Publications

Papers

list
No.タイトル著者採録先
1Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke TanakaAsiaCCS 2019
2Attribute Based Encryption (and more) for Nondeterministic Finite Automata from Learning With ErrorsShweta Agrawal, Monosij Maitra, Shota YamadaCRYPTO 2019
3Exploring Constructions of Compact NIZKs from Various AssumptionsShuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi YamakawaCRYPTO 2019
4CCA Security and Trapdoor Functions via Key-Dependent-Message SecurityFuyuki Kitagawa, Takahiro Matsuda, Keisuke TanakaCRYPTO 2019
5Field Extension in Secret-Shared Form and Its Applications to Efficient Secure ComputationRyo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C.N. SchuldtACISP 2019
※Best Paper Award受賞
6Efficient Estimation of Number of Short Lattice Vectors in Search Space under Randomness Assumption
Yoshitatsu Matsuda, Tadanori Teruya, Kenji KashiwabaraThe 6th ACM ASIA Public-Key Cryptography Workshop (APKC 2019)
7Equivalence between Non-Malleability against Replayable CCA and Other RCCA-security NotionsJunichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta MatsuuraIWSEC 2019
8Privacy-Preserving Deep Learning via Weight TransmissionLe Trieu Phong, Tran Thi PhuongIEEE Transactions on Information Forensics and Security
9Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from LatticesKeita Emura, Shuichi Katsumata, Yohei WatanabeESORICS 2019
10Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions
Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara, Kazumasa Omote, Yusuke Sakai
Security and Communication Networks
11MOBIUS: Model-Oblivious Binarized Neural NetworksH. Kitai, J. Cruz, N. Yanai, N. Nishida, T. Oba, Y. Unagami, T. Teruya, N. Attrapadung, T. Matsuda, G. Hanaoka.IEEE ACCESS
12Client-Aided Two-party Secure Interval Test ProtocolHiraku Morita and Nuttapong AttrapadungCANS 2019
13A New Combiner for Key Encapsulation MechanismsGoichiro HANAOKA,Takahiro Matsuda, Jacob C.N. SchuldtIEICE Transactions
Vol.E102-A,No.12, 2019. 
14Simulation-based receiver selective opening CCA secure PKE from standard computational assumptionsKeisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:Theoretical Computer Science
15Simple and Efficient KDM-CCA Secure Public Key EncryptionFuyuki Kitagawa, Takahiro Matsuda, Keisuke TanakaASIACRYPT 2019
16CPA-to-CCA Transformation for KDM SecurityFuyuki Kitagawa, Takahiro MatsudaTCC 2019
17Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle ModelYusuke SAKAI, Goichiro HANAOKAIEICE Trans. Fundamentals
18Attribute Based Encryption for Deterministic FiniteAutomata fromDLINShweta Agrawal, Monosij Maitra, Shota YamadaTCC 2019
19Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its ApplicationsHiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro HanaokaIEICE Transactions, Vol.E103-A,No.01, 2020.
20Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.Satsuya Ohata, Koji NuidaFC'20
21Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable EncryptionJunichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta MatsuuraIEICE Transactions
22Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512Ali El Kaafarani, Shuichi Katsumata, Federico PintorePKC 2020
23Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker AssumptionsGeoffroy Couteau, Shuichi Katsumata, Bogdan UrsuEUROCRYPT 2020
24Compact NIZKs from Standard Assumptions on Bilinear MapsShuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi YamakawaEUROCRYPT 2020
25Optimal Broadcast Encryption from Pairings and LWEShweta Agrawal, Shota YamadaEUROCRYPT 2020
26Exposing Private User Behaviors of Collaborative Filtering via Model Inversion TechniquesSeira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro HanaokaPoPETS/PETS 2020
27Lattice-based revocable (Hierarchical) IBE with decryption key exposure resistanceShuichi Katsumata, Takahiro Matsuda, AtsushiTakayasuTCS
28Adaptively Secure Constrained Pseudorandom Functions in the Standard ModelAlex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi YamakawaCRYPTO 2020
29Enhanced Secure Comparison Schemes Using Homomorphic EncryptionLihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho MoriaiNBiS2020
30On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity AttacksKeita EmuraIEICE Transactions
31Privacy-Preserving Data Analysis: Providing Traceability without Big BrotherHiromi Arai, Keita Emura, Takuya HayashiIEICE Transactions
32Adaptively Secure Inner Product Encryption from LWEShuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi YamakawaASIACRYPT 2020
33Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and LatticesWard Beullens, Shuichi Katsumata, Federico PintoreASIACRYPT 2020
34Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their ApplicationsShuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest.ASIACRYPT 2020
35Circular Security Is Complete for KDM SecurityFuyuki Kitagawa, Takahiro MatsudaASIACRYPT 2020
36Unbounded Dynamic Predicate Compositions in ABE from Standard AssumptionsNuttapong Attrapadung, Junichi TomidaASIACRYPT 2020
37Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based DefinitionGoichiro Hanaoka, Misaki Komatsu, Kazuma Ohara, Yusuke Sakai, Shota YamadaESORICS 2020
38Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security NotionsJunichiro HAYATA, Fuyuki KITAGAWA, Yusuke SAKAI, Goichiro HANAOKA, Kanta MATSUURAIEICE Trans. Fundamentals
39Achieving Pairing-Free Aggregate Signatures using Pre-Communication between SignersKaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo OhtaProvsec 2020
40NIZK from SNARGFuyuki Kitagawa, Takahiro Matsuda, Takashi YamakawaTCC 2020
41CP-ABE for Circuits (and more) in the Symmetric Key SettingShweta Agrawal; Shota YamadaTCC 2020
42Optimal Broadcast Encryption from LWE and Pairings in the Standard ModelShweta Agrawal; Daniel Wichs; Shota YamadaTCC 2020
43A Note on Subgroup Security in Discrete Logarithm-Based CryptographyTadanori TeruyaIEICE Trans. Fundamentals
44Distributed SignSGD with Improved Accuracy and Network-Fault ToleranceLe Trieu Phong, Tran Thi PhuongIEEE Access
45New Approaches to Federated XGBoost Learning for Privacy-Preserving Data AnalysisFuki Yamamoto, Lihua Wang, and Seiichi OzawaICONIP2020
46Achieving Pairing-Free Aggregate Signatures using Pre-Communication between SignersKaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo OhtaIEICE Trans. Fundamentals
47Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model.Shuichi Katsumata, Shota Yamada, Takashi Yamakawa.Journal of Cryptology(JoC)
48Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa.EUROCRYPT 2021
49An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable.Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest.PKC 2021
50Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics.Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi.ACM CCS 2021
51Receiver Selective Opening Chosen Ciphertext Secure Identity-based EncryptionKeisuke Hara, Takahiro Matsuda, Keisuke Tanaka.APKC 2021
52Recent Advances in Practical Secure Multi-Party ComputationSatsuya OhataIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
53Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret SharingKota Sasaki and Koji Nuida IWSEC 2020
※IWSEC 2020 Best Paper Award受賞,IWSEC 2020 Best Student Paper Award受賞
54RintC: fast and accuracy-aware decomposition of distributions of RNA secondary structures with extended logsumexpHiroki Takizawa, Junichi Iwakiri, and Kiyoshi AsaiBMC Bioinformatics
55Finding the direct optimal RNA barrier energy and improving pathways with an arbitrary energy modelHiroki Takizawa, Junichi Iwakiri, Goro Terai, and Kiyoshi AsaiBioinformatics
56Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCRShuichi Katsumata,Shota Yamada PKC 2019
57Adaptively Single-Key Secure Constrained PRFs for $$\mathrm {NC}^1$$Nuttapong Attrapadung,Takahiro Matsuda,Ryo Nishimaki,Shota Yamada,Takashi YamakawaPKC 2019
58Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman AssumptionsShuichi Katsumata,Ryo Nishimaki,Shota Yamada,Takashi YamakawaEUROCRYPT 2019
59Group Signatures Without NIZK: From Lattices in the Standard ModelShuichi Katsumata,Shota YamadaEUROCRYPT 2019
60A Taxonomy of Secure Two-Party Comparison Protocols and Efficient ConstructionsNuttapong ATTRAPADUNG,Goichiro HANAOKA,Shinsaku KIYOMOTO,Tomoaki MIMOTO,Jacob C. N. SCHULDTIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
61Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle MethodologyKazuma OHARA,Keita EMURA,Goichiro HANAOKA,Ai ISHIDA,Kazuo OHTA,Yusuke SAKAIIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
62A Fast Privacy-Preserving Multi-Layer Perceptron Using Ring-LWE-Based Homomorphic EncryptionTakehiro Tezuka, Lihua Wang, Takuya Hayashi, Seiichi OzawaICDMW2019
63Exploring and Identifying Malicious Sites in Dark Web Using Machine LearningYuki Kawaguchi and Seiichi OzawaICONIP 2019
64Lattice-based revocable (hierarchical) IBE with decryption key exposure resistanceShuichi Katsumata,Takahiro Matsuda,Atsushi TakayasuTheoretical Computer Science
65Simple Black-box Adversarial Examples Generation with Very Few QueriesYuya Senzaki, Satsuya Ohata, Kanta MatsuuraIEICE Transactions on Information and Systems
66Generic hardness of inversion on ring and its relation to self-bilinear mapTakashi Yamakawa, Shota Yamada, Goichiro Hanaoka, and Noboru KunihiroTheoretical Computer Science
67An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building BlocksKeitaro Hiwatashi, Satsuya Ohata and Koji NuidaACNS 2020
68On Private Information Retrieval Supporting Range QueriesJunichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, and Kanta MatsuuraESORICS 2020
69Efficient Secure Neural Network Prediction Protocol Reducing Accuracy DegradationNaohisa Nishida, Tatsumi Oba, Yuji Unagami, Jason Paul Cruz, Naoto Yanai, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, and Goichiro HanaokaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
70Constructive t-secure Homomorphic Secret Sharing for Low Degree PolynomialsKittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta MatsuuraINDOCRYPT 2020
71Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty ComputationReo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, and Koji NuidaFC 2021
72On Limitation of Plausible DeniabilityAtsushi Waseda, Ryo NojimaIWSEC 2020
73Communication-Efficient Distributed SGD with Error-Feedback, RevisitedTran Thi Phuong, Le Trieu PhongInternational Journal of Computational Intelligence Systems
74A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.Shuichi Katsumata.CRYPTO 2021
75Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, and Shota Yamada.CRYPTO 2021
76Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and ExtensionsReo Eriguchi, Kazuma Ohara, Shota Yamada, Koji NuidaCRYPTO 2021
77A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs.Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan.ACM CCS 2021
78An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building BlocksKeitaro Hiwatashi, Satsuya Ohata, Koji Nuida IEICE Transactions on Fundamentals of Electronics
79Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret SharingKota Sasaki, Koji NuidaIEICE Transactions on Fundamentals of Electronics
80Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree PolynomialsReo Eriguchi, Koji Nuida ASIACRYPT 2021
81Cryptographic Pseudorandom Generators Can Make Cryptosystems ProblematicKoji NuidaPKC 2021
82Accelerating Secure (2+1)-Party Computation by Insecure but Efficient
Building Blocks
Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji NuidaACM AsiaCCS 2021
83Evolving Homomorphic Secret Sharing for Hierarchical Access StructuresKittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta MatsuuraAdvances in Information and Computer Security, IWSEC 2021, Lecture Notes in Computer Science
84Statistical ZAPs from Group-Based AssumptionsGeoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, and Bogdan UrsuTheory of Cryptography, TCC 2021, Lecture Notes in Computer Science
85Secure Graph Analysis at ScaleToshinori Araki, Jun Furukawa, Benny Pinkas, Kazuma Ohara, Hanan Rosemarin, and Hikaru TsuchidaProceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021)
86Oblivious Linear Group Actions and ApplicationsNuttapong Attrapadung, Goichiro Hanaoaka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob Schuldt, Tadanori Teruya, and Kazunari TozawaProceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021)
87Outlier Detection by Privacy-Preserving Ensemble Decision Tree Using Homomorphic EncryptionKengo Itokazu, Lihua Wang, Seiichi OzawaProc. of International Joint Conference on Neural Network 2021
88
Efficient Privacy-Preserving Variable-Length Substring Match for Genome SequenceYoshiki Nakagawa, Satsuya Ohata, Kana ShimizuProceedings of 21st International Workshop on Algorithms in Bioinformatics (WABI 2021)
89
How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic EncryptionKoji NuidaProceedings of The 9th ACM ASIA Public-Key Cryptography Workshop
(APKC 2022)
90
Decentralized Descent Optimization with Stochastic Gradient Signs for Device-to-Device NetworksTran Thi Phuong and Le Trieu PhongEEE Wireless Communications Letters,
91
Adaptively secure revocable hierarchical IBE from k-linear assumptionKeita Emura, Atsushi Takayasu, Yohei WatanabeDesigns, Codes and Cryptography
92
Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGCShuntaro Ema, Yuta Sato, Keita Emura, Toshihiro OhigashiThe 8th International Workshop on Information and Communication Security, WICS 2021
93
Verifiable Functional Encryption Using Intel SGX.Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote15th International Conference on Provable and Practical Security, ProvSec 2021
94
Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on BiometricsShuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi.Proceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021)
95
Communication-Efficient Distributed SGD with Error-Feedback, Revisited.Tran Thi Phuong, Le Trieu PhongInternational Journal of Computational Intelligence Systems

Oral Presentations

list
No.タイトル講演者採録先
1Recent Advances in Attribute-Based SignaturesYusuke SakaiAPKC 2019
2機械学習とセキュリティ大畑幸矢電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM)・情報理論研究会(IT),旭川市国際会議場
3プライバシー保護データマイニングにより拡がるビッグデータ解析小澤誠一2019 神戸大学 数理・データサイエンスセンター シンポジウム ~AIセキュリティとフィンテック応用の最前線~,大阪イノベーションハブ
4プライバシー保護データマイニングとデジタルトランスフォーメーション小澤誠一Society5.0実現のためのセンシングソリューション技術分科会,JEITA,電子情報技術産業協会
5生命情報をどのように守り,安全に活用するのか清水佳奈生命情報科学若手の会 第11回研究会,富士Calm(カーム)一般財団法人 人材開発センター 富士研修所
6人工知能のメカニズムと活用小澤誠一人工知能のメカニズムと活用,日本総研本社 (東京都)
7DXと人工知能のメカニズムと活用小澤誠一DX実務者入門講座(第3回),神戸学院大学 神戸三宮サテライト(神戸市)
8Brain-Inspired Neural Network Architectures for Brain Inspired AINikola Kasabov (convener), Zeng-Guang Hou, Minho Lee, Seiichi Ozawa, Jie Yang, David Powers,ICONIP 2019
9データ解析におけるプライバシー保護技術とその応⽤小澤誠一第64回システム制御情報学会研究発表講演会 (SCI’20), チュートリアル講演
10AI基礎研修 -データ解析のためのAI-小澤誠一日本テクノセンターAI基礎研修
11An Introduction to Privacy-Preserving Machine Learning for Big Data AnalysisSeiichi OzawaDeep Learning and Artificial Intelligence Summer School 2020 (DLAI3)
12デジタルトランスフォーメーションで求められるAIの役割小澤誠一日本テクノセンターAI基礎研修
13三層ニューラルネットワークにおけるRing-LWEベース準同型暗号を用いた効率的なプライバシー保護推論処理手塚 雄大2019年人工知能学会全国大会,朱鷺メッセ (新潟市)
14Towards Privacy-preserving Biomedical Knowledge IntegrationKana ShimizuJAPAN - NORDIC WORKSHOP ON DIGITAL HEALTH FOR HEALTHY LONGEVITY,Business Finland
15生体情報セキュリティ清水佳奈第58回 日本生体医工学会大会,沖縄コンベンションセンター
16属性ベース暗号とIntel SGXを用いた堅牢かつ柔軟なアクセス制御を実現するデータ分析プラットフォームの構築岩田大輝情報処理学会 第58回バイオ情報学研究会,沖縄科学技術大学院大学
17BV-SGX: 生命情報解析向け仮想マシンを搭載したSGXクラウド櫻井碧情報処理学会 第58回バイオ情報学研究会,沖縄科学技術大学院大学
18スケーラブルな二者間秘匿計算のサーバー構成と効率的な通信方法の実装石田祐介コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス
19秘密分散法による秘匿データベース検索の設計と実装森田啓コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス
20近似多ビット乗算と新しい定数ラウンド基本ツールを用いた省ラウンド秘匿除算プロトコル樋渡啓太郎コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス
21Privacy-Preserving Approximate Nearest Neighbor Search: A Construction and Experimental ResultsKe Huangコンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス
22Ring-LWEベース準同型暗号を用いたプライバシー保護決定木分類福井 智コンピュータセキュリティシンポジウム 2019,ハウステンボス
23秘密分散に基づく秘匿全文検索中川佳貴コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス
24RSO-CCA安全性を満たすIDベース暗号原啓祐コンピュータセキュリティシンポジウム2019(CSS2019),ハウステンボス
25公開鍵長が定数である完全匿名な検証者ローカル失効グループ署名石田愛2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
26A Private Information Retrieval Scheme Supporting Range Queries林田淳一郎2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
27事前通信モデルにおけるペアリングを用いない集約署名竹牟禮薫2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
28エルガマル型暗号文に対する任意関数演算・再暗号化の二者間秘密計算プロトコルとその応用光成滋生2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
29非対称3パーティ秘密計算:任意の論理回路が計算可能な秘密分散ベースの定数ラウンドプロトコル樋渡啓太郎2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知(CSS2020)※SCIS2020 SCIS論文賞受賞
30部分乱数を使って暗号文の正当性を検証可能なタグベース暗号と選択暗号文攻撃に対する安全性への応用松田隆宏2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
31Query Ahead: 平易な記述が可能な秘匿DB クエリーシステムの設計と実装石田祐介2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
32Approximate Privacy Preserving Top-k Algorithm with Reduced Communication RoundsKe Huang2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
33Intel SGXを用いた個人ゲノム情報解析システム岩田大輝2020年暗号と情報セキュリティシンポジウム(SCIS2020),ザ・クラウンパレス新阪急高知
※SCIS2020 SCIS論文賞受賞
34AIのセキュリティとプライバシに関する近年の研究動向:医療データの安全な利活用に向けて大畑幸矢第2回日本メディカルAI学会学術集会,東京ビッグサイト TFTホール
35Finding the direct optimal RNA barrier energy and improving pathways with an arbitrary energy modelHiroki Takizawa, Junichi Iwakiri, Goro Terai, and Kiyoshi AsaiInternational Society for Computational Biology (ISMB 2020)
36協調学習スキームを導入したプライバシー保護XGBoost山本 楓己, 王 立華, 小澤 誠一コンピュータセキュリティシンポジウム 2020
37定数ラウンドかつ対数サイズ通信量の秘匿配列アクセスプロトコル樋渡啓太郎コンピュータセキュリティシンポジウム2020(CSS2020)
※CSS2020 学生論文賞受賞
383次ツイストを利用した効率的なペアリングアルゴリズム石井将大,照屋唯紀,安田貴徳コンピュータセキュリティシンポジウム2020(CSS2020)※CSS2020奨励賞受賞
39落とし戸付き置換に基づく適応的安全な落とし戸付き関数の構成松田隆宏2021年暗号と情報セキュリティシンポジウム(SCIS2021)
40CCA安全な鍵付きレベル2準同型暗号の構成前田勇作2021年暗号と情報セキュリティシンポジウム(SCIS2021)
41MPCを用いたプライバシー保護付きいつでもどこでもコンテンツ配信小川一人、縫田光司2021年暗号と情報セキュリティシンポジウム(SCIS2021)
42On Private Information Retrieval Supporting Multi-dimensional Range QueriesJunichiro Hayata2021年暗号と情報セキュリティシンポジウム(SCIS2021)
43Signalに適用可能な耐量子認証鍵交換プロトコルの設計と実装橋本啓太郎2021年暗号と情報セキュリティシンポジウム(SCIS2021)
※SCIS2021 SCIS論文賞受賞
44Lifted-ElGamal暗号を用いた任意関数演算の二者間秘密計算プロトコルのmaliciousモデルにおける効率化光成滋生2021年暗号と情報セキュリティシンポジウム(SCIS2021)
45非対話型秘密計算プロトコルに対する通信量の削減と安全性解析江利口礼央2021年暗号と情報セキュリティシンポジウム(SCIS2021)
※SCIS2021 SCIS論文賞受賞
46平方剰余に基づくPrivate Simultaneous Messagesについて品川和雅2021年暗号と情報セキュリティシンポジウム(SCIS2021)
47秘匿計算における乱数生成サーバーの設計と実装石田祐介2021年暗号と情報セキュリティシンポジウム(SCIS2021)
48準同型暗号を用いたプライバシー保護決定木アンサンブルによる外れ値検知糸数 健吾, 王 立華, 小澤 誠一2021年 暗号と情報セキュリティシンポジウム(SCIS2021)
49Privacy-Preserving Deep Learning via Additively Homomorphic EncryptionShiho Moriai26th IEEE Symposium on Computer Arithmetic (ARITH 26)
50安心・安全なSociety 5.0 の実現にむけて ~ プライバシー保護データ解析技術の現在 ~盛合 志帆NICTオープンハウス2019
51安心・安全なSociety 5.0 の実現にむけて ~プライバシー保護データ解析技術の現在~盛合 志帆KIISサイバーセキュリティサロン
52プライバシー保護データ解析技術の社会実装花岡 悟一郎, 盛合 志帆JST AIP ネットワークラボ 第4回 JST-NSF-DATAIA国際連携シンポジウム AI研究の最前線 〜超スマート社会実現に向けて〜
53新型コロナウィルス対策を踏まえた社会経済の変革 プライバシーに配慮したデータ利活用盛合 志帆NICT特別オープンシンポジウム〜アフターコロナ社会のかたち〜
54プライバシー保護データ解析技術の社会実装盛合 志帆JST/CRDSワークショップ Society5.9システムソフトウェア
55COVID-19対策におけるプライバシーに配慮したデータ利活用盛合 志帆マルチメディア推進フォーラム
56プライバシー保護データ解析技術の社会実装花岡 悟一郎, 盛合 志帆JST CREST人工知能領域成果展開シンポジウム
57未知の世界のサイバーセキュリティ(パネルディスカッション)盛合 志帆Cyber Initiative Tokyo 2020
58k-匿名化と(乱択)決定木の融合について野島 良, 王 立華暗号と情報セキュリティシンポジウム2021
59秘密計算とそのユースケース花岡悟一郎デロイトトーマツ セミナー「次世代データ活用とプライバシー強化技術」
60秘密計算の原理と最近の動向花岡悟一郎第6回 IoTセキュリティフォーラム 2021 オンライン
61文字レベル畳み込みニューラルネットによる悪性サイト判定のURL単語頻度に基づく高度化山本 貴巳, 石川 真太郎, 山田 明, 小澤 誠一2021年 暗号と情報セキュリティシンポジウム(SCIS2021)
62準同型暗号に基づく秘密計算の能動的攻撃者に対する秘匿性について縫田 光司2022年暗号と情報セキュリティシンポジウム(SCIS2022)
63デジタルトランスフォーメーションで求められるAIの役割小澤誠一日本テクノセンターAI基礎研修
64プライバシー保護データ解析技術を活用した不正送金検知精度向上に向けた実証実験について盛合 志帆全国地方銀行協会 マネロン等対策WG
65プライバシー保護データ解析技術を活用した不正送金検知精度向上に向けた実証実験について盛合 志帆デジタルリスクフォーラム2021
66動的サンプリングを使用した勾配ブースティング決定木の連合追加学習三浦 啓吾, 王 立華, 小澤 誠一2022年暗号と情報セキュリティシンポジウム(SCIS2022)
67IoT 機器のセキュリティとデータ利活用におけるプライバシー保護盛合 志帆一般社団法人日本計量機器工業連合会 講演会
68プライバシー保護データ解析技術を活用したIoT機器データ利活用盛合 志帆ロボット革命・産業IoTイニシアティブ協議会(RRI) 第41回IoTによる製造ビジネス変革WG会合
69プライバシー保護連合学習の実証実験について盛合 志帆一般社団法人データ社会推進協議会 フォーラム「秘密計算が実現する安心・安全な企業間データ共有」
70プライバシー保護連合学習技術を活用した実証実験について盛合 志帆2022年電子情報通信学会総合大会

Posters

list
No.タイトル著者採録先
1Privacy-preserving Search for Sharing Genetic VariantsKana ShimizuThe 27th International Conference on Intelligent Systems for Molecular Biology and the 19 th European Conference on Computational Biology (ISMB/ECCB 2019),Congress Center Basel
2Privacy-preserving Naive Bayes Classification using Homomorphic Encryption and Garbled CircuitsSangwook KimThe 14th International Workshop on Security (IWSEC2019),Tokyo Institute of Technology
3Intel SGXによるプライバシ保護生命情報解析プラットフォーム櫻井碧,岩田大輝第8回生命医薬情報学連合大会,東京工業大学

Books

list
No.タイトル講演者採録先
1Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type CiphertextsKoji Nuida, Satsuya Ohata, Shigeo Mitsunari, and Nuttapong AttrapadungCryptology ePrint Archive: Report 2019/1233
2Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWEShweta Agrawal, Monosij Maitra, and Shota YamadaCryptology ePrint Archive: Report 2019/629
3Attribute Based Encryption for Deterministic Finite Automata from DLINShweta Agrawal, Monosij Maitra, and Shota YamadaCryptology ePrint Archive: Report 2019/645
4CCA Security and Trapdoor Functions via Key-Dependent-Message SecurityFuyuki Kitagawa, Takahiro Matsuda, and Keisuke TanakaCryptology ePrint Archive: Report 2019/291
5CPA-to-CCA Transformation for KDM SecurityFuyuki Kitagawa and Takahiro MatsudaCryptology ePrint Archive: Report 2019/609
6Exploring Constructions of Compact NIZKs from Various AssumptionsShuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi YamakawaCryptology ePrint Archive: Report 2019/623
7Field Extension in Secret-Shared Form and Its Applications to Efficient Secure ComputationRyo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, and Jacob C. N. SchuldtCryptology ePrint Archive: Report 2019/386
8Identity-Based Encryption with Security against the KGC: A Formal Model and Its InstantiationsKeita Emura, Shuichi Katsumata, and Yohei WatanabeCryptology ePrint Archive: Report 2019/1384
9Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, and Keisuke TanakaCryptology ePrint Archive: Report 2019/284
10Simple and Efficient KDM-CCA Secure Public Key EncryptionFuyuki Kitagawa, Takahiro Matsuda, and Keisuke TanakaCryptology ePrint Archive: Report 2019/1012
11Compact NIZKs from Standard Assumptions on Bilinear MapsShuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi YamakawaCryptology ePrint Archive: Report 2019/223
12Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512Ali El Kaafarani, Shuichi Katsumata, and Federico PintoreCryptology ePrint Archive: Report 2020/124
13Optimal Broadcast Encryption from Pairings and LWEShweta Agrawal and Shota YamadaCryptology ePrint Archive: Report 2020/228
14Unbounded Dynamic Predicate Compositions in ABE from Standard AssumptionsJunichi Tomida and Nuttapong AttrapadungCryptology ePrint Archive: Report 2020/231
15Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker AssumptionsGeoffroy Couteau, Shuichi Katsumata, and Bogdan UrsuCryptology ePrint Archive: Report 2020/646
16Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and LatticesWard Beullens, Shuichi Katsumata, and Federico PintoreCryptology ePrint Archive: Report 2020/646
17Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic CurvesDaiki Hayashida, Kenichiro Hayasaka, and Tadanori TeruyaCryptology ePrint Archive: Report 2020/875
18Circular Security Is Complete for KDM SecurityFuyuki Kitagawa and Takahiro MatsudaCryptology ePrint Archive: Report 2020/649
19Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their ApplicationsShuichi Katsumata, Kris Kwiatkowski, Federico Pintore, and Thomas PrestCryptology ePrint Archive: Report 2020/1107
20Adaptively Secure Inner Product Encryption from LWEShuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi YamakawaCryptology ePrint Archive: Report 2020/1135
21Optimal Broadcast Encryption from LWE and Pairings in the Standard Model Shweta Agrawal, Daniel Wichs, and Shota YamadaCryptology ePrint Archive: Report 2020/1179
22Recent Advances in Practical Secure Multi-Party ComputationSatsuya OhataIEICE TRANSACTIONS on Fundamentals, vol. E103-A, no. 10, pp.1134-1141, 2020
23CP-ABE for Circuits (and more) in the Symmetric Key SettingShweta Agrawal and Shota YamadaCryptology ePrint Archive: Report 2020/1432
24Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard AssumptionsShuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi YamakawaCryptology ePrint Archive: Report 2021/306
25Chosen Ciphertext Secure Keyed Two-Level Homomorphic EncryptionYusaku Maeda, Koji NuidaCryptology ePrint Archive: Report 2021/722
26An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and DeniableKeitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, and Thomas PrestCryptology ePrint Archive: Report 2021/616, https://eprint.iacr.org/2021/616
27A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKsShuichi KatsumataCryptology ePrint Archive: Report 2021/927, https://eprint.iacr.org/2021/927