List of Publications (Before 2005)
Year 2004
Journal (incl. LNCS)
-
Kanta Matsuura,
Hideki Imai.
Inspection Mechanism For Server-and-Client Protocols With Private-Key Cipher,
The ETHICOMP Journal,
Vol.1,
No.3,
2004
[detail]
abstract
In an open network, how to provide deterrents to malicious behaviors is an important issue.
A common solution is the use of cryptographic primitives.
In this solution, execution logs
are stored by each entity and used when needs arise for trouble settlement or judgment;
authorities are involved mainly in the settlement phase.
Depending on system-design and
security policies, however, more active authorized procedures would be of great help.
In
preparation for such a situation, this paper introduces a framework of an inspection
mechanism for server-and-client protocols which are based on a private-key cipher.
The
mechanism uses two "current" private keys per server-and-client pair.
One of them is
updated session by session and thus the system can accept one-session rental of the
membership; voluntary clients can lend their membership to the inspection authority without
disclosing the current keys of the next and future sessions.
As an application example, a
digital-valuable storage system called an "electronic safe-deposit box" is described and
its protocol is shown in part.
-
Jose Luis Lacson,
Kanta Matsuura.
The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas,
Lecture Notes in Computer Science (Electronic Government: Third International Conference: EGOV 2004),
Vol.3183,
pp.547-548,
2004
[detail]
abstract
The Philippine Commission on Elections (COMELEC) has acknowledged that the absentee vote
can very well decide the final outcome of the close 2004 presidential elections.
However, the absentee voter registration system has procedural and technological problems
that can lead to allegations of fraud.
These are the problems that COMELEC must address
as it gets ready to proclaim the next president of the Philippines.
Furthermore, evaluation
of the absentee voter registration system now will help COMELEC prepare for the next major
election in 2007.
Conference
-
Kanta Matsuura,
Ken Ebato.
University-Industry Collaboration Networks in the Information Security Field in Japan: Problems and a Particular Success,
Proceedings of the 2004 IEEE International Engineering Management Conference (IEMC-2004),
Vol.2,
pp.839-844,
2004
[detail]
abstract
Promotion of university-industry interaction has become a key topic at many levels in
Japan to reform the social infrastructure.
On the other hand, information security is the
key to develop IT social network.
In this context, what is the state of university-industry
research collaboration in the information-security field in Japan? Our preliminary
bibliometric analysis reported in IEMCZ003 embarked on answering this question and gave a
conclusion that inter-sector collaboration in the informationsecurity field in Japan is
underdeveloped.
This article shows two more empirical supports far the conclusion; one uses
a patent suwey io this particular field in Japan, and the other is a research-network
analysis confined to the mdor players found in the bibliometric analysis.
We hope that these
series of reports and methodologies used there will open the door to empirical analyses of
collaboration "in a particular field in a particular country."
-
Kanta Matsuura,
Jose Luis Lacson,
Terdoro Locsin,
Jr..
Public Acceptance Issues Surrounding the Implementation of New Election Technology for the Philippines,
Twenty-sixth International Congress of Administrative Sciences,
2004
-
Hideyuki Tanaka,
Kanta Matsuura,
Osamu Sudo.
Vulnerability and Information Security Investment: An Empirical Analysis on the e-Local Government of Japan,
The Forum on Financial Systems and Cybersecurity: A Public Policy Perspective,
2004
-
Kanta Matsuura.
Robustness of Entrusted Data-Analysis in E-Science Research Collaboration,
Proceedings of the 2004 IEEE International Conference on e-Technology,
e-Commerce,
and e-Service (EEE04),
pp.373-378,
2004
-
Tsutomu Morigaki,
Kanta Matsuura,
Osamu Sudo.
An Analysis of Detailed Electronic Time-Stamping Using Digital TV,
Proceedings of the 2004 IEEE International Conference on e-Technology,
e-Commerce,
and e-Service (EEE04),
pp.277-284,
2004
[detail]
abstract
Theoretical studies on Electronic Time Stamping and Audit Logs Protection have focused
mainly on safety, particularly, "the identification of falsified contents or sequences
through encryption."
However, these studies don't consider such details as time (being
punctual to the second) or which electronic documents or data are older or newer when
looking at several different sites.
We solve the problem of time accuracy by using digital
TV as a base for judging the order relation of time information between two or more sites.
We designed a new Electronic Time-Stamping protocol for Digital TV and invented a new
digital publication infrastructure.
This protocol can also accommodate the demand for
ultra high-speed electronic commerce transactions in the future.
Therefore, it will
possibly become one of the important E-Business models or enterprise e-Service architectures.
In this paper, we will show these procedures and compare them to procedures shown in other
papers.
Year 2003
Journal (incl. LNCS)
-
Kanta Matsuura.
Digital Security Tokens and Their Derivatives,
Netnomics,
Vol.5,
No.2,
pp.161-179,
2003
[detail]
abstract
Digital objects in network commerce cause new credit risks (e.g., by an unpredictable
certificate revocation).
Financial theories can be used to estimate these risks but
theories firstly need models.
This paper models the objects as security token (setok).
Each setok has its price, values, timestamp, and contents.
Not only the price but also
the values can be uncertain and cause risks.
In order to hedge such risks, an option
written on the value is introduced and priced.
The pricing can be used to estimate
parameters which describe the uncertainty.Discussions include how systematic the
revocation risk is.
Conference
-
Ken Ebato,
Kenneth Pechter,
Kanta Matsuura.
University-Industry Research Collaboration in the Information Security Field in Japan,
Proceedings of the 2003 IEEE International Engineering Management Conference (IEMC-2003),
2003
[detail]
abstract
Since the collapse of the economic bubble, fhe Japanese economy has been entrenched in a
recession and is even lapsing into a deflationary regime.
In hope of innovating ou! of this
economic, university-indusfiy interaction has come into the spoflighf ofpublic scrutiny.
At the same time, fhe concern for information security, key to building secure network
communicafion, is intensrhing This raises the question: what the current state of university
-industry interaction is in the informafion securiry field? This article embarks on answering
this quesfion through the analysis of fhe coauthorship of papers in SCIS (Symposium on
Cryptography and Information Security).
The significance of SCIS has grown steadily each
year, providing a rich analytical platfonn for university-indusfiy collaboration and a
valuable reference for the field of information securiw in Japan.
-
Kanta Matsuura.
Information Security and Economics in Computer Networks: An Interdisciplinary Survey and a Proposal of Integrated Optimization of Investment,
The 9th International Conference of Computing in Economics and Finance (CEF 2003),
2003
Year 2002
Conference
-
Rui Zhang,
Michiharu Kudo,
Kanta Matsuura,
Hideki Imai.
A Model for Signature Revocation,
Proceedings of 2002 International Symposium on Information Theory and Its Applications (ISITA 2002),
pp.455-458,
2002
-
Kanta Matsuura.
Virtual Private Laboratories: Concept and Two Building Blocks,
Proceedings of the 2002 IEEE International Engineering Management Conference (IEMC 2002),
Vol.2,
pp.876-881,
2002
-
Kanta Matsuura.
Digital Security Tokens in Network Commerce: Modeling and Derivative Application,
The 8th International Conference on Computing in Economics and Finance (CEF 2002),
2002
-
Kanta Matsuura,
Hideki Imai.
Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation,
Verification,
and Renewal,
Proceedings of 4th International Conference on Enterprise Information Systems (ICEIS 2002),
Vol.2,
pp.962-967,
2002
Year 2001
Journal (incl. LNCS)
-
Shoichi Hirose,
Kanta Matsuura.
Key Agreement Protocols Resistant to a Denial-of-Service Attack,
IEICE Transactons on Information and Systems,
Vol.E84-D,
No.4,
pp.477-484,
2001
[detail]
abstract
In this manuscript, two key agreement protocols which are resistant to a denial-of-service
attack are constructed from a key agreement protocol in [9] provably secure against passive
and active attacks.
The denial-of-service attack considered is the resource-exhaustion
attack on a responder.
By the resource-exhaustion attack, a malicious initiator executes
a key agreement protocol simultaneously as many times as possible to exhaust the responder's
resources and to disturb executions of it between honest initiators and the responder.
The resources are the storage and the CPU.
The proposed protocols are the first protocols
resistant to both the storage-exhaustion attack and the CPU-exhaustion attack.
The
techniques used in the construction are stateless connection, weak key confirmation, and
enforcement of heavy computation.
The stateless connection is effective to enhancing the
resistance to the storage-exhaustion attack.
The weak key confirmation and the enforcement
of heavy computation are effective to enhancing the resistance to the CPU-exhaustion attack.
-
Kanta Matsuura.
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce,
Lecture Notes in Computer Science (Information and Communications Security: Third Internation Conference: ICICS 2001),
Vol.2229,
pp.90-94,
2001
[detail]
abstract
In electronic commerce, traded digital objects are likely associated with several numerical
values as well as their prices.
These values may change unpredictably over time and bring
risks both to the providers and to the consumers of the application.
One possible strategy
for hedging the risks is to introduce derivatives regarding the uncertain values.
This paper shows a theoretical pricing equation of the derivatives when the underlying
digital objects have systematic default or revocation risks.
We can make use of this pricing
to estimate the risks.
Conference
-
Kanta Matsuura.
Echo Back in Implementation of Passphrase Authentication,
Proceedings of the 2001 International Workshop on Cryptology and Network Security,
pp.238-245,
2001
-
Kanta Matsuura.
Security Token and Its Derivative in Discrete-Time Models,
Proceedings of 5th World Multiconference on Systemics,
Cybernetics and Informatics,
2001
-
Kanta Matsuura.
Digital Security Tokens and Their Derivatives,
7th International Conference of the Society for Computational Economics,
2001
[detail]
abstract
Applied cryptography and network security could bring a new commerce architecture for
valuable but uncertain digital objects in an open network.
This paper models the digital
objects security token, which is abbreviated into a word coinage setok.
Each setok has its
price, values, and timestamp on it as well as the main contents.
Not only the price but also
the values can be uncertain and may cause risks.
A number of properties of the setok are defined.
They include value response to compromise,
price response to compromise, refundability, tradability, online divisibility, and offline
divisibility.
Then, in search of risk-hedging tools, a derivative written not on the price but
on the value is introduced.
The derivative investigated is a simple European call option.
Based on the common noarbitrage condition, several option-pricing formulae are derived in
discrete-time and continuous-time models.
These formulae do not require any divisibility of
the underlyig setok.
With respect to applications, an inverse estimation of compromise probability is studied.
Assuming a systematic risk of compromise, the no-arbitrage theory gives a partial differential
equation (PDE) to price the call option; given a set of parameters including the compromise
probability, the PDE can tell us the option price.
By making an inverse use of this, we are
able to estimate the risk of compromise.
Year 2000
Journal (incl. LNCS)
-
Kanta Matsuura,
Hideki Imai.
Modified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks,
IEICE Transactons on Information and Systems,
Vol.E83-D,
No.5,
pp.972-979,
2000
[detail]
abstract
Internet Key Exchange (IKE) is very important as an entrance to secure communication
over the Internet.
The first phase of IKE is based on Diffie-Hellman (DH) key-agreement
protocol.
Since DH protocol on its own is vulnerable to man-in-the-middle (MIM) attack,
IKE provides authentication to protect the protocol from MIM.
This authentication owes
a lot to public-key primitives whose implementation includes modular exponentiation.
Since modular exponentiation is computationally expensive, attackers are motivated to
abuse it for Denial-of-Service (DoS) attacks; computational burden caused by malicious
requests may exhaust the CPU resource of the target.
DoS attackers can also abuse
inappropriate use of Cookies in IKE; as an anti-clogging token, Cookie must eliminate
the responder's state during initial exchanges of the protocol while IKE Cookies do not.
Thus a large number of malicious requests may exhaust the memory resource of the target.
In search of resistance against those DoS attacks, this paper first reviews DoS-resistance
of the current version of IKE and basic ideas on DoS-protection.
The paper then proposes a
DoS-resistant version of three-pass IKE Phase 1 where attackers are discouraged by heavy
stateful computation they must do before the attack really burdens the target.
DoS-
resistance is evaluated in terms of the computational cost and the memory cost caused by
bogus requests.
The result shows that the proposed version gives the largest ratio of the
attacker's cost to the responder's cost.
Conference
-
Kanta Matsuura,
Hideki Imai.
Modification of Internet Key Exchange Resistant against Denial-of-Service,
Pre-Proeedings of Internet Workshop 2000 (IWS2000),
pp.167-174,
2000
Year 1999
Journal (incl. LNCS)
-
Kanta Matsuura,
Hideki Imai.
Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack,
Cientifica,
Vol.2,
No.11,
pp.15-19,
1999
[detail]
abstract
Authenticated and secure key-agreement protocols without a trusted key-distribution center
usually owe a lot to public-key primitives whose implementation includes modular
exponentiation.
Since modular exponentiation is computationally expensive, protocols should
be carefully designed so that attackers will not be motivated to use Denial-of-Service (DoS)
attacks.
Considering this design direction, this paper first shows a basic protection
strategy against DoS attacks based on public-key related computational cost.
We then propose
a three-pass authenticated Diffie-Hellman key-agreement protocol conforming to the strategy;
DoS attacks impose expensive computation on the attackers themselves.
-
Shoichi Hirose,
Kanta Matsuura.
Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack,
Lecture Notes in Computer Science (Information and Communication Security: Second International Conference: ICICS'99),
Vol.1726,
pp.169-182,
1999
[detail]
abstract
In this manuscript, two key agreement protocols which are resistant to a denial-of-service
attack are constructed from a key agreement protocol in [9] provably secure against passive
and active attacks.
The denial-of-service attack considered is the resource-exhaustion
attack on a responder.
By the resource-exhaustion attack, a malicious initiator executes
a key agreement protocol simultaneously as many times as possible to exhaust the responder's
resources and to disturb executions of it between honest initiators and the responder.
The resources are the storage and the CPU.
The proposed protocols are the first protocols
resistant to both the storage-exhaustion attack and the CPU-exhaustion attack.
The techniques
used in the construction are stateless connection, weak key confirmation, and enforcement of
heavy computation.
The stateless connection is effective to enhancing the resistance to the
storage-exhaustion attack.
The weak key confirmation and the enforcement of heavy computation
are effective to enhancing the resistance to the CPU-exhaustion attack.
Conference
-
Kanta Matsuura,
Hideki Imai.
Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack,
Proceedings of Internet Workshop'99: IWS'99,
pp.17-24,
1999
-
Kanta Matsuura,
Hideki Imai.
Activity Report of IIS E-Commerce and Digital-Cash Committee,
The 5th International Conference on Ethical Issues of Information Technology,
1999
-
Kanta Matsuura,
Hideki Imai.
Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack,
Pre-Proceedings of Internet Workshop'99 (IWS'99),
pp.17-24,
1999
Year 1998
Journal (incl. LNCS)
-
Kanta Matsuura,
Yuliang Zheng,
Hideki Imai.
Compact and Flexible Resolution of CBT Multicast Key-Distribution,
Lecture Notes in Computer Science (Worldwide Computing and Its Application: WWCA'98),
Vol.1368,
pp.190-205,
1998
[detail]
abstract
In an open network such as the Internet, multicast security services typically start with
group session-key distribution.
Considering scalability for group communication among
widely-distributed members.
we can find a currently-leading approach based on a CBT
(Core-Based Tree) routing protocol, where Group Key Distribution Centers (GKDCs) are
dynamically constructed during group-member joining process.
In search of practical use of
it~ this paper first analyzes the CBT protocol in terms of its efficiency as well as
security management.
Then the paper proposes several improvements on the protocol with all
aim to solve the problem identified.
In particutaa ~, (1) an overuse of encryption and
signatures is avoided and (2) a hybrid trust model is introduced by a simple mechanism for
controling the GKDC distribution.
A comprehensive comparison among the costs of several
implementations is also carried out.
Conference
-
Kanta Matsuura,
Hideki Imai.
Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack,
Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98),
pp.466-470,
1998
-
Goichiro Hanaoka,
Tsuyoshi Nishioka,
Kanta Matsuura,
Yuliang Zheng,
Hideki Imai.
On Advanced KPS: An Optimized KPS against Collusion Attacks,
Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98),
pp.247-250,
1998
-
Shu Akahane,
Takeo Ozeki,
Kanta Matsuura,
Yoichi Okabe.
A Robust Estimation by Selective Minimum-Norm Method,
11th International Conference on Biomagnetism,
1998
-
Kanta Matsuura,
Hideki Imai.
Toward Research-Promotion Infrastructure for Multi-Modal Imaging,
11th International Conference on Biomagnetism,
1998
-
Kanta Matsuura,
Hideki Imai.
Inspection Mechanism for Server-and-Client Protocols with Private-Key Cipher,
Proceedings of the 4th International Conference on Ethical Issues of Information Technology,
pp.479-487,
1998
Year 1997
Journal (incl. LNCS)
-
Kanta Matsuura,
Yoichi Okabe.
A Robust Reconstruction of Sparse Biomagnetic Sources,
IEEE Transactions on Biomedical Engineering,
Vol.44,
No.8,
pp.720-726,
1997
-
Shu Akahane,
Kanta Matsuura,
Yoichi Okabe.
A Three-Dimensional Multi-Dipole Estimation by Selective Minimum-Norm Method,
NeuroImage,
Vol.5,
No.4,
pp.435,
1997
Year 1996
Conference
-
Kanta Matsuura,
Yoichi Okabe.
Lp-Normalized Minimum-L1-Norm Solution of the Biomagnetic Inverse Problem,
18th Annual International Conference of the IEEE Engineering in Medicine and Biology Society,
1996
-
Kanta Matsuura,
Yoichi Okabe.
Multiple Current-Dipole Distribution Reconstructed by Modified Selective Minimum-Norm Method,
10th International Conference on Biomagnetism,
1996
Year 1995
Journal (incl. LNCS)
-
Kanta Matsuura,
Yoichi Okabe.
A Parametric Simplex Algorithm for Multi-Dipole Estimation,
Human Brain Mapping,
pp.104,
1995
-
Kanta Matsuura,
Yoichi Okabe.
Selective Minimum-Norm Solution of the Biomagnetic Inverse Problem,
IEEE Transactions on Biomedical Engineering,
Vol.42,
No.6,
pp.608-615,
1995
Conference
-
Kanta Matsuura,
Nobuaki Shimizu,
Yoichi Okabe.
Reconstruction of Sparse Dipole Source by Modified SMN Method,
10th Tokyo Institute of Psychiatry International Symposium,
1995
Year 1993
Conference
-
Kanta Matsuura,
Yoichi Okabe.
Multi-Dipole Estimation by Selective-Minimum-Norm Method,
Abstracts of 9th International Conference on Biomagnetism,
pp.215-216,
1993
|