of physical strength of visuomotor transformation at the cognitive processing of concept formation. We confirmed that our software can be used in fMRI.

    The Institute of Electronics, Information and Communication Engineers, Jan. 2012, IEICE technical report. Life intelligence and office information systems, 111 (383), 45 - 50, Japanese

  • An End-host based Logging Mechanism Using TPM and TSS

    福田 洋治, 白石 善明, 毛利 公美, 溝渕 昭二, 野口 亮司

    12 Oct. 2011, コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集, 2009, 1 - 6, Japanese

  • 行動データを取得するWebアプリケーションのための処理時間予測による測定精度保証

    杉浦圭, 福田洋治, 毛利公美, 中井敏晴, 田中あゆ子, 白石善明

    22 Aug. 2011, 情報科学技術フォーラム, FIT 2011, 659 - 660, Japanese

  • 予防医療のための生体機能測定用Webアプリケーションの動作精度保証機構

    杉浦圭, 矢田久美子, 福田洋治, 毛利公美, 中井敏晴, 田中あゆ子, 白石善明

    02 Mar. 2011, 情報処理学会全国大会講演論文集, 73rd (4), 4.721-4.722, Japanese

  • A Communication Tool With No Need To Explicitly Reply For Smooth Information Sharing

    Kumiko Yada, Yoshiaki Shiraishi, Masami Mohri

    2010, Proceedings of Forum on Information Technology 2010, 4, 147 - 150

  • Pliable Devices - Improvement of Usability by User Leading with Pliably Customizable Terminal -

    Yoshiaki SHIRAISHI

    2010, 情報処理, 51 (5), 525

  • Development and Evaluation of a Knowledge Distribution Support System for Team Care-- Information Coordination based on Electronic Sharing of Home Care Service Records --

    Takaaki Yaguchi, Akira Iwata, Yoshiaki Shiraishi, Jun-ichi Yokoyama

    2010, An Official Journal of the Japan Association for Medical Informatics, 29 (2)

  • Antispam Method Using Social Network Analysis: Eigenvector Centrality-based Email Filtering

    Yoshiaki SHIRAISHI, Youji FUKUTA, Shoji MIZOBUCHI, Takashi SUZUKI

    2010, IPSJ Journal, Vol.51 (No.3), 1 - 11

  • M-094 Blog Based Sensor Data Annotating System for Creating Information Spirally

    Mizobuchi Shoji, Yokomae Takuma, Shiraishi Yoshiaki, Iguchi Nobukazu, Mukai Sonoyo

    Forum on Information Technology, 20 Aug. 2009, 情報科学技術フォーラム講演論文集, 8 (4), 463 - 464, Japanese

  • AS-1-3 On Host-based Logging for Network Forensics

    FUKUTA Youji, MIZOBUCHI Shoji, MOHRI Masami, SHIRAISHI Yoshiaki, NOGUCHI Ryoji

    社団法人電子情報通信学会, 04 Mar. 2009, 電子情報通信学会総合大会講演論文集, 2009 (0), S - 25-S-26, Japanese

  • Sensor Information Sharing System Using Weblog

    Mizobuchi Shoji, Shiraishi Yoshiaki, Iguchi Nobukazu, Mukai Sonoyo

    This paper describes a sensor information sharing system that shares and creates sensor information using weblog media. The aim of the system is to trigger a loop of creating and sharing of sensor information and circulate it spirally. In order to achieve this aim, the system equips functions supporting induction and acquirement of sensor information. The evaluation of the system showed that the functions achieved the desired effect.

    The Japan Joint Automatic Control Conference, 2009, Proceedings of the Japan Joint Automatic Control Conference, 52 (0), 172 - 172, Japanese

  • Development and Evaluation of a Knowledge Distribution System for Team Care Basd on Tacit Knowledge in Home Care Services

    Takaaki Yaguchi, Akira Iwata, Yoshiaki Shiraishi

    2009, Journal of the Japan Information-culture Society, 16 (2), 12 - 20

  • An Operation Presentation Mechanism For GUI Application and its Evaluation

    Kumiko YADA, Yoshiaki SHIRAISHI, Masami MOHRI

    2009, Proc. The 8th Forum on Information Technology, 4, 101 - 108

  • On Host-based Packet Capturing Mechanism for Network Forensics

    INAI Shunsuke, FUKUTA Youji, MIZOBUCHI Shoji, MOHRI Masami, SHIRAISHI Yoshiaki, NOGUCHI Ryoji

    Digital forensics is application of computer crime investigation and analysis techniques in the interests of determing potential legal evidence. In this paper, we will give some considerations about host-based network forensic system that communication packets are collected and preserved in each monitored host. The system has advantages in terms of comprehending communication state, however its each process requires ensuring reliability, availability and maintaining legal probative force. We show host-based packet capturing mechanism and process flow, which consist of log collection, preservation, for satisfying the above requirement.

    The Institute of Electronics, Information and Communication Engineers, 06 Nov. 2008, IEICE technical report, 108 (285), 1 - 6, Japanese

  • Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii

    In a key scheduling algorithm (KSA) of stream ciphers, a secret key is expanded into a large initial state. An internal state reconstruction method is known as a general attack against stream ciphers; it recovers the initial state from a given pair of plaintext and ciphertext more efficiently than exhaustive key search. If the method succeeds, then it is desirable that the inverse of KSA is infeasible in order to avoid the leakage of the secret key information. This paper shows that it is easy to compute a secret key from an initial state of RC4. We propose a method to recover an l-bit secret key from only the first l bits of the initial state of RC4 using linear equations with the time complexity less than that of one execution of KSA. It can recover the secret keys of which number is 2(103.6) when the size of the secret key is 128 bits. That is, the 128-bit secret key can be recovered with a high probability when the first 128 bits of the initial state are determined using the internal state reconstruction method.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Jan. 2008, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E91A (1), 3 - 11, English

  • Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii

    In a key scheduling algorithm (KSA) of stream ciphers, a secret key is expanded into a large initial state. An internal state reconstruction method is known as a general attack against stream ciphers; it recovers the initial state from a given pair of plaintext and ciphertext more efficiently than exhaustive key search. If the method succeeds, then it is desirable that the inverse of KSA is infeasible in order to avoid the leakage of the secret key information. This paper shows that it is easy to compute a secret key from an initial state of RC4. We propose a method to recover an l-bit secret key from only the first l bits of the initial state of RC4 using linear equations with the time complexity less than that of one execution of KSA. It can recover the secret keys of which number is 2(103.6) when the size of the secret key is 128 bits. That is, the 128-bit secret key can be recovered with a high probability when the first 128 bits of the initial state are determined using the internal state reconstruction method.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Jan. 2008, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E91A (1), 3 - 11, English

  • J-039 Group Communication Support Using Index That Represents Message Balance

    Mizobuchi Shoji, Shiraishi Yoshiaki

    Forum on Information Technology, 22 Aug. 2007, 情報科学技術フォーラム一般講演論文集, 6 (3), 475 - 478, Japanese

  • O-012 Mail Sets for Spam Filtering Tests

    Suzuki Takashi, Shiraishi Yoshiaki, Mizobuchi Shoji

    Forum on Information Technology, 22 Aug. 2007, 情報科学技術フォーラム一般講演論文集, 6 (4), 461 - 464, Japanese

  • 顔認識技術を利用した受講者撮影支援システムの提案と試作

    越智洋司, 大西佑樹, 井口信和, 白石善明, 向井苑生

    2007, 教育システム情報学会誌, Vol.24 (No.4), 301 - 310

  • 顔認識技術を利用した受講者撮影支援システムの提案と試作

    越智洋司, 大西佑樹, 井口信和, 白石善明, 向井苑生

    2007, 教育システム情報学会誌, Vol.24 (No.4), 301 - 310

  • A Development of Camera Control System to Support Recording Lecture Video

    OCHI Youji, IGUCHI Nobukazu, TANAKA Kazuki, MIZOBUCHI Shouji, SHIRAISHI Yoshiaki, MUKAI Sonoyo

    Recently, the growing popularity of network infrastructure has dramatically increased the number of delivery of the lecture with a cheap camera system in many universities. This approach does not require a specific classroom. However, a workload of the establishment and operation of a camera becomes some problem, hi this paper, we describe a development of a camera control system for recording lecture video.

    The Institute of Electronics, Information and Communication Engineers, 02 Mar. 2006, IEICE technical report, 106 (583), 117 - 120, Japanese

  • 特定少数グループ向けP2P型バックアップシステム

    中居大昭, 岩野桂太, 毛利公美, 福田洋治, 白石善明

    2006, 情報科学技術レターズ, 411 - 414

  • Network Service Access Control for Behavioral Management of Entities in Organization

    Youji FUKUTA, Yoshiaki SHIRAISHI, Masakatu MORII

    2006, Trans. of IEICE D, Vol.J89-D (No.12), 2564 - 2578

  • P2P-type backup system for specified minority group

    Hiroaki NAKAI, Keita IWANO, Masami MOHRI, Youji FUKUTA, Yoshiaki SHIRAISHI

    2006, Information Technology Letters, 411 - 414

  • Unknown Virus Analysis Support System Using Code Loaded on Memory

    Sashihiro ICHIKAWA, Ryoichi ISAWA, Yoshiaki SHIRAISHI, Masakatu MORII

    2006, IPSJ Journal, Vol.47 (No.8), 2524 - 2534

  • Development of a Damage Prediction System Based on the Event Dependent Model on Time-Series Data

    野口大輔, 白石善明, 栗林稔, 桑門秀典, 森井昌克

    26 Oct. 2005, 情報処理学会シンポジウム論文集, 2005 (13,Vol.1), 151 - 156, Japanese

  • Security Analysis for a Single One-Time Password Method Usable by Multi-Authentication Agents

    UO Kenji, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    One-Time Password (OTP) method is a secure password-based authentication method by changing password in each session. We have already proposed a single OTP method usable by multi-authentication agents. In this paper, we evaluate the security of the proposed method. We show the proposed method can protect the secret information of user from not only unknown the opponents but also the agents and other users. And, the proposed method can protect the secret information of the agent from not only unknown the opponents but also the users and other agents. Additionally, the proposed method is secu...

    一般社団法人電子情報通信学会, 08 Sep. 2005, IEICE technical report. Office Information Systems, 105 (283), 29 - 34, Japanese

  • Speed-Up by Adapting Stream Cipher and an Improvement of Usability for OpenVPN

    MOTOIE Hiromi, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    Virtual Private Network (VPN) is a technology to construct a private network over public networks. Software-based VPN products are popular, because they don't need any appliance. OpenVPN is one of the most popular software-based VPN products and has high flexibility. However, the usability of OpenVPN is not so high because its setting requires expert knowledge of VPN. Additionally, the throughput decreases by the overhead of encryption because the encryption time of block cipher is large. This paper presents a method to improve the usability. A client can set VPN up on a VPN setting server ...

    Information Processing Society of Japan (IPSJ), 19 May 2005, IPSJ SIG Notes, 2005 (41), 41 - 46, Japanese

  • A Single One-Time Password Method Usable by Multi-Authentication Agents

    UO Kenji, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    One-Time Password (OTP) method is a secure password-based authentication method by changing password in each session. A lot of OTP methods have been proposed, but most methods don't consider use of multi-authentication agents. The authorization model using multi-authentication agents achieves high usability and scalability. In this paper, we propose a single OTP method usable by multi-authentication agents. The proposed method can protect secret information of user from not only unknown opponents but also agents and other users. Additionally, the proposed method has high scalability because...

    Information Processing Society of Japan (IPSJ), 19 May 2005, IPSJ SIG Notes, 2005 (41), 53 - 58, Japanese

  • A Chosen IV Attack against FMS Attack-Resistant WEP Implementation

    OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    WEP protocol is a security protocol to protect privacy of the wireless LAN communication. Original WEP was broken by the FMS attack in 2001. FMS attack-resistant WEP implementation removes weak IVs to resist the FMS attack. We have already proposed a known IV attack to FMS attack-resistant WEP implementation, and have pointed out that most WEP's IVs become weak IV. When 64-bit session key, the threat of the practical attack for the FMS attack-resistant WEP implementation increases greatly by the known IV attack. When 128-bit session key, the known IV attack recover 104-bit secret key of the...

    一般社団法人電子情報通信学会, 10 Mar. 2005, Technical report of IEICE. ISEC, 104 (731), 43 - 48, Japanese

  • A Note on Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables

    OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    Internal-state reconstruction method is a method for reconstructing the internal state of stream ciphers with time-variant tables. The key size and the key scheduling algorithm of stream ciphers with time-variant tables do not influence the time-complexity of internal-state reconstruction method. We have already proposed an efficient deterministic internal-state reconstruction method based on a tree-search algorithm. In this paper, we improve the method by applying probabilistic internal-state reconstruction method proposed by Golic. The proposed method is most effective method in the all i...

    一般社団法人電子情報通信学会, 14 Jul. 2004, Technical report of IEICE. ISEC, 104 (200), 41 - 48, Japanese

  • SSSM : A New Key Stream Generator with Time-variant Tables

    UGAWA Sanzo, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    A new key stream generator with time-variant tables, named SSSM, is proposed. SSSM is high-speed and secure key stream generator operated by the unit of 32-bit. This paper gives the algorithm and analytical result of SSSM.

    一般社団法人電子情報通信学会, 14 Jul. 2004, Technical report of IEICE. ISEC, 104 (200), 49 - 52, English

  • A Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables

    OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    Internal-state reconstruction method is a method for reconstructing the internal state of some stream ciphers with time-variant tables. We have already proposed an efficient deterministic internal-state reconstruction method. In this paper, we improve the method by applying probabilistic internal-state reconstruction method proposed by Golic in 2000.

    一般社団法人電子情報通信学会, 14 May 2004, IEICE technical report. Office Information Systems, 104 (69), 1 - 6, Japanese

  • A New Keystream Generator with Time-variant Tables

    UGAWA Sanzo, OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    Stream cipher using keystream generator with time-variant tables is suitable for software implementation. RC4 is the most widely used keystream generator with time-variant tables. There have been many security analyses of RC4. In this paper, we propose a new stream cipher using keystream generator with time-variant tables. Our stream cipher is faster than RC4. The method has resistance for several cryptanalysis.

    一般社団法人電子情報通信学会, 14 May 2004, IEICE technical report. Office Information Systems, 104 (69), 7 - 12, Japanese

  • It is Not Large for the Amount of Calculation Which Derives the Private Key of RC4

    OHIGASHI Toshihiro, SHIRAISHI Yoshiaki, MORII Masakatu

    15 Dec. 2003, 情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications, 26 (1), 37 - 40, Japanese

  • Internal-state reconstruction of a stream cipher RC4

    Y Shiraishi, T Ohigashi, M Morii

    Knudsen et al. proposed an efficient method based on a tree-search algorithm with recursive process for reconstructing the internal state of RC4 stream cipher. However, the method becomes infeasible for word size n > 5 because its time complexity to reconstruct the internal state is too large. This letter proposes a more efficient method than theirs. Our method can reconstruct the internal state by using the pre-known internal-state entries, which are fewer than their method.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 2003, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E86A (10), 2636 - 2638, English

  • Internal-state reconstruction of a stream cipher RC4

    Y Shiraishi, T Ohigashi, M Morii

    Knudsen et al. proposed an efficient method based on a tree-search algorithm with recursive process for reconstructing the internal state of RC4 stream cipher. However, the method becomes infeasible for word size n > 5 because its time complexity to reconstruct the internal state is too large. This letter proposes a more efficient method than theirs. Our method can reconstruct the internal state by using the pre-known internal-state entries, which are fewer than their method.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 2003, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E86A (10), 2636 - 2638, English

  • A method for improving fast correlation attack using parity check equations modifications

    Y Fukuta, Y Shiraishi, M Morii

    A nonlinear combiner random number generator is a general keystream generator for certain stream ciphers. The generator is composed of several linear feedback shift registers and a nonlinear function; the output is used as a keystream. A fast correlation attack is a typical attack for such keystream generators. Mihaljevic, Fossorier, and Imai have proposed an improved fast correlation attack. The attack is based on error correction of information bits only in the corresponding binary linear block code; APP threshold decoding is employed for the error correction procedure. In this letter, we propose a method which improves the success rate of their attacks with similar complexity. The method adds some intentional error to original parity check equations. Those equations are then used in APP threshold decoding.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Aug. 2003, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E86A (8), 2155 - 2158, English

  • A method for improving fast correlation attack using parity check equations modifications

    Y Fukuta, Y Shiraishi, M Morii

    A nonlinear combiner random number generator is a general keystream generator for certain stream ciphers. The generator is composed of several linear feedback shift registers and a nonlinear function; the output is used as a keystream. A fast correlation attack is a typical attack for such keystream generators. Mihaljevic, Fossorier, and Imai have proposed an improved fast correlation attack. The attack is based on error correction of information bits only in the corresponding binary linear block code; APP threshold decoding is employed for the error correction procedure. In this letter, we propose a method which improves the success rate of their attacks with similar complexity. The method adds some intentional error to original parity check equations. Those equations are then used in APP threshold decoding.

    IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Aug. 2003, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E86A (8), 2155 - 2158, English

  • A Random Number Generation Using Prediction Error of Round Trip Time on IP Network

    Yoshiaki SHIRAISHI, Takeshi KOFUJI, Masakatu MORII

    2003, IPSJ Journal, Vol.44 (No.8), 2170 - 2177

  • Remote Patrol Method for Web Server Systems

    Takemori Keisuke, Miyake Yutaka, Nakao Koji, Ohigashi Toshihiro, Miyake Takashii, Shiraishi Yoshiaki, Morii Masakatsu

    一般社団法人電子情報通信学会, 07 Mar. 2002, Proceedings of the IEICE General Conference, 2002 (1), Japanese

  • Implementation and Evaluation of Remote Patrol System for Web Server

    Keisuke TAKEMORI, Toshiaki TANAKA, Koji NAKAO, Toshihiro OHIGASHI, Takashi MIYAKE, Yoshiaki SHIRAISHI, Masakatu MORII

    2002, IPSJ Journal, Vol.43 (No.8), 2542 - 2551

  • A Security Protocol Intended to Ease QoS Management in IP Networks

    Yoshiaki SHIRAISHI, Youji FUKUTA, Masakatu MORII

    2002, Trans. of IEICE D-I, Vol.J85-D-I (No.7), 614 - 625

  • Development and Experiment of Detection System for Web Page Alteration via the Internet

    OHIGASHI Toshihiro, MASUDA Shinsuke, MIYAKE Takashi, SHIRAISHI Yoshiaki, MORII Masakatu

    With the spread of the Internet, illegal access via the Internet becomes serious problem. WWW contents are frequently altered by opponent, and the attack is a social problem recently. DNS attack for WWW is not detected by existent detection systems for web page alteration, because the systems inspect the web page from the inside of the system. Moreover, not all the administrators can easily build the secure network including the WWW server and the detection system. In this paper, we show a new surveillance system for web page alteration from the outside of the network. This system has an ef...

    一般社団法人電子情報通信学会, 12 Nov. 2001, Technical report of IEICE. OFC, 101 (435), 29 - 34, Japanese

  • 白石善明, 白河芳徳, 太田能, 曽根直人, 森井昌克

    2000, システム制御情報学会論文誌, Vol.13 (No.4), 168 - 178

  • Some Properties on Non-Linear Combiner Function -On Linear Complexity, Mutual Information and Correlation Immunity-

    Yoshiaki SHIRAISHI, Masakatu MORII, Tomohiko UYEMATSU, Kohichi SAKANIWA

    2000, Trans. of IEICE A, Vol.J83-A (No.10), 1169 - 1179

  • Yoshiaki SHIRAISHI, Yoshinori SHIRAKAWA, Chikara OHTA, Naoto SONE, Masakatu MORII

    2000, Trans. of ISCIE, Vol.13 (No.4), 168 - 178

  • Construction of WLL using low power data transmission system and its experimental results

    Shirakawa Yoshinori, Ohta Chikara, Mano Hiroshi, Shiraishi Yoshiaki, Morii Masakatu, Yamashita Toru, Takahashi Tomio, Takeda Yoshiyuki

    In this paper, we report the wireless local loop (WLL) which is experimentally constructed in Wajiki Town, Tokushima prefecture mainly by the ministry of posts and telecommunications, and its experimental results. The WLL is realized as a distributed wireless network using low power CDMA transceiver, and it has some good features from the point of view of institution, management and cost. From the experimental results, it is observed that the WLL networks show the almost equal throughput to INS and the communication applications such as IP-FAX, IP-Phone, TV-phone, mail, Web server and video server are available in practice.

    The Institute of Electronics, Information and Communication Engineers, 20 May 1999, Technical report of IEICE. OFC, 99 (69), 31 - 36, Japanese

  • Study on Construction of Local IXP and Its Experimental Results

    Shirakawa Yoshinori, Shiraishi Yoshiaki, Ohta Chikara, Sone Naoto, Morii Masakatsu

    In this paper, we discuss the structure of local HTTP-IXP server and its experimental results. Such local HTTP-IXP server aims to reduce HTTP traffic, which is major in Internet, by refining the network topology among local ISP's and sharing WWW contents in local area effectively by means of the layered cache structure. Experimental results show that local HTTP-IXP server can reduce HTTP traffic in backborn network and improve quality of service of ISP.

    The Institute of Electronics, Information and Communication Engineers, 22 May 1998, Technical report of IEICE. OFC, 98 (75), 23 - 28, Japanese

  • A Packet Distribution Experiment of Still and Moving Images over the Internet

    Masakatu MORII, Yoshiaki SHIRAISHI, Naoto SONE, Ken-ichi IWATA, Chikara OHTA, Takahiro OIE

    1998, Journal of IIEEJ, Vol.27 (No.3), 253 - 262

Books etc

  • 暗号と情報セキュリティ(共著)

    オーム社, 2010, ISBN: 9784274209581

Presentations

  • Malicious Website Detection and Exploit-kit Identification Techniques Using Website Structure

    TAKANO YASUHIRO, SHIRAISHI Yoshiaki, MORII MASAKATU

    The Second NTU-Kobe U Joint Workshop on Data Science and AI, Mar. 2018, English, Nanyang Technological University, Singapore, International conference

    Oral presentation

  • 知識創造モデルの共同化プロセスにおける知識流通を支援するシステム

    情報処理学会50周年記念(第72回)全国大会, 2010

  • 単一の鍵で多重帰属できるグループファイル共有プロトコルの評価

    情報処理学会50周年記念(第72回)全国大会, 2010

  • 信頼できるメールアドレスを公開鍵とするWebベース機密情報伝送システムの提案

    情報処理学会50周年記念(第72回)全国大会, 2010

  • 情報資産のセキュリティレベルを多角的に解析するためのレイヤを選択的に複合できる統合可視化手法

    情報処理学会50周年記念(第72回)全国大会, 2010

  • 処理能力の低いスクリプト言語と高速通信路を組合せるWebサービスのためのElGamal暗号の依頼計算

    情報処理学会50周年記念(第72回)全国大会, 2010

  • ポリシー強制ポイントをエンドホストで実現するための通信制御機構の提案

    情報処理学会50周年記念(第72回)全国大会, 2010

  • ホスト間直接通信型ファイル配送システムのためのインスタントな宛先IDとホストだけが管理する秘密を用いたペアリングによる暗号通信

    情報処理学会50周年記念(第72回)全国大会, 2010

  • ファイル提供要求に対する確実な応答を誘発し遺漏のない情報流通を支援するシステムの提案

    情報処理学会50周年記念(第72回)全国大会, 2010

  • サーバサイドネットワークを保護するためのTPMを用いた接続資格保証基盤の提案

    情報処理学会50周年記念(第72回)全国大会, 2010

  • エンドポイントでポリシー強制を行うアクセス制御モデル

    情報処理学会50周年記念(第72回)全国大会, 2010

  • アプリケーションの実装時組み込み型操作手順提示機構のユーザビリティ評価

    情報処理学会50周年記念(第72回)全国大会, 2010

  • Webクライアント上での暗号化のためのペアリング演算ライブラリのActionScriptでの実装

    情報処理学会50周年記念(第72回)全国大会, 2010

  • 知識創造モデルの共同化プロセスにおける知識流通を支援するシステム

    2010

  • ファイル提供要求に対する確実な応答を誘発し遺漏のない情報流通を支援するシステムの提案

    2010

  • 単一の鍵で多重帰属できるグループファイル共有プロトコルの評価

    2010

  • ホスト間直接通信型ファイル配送システムのためのインスタントな宛先IDとホストだけが管理する秘密を用いたペアリングによる暗号通信

    2010

  • Webクライアント上での暗号化のためのペアリング演算ライブラリのActionScriptでの実装

    2010

  • 処理能力の低いスクリプト言語と高速通信路を組合せるWebサービスのためのElGamal暗号の依頼計算

    2010

  • 信頼できるメールアドレスを公開鍵とするWebベース機密情報伝送システムの提案

    2010

  • サーバサイドネットワークを保護するためのTPMを用いた接続資格保証基盤の提案

    2010

  • エンドポイントでポリシー強制を行うアクセス制御モデル

    2010

  • ポリシー強制ポイントをエンドホストで実現するための通信制御機構の提案

    2010

  • 情報資産のセキュリティレベルを多角的に解析するためのレイヤを選択的に複合できる統合可視化手法

    2010

  • アプリケーションの実装時組み込み型操作手順提示機構のユーザビリティ評価

    2010

  • 蓄積された要素知識群からの伝達を効率的にするインタフェース

    第8回情報科学技術フォーラム(FIT2009), 2009

  • 在宅介護現場知の知識共有・情報連携支援システムに関する研究

    情報学ワークショップ2009(WiNF2009), 2009

  • ネットワーク符号化を用いたALM通信方式のためのシミュレーションフレームワークの提案

    情報学ワークショップ2009(WiNF2009), 2009

  • ネットワーク符号化および予測符号化を用いた画像のマルチキャスト通信

    第32回情報理論とその応用シンポジウム(SITA2009), 2009

  • スパイラルな情報創出に向けたブログ型センサデータアノテーションシステム

    第8回情報科学技術フォーラム(FIT2009), 2009

  • TPMとTSSを用いたエンドホストのロギング機構

    コンピュータセキュリティシンポジウム2009(CSS2009), 2009

  • ActionScript によるペアリング演算ライブラリの開発

    情報学ワークショップ2009(WiNF2009), 2009

  • Multicast Communication of Image Data Using the Network and Predictive Codings

    SITA2009, 2009

  • Pairing arithmetic library by ActionScript

    WiNF2009, 2009

  • A Knowledge Management and Sharing Support System for Tacit Knowledge of Home Care Services

    WiNF2009, 2009

  • Simulation Framework for AML Communication with Network Coding

    WiNF2009, 2009

  • An End-host based Logging Mechanism Using TPM and TSS

    CSS2009, 2009

  • Interface for Efficient Transferring From Stored Group of Knowledge Element

    FIT2009, 2009

  • Blog Based Sensor Data Annotating System for Creating Information Spirally

    FIT2009, 2009

Association Memberships

  • IEEE

  • IPSJ

  • IEICE

  • IEEE(米国電気電子学会)

  • 情報処理学会

  • 電子情報通信学会

Research Projects

  • 白石 善明

    学術研究助成基金助成金/基盤研究(C), Apr. 2016 - Mar. 2019, Principal investigator

    Competitive research funding

  • 白石 善明

    学術研究助成基金助成金/基盤研究(C), Apr. 2013 - Mar. 2016, Principal investigator

    Competitive research funding

  • 暗号プロトコルとその応用に関する研究

    2008 - 2008

    Competitive research funding

  • Study on Cryptographic Protocols and its Applications

    2008 - 2008

    Competitive research funding

  • ネットワークフォレンジックに関する研究

    2007 - 2007

    Competitive research funding

  • Study on Network Forensics

    2007 - 2007

    Competitive research funding

  • オーバーレイネットワークの効率的な通信方式に関する研究

    2006 - 2006

    Competitive research funding

  • Study on Efficient Communication in Overlay Network

    2006 - 2006

    Competitive research funding

  • 分散ネットワーク環境のセキュリティに関する研究

    1997 - 1997

    Competitive research funding

  • Study on Security in Distributed Network

    1997 - 1997

    Competitive research funding

  • 安全で高速なストリーム暗号方式に関する研究

    1995 - 1995

    Competitive research funding

  • Study on Stream Cipher with High Security and Efficiency

    1995 - 1995

    Competitive research funding