Fuyuki Kitagawa
Tokyo Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Fuyuki Kitagawa.
public key cryptography | 2016
Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka
In PKC 1999, Fujisaki and Okamoto showed how to convert any public key encryption PKE scheme secure against chosen plaintext attacks CPA to a PKE scheme which is secure against chosen ciphertext attacks CCA in the random oracle model. Surprisingly, the resulting CCA secure scheme has almost the same efficiency as the underlying CPA secure scheme. Moreover, in J. Cryptology 2013, they proposed more efficient conversion by using the hybrid encryption framework. In this work, we clarify whether these two constructions are also secure in the sense of key dependent message security against chosen ciphertext attacks KDM-CCA security, under exactly the same assumptions on the building blocks as those used by Fujisaki and Okamoto. Specifically, we show two results: Firstly, we show that the construction proposed in PKC 1999 does not satisfy
the cryptographers’ track at the rsa conference | 2015
Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka
public key cryptography | 2018
Fuyuki Kitagawa; Keisuke Tanaka
\text {KDM}\text {-}\text {CCA}
international conference on information security and cryptology | 2014
Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka
public key cryptography | 2018
Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka
KDM-CCA security generally. Secondly, on the other hand, we show that the construction proposed in J. Cryptology 2013 satisfies
theory and application of cryptographic techniques | 2018
Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka
provable security | 2018
Satoshi Yasuda; Yoshihiro Koseki; Yusuke Sakai; Fuyuki Kitagawa; Yutaka Kawai; Goichiro Hanaoka
\text {KDM}\text {-}\text {CCA}
international conference on security and cryptography | 2018
Keisuke Hara; Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka
Archive | 2018
Fuyuki Kitagawa; Keisuke Tanaka
KDM-CCA security.
Archive | 2018
Satoshi Yasuda; Fuyuki Kitagawa; Keisuke Tanaka
Applebaum (EUROCRYPT 2011, J. Cryptology 2014) showed that it is possible to convert a public key encryption (PKE) scheme which is key dependent message (KDM) secure with respect to projection functions (also called projection-KDM secure) into a PKE scheme which is KDM secure with respect to any function family that can be computed in fixed polynomial time, without using any other assumption. This result holds in both of the chosen plaintext attack (CPA) and the chosen ciphertext attack (CCA) settings. In the CPA setting, he furthermore showed that even a projection-KDM secure 1-bit PKE scheme is sufficient to construct a KDM secure PKE scheme with respect to polynomial time computable functions. The existence of the latter trivially implies that of the former, and in this sense, he mentioned that single-bit projection-KDM security in the CPA setting and (multi-bit) projection-KDM security in the CCA setting are complete.
Collaboration
Dive into the Fuyuki Kitagawa's collaboration.
National Institute of Advanced Industrial Science and Technology
View shared research outputsNational Institute of Advanced Industrial Science and Technology
View shared research outputsNational Institute of Advanced Industrial Science and Technology
View shared research outputs