研究成果 1997 2019

フィルター
会議での発言
2018

Acceleration of index calculus for solving ECDLP over prime fields and its limitation

Kudo, M., Yokota, Y., Takahashi, Y. & Yasuda, M., 1 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (版). Springer Verlag, p. 377-393 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11124 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Discrete Logarithm Problem
Elliptic Curves
Calculus
Polynomials
Summation
3 引用 (Scopus)

An experimental study of Kannan’s embedding technique for the search LWE problem

Wang, Y., Aono, Y. & Takagi, T., 1 1 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings. Qing, S., Liu, D., Mitchell, C. & Chen, L. (版). Springer Verlag, p. 541-553 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10631 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Experimental Study
Enumeration
Learning
Lattice Reduction
Experimental Results
2 引用 (Scopus)

A public-key encryption scheme based on non-linear indeterminate equations

Akiyama, K., Goto, Y., Okumura, S., Takagi, T., Nuida, K. & Hanaoka, G., 1 1 2018, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (版). Springer Verlag, p. 215-234 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10719 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Public Key Encryption
Nonlinear equations
Cryptography
Cryptosystem
Small Solutions

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

Hashimoto, Y., Ikematsu, Y. & Takagi, T., 1 1 2018, Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Proceedings. Yasuda, K. & Inomata, A. (版). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11049 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Signature
Hardness
Attack
Polynomials
Quadratic equation

Development of a dual version of DeepBKZ and its application to solving the LWE challenge

Yasuda, M., Yamaguchi, J., Ooka, M. & Nakamura, S., 1 1 2018, Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Joux, A. (版). Springer Verlag, p. 162-182 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10831 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Decoding
Subroutines
Enumeration
Dual Basis
Pruning

Efficient decryption algorithms for extension field cancellation type encryption schemes

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., 1 1 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (版). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10946 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Field extension
Cancellation
Encryption
Cryptography
Efficient Algorithms
2 引用 (Scopus)

Explicit formula for gram-schmidt vectors in LLL with deep insertions and its applications

Yamaguchi, J. & Yasuda, M., 1 1 2018, Number-Theoretic Methods in Cryptology - 1st International Conference, NuTMiC 2017, Revised Selected Papers. Pieprzyk, J., Pieprzyk, J., Kaczorowski, J. & Pomykała, J. (版). Springer Verlag, p. 142-160 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10737 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Orthogonalization
Subroutines
Insertion
Explicit Formula
Lattice Basis Reduction

Faster PCA and linear regression through hypercubes in HElib

Rathee, D., Mishra, P. K. & Yasuda, M., 10 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 42-53 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

研究成果: 著書/レポートタイプへの貢献会議での発言

Linear regression
Principal component analysis
Cryptography
Outsourcing
Experiments
1 引用 (Scopus)

HFERP - A new multivariate encryption scheme

Ikematsu, Y., Perlner, R., Smith-Tone, D., Takagi, T. & Vates, J., 1 1 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (版). Springer Verlag, p. 396-416 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10786 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Encryption
Cryptography
Blow-up
Attack
Doubling

Solving LWR via BDD strategy: Modulus switching approach

Le, H. Q., Mishra, P. K., Duong, D. H. & Yasuda, M., 1 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (版). Springer Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11124 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Modulus
Modulo
Attack
Hermite
Probability distributions
2017

An estimate of the complexity of the section finding problem on algebraic surfaces

Okumura, S., Akiyama, K. & Takagi, T., 1 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 28-36 9 p. 7818591. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Quantum cryptography
Quantum computers
5 引用 (Scopus)

An experimental study of the BDD approach for the search LWE problem

Xu, R., Yeo, S. L., Fukushima, K., Takagi, T., Seo, H., Kiyomoto, S. & Henricksen, M., 1 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (版). Springer Verlag, p. 253-272 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10355 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Decoding
Experimental Study
Enumeration
Cryptography
Cryptosystem
1 引用 (Scopus)

Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU

Duong, D. H., Yasuda, M. & Takagi, T., 1 1 2017, Information Security - 20th International Conference, ISC 2017, Proceedings. Nguyen, P. Q., Nguyen, P. Q. & Zhou, J. (版). Springer Verlag, p. 79-91 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10599 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Subfield
Attack
Lattice Reduction
Public key
Modulus
2 引用 (Scopus)

Enhancement for secure multiple matrix multiplications over ring-LWE homomorphic encryption

Mishra, P. K., Duong, D. H. & Yasuda, M., 1 1 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (版). Springer Verlag, p. 320-330 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10701 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Homomorphic Encryption
Matrix multiplication
Cryptography
Enhancement
Ring
3 引用 (Scopus)

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card

Yuan, Y., Fukushima, K., Kiyomoto, S. & Takagi, T., 6 16 2017, Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Institute of Electrical and Electronics Engineers Inc., p. 47-50 4 p. 7951796. (Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Quantum cryptography
Data storage equipment
Quantum computers
Smart cards
3 引用 (Scopus)

Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016

Yasuda, M., Shimoyama, T., Takenaka, M., Abe, N., Yamada, S. & Yamaguchi, J., 1 1 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (版). Springer Verlag, p. 409-421 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10701 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Biometrics
Signature Scheme
Attack
Template
Signature
2 引用 (Scopus)

Revisiting the cubic UOV signature scheme

Duong, D. H., Petzoldt, A., Wang, Y. & Takagi, T., 1 1 2017, Information Security and Cryptology – ICISC 2016 - 19th International Conference, Revised Selected Papers. Hong, S. & Park, J. H. (版). Springer Verlag, p. 223-238 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10157 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Quantum computers
Electronic document identification systems
Signature Scheme
Cryptography
Attack
1 引用 (Scopus)

Revisiting the efficient key generation of ZHFE

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., 1 1 2017, Codes, Cryptology and Information Security - 2nd International Conference, C2SI 2017, Proceedings In Honor of Claude Carlet. Nitaj, A., El Hajji, S. & Souidi, E. M. (版). Springer Verlag, p. 195-212 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10194 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Linear algebra
Cryptosystem
Encryption
Efficient Algorithms
1 引用 (Scopus)

Secure and efficient pairing at 256-Bit security level

Kiyomura, Y., Inoue, A., Kawahara, Y., Yasuda, M., Takagi, T. & Kobayashi, T., 1 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (版). Springer Verlag, p. 59-79 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10355 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Pairing
Cryptography
Pairing-based Cryptography
Sieves
Curve

The beauty and the beasts—The hard cases in LLL reduction

Alsayigh, S., Ding, J., Takagi, T. & Wang, Y., 1 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (版). Springer Verlag, p. 19-35 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10418 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Beast
Higher Dimensions
Failure Probability
Geometric Structure
Angle
2016
2 引用 (Scopus)

Comprehensive and improved secure biometric system using homomorphic encryption

Mandal, A., Roy, A. & Yasuda, M., 1 1 2016, Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015 and 4th International Workshop, QASA 2015, Revised Selected Papers. Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. & Garcia-Alfaro, J. (版). Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9481).

研究成果: 著書/レポートタイプへの貢献会議での発言

Homomorphic Encryption
Biometrics
Authentication
Cryptography
Template
1 引用 (Scopus)

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

Yasuda, T., Takagi, T. & Sakurai, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

研究成果: 著書/レポートタイプへの貢献会議での発言

Number theory
Cryptography

Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction

Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., 1 1 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Springer Verlag, p. 305-315 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9836 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Public-key Cryptosystem
Diophantine equation
Cryptanalysis
LLL Algorithm
Cryptography
24 引用 (Scopus)

Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator

Aono, Y., Wang, Y., Hayashi, T. & Takagi, T., 1 1 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J-S. & Fischlin, M. (版). Springer Verlag, p. 789-819 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9665).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cost Estimation
Simulator
Simulators
Costs
Enumeration
1 引用 (Scopus)

Portable Implementation of Lattice-Based Cryptography Using JavaScript

Yuan, Y., Cheng, C. M., Kiyomoto, S., Miyake, Y. & Takagi, T., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 58-67 10 p. 7424690

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Quantum computers
Web browsers
Computer operating systems
Microcontrollers
6 引用 (Scopus)

Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 Fukuoka, Japan, February 24-26, 2016 Proceedings

Takagi, T., 1 1 2016, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Proceedings. Takagi, T. (版). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9606).

研究成果: 著書/レポートタイプへの貢献会議での発言

Quantum Cryptography
Quantum cryptography
Japan
1 引用 (Scopus)

Practical analysis of key recovery attack against search-LWE problem

Kudo, M., Yamaguchi, J., Guo, Y. & Yasuda, M., 1 1 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Yoshioka, K. & Ogawa, K. (版). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9836 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Key Recovery
Attack
Recovery
LLL Algorithm
Lattice Reduction

Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes

Yasuda, M., Shimoyama, T., Abe, N., Yamada, S., Shinzaki, T. & Koshiba, T., 1 1 2016, Foundations and Practice of Security - 8th International Symposium, FPS 2015, Revised Selected Papers. Garcia-Alfaro, J., Bonfante, G. & Kranakis, E. (版). Springer Verlag, p. 117-133 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9482).

研究成果: 著書/レポートタイプへの貢献会議での発言

Error-correcting Codes
Privacy Preserving
Biometrics
Template
Privacy
3 引用 (Scopus)

Privacy-preserving k-nearest neighbour query on outsourced database

Xu, R., Morozov, K., Yang, Y., Zhou, J. & Takagi, T., 1 1 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Liu, J. K. & Steinfeld, R. (版). Springer Verlag, p. 181-197 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9722).

研究成果: 著書/レポートタイプへの貢献会議での発言

Privacy Preserving
Information management
Nearest Neighbor
Query
Data privacy
3 引用 (Scopus)

Reducing the key size of the SRP encryption scheme

Duong, D. H., Petzoldt, A. & Takagi, T., 1 1 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Liu, J. K. & Steinfeld, R. (版). Springer Verlag, p. 427-434 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9723).

研究成果: 著書/レポートタイプへの貢献会議での発言

Encryption
Cryptography
Public key cryptography
Polynomials
Public key
2015
12 引用 (Scopus)

Secure statistical analysis using RLWE-based homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 1 1 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Foo, E. & Stebila, D. (版). Springer Verlag, p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9144).

研究成果: 著書/レポートタイプへの貢献会議での発言

Homomorphic Encryption
Cryptography
Statistical Analysis
Statistical methods
Integer
2014
8 引用 (Scopus)

Efficient variant of rainbow without triangular matrix representation

Yasuda, T., Takagi, T. & Sakurai, K., 1 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8407 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Triangular matrix
Matrix Representation
Cryptography
Public-key Cryptosystem
Signature
18 引用 (Scopus)

Parallel gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice

Ishiguro, T., Kiyomoto, S., Miyake, Y. & Takagi, T., 1 1 2014, Public-Key Cryptography, PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer Verlag, p. 411-428 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8383 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Lattice Ideal
Sieves
Sieve
Gauss
Thread
2013
6 引用 (Scopus)

Attacks on multi-prime RSA with small prime difference

Zhang, H. & Takagi, T., 9 26 2013, Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings. p. 41-56 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7959 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Attack
Exponent
Modulus
Fermat
Factoring
9 引用 (Scopus)

A variant of rainbow with shorter secret key and faster signature generation

Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 5 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Quantum cryptography
2 引用 (Scopus)

Batch verification suitable for efficiently verifying a limited number of signatures

Hakuta, K., Katoh, Y., Sato, H. & Takagi, T., 4 15 2013, Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers. p. 425-440 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7839 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Batch
Signature
Electronic document identification systems
Digital Signature
Elliptic Curves
1 引用 (Scopus)

Efficient algorithm for Tate pairing of composite order

Kiyomura, Y. & Takagi, T., 12 1 2013, Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Proceedings. p. 201-216 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8231 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Tate Pairing
Efficient Algorithms
Composite
Composite materials
Pairing
5 引用 (Scopus)

Extended algorithm for solving underdefined multivariate quadratic equations

Miura, H., Hashimoto, Y. & Takagi, T., 9 26 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 118-135 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7932 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Quadratic equation
Cryptography
Public-key Cryptosystem
Polynomials
Galois field
9 引用 (Scopus)

Improvement of Faugère et al.'s method to solve ECDLP

Huang, Y. J., Petit, C., Shinohara, N. & Takagi, T., 12 1 2013, Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Proceedings. p. 115-132 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8231 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Discrete Logarithm Problem
Elliptic Curves
Cryptography
Polynomials
Data storage equipment
9 引用 (Scopus)

Multivariate signature scheme using quadratic forms

Yasuda, T., Takagi, T. & Sakurai, K., 9 26 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. 巻 7932 LNCS. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7932 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Signature Scheme
Quadratic form
Cryptography
Public-key Cryptosystem
Equivalence classes
8 引用 (Scopus)

On cheater identifiable secret sharing schemes secure against rushing adversary

Xu, R., Morozov, K. & Takagi, T., 12 1 2013, Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Proceedings. p. 258-271 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8231 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Secret Sharing Scheme
Strengthening
Attack
Demonstrate
1 引用 (Scopus)

On zero-knowledge identification based on q-ary syndrome decoding

Hu, R., Morozov, K. & Takagi, T., 1 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 12-18 7 p. 6621646. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

研究成果: 著書/レポートタイプへの貢献会議での発言

Decoding
Cryptography
Communication
Costs
27 引用 (Scopus)

Packed homomorphic encryption based on ideal lattices and its application to biometrics

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 12 1 2013, Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Proceedings. p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8128 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Lattice Ideal
Homomorphic Encryption
Hamming Distance
Biometrics
Hamming distance
1 引用 (Scopus)

Post-quantum strongly unforgeable identity-based signature scheme from lattices without random oracles

Liu, Z., Zhang, X. & Takagi, T., 12 16 2013, Proceedings - 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013. p. 578-585 8 p. 6630490. (Proceedings - 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Simulators
Hardness
1 引用 (Scopus)

Proof of plaintext knowledge for code-based public-key encryption revisited

Hu, R., Morozov, K. & Takagi, T., 5 27 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 535-540 6 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
25 引用 (Scopus)

Secure k-NN computation on encrypted cloud data without sharing key with query users

Zhu, Y., Xu, R. & Takagi, T., 2013, Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing. p. 55-60 6 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Cloud computing
2012
1 引用 (Scopus)

Application of scalar multiplication of edwards curves to pairing-based cryptography

Yasuda, T., Takagi, T. & Sakurai, K., 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. 巻 7631 LNCS. p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7631 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Pairing-based Cryptography
Scalar multiplication
Cryptography
Curve
Pairing
19 引用 (Scopus)

Breaking pairing-based cryptosystems using ηT pairing over GF(397)

Hayashi, T., Shimoyama, T., Shinohara, N. & Takagi, T., 12 31 2012, Advances in Cryptology, ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 43-60 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7658 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Pairing-based Cryptosystems
Sieves
Sieve
Function Fields
Pairing
4 引用 (Scopus)

Efficient secure primitive for privacy preserving distributed computations

Zhu, Y., Takagi, T. & Huang, L., 11 9 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. p. 233-243 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7631 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Distributed Computation
Privacy Preserving
Scalar, inner or dot product
Experiments
Homomorphic
7 引用 (Scopus)

Key length estimation of pairing-based cryptosystems using η T pairing

Shinohara, N., Shimoyama, T., Hayashi, T. & Takagi, T., 4 11 2012, Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Proceedings. p. 228-244 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7232 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Pairing-based Cryptosystems
Sieves
Pairing
Sieve
Cryptography