Information Security Laboratory

H. Morita

Hikaru Morita
(Professor)

Office: 23-412 Ext.: 3720

e-mail:  morita@kanagawa-u.ac.jp

06/1993, Ph.D., Engineering, Hokkaido University

03/1982, M.Eng., Hokkaido University

03/1980, B.Eng., Hokkaido University

A. Takaoka

Asahi Takaoka
(Assistant Professor)

Office: 23-411 Ext.: 3719

e-mail:  takaoka@kanagawa-u.ac.jp

03/2015, D.Eng., Tokyo Institute of Technology

03/2012, M.Eng., Tokyo Institute of Technology

Research Field

Information Security and Cryptography.

Research Overview

Experimental research on cryptographic analysis, research on cryptographic protocols for constructing information systems, and feasibility studies for secure products.

Research Subjects

  • 1.Cryptographic analysis.
  • 2.Cryptographic protocols for electronic money and electronic auctions.
  • 3. Implementation methods to speed up information systems

Introduction:

Information systems contain many computers that are connected together on networks. Reading and writing information, which was previously done by only people, is now performed by electronic information systems, too. This is because costs are reduced by reducing the number of tasks performed by humans. Information systems are changing our lifestyles and society. Programmers who computerize existing businesses are not highly paid. Creative talent for building information systems that affect society and everyday life is required. Information systems that obtain people's attention or build interlocking communication services are pioneering. Engineers and researchers to develop the systems will be highly paid.
We research secure information systems for particular purposes such as cryptographic technologies. The main communication infrastructure is now the Internet. The use of wireless tools, such as cellphones and smart phones, has become commonplace. Thus, secure systems should be designed assuming that information can leak. However, in information systems that handle content, such as movies and music, copy protection is a concern. For electronic money, copy protection is a more serious problem, and information security has become an important field of research. We have been studying cryptographic protocols for Web services, and designing a wide range of security systems.

Publications
  • 1)H. Morita, H. Odagi, and K. Ohta, “Collision search of a hash function by using random mapping,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E81-A(1), pp. 35–40 (1998).
  • 2)K. Kobayashi, H. Morita, K. Suzuki, and M. Hakuta, “Efficient sealed-bid auction by using one-way functions,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E84-A(1), pp. 289–294 (2001) .
Affiliated Academic Organizations

H. Morita:
Institute of Electronics, Information and Communication Engineers (IEICE), Institute of Electrical and Electronics Engineers (IEEE), Information Processing Society of Japan (IPSJ), Association for Computing Machinery (ACM).

A. Takaoka:
IEEE, IEICE.

Current members
◯ Professors: 1 ◯ Assistant Professors: 1
◯ Postgraduates: 1 ◯ Undergraduates: 13

Facilities: Programmable robots: 9

BACK

PAGE TOP