National Institute of Advanced Industrial Science and Technology (AIST)

Displaying 1-13 of 13 results

  • White Papers // Jan 2013

    Hybrid Cloud Considerations: Managerial Perspective

    Cloud computing services have been regarded by organizations as a highly promising and lucrative trend. However, cloud-based services have numerous inherent risks that outweigh benefits. The services are distributed and provided on-demand via networks. Distribution and network-based access of services are the roots of benefits and risks. Primary risks are...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Dec 2012

    Relations Among Security Metrics for Template Protection Algorithms

    One of the main issues in biometric authentication systems is to protect a biometric template database from compromise. Biometric information is so unique to each user and unchangeable during his or her lifetime. Once biometric template is leaked together with his or her identity, the person will face a severe...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Sep 2012

    On Pseudorandomization of Information-Theoretically Secure Schemes without Hardness Assumptions

    A recent work by Nuida and Hanaoka provided a proof technique for security of information-theoretically secure cryptographic schemes in which the random input tape is implemented by a PseudoRandom Generator (PRG). In this paper, the authors revisit their proof technique and generalize it by introducing some trade-off factor, which involves...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Aug 2012

    On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups

    In this paper, the authors focus on the problem of minimizing ciphertext overhead, and discuss the (im)possibility of constructing Key Encapsulation Mechanisms (KEMs) with low ciphertext overhead. More specifically, they rule out the existence of algebraic black-box reductions from the (bounded) CCA security of a natural class of KEMs to...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Sep 2011

    Making VM Consolidation More Energy-Efficient by Postcopy Live Migration

    Dynamic consolidation of Virtual Machines (VMs) is a promising technology for reducing energy consumption of data centers. Existing studies on VM consolidation, however, are based on pre-copy live migration; it is difficult to optimize VM locations aggressively due to its long and undeterminable migration process. In this paper, the authors...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Dec 2010

    Short Collusion-Secure Fingerprint Codes Against Three Pirates

    In this paper, the authors propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. The pirate tracing algorithm combines a scoring method analogous to Tardos codes (J. ACM, 2008) with an extension of parent search techniques of some preceding...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Oct 2010

    Towards Secure Cloud Storage

    Cloud computing (so-called, cloud) represents one of the magnificent shifts in information technology which can enhance collaboration, agility, scaling and availability, and provide the potential for cost reduction through optimized and efficient computing. Different from the existing technologies and computing approaches, cloud is defined with five essential characteristics (on-demand self-service,...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Sep 2010

    Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes

    Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete Key-Insulated Encryption (KIE) schemes in which secret keys are periodically updated by using a physically "Insulated" helper key. For significantly reducing possibility...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // May 2010

    Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature

    Drawback of code-based public-key cryptosystems is that their public-key size is large. It takes some hundreds KB to some MB for typical parameters. While several attempts have been conducted to reduce it, most of them have failed except one, which is Quasi-Dyadic (QD) public-key (for large extention degrees). Public-key Cryptosystems...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // May 2010

    Virt-ICE: Next-Generation Debugger for Malware Analysis

    Dynamic malware analysis is an important method to analyze malware. The most important tool for dynamic malware analysis is debugger. However, because debuggers are originally built by software developers to debug legitimate software, they have some significant flaws against malware. First of all, malware can easily detect the presence of...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Jun 2009

    FREDDY: A Web Browser-Friendly Lightweight Data-Interchange Method Suitable for Composing Continuous Data Streams

    As a remarkable lightweight data-interchange format for use with web browsers, JSON is well known. Recently, web browsers have come to support rich applications called Software as a Service (SaaS) and Cloud Computing. Consequently, data interchange between web servers and web browsers is an important issue. A singleton, an array,...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // May 2009

    Mobile Omnidirectional Monitoring System for Remote Personal Security

    This paper describes a mobile omnidirectional monitoring system that enables an observer such as a parent to keep watch on a subject such as a child walking around city-wide outdoors easily from a remote site. The subject is equipped with an omnidirectional camera, GPS (Global Positioning System) receiver, and microphone....

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Jun 2008

    Bitstream Encryption and Authentication with AES-GCM in Dynamically Reconfigurable Systems

    A high-speed and secure Dynamic Partial Reconfiguration (DPR) system is realized with AES-GCM that guarantees both confidentiality and authenticity of FPGA bitstreams. In DPR systems, bitstream authentication is essential for avoiding fatal damage caused by unintended bitstreams. An encryption-only system can prevent bitstream cloning and reverse engineering, but cannot prevent...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Sep 2012

    On Pseudorandomization of Information-Theoretically Secure Schemes without Hardness Assumptions

    A recent work by Nuida and Hanaoka provided a proof technique for security of information-theoretically secure cryptographic schemes in which the random input tape is implemented by a PseudoRandom Generator (PRG). In this paper, the authors revisit their proof technique and generalize it by introducing some trade-off factor, which involves...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Aug 2012

    On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups

    In this paper, the authors focus on the problem of minimizing ciphertext overhead, and discuss the (im)possibility of constructing Key Encapsulation Mechanisms (KEMs) with low ciphertext overhead. More specifically, they rule out the existence of algebraic black-box reductions from the (bounded) CCA security of a natural class of KEMs to...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Jan 2013

    Hybrid Cloud Considerations: Managerial Perspective

    Cloud computing services have been regarded by organizations as a highly promising and lucrative trend. However, cloud-based services have numerous inherent risks that outweigh benefits. The services are distributed and provided on-demand via networks. Distribution and network-based access of services are the roots of benefits and risks. Primary risks are...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Sep 2011

    Making VM Consolidation More Energy-Efficient by Postcopy Live Migration

    Dynamic consolidation of Virtual Machines (VMs) is a promising technology for reducing energy consumption of data centers. Existing studies on VM consolidation, however, are based on pre-copy live migration; it is difficult to optimize VM locations aggressively due to its long and undeterminable migration process. In this paper, the authors...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Jun 2008

    Bitstream Encryption and Authentication with AES-GCM in Dynamically Reconfigurable Systems

    A high-speed and secure Dynamic Partial Reconfiguration (DPR) system is realized with AES-GCM that guarantees both confidentiality and authenticity of FPGA bitstreams. In DPR systems, bitstream authentication is essential for avoiding fatal damage caused by unintended bitstreams. An encryption-only system can prevent bitstream cloning and reverse engineering, but cannot prevent...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // May 2009

    Mobile Omnidirectional Monitoring System for Remote Personal Security

    This paper describes a mobile omnidirectional monitoring system that enables an observer such as a parent to keep watch on a subject such as a child walking around city-wide outdoors easily from a remote site. The subject is equipped with an omnidirectional camera, GPS (Global Positioning System) receiver, and microphone....

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Jun 2009

    FREDDY: A Web Browser-Friendly Lightweight Data-Interchange Method Suitable for Composing Continuous Data Streams

    As a remarkable lightweight data-interchange format for use with web browsers, JSON is well known. Recently, web browsers have come to support rich applications called Software as a Service (SaaS) and Cloud Computing. Consequently, data interchange between web servers and web browsers is an important issue. A singleton, an array,...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // May 2010

    Virt-ICE: Next-Generation Debugger for Malware Analysis

    Dynamic malware analysis is an important method to analyze malware. The most important tool for dynamic malware analysis is debugger. However, because debuggers are originally built by software developers to debug legitimate software, they have some significant flaws against malware. First of all, malware can easily detect the presence of...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Oct 2010

    Towards Secure Cloud Storage

    Cloud computing (so-called, cloud) represents one of the magnificent shifts in information technology which can enhance collaboration, agility, scaling and availability, and provide the potential for cost reduction through optimized and efficient computing. Different from the existing technologies and computing approaches, cloud is defined with five essential characteristics (on-demand self-service,...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Dec 2010

    Short Collusion-Secure Fingerprint Codes Against Three Pirates

    In this paper, the authors propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. The pirate tracing algorithm combines a scoring method analogous to Tardos codes (J. ACM, 2008) with an extension of parent search techniques of some preceding...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Sep 2010

    Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes

    Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete Key-Insulated Encryption (KIE) schemes in which secret keys are periodically updated by using a physically "Insulated" helper key. For significantly reducing possibility...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // May 2010

    Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature

    Drawback of code-based public-key cryptosystems is that their public-key size is large. It takes some hundreds KB to some MB for typical parameters. While several attempts have been conducted to reduce it, most of them have failed except one, which is Quasi-Dyadic (QD) public-key (for large extention degrees). Public-key Cryptosystems...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)

  • White Papers // Dec 2012

    Relations Among Security Metrics for Template Protection Algorithms

    One of the main issues in biometric authentication systems is to protect a biometric template database from compromise. Biometric information is so unique to each user and unchangeable during his or her lifetime. Once biometric template is leaked together with his or her identity, the person will face a severe...

    Provided By National Institute of Advanced Industrial Science and Technology (AIST)