Updated on 2026/03/24

写真a

 
KURIHARA JUN
 
Organization
School of Computing Associate Professor
Title
Associate Professor
External link

Degree

  • PhD in Engineering ( 2012.9   Tokyo Institute of Technology )

  • ME ( 2006.3   Tokyo Institute of Technology )

  • BE ( 2004.3   Tokyo Institute of Technology )

Research Interests

  • Coding Theory

  • Information Security

  • プライバシ

  • Networking Architecture

  • 匿名化

Research Areas

  • Informatics / Information network

  • Informatics / Information security

  • Manufacturing Technology (Mechanical Engineering, Electrical and Electronic Engineering, Chemical Engineering) / Communication and network engineering

  • Informatics / Theory of informatics  / Coding Theory

Education

  • Tokyo Institute of Technology   Graduate School of Science and Engineering   Department of Communications and Integrated Systems, Doctoral Program

    2009.10 - 2012.9

      More details

  • Tokyo Institute of Technology   Graduate School of Science and Engineering   Department of Communications and Integrated Systems, Master's Program

    2004.4 - 2006.3

      More details

  • Tokyo Institute of Technology   School of Engineering   Department of Information Engineering

    - 2004.3

      More details

Research History

  • Institute of Science Tokyo   School of Computing   Associate Professor

    2026.1

      More details

    Country:Japan

    researchmap

  • Carnegie Mellon University   CyLab   Visiting Researcher

    2022.1 - 2022.7

      More details

  • University of Hyogo   Graduate School of Information Science   Associate Professor

    2021.4 - 2025.12

      More details

  • Advanced Telecommunications Research Institute International   Visiting Scholar

    2020.5 - 2024.3

      More details

  • University of Hyogo   Graduate School of Applied Informatics   Associate Professor

    2020.1 - 2025.12

      More details

  • Zettant Inc.   Principal Researcher

    2018.1

      More details

  • KDDI Corp.

    2016.10 - 2017.12

      More details

  • Palo Alto Research Center   Visiting Researcher

    2013.9 - 2014.9

      More details

    Country:United States

    researchmap

  • KDDI R&D Labs., Inc.

    2006.4 - 2016.9

      More details

▼display all

Professional Memberships

  • IEEE

      More details

  • THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS

      More details

Committee Memberships

  • 情報処理学会   コンピュータセキュリティシンポジウム2025 システムトラック プログラム委員  

    2025.10   

      More details

  • First International on Workshop Artificial Intelligence Security and Privacy (AI Security & Privacy 2025)   Technical Program Committee  

    2025   

      More details

    Committee type:Academic society

    researchmap

  • 情報処理学会   コンピュータセキュリティシンポジウム2024 システムトラック プログラム委員  

    2024.10   

      More details

  • 情報処理学会   コンピュータセキュリティシンポジウム2023 システムトラック プログラム委員  

    2023.10   

      More details

  • 情報処理学会   コンピュータセキュリティシンポジウム2022 システムトラック プログラム委員  

    2022.10   

      More details

  • 電子情報通信学会 情報指向ネットワーク技術特別研究専門委員会   専門委員  

    2021   

      More details

  • 情報処理学会   コンピュータセキュリティシンポジウム2020 運営委員  

    2020.10   

      More details

  • Internet Society   Technical Program Committee, DISS Workshop in NDSS 2019  

    2019   

      More details

  • ACM   Technical Program Committee, ACM ICN 2018  

    2018   

      More details

  • ACM   Poster and Demo Program Committee, ACM SIGCOMM 2017  

    2017   

      More details

  • ACM   Organizing Committee, ACM ICN 2016  

    2016   

      More details

  • 電子情報通信学会   暗号と情報セキュリティシンポジウム 2010 運営委員  

    2010   

      More details

▼display all

Papers

  • Extensive study on the security of private information delivery from coded storage Reviewed

    Koki NAKANO, Jun KURIHARA, Toshiaki TANAKA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E109-A ( 3 )   2026.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.2025eap1094

    researchmap

  • Aggregable generalized deduplication Reviewed

    Riki Aoshima, Jun Kurihara, Toshiaki Tanaka

    IEICE Transactions on Communications   E109-B ( 3 )   2026.3

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.23919/transcom.2025ebp3064

    researchmap

  • A Monitoring Mechanism to Realize the Byzantine Resilience in Federated Learning via Client Tracking Reviewed

    Shunsuke Hashimoto, Toshiaki Tanaka, Jun Kurihara

    66 ( 12 )   1827 - 1840   2025.12

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.20729/0002006337

    CiNii Books

    CiNii Research

    researchmap

  • Leveraging Heterogeneous Programmable Data Planes for Security and Privacy of Cellular Networks, 5G & Beyond Invited Reviewed

    Toru HASEGAWA, Yuki KOIZUMI, Junji TAKEMASA, Jun KURIHARA, Toshiaki TANAKA, Timothy WOOD, K. K. RAMAKRISHNAN

    IEICE Transactions on Information and Systems   108-D ( 6 )   2025.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2024nti0001

    researchmap

  • Aggregable Generalized Deduplication Reviewed

    Riki Aoshima, Jun Kurihara, Toshiaki Tanaka

    Proceedings of the 2024 International Symposium on Information Theory and Its Applications (ISITA 2024)   2024.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Private Information Delivery from Coded Storage against Byzantine and Eavesdropping Attacks Reviewed

    Koki Nakano, Jun Kurihara, Toshiaki Tanaka

    Proceedings of the 2024 International Symposium on Information Theory and Its Applications (ISITA 2024)   2024.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A New Security Measure in Secret Sharing Schemes and Secure Network Coding Reviewed International journal

    Itaru Kurihara, Jun Kurihara, Toshiaki Tanaka

    IEEE Access   12   69163 - 69171   2024.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2024.3401471

    researchmap

  • Extension of Resource Authorization Method with SSI in Edge Computing Reviewed International journal

    Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai

    Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 6   204 LNDECT   385 - 394   2024.4

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-57942-4_37

    researchmap

  • μODNS: A distributed approach to DNS anonymization with collusion resistance Reviewed International journal

    Jun Kurihara, Toshiaki Tanaka, Takeshi Kubo

    Computer Networks   237   110078   2023.12

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier  

    DOI: 10.1016/j.comnet.2023.110078

    researchmap

  • Application of Generalized Deduplication Techniques in Edge Computing Environments Reviewed

    Ryu Watanabe, Ayumu Kubota, Jun Kurihara

    Advanced Information Networking and Applications Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3   655 LNNS   585 - 596   2023.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-031-28694-0_55

    Scopus

    researchmap

  • Resource Authorization Methods for Edge Computing Reviewed

    Ryu Watanabe, Ayumu Kubota, Jun Kurihara

    Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022)   449 LNNS   167 - 179   2022.4

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-99584-3_15

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/aina/aina2022-1.html#WatanabeKK22

  • Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries Reviewed

    KURIHARA Jun, NAKAMURA Toru, WATANABE Ryu

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E104-A ( 9 )   1271 - 1283   2021.9

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    <p>This paper investigates an adversarial model in the scenario of private information retrieval (PIR) from n coded storage servers, called Byzantine adversary. The Byzantine adversary is defined as the one altering b server responses and erasing u server responses to a user's query. In this paper, two types of Byzantine adversaries are considered; 1) the classic omniscient type that has the full knowledge on n servers as considered in existing literature, and 2) the reasonable limited-knowledge type that has information on only b+u servers, i.e., servers under the adversary's control. For these two types, this paper reveals that the resistance of a PIR scheme, i.e., the condition of b and u to correctly obtain the desired message, can be expressed in terms of a code parameter called the coset distance of linear codes employed in the scheme. For the omniscient type, the derived condition expressed by the coset distance is tighter and more precise than the estimation of the resistance by the minimum Hamming weight of the codes considered in existing researches. Furthermore, this paper also clarifies that if the adversary is limited-knowledge, the resistance of a PIR scheme could exceed that for the case of the omniscient type. Namely, PIR schemes can increase their resistance to Byzantine adversaries by allowing the limitation on adversary's knowledge.</p>

    DOI: 10.1587/transfun.2020DMP0018

    researchmap

  • Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers Reviewed

    Yuji Koike, Takuya Hayashi, Jun Kurihara, Takanori Isobe

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci.   104-A ( 1 )   182 - 189   2021

     More details

  • On the resistance to Byzantine and unresponsive servers in code-based PIR schemes Reviewed

    Jun Kurihara, Toru Nakamura

    IEICE Communications Express   9 ( 7 )   342 - 347   2020.7

     More details

    Language:English   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    <p>In private information retrieval (PIR) from coded storage servers, consider the case where some of servers are Byzantine adversaries and unresponsive. There have been proposed several specialized schemes guaranteeing that the user can correctly obtain the desired message even in the adversarial situation. However, to the best of our knowledge, such resistance to the adversaries in PIR schemes based on arbitrary codes have been not precisely characterized. In this paper, we reveal that the exact resistance to Byzantine and unresponsive servers is expressed in terms of the coset distance of linear codes in linear PIR schemes based on arbitrary storage code.</p>

    DOI: 10.1587/comex.2020xbl0055

    researchmap

  • Two-Level Named Packet Forwarding for Enhancing the Performance of Virtualized ICN Router. Reviewed

    Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami

    IEICE Transactions on Communications   102-B ( 9 )   1813 - 1821   2019.9

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control. Reviewed

    Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara

    43rd IEEE Conference on Local Computer Networks, LCN 2018, Chicago, IL, USA, October 1-4, 2018   303 - 306   2018.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/LCN.2018.8638129

    researchmap

  • IPRES: in-device proxy re-encryption service for secure ICN. Reviewed

    Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara

    Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN 2017, Berlin, Germany, September 26-28, 2017   176 - 177   2017.9

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3125719.3132089

    researchmap

  • List Interest: Simply Packing Interests Dramatically Reduces Router Workload in Content-Centric Networking Reviewed

    KURIHARA Jun, YOKOTA Kenji, TAGAMI Atsushi

    IEICE Transactions on Communications   99 ( 12 )   2520 - 2531   2016.12

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    <p>Content-centric networking (CCN) is an emerging networking architecture that is being actively investigated in both the research and industrial communities. In the latest version of CCN, a large number of interests have to be issued when large content is retrieved. Since CCN routers have to search several tables for each incoming interest, this could cause a serious problem of router workload. In order to solve this problem, this paper introduces a novel strategy of "grouping" multiple interests with common information and "packing" them to a special interest called the list interest. Our list interest is designed to co-operate with the manifest of CCN as its dual. This paper demonstrates that by skipping and terminating several search steps using the common information in the list interest, the router can search its tables for the list interest-based request with dramatically smaller complexity than the case of the standard interest-based request. Furthermore, we also consider the deployment of list interests and design a novel TCP-like congestion control method for list interests to employ them just like standard interests.</p>

    DOI: 10.1587/transcom.2016CNP0004

    researchmap

  • Towards the NFVI-Assisted ICN: Integrating ICN Forwarding into the Virtualization Infrastructure. Reviewed

    Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami

    2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016   1 - 6   2016.12

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/GLOCOM.2016.7842348

    researchmap

  • A Consumer-Driven Access Control Approach to Censorship Circumvention in Content-Centric Networking. Reviewed

    Jun Kurihara, Kenji Yokota, Atsushi Tagami

    Proceedings of the 3rd ACM Conference on Information-Centric Networking, ICN '16, Kyoto, Japan, September 26-28, 2016   186 - 194   2016.9

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/2984356.2984360

    researchmap

  • RTT-Based Caching Policies to Improve User-Centric Performance in CCN. Reviewed

    Kenji Yokota, Kohei Sugiyama, Jun Kurihara, Atsushi Tagami

    30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016   124 - 131   2016.3

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/AINA.2016.32

    researchmap

  • List Interest: Packing Interests for Reduction of Router Workload in CCN 1.0. Reviewed

    Jun Kurihara, Kenji Yokota, Kazuaki Ueda, Atsushi Tagami

    12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015   500 - 505   2015.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/MASS.2015.20

    Web of Science

    researchmap

  • A Performance Analysis of End-to-End Fragmentation in Content-Centric Networking. Reviewed

    Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami

    12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015   531 - 536   2015.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/MASS.2015.24

    Web of Science

    researchmap

  • Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding Reviewed

    Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu

    IEEE Transactions on Information Theory   61 ( 7 )   3912 - 3936   2015.7

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical {\&} Electronics Engineers ({IEEE})  

    By extending the notion of minimum rank distance, this paper introduces two
    new relative code parameters of a linear code C_1 of length n over a field
    extension and its subcode C_2. One is called the relative
    dimension/intersection profile (RDIP), and the other is called the relative
    generalized rank weight (RGRW). We clarify their basic properties and the
    relation between the RGRW and the minimum rank distance. As applications of the
    RDIP and the RGRW, the security performance and the error correction capability
    of secure network coding, guaranteed independently of the underlying network
    code, are analyzed and clarified. We propose a construction of secure network
    coding scheme, and analyze its security performance and error correction
    capability as an example of applications of the RDIP and the RGRW. Silva and
    Kschischang showed the existence of a secure network coding in which no part of
    the secret message is revealed to the adversary even if any dim C_1-1 links are
    wiretapped, which is guaranteed over any underlying network code. However, the
    explicit construction of such a scheme remained an open problem. Our new
    construction is just one instance of secure network coding that solves this
    open problem.

    DOI: 10.1109/TIT.2015.2429713

    arXiv

    researchmap

  • An encryption-based access control framework for content-centric networking Reviewed

    Jun Kurihara, Ersin Uzun, Christopher A. Wood

    2015 IFIP Networking Conference (IFIP Networking)   1 - 9   2015.5

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical {\&} Electronics Engineers ({IEEE})  

    DOI: 10.1109/ifipnetworking.2015.7145300

    researchmap

  • Securing distributed storage systems based on arbitrary regenerating codes Reviewed

    Kurihara Jun, Miyake Yutaka

    IEICE Communications Express   2 ( 10 )   442 - 446   2013.10

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper proposes a coding scheme to securely store a secret file in a distributed storage system that uses an arbitrary regenerating code. Our scheme encodes the secret file to the input of a certain regenerating code by using the coset coding scheme with a maximum rank distance (MRD) code. We show that our scheme can protect the secret file from being leaked to an eavesdropper in the distributed storage system. Existing security schemes for distributed storage systems are based on specific regenerating codes, and they cannot be used with other regenerating codes. In contrast, our scheme can guarantee the security against the eavesdropper independently of the construction of the underlying regenerating code.

    DOI: 10.1587/comex.2.442

    researchmap

  • Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight Reviewed

    KURIHARA Jun, UYEMATSU Tomohiko, MATSUMOTO Ryutaroh

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   95 ( 11 )   2067 - 2075   2012.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    DOI: 10.1587/transfun.E95.A.2067

    Scopus

    CiNii Books

    researchmap

    Other Link: https://www.wikidata.org/entity/Q57735066

  • New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding Reviewed

    Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto

    2012 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012   533 - 540   2012.7

     More details

    Language:English   Publisher:IEEE  

    DOI: 10.1109/Allerton.2012.6483264

    Scopus

    arXiv

    researchmap

  • Explicit construction of universal strongly secure network coding via MRD codes. Reviewed

    Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto

    IEEE International Symposium on Information Theory - Proceedings   1483 - 1487   2012.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ISIT.2012.6283510

    Scopus

    researchmap

  • Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weight. Reviewed

    Jun Kurihara, Tomohiko Uyematsu

    49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park & Retreat Center, Monticello, IL, USA, 28-30 September, 2011   951 - 957   2011.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/Allerton.2011.6120269

    researchmap

  • A Novel Realization of Threshold Schemes over Binary Field Extensions Reviewed

    KURIHARA Jun, UYEMATSU Tomohiko

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   94 ( 6 )   1375 - 1380   2011.6

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper presents a novel technique to realize Karnin et al.'s (k,n)-threshold schemes over binary field extensions as a software. Our realization uses the matrix representation of finite fields and matrix-vector multiplications, and enables rapid operations in software implementation. The theoretical evaluation and computer simulation reveal that our realization of Karnin et al.'s scheme achieves much faster processing time than the ordinary symbol oriented realization of the scheme. Further, we show that our realization has comparable performance to the existing exclusive-OR-based fast schemes of Fujii et al. and Kurihara et al.

    DOI: 10.1587/transfun.E94.A.1375

    CiNii Books

    researchmap

  • Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Reviewed

    Jun Kurihara, Tomohiko Uyematsu

    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION THEORY, RELIABILITY, AND QUALITY OF SERVICE (CTRQ 2011)   35 - 39   2011.4

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • A Stream Authentication Method for One-Seg Broadcasting Reviewed

    KURIHARA Jun, KIYOMOTO Shinsaku, WATANABE Ryu, TANAKA Toshiaki

    The Journal of The Institute of Image Information and Television Engineers   64 ( 12 )   1921 - 1932   2010.12

     More details

    Language:Japanese   Publisher:The Institute of Image Information and Television Engineers  

    In this paper, we present an authentication mechanism for ISDB-T broadcast streams, especially a One-Seg broadcast stream, which is suitable for low-power devices. Our method makes it possible to authenticate data streams at a low computational cost. The method requires a small memory for buffering to process the broadcast stream and is resistant to packet-loss. We evaluated the computational cost of our method by computer simulation and theoretical estimation, and we show here that our method achieved good properties for authenticating data streams broadcast through lossy channels, e.g. wireless channels. Furthermore, we developed a mobile phone that can authenticate One-Seg broadcast streams with our method, and we report the effectiveness of our scheme here.

    DOI: 10.3169/itej.64.1921

    CiNii Books

    researchmap

  • On a Construction of Stream-cipher-based Hash Functions. Reviewed

    Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka

    SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications   334 - 343   2010.7

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:SciTePress  

    researchmap

  • Stream Cipher-Based Hash Function and Its Security. Reviewed

    Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka

    e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers   222 CCIS   188 - 202   2010.2

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-642-25206-8_12

    Scopus

    researchmap

  • The RAKAPOSHI Stream Cipher Reviewed

    Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara

    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS   5927   32 - +   2009.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-11145-7_5

    Web of Science

    researchmap

  • A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme Reviewed

    KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   92 ( 8 )   1808 - 1821   2009.8

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Shamir's (k, n)-threshold secret sharing scheme (threshold scheme) has two problems: a heavy computational cost is required to make shares and recover the secret, and a large storage capacity is needed to retain all the shares. As a solution to the heavy computational cost problem, several fast threshold schemes have been proposed. On the other hand, threshold ramp secret sharing schemes (ramp scheme) have been proposed in order to reduce each bit-size of shares in Shamir's scheme. However, there is no fast ramp scheme which has both low computational cost and low storage requirements. This paper proposes a new (k, L, n)-threshold ramp secret sharing scheme which uses just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret at a low computational cost. Moreover, by proving that the fast (k, n)-threshold scheme in conjunction with a method to reduce the number of random numbers is an ideal secret sharing scheme, we show that our fast ramp scheme is able to reduce each bit-size of shares by allowing some degradation of security similar to the existing ramp schemes based on Shamir's threshold scheme.

    DOI: 10.1587/transfun.E92.A.1808

    CiNii Books

    researchmap

  • On a Fast (k, n)-Threshold Secret Sharing Scheme Reviewed

    KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   91 ( 9 )   2365 - 2378   2008.9

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In Shamir's (k,n)-threshold secret sharing scheme (threshold scheme) [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k,n)-threshold scheme, where k and n are arbitrary. This paper proposes a new fast (k,n)-threshold scheme which uses just EXCLUSIVE-OR (XOR) operations to make n shares and recover the secret from k shares. We prove that every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret in the proposed scheme. Moreover, the proposed scheme is an ideal secret sharing scheme similar to Shamir's scheme, in which every bitsize of shares equals that of the secret. We also evaluate the efficiency of the scheme, and show that our scheme realizes operations that are much faster than Shamir's.

    DOI: 10.1093/ietfec/e91-a.9.2365

    CiNii Books

    researchmap

  • A new (k, n)-threshold secret sharing scheme and its extension Reviewed

    Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka

    Proceedings of the 2008 Information Security Conference   5222   455 - 470   2008.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-540-85886-7_31

    Web of Science

    researchmap

  • A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations Reviewed

    KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   91 ( 1 )   127 - 138   2008.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In Shamir's (k, n)-threshold secret sharing scheme [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast threshold schemes have been proposed. However, there is no fast ideal (k, n)-threshold scheme, where k&ge;3 and n is arbitrary. This paper proposes a new fast (3, n)-threshold scheme by using just EXCLUSIVE-OR (XOR) operations to make shares and recover the secret, which is an ideal secret sharing scheme similar to Shamir's scheme. Furthermore, we evaluate the efficiency of the scheme, and show that it is more efficient than Shamir's in terms of computational cost. Moreover, we suggest a fast (k, n)-threshold scheme can be constructed in a similar way by increasing the sets of random numbers constructing pieces of shares.

    DOI: 10.1093/ietfec/e91-a.1.127

    CiNii Books

    researchmap

  • Security vulnerabilities and solutions in mobile WiMAX Reviewed

    Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka

    IJCSNS International Journal of Computer Science and Network Security   7 ( 11 )   7 - 15   2007.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

▼display all

MISC

  • Mutualized oblivious DNS ($μ$ODNS): Hiding a tree in the wild forest

    Jun Kurihara, Takeshi Kubo

    Arxiv preprint   2021.4

     More details

    Language:English  

    The traditional Domain Name System (DNS) lacks fundamental features of
    security and privacy in its design. As concerns of privacy increased on the
    Internet, security and privacy enhancements of DNS have been actively
    investigated and deployed. Specially for user's privacy in DNS queries, several
    relay-based anonymization schemes have been recently introduced, however, they
    are vulnerable to the collusion of a relay with a full-service resolver, i.e.,
    identities of users cannot be hidden to the resolver. This paper introduces a
    new concept of a multiple-relay-based DNS for user anonymity in DNS queries,
    called the mutualized oblivious DNS ($\mu$ODNS), by extending the concept of
    existing relay-based schemes. The $\mu$ODNS introduces a small and reasonable
    assumption that each user has at least one trusted/dedicated relay in a network
    and mutually shares the dedicated one with others. The user just sets the
    dedicated one as his next-hop, first relay, conveying his queries to the
    resolver, and randomly chooses its $0$ or more subsequent relays shared by
    other entities. Under this small assumption, the user's identity is concealed
    to a target resolver in the $\mu$ODNS even if a certain (unknown) subset of
    relays collude with the resolver. That is, in $\mu$ODNS, users can preserve
    their privacy and anonymity just by paying a small cost of sharing its
    resource. Moreover, we present a PoC implementation of $\mu$ODNS that is
    publicly available on the Internet. We also show that by measurement of
    round-trip-time for queries, and our PoC implementation of $\mu$ODNS achieves
    the performance comparable to existing relay-based schemes.

    arXiv

    researchmap

    Other Link: http://arxiv.org/pdf/2104.13785v3

  • Network Operations as an Infrastructure for Diverse Businesses

    The journal of the Institute of Electronics, Information and Communication Engineers   103 ( 2 )   155 - 161   2020.2

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Formal expression of BBc-1 mechanism and its security analysis

    Jun Kurihara, Takeshi Kubo

    2017.10

     More details

  • B-7-41 A Study of Secure Delivery of Prefetched Content

    Yokota Kenji, Kurihara Jun, Tagami Atsushi

    Proceedings of the IEICE General Conference   2016 ( 2 )   174   2016.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • CCNにおける集約Interestを用いたTCP-likeな輻輳制御手法の検討—A Study of TCP-like Congestion Control using Interest Aggregation in Content-Centric Networking

    横田 健治, 栗原 淳, 田上 敦士

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 477 )   173 - 178   2015.3

     More details

    Language:Japanese   Publisher:東京 : 電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I026322219

  • B-7-68 Message Transfer Delay Reduction by Effective Caching of ICN in Disasters

    Sunaga Takaaki, Kawahara Yoshihiro, Sugiyama Kohei, Kurihara Jun, Tagami Atsushi, Yagyu Tomohiko, Hasegawa Toru, Asami Tohru

    Proceedings of the IEICE General Conference   2015 ( 2 )   218   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-69 Short Packet Transmission for NDN Using Identity-Based Aggregate Signatures

    Namsraijav Byambajav, Kawahara Yoshihiro, Sugiyama Kohei, Kurihara Jun, Tagami Atsushi, Yagyu Tomohiko, Hasegawa Toru, Asami Tohru

    Proceedings of the IEICE General Conference   2015 ( 2 )   219   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • Security of Secret-Sharing Schemes Can Be Characterized by Relative Parameters of Linear Codes

    KURIHARA Jun, MATSUMOTO Ryutaroh, UYEMATSU Tomohiko

    IEICE ESS Fundamentals Review   9 ( 1 )   14 - 23   2015

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we first introduce Shamir&rsquo;s construction of the (k; n)-threshold scheme as a typical linear secret-sharing scheme and explain the construction of the (k; l; n)-threshold ramp scheme proposed by Yamamoto and Blakley-Meadows as its extension. Then, by generalizing threshold ramp schemes with a linear code C1 and its subcode C2, we represent a linear secret-sharing scheme in terms of C1 and C2. As examples, we represent Shamir&rsquo;s (k; n)-threshold scheme and the (k; l; n)-threshold ramp scheme of Yamamoto and Blakley-Meadows using linear codes. Furthermore, we show that in linear secret-sharing schemes, the maximum amount of information leakage of a secret message and their strong security are characterized by the relative generalized Hamming weights (RGHW&rsquo;s) of C1 and C2 when every share is an element of a finite field.

    DOI: 10.1587/essfr.9.14

    researchmap

  • Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding

    Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu

    CoRR   abs/1301.5482   2013.1

     More details

  • New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding

    Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto

    CoRR   abs/1207.1936   2012.10

     More details

  • A New (k, n)-Threshold Secret Sharing Scheme and Its Extension

    Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka

    IACR Cryptol. ePrint Arch.   2008.9

  • A stream authentication scheme for 1-seg broadcasting

    栗原 淳

    Material stage   7 ( 12 )   22 - 25   2008.3

     More details

    Language:Japanese   Publisher:技術情報協会  

    researchmap

▼display all

Presentations

  • On Correctness and Privacy in Private Information Delivery with Coded Storage

    Jun Kurihara, Koki Nakano, Toshiaki Tanaka

    Symposium on Information Theory and Its Applications 2025 (SITA2025)  2025.11 

     More details

    Event date: 2025.11

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • 眼電位を用いた継続認証方式の検討

    松原 史恩, 田中 俊昭, 栗原 淳, 神薗 雅紀

    暗号と情報セキュリティシンポジウム 2025  2025.1 

     More details

    Event date: 2025.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 任意の線形符号を用いたPrivate Information Deliveryとその特徴づけ

    中野光喜, 栗原淳, 田中俊昭

    情報理論とその応用シンポジウム  2024.12 

     More details

    Event date: 2024.12

    Language:Japanese   Presentation type:Poster presentation  

    researchmap

  • クライアントの行動に基づくビザンチン耐性のある連合学習の監視メカニズム

    橋本 俊甫, 田中 俊昭, 栗原 淳

    コンピュータセキュリティシンポジウム2024論文集 

     More details

    Event date: 2024.10

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Security Analysis of the Smart Lock Products against the Device Hijacking Attacks

    Hiroki Kimura, Jun Kurihara, Toshiaki Tanaka

     More details

    Event date: 2024.10

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • エッジコンピューティングにおける接続先エッジノードのハンドオーバを考慮した認可手法

    北 一希, 栗原 淳, 田中 俊昭

    電子情報通信学会ソサエティ大会論文集 2024  2024.9 

     More details

    Event date: 2024.9

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • エッジコンピューティングにおけるリソース認可への自己主権型アイデンティティの適用

    渡辺龍, 窪田歩, 栗原淳, 櫻井幸一

    情報処理学会 コンピュータセキュリティ研究会  2024.3 

     More details

    Event date: 2024.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • プライバシ保護を考慮したフィッシングサイト検知システム

    金山知美, 田中俊昭, 栗原 淳

    電子情報通信学会 総合大会 2024  2024.3 

     More details

    Event date: 2024.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • A New Security Measure in Secret Sharing Schemes and Secure Network Coding

    Itaru Kurihara, Jun Kurihara, Toshiaki Tanaka

    Computer Security Symposium 2023  2023.11 

     More details

    Event date: 2023.10 - 2023.11

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ランプ型しきい値法のIndividual Insecurity

    栗原頂, 栗原淳, 田中俊昭

    電子情報通信学会 総合大会 2023  2023.3 

     More details

    Event date: 2023.3

    Presentation type:Oral presentation (general)  

    researchmap

  • Application of generalized deduplication techniques in edge computing environments

    2022.10 

     More details

    Event date: 2022.10

    Language:Japanese  

    researchmap

  • エッジコンピューティングにおけるリソース認可のパターンについて

    渡辺 龍, 窪田 歩, 栗原 淳

    信学技報 IN2020-68  2021.3 

     More details

    Event date: 2021.3

    researchmap

  • Mutualized oblivious DNS (μODNS): Hiding a tree in the wild forest

    KURIHARA Jun, KUBO Takeshi

    電子情報通信学会技術研究報告(Web)  2021 

     More details

    Event date: 2021

    researchmap

  • On the Resistance to Byzantine and Unresponsive Servers in Code-based PIR Schemes

    Jun Kurihara, Toru Nakamura, Ryu Watanabe

    誤り訂正符号のワークショップ 

     More details

    Event date: 2020.9

    researchmap

  • Introduction to Name Prefix Security in NDN

    Jun Kurihara, Daishi Kondo, Hideki Tode, Tohru Asami

    Proceedings of the Society Conference of IEICE 2019  2019.9 

     More details

    Event date: 2019.9

    Language:English  

    researchmap

  • Name Prefix Security Applications in NDN

    Daishi Kondo, Jun Kurihara, Hideki Tode, Tohru Asami

    Proceedings of the Society Conference of IEICE 2019  2019.9 

     More details

    Event date: 2019.9

    Language:English  

    researchmap

  • Current security related topics and content protection in information-centric networking [Tutorial]

    Jun Kurihara

    Proceedings of the Society Conference of IEICE 2016  2016.9 

     More details

    Event date: 2016.9

    Language:Japanese  

    researchmap

  • Proposed proof of concept contribution by KDDI R&D Labs., Inc.

    Jun Kurihara, Marc Mosco

    ITU-T Focus Group on IMT-2020 

     More details

    Event date: 2016.3

    Language:English  

    researchmap

  • B-7-41 A Study of Secure Delivery of Prefetched Content

    Yokota Kenji, Kurihara Jun, Tagami Atsushi

    Proceedings of the IEICE General Conference  2016.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2016.3

    Language:Japanese  

    researchmap

  • Invited Talk : Security of Secret Sharing Schemes Expressed in Terms of the Relative Parameters of Linear Codes

    KURIHARA Jun, MATSUMOTO Ryutaroh, UYEMATSU Tomohiko

    Technical report of IEICE. ISEC  2015.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.3

    Language:Japanese  

    In this paper, we first introduce Shamir's construction of the (k, n)-threshold scheme as a typical linear secret sharing scheme, and explain the construction of the (k, l, n)-threshold ramp scheme proposed by Yamamoto and Blakley-Meadows as its extension. Then, by generalizing the threshold ramp schemes with a general linear code C_1 and its subcode C_2, we introduce an expression of linear secret sharing scheme in terms of C_1 and C_2. As examples, we express Shamir's (k, n)-threshold scheme and the (k, l, n)-threshold ramp scheme of Yamamoto and Blakley-Meadows by linear codes. Furthermore, we show that in linear secret sharing schemes, the maximum amount of the information leakage of the secret message and their strong security are expressed in terms of the relative generalized Hamming weights (RGHW's) of C_1 and C_2 when every share is an element of a finite field. We also present detailed examples of this security analysis to help readers to gain understanding of the analytic technique.

    researchmap

  • A Study of TCP-like Congestion Control using Interest Aggregation in Content-Centric Networking

    YOKOTA Kenji, KURIHARA Jun, TAGAMI Atsushi

    IEICE technical report  2015.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.3

    Language:Japanese  

    Content-Centric Networking (CCN) has been recently attracting increasing attention as a future Internet architecture. In the CCN, a client has to follow the one-to-one matching principle between the request and the content chunk, and issue a network message called an Interest as a request to its corresponding content chunk called a Content Object. This implies that in the retrieval of a large content, a large number of interests are issued and CCN routers may suffer from the heavy workload and network traffic. To solve this problem, methods to aggregate multiple Interest messages to one Interest has been proposed. However, existing congestion control methods for CCN are not compatible with the aggregated interests, and as far as we know, no congestion control method for the aggregated Interests have been proposed yet. We propose TCP-like congestion control method designed for the interest aggregation. By the evaluation through computer simulations, it is clarified that our proposed method can control congestion in CCN similar to the TCP in the current Internet.

    researchmap

  • Invited Talk : Security of Secret Sharing Schemes Expressed in Terms of the Relative Parameters of Linear Codes

    KURIHARA Jun, MATSUMOTO Ryutaroh, UYEMATSU Tomohiko

    IEICE technical report. Information theory  2015.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.3

    Language:Japanese  

    In this paper, we first introduce Shamir's construction of the (k, n)-threshold scheme as a typical linear secret sharing scheme, and explain the construction of the (k, l, n)-threshold ramp scheme proposed by Yamamoto and Blakley-Meadows as its extension. Then, by generalizing the threshold ramp schemes with a general linear code C_1 and its subcode C_2, we introduce an expression of linear secret sharing scheme in terms of C_1 and C_2. As examples, we express Shamir's (k, n)-threshold scheme and the (k, l, n)-threshold ramp scheme of Yamamoto and Blakley-Meadows by linear codes. Furthermore, we show that in linear secret sharing schemes, the maximum amount of the information leakage of the secret message and their strong security are expressed in terms of the relative generalized Hamming weights (RGHW's) of C_1 and C_2 when every share is an element of a finite field. We also present detailed examples of this security analysis to help readers to gain understanding of the analytic technique.

    researchmap

  • Optimization of ICN Potential Based Routing for Disasters

    SUNAGA Takaaki, ASAMI Tohru, KAWAHARA Yoshihiro, SUGIYAMA Kohei, KURIHARA Jun, TAGAMI Atsushi, YAGYU Tomohiko, HASEGAWA Toru

    IEICE technical report. Information networks  2015.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.3

    Language:Japanese  

    In the current Internet, many applications are based on DNS, the centralized name resolution system, assuming hosts are interconnected at all times. Such applications are not available in the network in a disaster, which is divided into several fragmented pieces. ICN (Information Centric Network) has itself a routing function toward each content, and there were several proposals to apply ICN to the disaster environment. These existing methods can only use the content caches on the way to the original content, and cannot use effectively all the available content caches within the limited network resources in the disaster. For effective caching, this paper investigates the optimization of potential based routing, resistant to topology changes in a disaster. consider the optimization of the strong potential routing to changes in the topology.

    researchmap

  • Invited Talk : Security of Secret Sharing Schemes Expressed in Terms of the Relative Parameters of Linear Codes

    KURIHARA Jun, MATSUMOTO Ryutaroh, UYEMATSU Tomohiko

    IEICE technical report. WBS, Wideband System  2015.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.3

    Language:Japanese  

    In this paper, we first introduce Shamir's construction of the (k, n)-threshold scheme as a typical linear secret sharing scheme, and explain the construction of the (k, l, n)-threshold ramp scheme proposed by Yamamoto and Blakley-Meadows as its extension. Then, by generalizing the threshold ramp schemes with a general linear code C_1 and its subcode C_2, we introduce an expression of linear secret sharing scheme in terms of C_1 and C_2. As examples, we express Shamir's (k, n)-threshold scheme and the (k, l, n)-threshold ramp scheme of Yamamoto and Blakley-Meadows by linear codes. Furthermore, we show that in linear secret sharing schemes, the maximum amount of the information leakage of the secret message and their strong security are expressed in terms of the relative generalized Hamming weights (RGHW's) of C_1 and C_2 when every share is an element of a finite field. We also present detailed examples of this security analysis to help readers to gain understanding of the analytic technique.

    researchmap

  • Identity-Based Aggregate Signatures Applied to NDN for Short Message Transfers

    NAMSRAIJAV Byambajav, ASAMI Tohru, KAWAHARA Yoshihiro, KURIHARA Jun, SUGIYAMA Kohei, TAGAMI Atsushi, YAGYU Tomohiko, HASEGAWA Toru

    IEICE technical report. Information networks  2015.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.3

    Language:English  

    In Named Data Networking (NDN), security is imposed on contents instead of end-to-end connections; therefore, every content contains a signature to prove its authenticity and integrity. While this property has many significant advantages, it causes big message overhead in some cases, especially if the content size is small. This overhead further increases if the content is generated by multiple authorities, e.g., in a moderator-controlled information sharing service, and needs to contain multiple signatures. We propose the use of Identity-Based Aggregate Signatures (IBAS) to decrease this overhead. Also, we provide a proof-of-concept IBAS implementation in NDN and compare its performance with existing Public Key Infrastructure RSA signatures.

    researchmap

  • B-7-69 Short Packet Transmission for NDN Using Identity-Based Aggregate Signatures

    Namsraijav Byambajav, Kawahara Yoshihiro, Sugiyama Kohei, Kurihara Jun, Tagami Atsushi, Yagyu Tomohiko, Hasegawa Toru, Asami Tohru

    Proceedings of the IEICE General Conference  2015.2  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.2

    Language:Japanese  

    researchmap

  • B-7-68 Message Transfer Delay Reduction by Effective Caching of ICN in Disasters

    Sunaga Takaaki, Kawahara Yoshihiro, Sugiyama Kohei, Kurihara Jun, Tagami Atsushi, Yagyu Tomohiko, Hasegawa Toru, Asami Tohru

    Proceedings of the IEICE General Conference  2015.2  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2015.2

    Language:Japanese  

    researchmap

  • Relative generalized rank weight of linear codes and its applications to network coding Invited

    Jun Kurihara

    SITA 2014 workshop on current topics of coding in distributed systems 

     More details

    Event date: 2014.12

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    researchmap

  • Strongly-Secure Secret Sharing based on Linear Codes Can Be Characterized by Generalized Hamming Weight

    KURIHARA Jun, UYEMATSU Tomohiko

    IEICE technical report  2011.7  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2011.7

    Language:English  

    Secret sharing scheme is an important tool for the management of secret information. For secret sharing scheme based on linear block codes, the amount of information leaked to adversaries has not been investigated. Hence, in existing constructions of secret sharing scheme based on arbitrary linear codes, some elements of a secret vector might leak out deterministically from a non-qualified set, like weakly-secure ramp threshold schemes. In this paper, we first define anti-access set as a set from which no element is deterministically leaked. We also introduce the conditions of a linear code and its dual code such that a specified set becomes an anti-access set in secret sharing scheme using the code. Then, we propose a secret sharing scheme based on a linear code C^⊥ whose dual code C is defined by a systematic parity check matrix. This realizes a similar access structure to threshold access structures, and every non-qualified set whose cardinality is less than or equal to α are anti-access sets (called α-strongly-secure). Further, we show that this construction is completely characterized by the generalized Hamming weight and the MDS-rank of C.

    researchmap

  • A-6-4 Time-Varying Jamming Links for MRD-Code-based Universal Secure Error-Correcting Network Codes

    KURIHARA Jun, UYEMATSU Tomohiko

    Proceedings of the Society Conference of IEICE  2010.8  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2010.8

    Language:Japanese  

    researchmap

  • A-7-9 A Message Injection in SCH

    Nakano Yuto, Kurihara Jun, Kiyomoto Shinsaku, Tanaka Toshiaki

    Proceedings of the IEICE General Conference  2010.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2010.3

    Language:Japanese  

    researchmap

  • A novel realization of (k,n)-threshold schemes over binary field extensions

    Jun Kurihara, Tomohiko Uyematsu, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka

    暗号と情報セキュリティシンポジウム 2010 

     More details

    Event date: 2010.1

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • Rediscovery of XOR-based Threshold Schemes in MDS codes

    Jun Kurihara, Tomohiko Uyematsu, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka

    暗号と情報セキュリティシンポジウム 2010 

     More details

    Event date: 2010.1

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • A Study on Stream-Cipher-Based Hash Functions

    NAKANO Yuto, KURIHARA Jun, KIYOMOTO Shinsaku, TANAKA Toshiaki

    IEICE technical report  2009.7  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2009.7

    Language:English  

    researchmap

  • A Study on Stream-Cipher-Based Hash Functions

    NAKANO Yuto, KURIHARA Jun, KIYOMOTO Shinsaku, TANAKA Toshiaki

    IEICE technical report  2009.6  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2009.6

    Language:English  

    Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based hash functions (SCHs) have not been studied sufficiently yet. In this paper, we present a model of SCHs consisting of two parts: a pre-computation phase and a stream cipher phase. We apply this model to existing broken SCHs, Abacus and Boole, and analyze the vulnerabilities corresponding to existing attacks for each part of our model. By applying our model to these algorithms, weak parts in the algorithms are revealed, and we show that these vulnerabilities can be removed by minor modifications to each part. Furthermore, we clarify the requirements for the pre-computation phase and the stream cipher phase to realize secure SCHs.

    researchmap

  • A Study on Stream-Cipher-Based Hash Functions

    NAKANO Yuto, KURIHARA Jun, KIYOMOTO Shinsaku, TANAKA Toshiaki

    IEICE technical report  2009.6  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2009.6

    Language:English  

    Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based hash functions (SCHs) have not been studied sufficiently yet. In this paper, we present a model of SCHs consisting of two parts: a pre-computation phase and a stream cipher phase. We apply this model to existing broken SCHs, Abacus and Boole, and analyze the vulnerabilities corresponding to existing attacks for each part of our model. By applying our model to these algorithms, weak parts in the algorithms are revealed, and we show that these vulnerabilities can be removed by minor modifications to each part. Furthermore, we clarify the requirements for the pre-computation phase and the stream cipher phase to realize secure SCHs.

    researchmap

  • A-7-3 Revocation and Addition Mechanisms for Fast (k, n)-Threshold Schemes

    Kurihara Jun, Kiyomoto Shinsaku, Fukushima Kazuhide, Tanaka Toshiaki

    Proceedings of the IEICE General Conference  2009.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2009.3

    Language:English  

    researchmap

  • Fast (k,n)-threshold schemes for hierarchical access structures

    Jun Kurihara, Shisaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka

    コンピュータセキュリティシンポジウム2008論文集 

     More details

    Event date: 2008.10

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • B-15-14 A Stream Authentication Scheme for 1-Seg Broadcasting

    Kurihara Jun, Kiyomoto Shinsaku, Watanabe Ryu, Tanaka Toshiaki

    Proceedings of the IEICE General Conference  2008.3  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2008.3

    Language:Japanese  

    researchmap

  • An Extension of Fast Threshold Schemes Using XOR Operations (2)

    KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki

    IEICE technical report  2007.8  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2007.8

    Language:English  

    This paper proposes several extensions of fast (k,n)-threshold schemes which use EXCLUSIVE-OR(XOR) operations. We introduced the new concept of singular point of divided pieces of shares in part one. Several methods using singular point based on fast (k,n)-threshold schemes are proposed in this paper. These comprise a fast threshold ramp scheme and a method to embed additional information into shares. Similar to a ramp scheme based on Shamir's threshold scheme, our fast ramp scheme realizes to reduce each bit-size of shares instead of degradation of security. On the other hand, a method to embed additional information allows only participants who pre-shared the authorities with the dealer to recover not only the secret but also the additional information corresponding to the authority from k shares. Thus, this embedding method can realize a distributed subliminal channel (storage) between the dealer and the trusted participant, simple access control method and so on, which use the property of secret sharing schemes.

    researchmap

  • An Extension of Fast Threshold Schemes Using XOR Operations (1)

    KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki

    IEICE technical report  2007.8  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2007.8

    Language:English  

    This paper proposes several extensions of fast (k,n)-threshold schemes which use EXCLUSIVE-OR(XOR) operations. Existing fast threshold schemes need to calculate inverse matrices in recovery phase and hence these operations on software/hardware are delayed due to conditional branching in calculation of invese matrices. We introduce a new method to calculate a particular matrix in a recovery algorithm. Our method does not need to make a generator matrix for shares or to calculate inverse matrices of block matrices. The particular matrix which denotes the combination of divided pieces of shares to recover the secret is calculated by rote only from the share indexes. Futhermore, our method can be implemented without "IF" statement (conditional branching) by using word-wise XOR operations, cyclic shift operations and bit shift operations. Thus, our method can be operated more rapidly than existing schemes on software and hardware.

    researchmap

  • A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes

    KURIHARA Jun, KIYOMOTO Shinsaku, FUKUSHIMA Kazuhide, TANAKA Toshiaki

    IEICE technical report  2007.5  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2007.5

    Language:English  

    In Shamir's (k,n)-threshold secret sharing scheme, a heavy computational cost is required to recover the secret from k shares. As a solution to this problem, several fast threshold schemes are proposed. However, there is no fast ideal (k,n)-threshold scheme, where k >_ 4 and n is arbitrary. This paper proposes a new fast (4,n)-threshold scheme using just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret, which is an ideal secret sharing scheme similar to Shamir's scheme. Furthermore, we extend and generalize the (4,n)-threshold scheme to a new fast (k,n)-threshold scheme using XOR operations with arbitrary k and n, which is also an ideal secret sharing scheme.

    researchmap

  • XORを用いた(3,n)閾値秘密分散法の完全性証明

    栗原 淳, 清本 晋作, 福島 和英, 田中 俊昭

    暗号と情報セキュリティシンポジウム2007 

     More details

    Event date: 2007.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • XORを用いた(3,n)閾値秘密分散法

    栗原 淳, 清本 晋作, 福島 和英, 田中 俊昭

    暗号と情報セキュリティシンポジウム2007 

     More details

    Event date: 2007.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Efficient Nonbinary Coding Systems Approaching the Shannon Limit by Using Product Accumlate Codes

    KURIHARA Jun, UYEMATSU Tomohiko, MATSUMOTO Ryutaroh

    ITE technical report  2005.12 

     More details

    Event date: 2005.12

    Language:Japanese  

    researchmap

  • Efficient Nonbinary Coding Systems Approaching the Shannon Limit by Using Product Accumlate Codes

    KURIHARA Jun, UYEMATSU Tomohiko, MATSUMOTO Ryutaroh

    IPSJ SIG Notes  2005.12  Information Processing Society of Japan (IPSJ)

     More details

    Event date: 2005.12

    Language:Japanese  

    PA(Product Accumulate) codes achieve perfomance near the Shannon limit for BPSK, have low encoding and decoding complexity, and have flexible rate adaptivity for all rates above 1/2. In this paper, we propose a new method of application of PA codes to multilevel modulation with multilevel coding and BICM-ID(Bit Interleaved Coded Modulation with Iterative Decoding). First, to adjust code rate flexibly, we investigate perfomances of PA codes and GPA (Generalized Product Accumulate) codes that have two different single parity check codes as component codes, and we show a procedure to design PA codes or GPA codes with different component codes for wide range of code rate. Next, we identify labeling methods that give the lowest decoding error probability for BICM-ID and multilevel coding. Computer simulation demonstrates that multilevel coding systems and BICM-ID systems with PA codes or GPA codes designed with our procedure give performances near the Shannon limit.

    researchmap

  • Efficient Nonbinary Coding Systems Approaching the Shannon Limit by Using Product Accumlate Codes

    KURIHARA Jun, UYEMATSU Tomohiko, MATSUMOTO Ryutaroh

    IEICE technical report  2005.12  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2005.12

    Language:Japanese  

    PA (Product Accumulate) codes achieve perfomance near the Shannon limit for BPSK, have low encoding and decoding complexity, and have flexible rate adaptivity for all rates above 1/2. In this paper, we propose a new method of application of PA codes to multilevel modulation with multilevel coding and BICM-ID (Bit Interleaved Coded Modulation with Iterative Decoding). First, to adjust code rate flexibly, we investigate perfomances of PA codes and GPA (Generalized Product Accumulate) codes that have two different single parity check codes as component codes, and we show a procedure to design PA codes or GPA codes with different component codes for wide range of code rate. Next, we identify labeling methods that give the lowest decoding error probability for BICM-ID and multilevel coding. Computer simulation demonstrates that multilevel coding systems and BICM-ID systems with PA codes or GPA codes designed with our procedure give performances near the Shannon limit.

    researchmap

  • Software Radio Receiver Utilizing RF Filter Bank

    KURIHARA Jun, SUZUKI Hiroshi

    RCS  2004.8  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2004.8

    Language:Japanese  

    This paper proposes a software radio receiver which utilizes an RF filter bank in the front end and optimally combines the signals whose bandwidth is divided by the filter bank. This method assumes the future solid state advanced integrated circuit technologies in RF filters, RF receiving circuit and A/D converters (ADC). The optimal combining utilizing the multiple input linear equalizer regenerates the wide band signal in baseband from the discrete complex envelopes that are sampled from the outputs of filters constructing the RF filter bank. The equalizer uses chirp signal as the training signal. Time alignment of the complex impulse response to the chirp signal yields the complex impulse response of the combining circuit. The combiner circuit minimizes the difference between the complex impulse response and the desired impulse response, and it becomes the matched filter. Computer simulation is conducted in order to evaluate the reception performance by utilizing Gaussian bandpass filter for the filter bank. Both single carrier roll-off and OFDM multicarrier signals are examined. The simulation shows the dependences of eye pattern and that of bit error rate (BER) upon the number of bits of ADC, and dependence of BER upon an out-of-band interference signal. The results show the superiority of the filter bank receiver to the digital filter receiver.

    researchmap

  • A secret sharing scheme based on linear codes and its security analysis Invited

    Jun Kurihara

    Workshop on Discrete Mathematics Related to Information Security  2013.8 

     More details

    Language:Japanese  

    researchmap

  • An XOR-based high-speed secret sharing Invited

    Jun Kurihara

    One day workshop on secret sharing and cloud computing, Institute of Mathematics for Industry, Kyushu University  2011.6 

     More details

    Language:English  

    researchmap

  • Reduction of router workload by using list-type interest

    Jun Kurihara, Kenji Yokota, Kazuki Ueda, Atsushi Tagami

    Kick-off Workshop of IEICE Technical Committee on Information-Centric Networking  2015.4 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 1-to-n matching between interest and content objects for reduction of router workload

    Jun Kurihara

    IRTF ICNRG, the 94-th IETF Meeting  2015.11 

     More details

    Language:English  

    researchmap

  • Security and Privacy in DNS (Tutorial) Invited

    Jun Kurihara

    電子情報学会ソサエティ大会  2021.9 

     More details

▼display all

Industrial property rights

▼display all

Awards

  • Excellent Paper Award

    2014.6   IEICE  

     More details

  • Kiyasu Zen’ichi (Best Paper) Award

    2014.6   IEICE  

     More details

  • Academic Encouragement Award of Engineering Sciences Society

    2013.3   IEICE  

     More details

  • Excellent Paper Award at Computer Security Symposium (CSS) 2008

    2008.10   IPSJ  

     More details

Research Projects

  • 匿名性とDoS耐性を同時に達成する高速低遅延なTLS匿名化手法と安全性評価

    Grant number:25K03108  2025.4 - 2028.3

    日本学術振興会  科学研究費助成事業  基盤研究(B)(一般)

    栗原淳, 田中俊昭

      More details

  • マネーフォワード共同研究

    2022.12 - 2023.3

    株式会社マネーフォワード 

      More details

    Authorship:Principal investigator 

    researchmap

  • LabBase共同研究

    2022.11 - 2026.3

    株式会社LabBase 

      More details

    Authorship:Principal investigator 

    researchmap

  • Beyond 5Gネットワークのセキュリティ、プライバシーを保護するプログラマブルデータプレーン技術

    Grant number:NICT22401  2022.9 - 2025.8

    NICT  次世代コアとBeyond 5G/6Gネットワークのためのプログラム 可能なネットワークの研究開発 

    長谷川亨, 小泉佑揮, 武政淳二, 田中俊昭, 栗原淳

      More details

    Authorship:Coinvestigator(s) 

    researchmap

  • 匿名DNSの攻撃および高度化手法の研究

    2022.4 - 2025.3

    KDDI財団  調査研究助成 

    栗原 淳, 田中 俊昭

      More details

    Authorship:Principal investigator 

    researchmap

  • 匿名化Domain Name Systemの実効性評価と高度匿名化手法の研究

    Grant number:22K11994  2022.4 - 2025.3

    日本学術振興会  科学研究費助成事業 基盤研究(C)  基盤研究(C)

    栗原 淳, 田中 俊昭, 小泉 佑揮

      More details

    Grant amount:\4290000 ( Direct Cost: \3300000 、 Indirect Cost:\990000 )

    researchmap

  • University of Hyogo Special Research Grant for Young Researchers

    2021.8 - 2022.3

      More details

    Authorship:Principal investigator 

    researchmap

  • Secure Computing Platform in the AI Era

    Grant number:21H03442  2021.4 - 2024.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)  Grant-in-Aid for Scientific Research (B)

      More details

    Authorship:Coinvestigator(s) 

    Grant amount:\16900000 ( Direct Cost: \13000000 、 Indirect Cost:\3900000 )

    researchmap

  • Research on privacy-preserving schemes in Edge-Named Function architecture

    Grant number:20K23329  2020.9 - 2023.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Research Activity Start-up  Grant-in-Aid for Research Activity Start-up

      More details

    Authorship:Principal investigator 

    Grant amount:\2860000 ( Direct Cost: \2200000 、 Indirect Cost:\660000 )

    researchmap

  • University of Hyogo Special Research Grant for Young Researchers

    2020.8 - 2021.3

      More details

    Authorship:Principal investigator 

    researchmap

  • KDDI Research, Inc. Funded Research Project

    2020.4 - 2023.3

      More details

▼display all

Teaching Experience

  • Network Security

    2021.4 Institution:University of Hyogo

     More details

  • Security Engineering

    2021.4 Institution:University of Hyogo

     More details

  • Information Security

    2021.4 Institution:University of Hyogo

     More details

  • Information Security

    2020.4 - 2021.3 Institution:University of Hyogo

     More details