We are researching information security technologies that support safe and secure information systems. To protect digital data, it is important to prevent it from being seen by others (confidentiality). In this laboratory, we are researching cryptographic protocols that defend against cyber attacks and maintain data confidentiality. We evaluate the security of cryptographic protocols using mathematical proofs and computer simulations based on computational assumptions. We aim to realize a safe and reliable information society.
Basic Information
Faculty name/Affiliation
Tatsuyuki Matsushita / Department of Data Science
Specialized Fields
Information encryption technology
Research theme
Technology that processes data while it remains encrypted
Fraudster tracking technology for content distribution
P2P content encryption technology
Research keywords
Proxy re-encryption, non-transferability, non-forgery of re-encryption, anti-collusion attacks
Technology that processes data while it remains encrypted
This technology converts data into encrypted data that can be decrypted using the key of a specific group member without decrypting it. It is realized by applying public key cryptography technology to a system that shares encrypted data in cloud storage.
Fraudster tracking technology for content distribution
This technology prevents "free viewing" of digital content distribution services such as movies. It identifies the unauthorized users who helped create pirated decoders (devices and software that decrypt encrypted content) by using illegally created pirated decoders.
P2P content encryption technology
This project aims to solve the problem of all encrypted content becoming decryptable if a shared decryption key is leaked in peer-to-peer (P2P) distribution. To solve this problem, we will evaluate the safety and efficiency through computer simulations.