Cryptography |
Fully secure identity-based encryption resilient to continual auxiliary leakage
|
Leakage-resilient cryptography is practically meaningful since it guarantees that the security remains even if secret information such as private keys partially leaked. The most desirable security model among the models proposed so far is called the continual auxiliary leakage model. We proposed the first identity-based encryption scheme resilient to continual auxiliary leakage.
|
|
Machine Learning |
Detection of adversarial images
|
The accuracy of machine image recognition is very increased by Deep learning. However, existence of images that human can recognize but machine can't do is reported. It's called adversarial image, and sometimes we can regard it as attack. In this research, we proposed detection technique of it.
|
Blockchain |
A Survey on Blockchain Electronic Voting Systems
|
Classical paper ballots are used in many elections today. But electronic
voting systems have attracted attention because of its
tamper-resistance, accuracy of vote-tallying and low personnel cost. I
introduce and review existing blockchain electronic voting systems.
|
Security of blockchain technology and its applications |
Blockchain is a distributed ledger technology,
which has a potential to construct multiparty
protocols without a trusted third party.
This technology is spreading to apply such as
cryptocurrencies like Bitcoin and others,
and we introduce current researches on its security.
|
Web Security |
Static Analysis and Evaluation Metrics of Cross-site Scripting Attacks
|
XSS attacks is a major attack. However, There is no method which is decisive as a countermeasure techniques, especially script language implemented with object oriented programing. Also the criteria of judgement is often ambiguous. This research disucusses how to handle and implement those problems.
|
Authentication |
A Fallback-Authentication Method Using Music
|
In this paper, conventional and newly proposed prevalent fallback authentication approaches focusing on web services have been reviewed. Furthermore, according to the unsolved problems - tradeoff between usability and memorability, left from the existing fallback authentication methods and the unique properties fallback authentication preserves, a new fallback authentication method MusiAuth based on those principles on web services has been proposed and explained. Experiments has been conducted as an individual interview for several times on different dates on 32 participants to evaluate the usability and security of the proposal. Besides, the duration of the experiments last from one day to three months in order to give a better memorability evaluation of the proposal.
|
Privacy |
Dummy Hidden Service to Protect Tor Hidden Service
|
Tor hidden service protocol enables web servers to hide their addresses. Kwon and his colleagues said their passive attack against Tor hidden service, which is called Circuit Fingerprinting Attack, is able to identify hidden services.We propose Dummy Hidden Service, which generates traffic data to cheat the classifier.
|
|