Tatsuyuki Matsushita Laboratory (Information Security Laboratory)
Tatsuyuki Matsushita Laboratory (Information Security Laboratory)

松下達之

We are researching information security technologies that support safe and secure information systems. To protect digital data, it is important to prevent it from being seen by others (confidentiality). In this laboratory, we are researching cryptographic protocols that defend against cyber attacks and maintain data confidentiality. We evaluate the security of cryptographic protocols using mathematical proofs and computer simulations based on computational assumptions. We aim to realize a safe and reliable information society.

Basic Information

Faculty name/Affiliation Tatsuyuki Matsushita / Department of Data Science
Specialized Fields Information encryption technology
Research theme
  • Technology that processes data while it remains encrypted
  • Fraudster tracking technology for content distribution
  • P2P content encryption technology
Research keywords Proxy re-encryption, non-transferability, non-forgery of re-encryption, anti-collusion attacks
Faculty introduction URL https://www3.med.teikyo-u.ac.jp/profile/ja.95dd71ee3282c480.html

Our Research

Technology that processes data while it remains encrypted

Technology that processes data while it remains encrypted

This technology converts data into encrypted data that can be decrypted using the key of a specific group member without decrypting it. It is realized by applying public key cryptography technology to a system that shares encrypted data in cloud storage.

Fraudster tracking technology for content distribution

Fraudster tracking technology for content distribution

This technology prevents "free viewing" of digital content distribution services such as movies. It identifies the unauthorized users who helped create pirated decoders (devices and software that decrypt encrypted content) by using illegally created pirated decoders.

P2P content encryption technology

P2P content encryption technology

This project aims to solve the problem of all encrypted content becoming decryptable if a shared decryption key is leaked in peer-to-peer (P2P) distribution. To solve this problem, we will evaluate the safety and efficiency through computer simulations.