■Information Security Laboratory
06/1993, Ph.D., Engineering, Hokkaido University
03/1982, M.Eng., Hokkaido University
03/1980, B.Eng., Hokkaido University
03/2015, D.Eng., Tokyo Institute of Technology
03/2012, M.Eng., Tokyo Institute of Technology
Information Security and Cryptography.
- 1.Cryptographic analysis.
- 2.Cryptographic protocols for electronic money and electronic auctions.
- 3. Implementation methods to speed up information systems
Information systems contain many computers that are connected together on networks. Reading and writing information, which was previously done by only people, is now performed by electronic information systems, too. This is because costs are reduced by reducing the number of tasks performed by humans. Information systems are changing our lifestyles and society. Programmers who computerize existing businesses are not highly paid. Creative talent for building information systems that affect society and everyday life is required. Information systems that obtain people's attention or build interlocking communication services are pioneering. Engineers and researchers to develop the systems will be highly paid.
We research secure information systems for particular purposes such as cryptographic technologies. The main communication infrastructure is now the Internet. The use of wireless tools, such as cellphones and smart phones, has become commonplace. Thus, secure systems should be designed assuming that information can leak. However, in information systems that handle content, such as movies and music, copy protection is a concern. For electronic money, copy protection is a more serious problem, and information security has become an important field of research. We have been studying cryptographic protocols for Web services, and designing a wide range of security systems.
- 1)H. Morita, H. Odagi, and K. Ohta, “Collision search of a hash function by using random mapping,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E81-A(1), pp. 35–40 (1998).
- 2)K. Kobayashi, H. Morita, K. Suzuki, and M. Hakuta, “Efficient sealed-bid auction by using one-way functions,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E84-A(1), pp. 289–294 (2001) .
Affiliated Academic Organizations
Institute of Electronics, Information and Communication Engineers (IEICE), Institute of Electrical and Electronics Engineers (IEEE), Information Processing Society of Japan (IPSJ), Association for Computing Machinery (ACM).
|◯ Professors: 1||◯ Assistant Professors: 1|
|◯ Postgraduates: 1||◯ Undergraduates: 13|
Facilities: Programmable robots: 9