Papers
list
No. | タイトル | 著者 | 採録先 |
---|---|---|---|
1 | Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2 | Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka | AsiaCCS 2019 |
2 | Attribute Based Encryption (and more) for Nondeterministic Finite Automata from Learning With Errors | Shweta Agrawal, Monosij Maitra, Shota Yamada | CRYPTO 2019 |
3 | Exploring Constructions of Compact NIZKs from Various Assumptions | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa | CRYPTO 2019 |
4 | CCA Security and Trapdoor Functions via Key-Dependent-Message Security | Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka | CRYPTO 2019 |
5 | Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation | Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C.N. Schuldt | ACISP 2019 ※Best Paper Award受賞 |
6 | Efficient Estimation of Number of Short Lattice Vectors in Search Space under Randomness Assumption | Yoshitatsu Matsuda, Tadanori Teruya, Kenji Kashiwabara | The 6th ACM ASIA Public-Key Cryptography Workshop (APKC 2019) |
7 | Equivalence between Non-Malleability against Replayable CCA and Other RCCA-security Notions | Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura | IWSEC 2019 |
8 | Privacy-Preserving Deep Learning via Weight Transmission | Le Trieu Phong, Tran Thi Phuong | IEEE Transactions on Information Forensics and Security |
9 | Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices | Keita Emura, Shuichi Katsumata, Yohei Watanabe | ESORICS 2019 |
10 | Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions | Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara, Kazumasa Omote, Yusuke Sakai | Security and Communication Networks |
11 | MOBIUS: Model-Oblivious Binarized Neural Networks | H. Kitai, J. Cruz, N. Yanai, N. Nishida, T. Oba, Y. Unagami, T. Teruya, N. Attrapadung, T. Matsuda, G. Hanaoka. | IEEE ACCESS |
12 | Client-Aided Two-party Secure Interval Test Protocol | Hiraku Morita and Nuttapong Attrapadung | CANS 2019 |
13 | A New Combiner for Key Encapsulation Mechanisms | Goichiro HANAOKA,Takahiro Matsuda, Jacob C.N. Schuldt | IEICE Transactions Vol.E102-A,No.12, 2019. |
14 | Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions | Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka: | Theoretical Computer Science |
15 | Simple and Efficient KDM-CCA Secure Public Key Encryption | Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka | ASIACRYPT 2019 |
16 | CPA-to-CCA Transformation for KDM Security | Fuyuki Kitagawa, Takahiro Matsuda | TCC 2019 |
17 | Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model | Yusuke SAKAI, Goichiro HANAOKA | IEICE Trans. Fundamentals |
18 | Attribute Based Encryption for Deterministic FiniteAutomata fromDLIN | Shweta Agrawal, Monosij Maitra, Shota Yamada | TCC 2019 |
19 | Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications | Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka | IEICE Transactions, Vol.E103-A,No.01, 2020. |
20 | Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application. | Satsuya Ohata, Koji Nuida | FC'20 |
21 | Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption | Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura | IEICE Transactions |
22 | Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512 | Ali El Kaafarani, Shuichi Katsumata, Federico Pintore | PKC 2020 |
23 | Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions | Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu | EUROCRYPT 2020 |
24 | Compact NIZKs from Standard Assumptions on Bilinear Maps | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa | EUROCRYPT 2020 |
25 | Optimal Broadcast Encryption from Pairings and LWE | Shweta Agrawal, Shota Yamada | EUROCRYPT 2020 |
26 | Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques | Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka | PoPETS/PETS 2020 |
27 | Lattice-based revocable (Hierarchical) IBE with decryption key exposure resistance | Shuichi Katsumata, Takahiro Matsuda, AtsushiTakayasu | TCS |
28 | Adaptively Secure Constrained Pseudorandom Functions in the Standard Model | Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa | CRYPTO 2020 |
29 | Enhanced Secure Comparison Schemes Using Homomorphic Encryption | Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai | NBiS2020 |
30 | On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks | Keita Emura | IEICE Transactions |
31 | Privacy-Preserving Data Analysis: Providing Traceability without Big Brother | Hiromi Arai, Keita Emura, Takuya Hayashi | IEICE Transactions |
32 | Adaptively Secure Inner Product Encryption from LWE | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa | ASIACRYPT 2020 |
33 | Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices | Ward Beullens, Shuichi Katsumata, Federico Pintore | ASIACRYPT 2020 |
34 | Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications | Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest. | ASIACRYPT 2020 |
35 | Circular Security Is Complete for KDM Security | Fuyuki Kitagawa, Takahiro Matsuda | ASIACRYPT 2020 |
36 | Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions | Nuttapong Attrapadung, Junichi Tomida | ASIACRYPT 2020 |
37 | Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition | Goichiro Hanaoka, Misaki Komatsu, Kazuma Ohara, Yusuke Sakai, Shota Yamada | ESORICS 2020 |
38 | Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions | Junichiro HAYATA, Fuyuki KITAGAWA, Yusuke SAKAI, Goichiro HANAOKA, Kanta MATSUURA | IEICE Trans. Fundamentals |
39 | Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers | Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta | Provsec 2020 |
40 | NIZK from SNARG | Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa | TCC 2020 |
41 | CP-ABE for Circuits (and more) in the Symmetric Key Setting | Shweta Agrawal; Shota Yamada | TCC 2020 |
42 | Optimal Broadcast Encryption from LWE and Pairings in the Standard Model | Shweta Agrawal; Daniel Wichs; Shota Yamada | TCC 2020 |
43 | A Note on Subgroup Security in Discrete Logarithm-Based Cryptography | Tadanori Teruya | IEICE Trans. Fundamentals |
44 | Distributed SignSGD with Improved Accuracy and Network-Fault Tolerance | Le Trieu Phong, Tran Thi Phuong | IEEE Access |
45 | New Approaches to Federated XGBoost Learning for Privacy-Preserving Data Analysis | Fuki Yamamoto, Lihua Wang, and Seiichi Ozawa | ICONIP2020 |
46 | Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers | Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta | IEICE Trans. Fundamentals |
47 | Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. | Shuichi Katsumata, Shota Yamada, Takashi Yamakawa. | Journal of Cryptology(JoC) |
48 | Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa. | EUROCRYPT 2021 |
49 | An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. | Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest. | PKC 2021 |
50 | Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. | Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi. | ACM CCS 2021 |
51 | Receiver Selective Opening Chosen Ciphertext Secure Identity-based Encryption | Keisuke Hara, Takahiro Matsuda, Keisuke Tanaka. | APKC 2021 |
52 | Recent Advances in Practical Secure Multi-Party Computation | Satsuya Ohata | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
53 | Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing | Kota Sasaki and Koji Nuida | IWSEC 2020 ※IWSEC 2020 Best Paper Award受賞,IWSEC 2020 Best Student Paper Award受賞 |
54 | RintC: fast and accuracy-aware decomposition of distributions of RNA secondary structures with extended logsumexp | Hiroki Takizawa, Junichi Iwakiri, and Kiyoshi Asai | BMC Bioinformatics |
55 | Finding the direct optimal RNA barrier energy and improving pathways with an arbitrary energy model | Hiroki Takizawa, Junichi Iwakiri, Goro Terai, and Kiyoshi Asai | Bioinformatics |
56 | Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR | Shuichi Katsumata,Shota Yamada | PKC 2019 |
57 | Adaptively Single-Key Secure Constrained PRFs for $$\mathrm {NC}^1$$ | Nuttapong Attrapadung,Takahiro Matsuda,Ryo Nishimaki,Shota Yamada,Takashi Yamakawa | PKC 2019 |
58 | Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions | Shuichi Katsumata,Ryo Nishimaki,Shota Yamada,Takashi Yamakawa | EUROCRYPT 2019 |
59 | Group Signatures Without NIZK: From Lattices in the Standard Model | Shuichi Katsumata,Shota Yamada | EUROCRYPT 2019 |
60 | A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions | Nuttapong ATTRAPADUNG,Goichiro HANAOKA,Shinsaku KIYOMOTO,Tomoaki MIMOTO,Jacob C. N. SCHULDT | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
61 | Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology | Kazuma OHARA,Keita EMURA,Goichiro HANAOKA,Ai ISHIDA,Kazuo OHTA,Yusuke SAKAI | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
62 | A Fast Privacy-Preserving Multi-Layer Perceptron Using Ring-LWE-Based Homomorphic Encryption | Takehiro Tezuka, Lihua Wang, Takuya Hayashi, Seiichi Ozawa | ICDMW2019 |
63 | Exploring and Identifying Malicious Sites in Dark Web Using Machine Learning | Yuki Kawaguchi and Seiichi Ozawa | ICONIP 2019 |
64 | Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance | Shuichi Katsumata,Takahiro Matsuda,Atsushi Takayasu | Theoretical Computer Science |
65 | Simple Black-box Adversarial Examples Generation with Very Few Queries | Yuya Senzaki, Satsuya Ohata, Kanta Matsuura | IEICE Transactions on Information and Systems |
66 | Generic hardness of inversion on ring and its relation to self-bilinear map | Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro | Theoretical Computer Science |
67 | An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks | Keitaro Hiwatashi, Satsuya Ohata and Koji Nuida | ACNS 2020 |
68 | On Private Information Retrieval Supporting Range Queries | Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, and Kanta Matsuura | ESORICS 2020 |
69 | Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation | Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Jason Paul Cruz, Naoto Yanai, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, and Goichiro Hanaoka | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
70 | Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials | Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta Matsuura | INDOCRYPT 2020 |
71 | Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation | Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, and Koji Nuida | FC 2021 |
72 | On Limitation of Plausible Deniability | Atsushi Waseda, Ryo Nojima | IWSEC 2020 |
73 | Communication-Efficient Distributed SGD with Error-Feedback, Revisited | Tran Thi Phuong, Le Trieu Phong | International Journal of Computational Intelligence Systems |
74 | A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs. | Shuichi Katsumata. | CRYPTO 2021 |
75 | Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE. | Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, and Shota Yamada. | CRYPTO 2021 |
76 | Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions | Reo Eriguchi, Kazuma Ohara, Shota Yamada, Koji Nuida | CRYPTO 2021 |
77 | A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs. | Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan. | ACM CCS 2021 |
78 | An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks | Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida | IEICE Transactions on Fundamentals of Electronics |
79 | Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing | Kota Sasaki, Koji Nuida | IEICE Transactions on Fundamentals of Electronics |
80 | Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials | Reo Eriguchi, Koji Nuida | ASIACRYPT 2021 |
81 | Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic | Koji Nuida | PKC 2021 |
82 | Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks | Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida | ACM AsiaCCS 2021 |
83 | Evolving Homomorphic Secret Sharing for Hierarchical Access Structures | Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta Matsuura | Advances in Information and Computer Security, IWSEC 2021, Lecture Notes in Computer Science |
84 | Statistical ZAPs from Group-Based Assumptions | Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, and Bogdan Ursu | Theory of Cryptography, TCC 2021, Lecture Notes in Computer Science |
85 | Secure Graph Analysis at Scale | Toshinori Araki, Jun Furukawa, Benny Pinkas, Kazuma Ohara, Hanan Rosemarin, and Hikaru Tsuchida | Proceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021) |
86 | Oblivious Linear Group Actions and Applications | Nuttapong Attrapadung, Goichiro Hanaoaka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob Schuldt, Tadanori Teruya, and Kazunari Tozawa | Proceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021) |
87 | Outlier Detection by Privacy-Preserving Ensemble Decision Tree Using Homomorphic Encryption | Kengo Itokazu, Lihua Wang, Seiichi Ozawa | Proc. of International Joint Conference on Neural Network 2021 |
88 | Efficient Privacy-Preserving Variable-Length Substring Match for Genome Sequence | Yoshiki Nakagawa, Satsuya Ohata, Kana Shimizu | Proceedings of 21st International Workshop on Algorithms in Bioinformatics (WABI 2021) |
89 | How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption | Koji Nuida | Proceedings of The 9th ACM ASIA Public-Key Cryptography Workshop (APKC 2022) |
90 | Decentralized Descent Optimization with Stochastic Gradient Signs for Device-to-Device Networks | Tran Thi Phuong and Le Trieu Phong | EEE Wireless Communications Letters, |
91 | Adaptively secure revocable hierarchical IBE from k-linear assumption | Keita Emura, Atsushi Takayasu, Yohei Watanabe | Designs, Codes and Cryptography |
92 | Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC | Shuntaro Ema, Yuta Sato, Keita Emura, Toshihiro Ohigashi | The 8th International Workshop on Information and Communication Security, WICS 2021 |
93 | Verifiable Functional Encryption Using Intel SGX. | Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote | 15th International Conference on Provable and Practical Security, ProvSec 2021 |
94 | Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics | Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi. | Proceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021) |
95 | Communication-Efficient Distributed SGD with Error-Feedback, Revisited. | Tran Thi Phuong, Le Trieu Phong | International Journal of Computational Intelligence Systems |
Oral Presentations
list
No. | タイトル | 講演者 | 採録先 |
---|---|---|---|
1 | Recent Advances in Attribute-Based Signatures | Yusuke Sakai | APKC 2019 |
2 | 機械学習とセキュリティ | 大畑幸矢 | 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM)・情報理論研究会(IT),旭川市国際会議場 |
3 | プライバシー保護データマイニングにより拡がるビッグデータ解析 | 小澤誠一 | 2019 神戸大学 数理・データサイエンスセンター シンポジウム ~AIセキュリティとフィンテック応用の最前線~,大阪イノベーションハブ |
4 | プライバシー保護データマイニングとデジタルトランスフォーメーション | 小澤誠一 | Society5.0実現のためのセンシングソリューション技術分科会,JEITA,電子情報技術産業協会 |
5 | 生命情報をどのように守り,安全に活用するのか | 清水佳奈 | 生命情報科学若手の会 第11回研究会,富士Calm(カーム)一般財団法人 人材開発センター 富士研修所 |
6 | 人工知能のメカニズムと活用 | 小澤誠一 | 人工知能のメカニズムと活用,日本総研本社 (東京都) |
7 | DXと人工知能のメカニズムと活用 | 小澤誠一 | DX実務者入門講座(第3回),神戸学院大学 神戸三宮サテライト(神戸市) |
8 | Brain-Inspired Neural Network Architectures for Brain Inspired AI | Nikola Kasabov (convener), Zeng-Guang Hou, Minho Lee, Seiichi Ozawa, Jie Yang, David Powers, | ICONIP 2019 |
9 | データ解析におけるプライバシー保護技術とその応⽤ | 小澤誠一 | 第64回システム制御情報学会研究発表講演会 (SCI’20), チュートリアル講演 |
10 | AI基礎研修 -データ解析のためのAI- | 小澤誠一 | 日本テクノセンターAI基礎研修 |
11 | An Introduction to Privacy-Preserving Machine Learning for Big Data Analysis | Seiichi Ozawa | Deep Learning and Artificial Intelligence Summer School 2020 (DLAI3) |
12 | デジタルトランスフォーメーションで求められるAIの役割 | 小澤誠一 | 日本テクノセンターAI基礎研修 |
13 | 三層ニューラルネットワークにおけるRing-LWEベース準同型暗号を用いた効率的なプライバシー保護推論処理 | 手塚 雄大 | 2019年人工知能学会全国大会,朱鷺メッセ (新潟市) |
14 | Towards Privacy-preserving Biomedical Knowledge Integration | Kana Shimizu | JAPAN - NORDIC WORKSHOP ON DIGITAL HEALTH FOR HEALTHY LONGEVITY,Business Finland |
15 | 生体情報セキュリティ | 清水佳奈 | 第58回 日本生体医工学会大会,沖縄コンベンションセンター |
16 | 属性ベース暗号とIntel SGXを用いた堅牢かつ柔軟なアクセス制御を実現するデータ分析プラットフォームの構築 | 岩田大輝 | 情報処理学会 第58回バイオ情報学研究会,沖縄科学技術大学院大学 |
17 | BV-SGX: 生命情報解析向け仮想マシンを搭載したSGXクラウド | 櫻井碧 | 情報処理学会 第58回バイオ情報学研究会,沖縄科学技術大学院大学 |
18 | スケーラブルな二者間秘匿計算のサーバー構成と効率的な通信方法の実装 | 石田祐介 | コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス |
19 | 秘密分散法による秘匿データベース検索の設計と実装 | 森田啓 | コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス |
20 | 近似多ビット乗算と新しい定数ラウンド基本ツールを用いた省ラウンド秘匿除算プロトコル | 樋渡啓太郎 | コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス |
21 | Privacy-Preserving Approximate Nearest Neighbor Search: A Construction and Experimental Results | Ke Huang | コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス |
22 | Ring-LWEベース準同型暗号を用いたプライバシー保護決定木分類 | 福井 智 | コンピュータセキュリティシンポジウム 2019,ハウステンボス |
23 | 秘密分散に基づく秘匿全文検索 | 中川佳貴 | コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス |
24 | RSO-CCA安全性を満たすIDベース暗号 | 原啓祐 | コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス |
25 | 公開鍵長が定数である完全匿名な検証者ローカル失効グループ署名 | 石田愛 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 |
26 | A Private Information Retrieval Scheme Supporting Range Queries | 林田淳一郎 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 |
27 | 事前通信モデルにおけるペアリングを用いない集約署名 | 竹牟禮薫 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 |
28 | エルガマル型暗号文に対する任意関数演算・再暗号化の二者間秘密計算プロトコルとその応用 | 光成滋生 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 |
29 | 非対称3パーティ秘密計算:任意の論理回路が計算可能な秘密分散ベースの定数ラウンドプロトコル | 樋渡啓太郎 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知(CSS2020)※SCIS2020 SCIS論文賞受賞 |
30 | 部分乱数を使って暗号文の正当性を検証可能なタグベース暗号と選択暗号文攻撃に対する安全性への応用 | 松田隆宏 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 |
31 | Query Ahead: 平易な記述が可能な秘匿DB クエリーシステムの設計と実装 | 石田祐介 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 |
32 | Approximate Privacy Preserving Top-k Algorithm with Reduced Communication Rounds | Ke Huang | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 |
33 | Intel SGXを用いた個人ゲノム情報解析システム | 岩田大輝 | 2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知 ※SCIS2020 SCIS論文賞受賞 |
34 | AIのセキュリティとプライバシに関する近年の研究動向:医療データの安全な利活用に向けて | 大畑幸矢 | 第2回日本メディカルAI学会学術集会,東京ビッグサイト TFTホール |
35 | Finding the direct optimal RNA barrier energy and improving pathways with an arbitrary energy model | Hiroki Takizawa, Junichi Iwakiri, Goro Terai, and Kiyoshi Asai | International Society for Computational Biology (ISMB 2020) |
36 | 協調学習スキームを導入したプライバシー保護XGBoost | 山本 楓己, 王 立華, 小澤 誠一 | コンピュータセキュリティシンポジウム 2020 |
37 | 定数ラウンドかつ対数サイズ通信量の秘匿配列アクセスプロトコル | 樋渡啓太郎 | コンピュータセキュリティシンポジウム2020(CSS2020) ※CSS2020 学生論文賞受賞 |
38 | 3次ツイストを利用した効率的なペアリングアルゴリズム | 石井将大,照屋唯紀,安田貴徳 | コンピュータセキュリティシンポジウム2020(CSS2020)※CSS2020奨励賞受賞 |
39 | 落とし戸付き置換に基づく適応的安全な落とし戸付き関数の構成 | 松田隆宏 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) |
40 | CCA安全な鍵付きレベル2準同型暗号の構成 | 前田勇作 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) |
41 | MPCを用いたプライバシー保護付きいつでもどこでもコンテンツ配信 | 小川一人、縫田光司 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) |
42 | On Private Information Retrieval Supporting Multi-dimensional Range Queries | Junichiro Hayata | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) |
43 | Signalに適用可能な耐量子認証鍵交換プロトコルの設計と実装 | 橋本啓太郎 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) ※SCIS2021 SCIS論文賞受賞 |
44 | Lifted-ElGamal暗号を用いた任意関数演算の二者間秘密計算プロトコルのmaliciousモデルにおける効率化 | 光成滋生 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) |
45 | 非対話型秘密計算プロトコルに対する通信量の削減と安全性解析 | 江利口礼央 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) ※SCIS2021 SCIS論文賞受賞 |
46 | 平方剰余に基づくPrivate Simultaneous Messagesについて | 品川和雅 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) |
47 | 秘匿計算における乱数生成サーバーの設計と実装 | 石田祐介 | 2021年暗号と情報セキュリティシンポジウム(SCIS2021) |
48 | 準同型暗号を用いたプライバシー保護決定木アンサンブルによる外れ値検知 | 糸数 健吾, 王 立華, 小澤 誠一 | 2021年 暗号と情報セキュリティシンポジウム(SCIS2021) |
49 | Privacy-Preserving Deep Learning via Additively Homomorphic Encryption | Shiho Moriai | 26th IEEE Symposium on Computer Arithmetic (ARITH 26) |
50 | 安心・安全なSociety 5.0 の実現にむけて ~ プライバシー保護データ解析技術の現在 ~ | 盛合 志帆 | NICTオープンハウス2019 |
51 | 安心・安全なSociety 5.0 の実現にむけて ~プライバシー保護データ解析技術の現在~ | 盛合 志帆 | KIISサイバーセキュリティサロン |
52 | プライバシー保護データ解析技術の社会実装 | 花岡 悟一郎, 盛合 志帆 | JST AIP ネットワークラボ 第4回 JST-NSF-DATAIA国際連携シンポジウム AI研究の最前線 〜超スマート社会実現に向けて〜 |
53 | 新型コロナウィルス対策を踏まえた社会経済の変革 プライバシーに配慮したデータ利活用 | 盛合 志帆 | NICT特別オープンシンポジウム〜アフターコロナ社会のかたち〜 |
54 | プライバシー保護データ解析技術の社会実装 | 盛合 志帆 | JST/CRDSワークショップ Society5.9システムソフトウェア |
55 | COVID-19対策におけるプライバシーに配慮したデータ利活用 | 盛合 志帆 | マルチメディア推進フォーラム |
56 | プライバシー保護データ解析技術の社会実装 | 花岡 悟一郎, 盛合 志帆 | JST CREST人工知能領域成果展開シンポジウム |
57 | 未知の世界のサイバーセキュリティ(パネルディスカッション) | 盛合 志帆 | Cyber Initiative Tokyo 2020 |
58 | k-匿名化と(乱択)決定木の融合について | 野島 良, 王 立華 | 暗号と情報セキュリティシンポジウム2021 |
59 | 秘密計算とそのユースケース | 花岡悟一郎 | デロイトトーマツ セミナー「次世代データ活用とプライバシー強化技術」 |
60 | 秘密計算の原理と最近の動向 | 花岡悟一郎 | 第6回 IoTセキュリティフォーラム 2021 オンライン |
61 | 文字レベル畳み込みニューラルネットによる悪性サイト判定のURL単語頻度に基づく高度化 | 山本 貴巳, 石川 真太郎, 山田 明, 小澤 誠一 | 2021年 暗号と情報セキュリティシンポジウム(SCIS2021) |
62 | 準同型暗号に基づく秘密計算の能動的攻撃者に対する秘匿性について | 縫田 光司 | 2022年暗号と情報セキュリティシンポジウム(SCIS2022) |
63 | デジタルトランスフォーメーションで求められるAIの役割 | 小澤誠一 | 日本テクノセンターAI基礎研修 |
64 | プライバシー保護データ解析技術を活用した不正送金検知精度向上に向けた実証実験について | 盛合 志帆 | 全国地方銀行協会 マネロン等対策WG |
65 | プライバシー保護データ解析技術を活用した不正送金検知精度向上に向けた実証実験について | 盛合 志帆 | デジタルリスクフォーラム2021 |
66 | 動的サンプリングを使用した勾配ブースティング決定木の連合追加学習 | 三浦 啓吾, 王 立華, 小澤 誠一 | 2022年暗号と情報セキュリティシンポジウム(SCIS2022) |
67 | IoT 機器のセキュリティとデータ利活用におけるプライバシー保護 | 盛合 志帆 | 一般社団法人日本計量機器工業連合会 講演会 |
68 | プライバシー保護データ解析技術を活用したIoT機器データ利活用 | 盛合 志帆 | ロボット革命・産業IoTイニシアティブ協議会(RRI) 第41回IoTによる製造ビジネス変革WG会合 |
69 | プライバシー保護連合学習の実証実験について | 盛合 志帆 | 一般社団法人データ社会推進協議会 フォーラム「秘密計算が実現する安心・安全な企業間データ共有」 |
70 | プライバシー保護連合学習技術を活用した実証実験について | 盛合 志帆 | 2022年電子情報通信学会総合大会 |
Posters
list
No. | タイトル | 著者 | 採録先 |
---|---|---|---|
1 | Privacy-preserving Search for Sharing Genetic Variants | Kana Shimizu | The 27th International Conference on Intelligent Systems for Molecular Biology and the 19 th European Conference on Computational Biology (ISMB/ECCB 2019),Congress Center Basel |
2 | Privacy-preserving Naive Bayes Classification using Homomorphic Encryption and Garbled Circuits | Sangwook Kim | The 14th International Workshop on Security (IWSEC2019),Tokyo Institute of Technology |
3 | Intel SGXによるプライバシ保護生命情報解析プラットフォーム | 櫻井碧,岩田大輝 | 第8回生命医薬情報学連合大会,東京工業大学 |
Books
list
No. | タイトル | 講演者 | 採録先 |
---|---|---|---|
1 | Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts | Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, and Nuttapong Attrapadung | Cryptology ePrint Archive: Report 2019/1233 |
2 | Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE | Shweta Agrawal, Monosij Maitra, and Shota Yamada | Cryptology ePrint Archive: Report 2019/629 |
3 | Attribute Based Encryption for Deterministic Finite Automata from DLIN | Shweta Agrawal, Monosij Maitra, and Shota Yamada | Cryptology ePrint Archive: Report 2019/645 |
4 | CCA Security and Trapdoor Functions via Key-Dependent-Message Security | Fuyuki Kitagawa, Takahiro Matsuda, and Keisuke Tanaka | Cryptology ePrint Archive: Report 2019/291 |
5 | CPA-to-CCA Transformation for KDM Security | Fuyuki Kitagawa and Takahiro Matsuda | Cryptology ePrint Archive: Report 2019/609 |
6 | Exploring Constructions of Compact NIZKs from Various Assumptions | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi Yamakawa | Cryptology ePrint Archive: Report 2019/623 |
7 | Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation | Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, and Jacob C. N. Schuldt | Cryptology ePrint Archive: Report 2019/386 |
8 | Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations | Keita Emura, Shuichi Katsumata, and Yohei Watanabe | Cryptology ePrint Archive: Report 2019/1384 |
9 | Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2 | Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, and Keisuke Tanaka | Cryptology ePrint Archive: Report 2019/284 |
10 | Simple and Efficient KDM-CCA Secure Public Key Encryption | Fuyuki Kitagawa, Takahiro Matsuda, and Keisuke Tanaka | Cryptology ePrint Archive: Report 2019/1012 |
11 | Compact NIZKs from Standard Assumptions on Bilinear Maps | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi Yamakawa | Cryptology ePrint Archive: Report 2019/223 |
12 | Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512 | Ali El Kaafarani, Shuichi Katsumata, and Federico Pintore | Cryptology ePrint Archive: Report 2020/124 |
13 | Optimal Broadcast Encryption from Pairings and LWE | Shweta Agrawal and Shota Yamada | Cryptology ePrint Archive: Report 2020/228 |
14 | Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions | Junichi Tomida and Nuttapong Attrapadung | Cryptology ePrint Archive: Report 2020/231 |
15 | Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions | Geoffroy Couteau, Shuichi Katsumata, and Bogdan Ursu | Cryptology ePrint Archive: Report 2020/646 |
16 | Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices | Ward Beullens, Shuichi Katsumata, and Federico Pintore | Cryptology ePrint Archive: Report 2020/646 |
17 | Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves | Daiki Hayashida, Kenichiro Hayasaka, and Tadanori Teruya | Cryptology ePrint Archive: Report 2020/875 |
18 | Circular Security Is Complete for KDM Security | Fuyuki Kitagawa and Takahiro Matsuda | Cryptology ePrint Archive: Report 2020/649 |
19 | Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications | Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, and Thomas Prest | Cryptology ePrint Archive: Report 2020/1107 |
20 | Adaptively Secure Inner Product Encryption from LWE | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi Yamakawa | Cryptology ePrint Archive: Report 2020/1135 |
21 | Optimal Broadcast Encryption from LWE and Pairings in the Standard Model | Shweta Agrawal, Daniel Wichs, and Shota Yamada | Cryptology ePrint Archive: Report 2020/1179 |
22 | Recent Advances in Practical Secure Multi-Party Computation | Satsuya Ohata | IEICE TRANSACTIONS on Fundamentals, vol. E103-A, no. 10, pp.1134-1141, 2020 |
23 | CP-ABE for Circuits (and more) in the Symmetric Key Setting | Shweta Agrawal and Shota Yamada | Cryptology ePrint Archive: Report 2020/1432 |
24 | Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions | Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi Yamakawa | Cryptology ePrint Archive: Report 2021/306 |
25 | Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption | Yusaku Maeda, Koji Nuida | Cryptology ePrint Archive: Report 2021/722 |
26 | An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable | Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, and Thomas Prest | Cryptology ePrint Archive: Report 2021/616, https://eprint.iacr.org/2021/616 |
27 | A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs | Shuichi Katsumata | Cryptology ePrint Archive: Report 2021/927, https://eprint.iacr.org/2021/927 |