Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rie Shigetomi is active.

Publication


Featured researches published by Rie Shigetomi.


global communications conference | 2008

New Attestation Based Security Architecture for In-Vehicle Communication

Hisashi Oguma; Akira Yoshioka; Makoto Nishikawa; Rie Shigetomi; Akira Otsuka; Hideki Imai

This paper presents a novel security architecture for in-vehicle communication. The ratio of electronics to vehicle equipment is steadily increasing. And novel vehicles will also have connectibility to public networks to provide many kinds of services. Therefore, they are expected to suffer from a wide variety of threats and the electronic control units (ECUs) embedded in them may execute execute malicious programs because of tampering. The remote attestation scheme with the trusted platform module (TPM) has been attracting a great deal of attention to cope with such issues. However, it is not feasible for vehicle systems because the conventional attestation process cannot adapt to in-vehicle communication and TPM cannot adapt to time-constrained vehicle systems. We propose an attestation based security architecture that is suitable for novel vehicles.


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2006

A Provably Secure Refreshable Partially Anonymous Token and Its Applications

Rie Shigetomi; Akira Otsuka; Jun Furukawa; Keith M. Martin; Hideki Imai

The first refreshable anonymous token scheme proposed in [l] enables one to provide services in such a way that each of its users is allowed to enjoy only a fixed number of services at the same time. In this paper, we show that the scheme in [l] is insecure and propose a provably secure refreshable partial anonymous token scheme which is a generalization of the previous scheme. The new scheme has an additional ability to control the anonymity level of users. We also propose a formal model and security requirements of the new scheme.


systems, man and cybernetics | 2006

Lightweight Privacy for Ubiquitous Devices

Akira Otsuka; Rie Shigetomi; Hideki Imai

In this paper, we survey the recent research results on privacy-preserving Identification suitable for limited-resource devices such as RFID, contactless smartcards, and introduce our recent results on a light-weight privacy-preserving identification scheme. The proposed scheme only requires (1) random bit generators, (2) simple bit-wise operations and (3) short storage for keys less than 1 Kbits. No cryptographic algorithms such as SHA-1 are required. On the other hand, security of the scheme is reducible to learning parity -with noise problem (LPN problem) which is further reducible to a problem in NP-complete.


international conference on its telecommunications | 2008

An efficient scheme to protect privacy in Probe Vehicle Information system

Rie Shigetomi; Masaaki Sato; Keisuke Uehara; Akira Otsuka; Hideki Sunahara; Hideki Imai

The Probe Vehicle Information system is as system that collects information from cars equipped with sensors. Usually, various information is collected and transferred to a server, at frequent intervals. The information includes when and where the information was collected, which could lead to privacy problems. One way to solve these problems, is to use cryptographic anonymous authentication protocols. However, although the computational and network resource on cars are limited, anonymous authentication protocols tend to consume both heavily. In this article, we propose a new protocol using the combination cryptographic anonymous authentication and symmetric-key cryptographic authentication. This protocol can protect the users¿ privacy, while is efficient enough to be used for probe vehicle information systems. We also have conducted an experiment on a simulator with 5,000 virtual cars, and showed that this protocol is efficient enough for real use.


Archive | 2008

Cipher communication system of common key system

Makoto Nishikawa; Rei Otsuka; Rie Shigetomi; Akira Yoshioka; 顕 吉岡; 玲 大塚; 利恵 繁富; 真 西川


global communications conference | 2010

Practical Searching over Encrypted Data by Private Information Retrieval

Rei Yoshida; Tomohiro Sekino; Rie Shigetomi; Akira Otsuka; Hideki Imai


workshop on xml security | 2003

Anonymous authentication scheme for XML security standard with Refreshable Tokens

Rie Shigetomi; Akira Otsuka; Hideki Imai


computational intelligence and games | 2005

How to Protect Peer-to-Peer Online Games from Cheats.

Haruhiro Yoshimoto; Rie Shigetomi; Hideki Imai


18th ITS World CongressTransCoreITS AmericaERTICO - ITS EuropeITS Asia-Pacific | 2011

Anonymous Authentication Scheme Considering Privacy for Probe Data Collection

Masaaki Sato; Rie Shigetomi; Michiko Izumi; Keisuke Uehara; Jun Murai


international symposium on information theory | 2005

An Efficient Anonymous Authentication Scheme with No Unlinkability

Rie Shigetomi; Akira Otsuka; Hideki Imai

Collaboration


Dive into the Rie Shigetomi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Akira Otsuka

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge