研究成果 1997 2019

フィルター
記事
2019
Insertion
Polynomial time
Lattice Basis Reduction
Polynomials
Output

The secure parameters and efficient decryption algorithm for multivariate public key cryptosystem EFC

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., 1 1 2019, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1028-1036 9 p.

研究成果: ジャーナルへの寄稿記事

Public-key Cryptosystem
Field extension
Cancellation
Cryptography
Efficient Algorithms
2018

An efficient key generation of ZHFE public key cryptosystem

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., 1 1 2018, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 29-38 10 p.

研究成果: ジャーナルへの寄稿記事

Public-key Cryptosystem
Cryptography
Linear algebra
Cryptosystem
Encryption

Recent developments in post-quantum cryptography

Takagi, T., 1 1 2018, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 3-11 9 p.

研究成果: ジャーナルへの寄稿記事

Quantum Cryptography
Quantum cryptography
Cryptography
Quantum computers
Quantum Computer

Security analysis of cryptosystems using short generators over ideal lattices

Okumura, S., Sugiyama, S., Yasuda, M. & Takagi, T., 7 1 2018, : : Japan Journal of Industrial and Applied Mathematics. 35, 2, p. 739-771 33 p.

研究成果: ジャーナルへの寄稿記事

Lattice Ideal
Cyclotomic Fields
Security Analysis
Cryptosystem
Cryptography

Some properties of τ -adic expansions on hyperelliptic Koblitz curves

Hakuta, K., Sato, H. & Takagi, T., 10 1 2018, : : Journal of Applied Mathematics and Computing. 58, 1-2, p. 367-388 22 p.

研究成果: ジャーナルへの寄稿記事

Hyperelliptic Curves
Concretes
Elliptic Curve Cryptosystem
Cryptography
Hamming Weight
2017
3 引用 (Scopus)

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 3 1 2017, : : Journal of Mathematical Cryptology. 11, 1, p. 1-24 24 p.

研究成果: ジャーナルへの寄稿記事

Vector Lattice
Random Sampling
Decrease
Strictly
Sampling

Application of mixed integer quadratic program to shortest vector problems

Kimura, K., Waki, H. & Yasuda, M., 2017, (受理済み/印刷中) : : JSIAM Letters.

研究成果: ジャーナルへの寄稿記事

CyclicSRP - A multivariate encryption scheme with a partially cyclic public key

Duong, D. H., Petzoldt, A. & Takagi, T., 12 1 2017, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 12, p. 2691-2698 8 p.

研究成果: ジャーナルへの寄稿記事

Public key cryptography
Public key
Encryption
Cryptography
Public Key Cryptography
7 引用 (Scopus)

Efficient outsourcing of secure k-nearest neighbour query over encrypted database

Xu, R., Morozov, K., Yang, Y., Zhou, J. & Takagi, T., 8 1 2017, : : Computers and Security. 69, p. 65-83 19 p.

研究成果: ジャーナルへの寄稿記事

Outsourcing
outsourcing
Data privacy
Random access storage
Cloud computing
1 引用 (Scopus)

Full cryptanalysis of hash functions based on cubic Ramanujan graphs

Jo, H., Petit, C. & Takagi, T., 9 1 2017, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 9, p. 1891-1899 9 p.

研究成果: ジャーナルへの寄稿記事

Ramanujan Graphs
Hash functions
Cubic Graph
Cryptanalysis
Hash Function

Representation growth of the Heisenberg group over O[x]/(x3)

Dung, D. H., 4 1 2017, : : Journal of Algebra and its Applications. 16, 4, 1750077.

研究成果: ジャーナルへの寄稿記事

Heisenberg Group
Number field
Riemann zeta function
Ring
Integer
1 引用 (Scopus)

Secret sharing with cheaters using multi-receiver authentication

Xu, R., Morozov, K. & Takagi, T., 1 1 2017, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 1, p. 115-125 11 p.

研究成果: ジャーナルへの寄稿記事

Secret Sharing Scheme
Secret Sharing
Authentication
Receiver
Authentication Codes
1 引用 (Scopus)
Hamming distance
Biometrics
Cryptography
Authentication
Encryption
42 引用 (Scopus)

Securing the Internet of Things in a Quantum World

Cheng, C., Lu, R., Petzoldt, A. & Takagi, T., 2 1 2017, : : IEEE Communications Magazine. 55, 2, p. 116-120 5 p., 7842421.

研究成果: ジャーナルへの寄稿記事

Quantum computers
Cryptography
Internet of things
Communication
7 引用 (Scopus)

Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups

Duong, D. H. & Voll, C., 1 1 2017, : : Transactions of the American Mathematical Society. 369, 9, p. 6327-6349 23 p.

研究成果: ジャーナルへの寄稿記事

G-convergence
Abscissa
Finitely Generated Group
Nilpotent Group
Twist
2016

Applications of fully homomorphic encryption

Yasuda, M., 12 1 2016, : : Journal of the Institute of Electronics, Information and Communication Engineers. 99, 12, p. 1167-1175 9 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
4 引用 (Scopus)

Computational hardness of IFP and ECDLP

Yasuda, M., Shimoyama, T., Kogure, J. & Izu, T., 12 1 2016, : : Applicable Algebra in Engineering, Communications and Computing. 27, 6, p. 493-521 29 p.

研究成果: ジャーナルへの寄稿記事

Integer Factorization
Discrete Logarithm Problem
Factorization
Elliptic Curves
Hardness
10 引用 (Scopus)

Efficient Deniably Authenticated Encryption and Its Application to E-Mail

Li, F., Zhong, D. & Takagi, T., 11 1 2016, : : IEEE Transactions on Information Forensics and Security. 11, 11, p. 2477-2486 10 p., 7499859.

研究成果: ジャーナルへの寄稿記事

Electronic mail
Authentication
Electronic document identification systems
Cryptography
Internet
6 引用 (Scopus)

Efficient Secure Matrix Multiplication over LWE-Based Homomorphic Encryption

Duong, D. H., Mishra, P. K. & Yasuda, M., 9 1 2016, : : Tatra Mountains Mathematical Publications. 67, 1, p. 69-83 15 p.

研究成果: ジャーナルへの寄稿記事

Homomorphic Encryption
Matrix multiplication
Packing
Confidentiality
Scalar, inner or dot product

Finiteness of Profinite Groups with a Rational Probabilistic Zeta Function

Dung, D. H., 2 1 2016, : : Communications in Algebra. 44, 2, p. 787-795 9 p.

研究成果: ジャーナルへの寄稿記事

Profinite Groups
Maximal Subgroup
Finiteness
Riemann zeta function
Class

On tameness of matsumoto-imai central maps in three variables over the finite field F2

Hakuta, K., Sato, H. & Takagi, T., 5 1 2016, : : Advances in Mathematics of Communications. 10, 2, p. 221-228 8 p.

研究成果: ジャーナルへの寄稿記事

Problem Decomposition
Public-key Cryptosystem
Cryptography
Galois field
Automorphisms

Recognizing PSL(2, p) in the non-Frattini chief factors of finite groups

Dung, D. H., 3 1 2016, : : Archiv der Mathematik. 106, 3, p. 201-208 8 p.

研究成果: ジャーナルへの寄稿記事

Finite Group
5 引用 (Scopus)

Revocable and strongly unforgeable identity-based signature scheme in the standard model

Liu, Z., Zhang, X., Hu, Y. & Takagi, T., 9 25 2016, : : Security and Communication Networks. 9, 14, p. 2422-2433 12 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Hardness
43 引用 (Scopus)

Secure and controllable k-NN query over encrypted cloud data with key confidentiality

Zhu, Y., Huang, Z. & Takagi, T., 3 1 2016, : : Journal of Parallel and Distributed Computing. 89, p. 1-12 12 p.

研究成果: ジャーナルへの寄稿記事

Confidentiality
Nearest Neighbor
Servers
Query
Data privacy
15 引用 (Scopus)

Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding

Cheng, C., Lee, J., Jiang, T. & Takagi, T., 5 2016, : : IEEE Transactions on Information Forensics and Security. 11, 5, p. 993-1002 10 p., 7373629.

研究成果: ジャーナルへの寄稿記事

Network coding
Authentication
Pollution
Communication
Costs

Torsion points and reduction of elliptic curves

Yasuda, M., 1 1 2016, : : Acta Arithmetica. 176, 1, p. 89-100 12 p.

研究成果: ジャーナルへの寄稿記事

Torsion Points
Elliptic Curves
2015

A multivariate quadratic challenge toward post-quantum generation cryptography

Yasuda, T., Dahan, X., Huang, Y. J., Takagi, T. & Sakurai, K., 9 1 2015, : : ACM Communications in Computer Algebra. 49, 3, p. 105-107 3 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Signature
Quantum Cryptography
One-way Function
Public Key Cryptography

Biometric key-binding using lattice masking

Yasuda, M. & Sugimura, Y., 12 1 2015, : : Security and Communication Networks. 8, 18, p. 3405-3414 10 p.

研究成果: ジャーナルへの寄稿記事

Biometrics
5 引用 (Scopus)

Efficient scalar product protocol and its privacy-preserving application

Zhu, Y. & Takagi, T., 1 1 2015, : : International Journal of Electronic Security and Digital Forensics. 7, 1, p. 1-19 19 p.

研究成果: ジャーナルへの寄稿記事

privacy
fairness
Experiments
candidacy
experiment

Key leakage-resilient secure cryptosystem with hierarchical wildcard pattern delegation

Zhang, M. W., Wang, C. Z., Yang, B. & Takagi, T., 1 1 2015, : : Ruan Jian Xue Bao/Journal of Software. 26, 5, p. 1196-1212 17 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Concretes
14 引用 (Scopus)

New packing method in somewhat homomorphic encryption and its applications

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 9 10 2015, : : Security and Communication Networks. 8, 13, p. 2194-2213 20 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Hamming distance
Pattern matching
Biometrics
Cloud computing

Note on some recent cheater identifiable secret sharing schemes

Xu, R., Morozov, K. & Takagi, T., 8 1 2015, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E98A, 8, p. 1814-1819 6 p.

研究成果: ジャーナルへの寄稿記事

Secret Sharing Scheme
Reed-Solomon codes
Reed-Solomon Codes
Coding Theory
Error Detection
1 引用 (Scopus)

Privacy-preserving and adaptively-secure encryptions with Deterministic Finite Automata policy and their applications

Zhang, M. W., Yang, B., Wang, C. Z. & Takagi, T., 4 1 2015, : : Jisuanji Xuebao/Chinese Journal of Computers. 38, 4, p. 897-908 12 p.

研究成果: ジャーナルへの寄稿記事

Finite automata
Cryptography
DNA
2 引用 (Scopus)

Revocable identity-based signcryption scheme without random oracles

Zhang, X., Liu, Z., Hu, Y. & Takagi, T., 1 1 2015, : : International Journal of Network Security. 17, 2, p. 110-122 13 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Hardness

Searchable encryption: A technology that enables searches on encrypted data

Kogure, J., Shimoyama, T. & Yasuda, M., 3 1 2015, : : Journal of the Institute of Electronics, Information and Communication Engineers. 98, 3, p. 202-206 5 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
1 引用 (Scopus)

Zero-knowledge protocols for code-based public-key encryption

Hu, R., Morozov, K. & Takagi, T., 10 1 2015, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E98A, 10, p. 2139-2151 13 p.

研究成果: ジャーナルへの寄稿記事

Zero-knowledge
Public Key Encryption
Cryptography
Encryption
Quantum Cryptography
2014
1 引用 (Scopus)

Anonymous encryption with partial-order subset delegation and its application in privacy email systems

Zhang, M., Nishide, T., Yang, B. & Takagi, T., 1 1 2014, : : IET Information Security. 8, 4, p. 240-249 10 p.

研究成果: ジャーナルへの寄稿記事

Electronic mail
Cryptography
5 引用 (Scopus)

Anonymous spatial encryption under affine space delegation functionality with full security

Zhang, M., Yang, B. & Takagi, T., 9 1 2014, : : Information Sciences. 277, p. 715-730 16 p.

研究成果: ジャーナルへの寄稿記事

Delegation
Affine Space
Encryption
Cryptography
Confidentiality
1 引用 (Scopus)
Quadratic equation
Polynomial-time Algorithm
Odd
Polynomials
Range of data

Collaborative agglomerative document clustering with limited information disclosure

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 1 1 2014, : : Security and Communication Networks. 7, 6, p. 964-978 15 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Data mining
Scalability
Computational complexity
Processing

Efficient algorithm for tate pairing of composite order

Kiyomura, Y. & Takagi, T., 10 1 2014, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E97A, 10, p. 2055-2063 9 p.

研究成果: ジャーナルへの寄稿記事

Tate Pairing
Efficient Algorithms
Composite
Composite materials
Pairing
1 引用 (Scopus)

Efficient privacy-preserving reputation evaluation in decentralized environments

Zhu, Y. & Takagi, T., 1 2014, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E97-A, 1, p. 409-412 4 p.

研究成果: ジャーナルへの寄稿記事

Privacy Preserving
Decentralized
Communication
Evaluation
Casting
10 引用 (Scopus)

Efficient variant of Rainbow using sparse secret keys

Yasuda, T., Takagi, T. & Sakurai, K., 9 1 2014, : : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5, 3, p. 3-13 11 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Quantum cryptography
Electronic document identification systems
1 引用 (Scopus)

Extended algorithm for solving underdefined multivariate quadratic equations

Miura, H., Hashimoto, Y. & Takagi, T., 1 1 2014, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E97-A, 6, p. 1418-1425 8 p.

研究成果: ジャーナルへの寄稿記事

Quadratic equation
Cryptography
Public-key Cryptosystem
Polynomials
Galois field

Fully secure constructions of spatial encryption with vector privacy

Zhang, M., Wang, C., Yang, B. & Takagi, T., 12 1 2014, : : International Journal of Communication Systems. 27, 12, p. 4307-4327 21 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
Composite materials

Generic constructions and transformations of decryption consistent encryption

Zhang, M., Morozov, K. & Takagi, T., 1 1 2014, : : IETE Journal of Research. 60, 3, p. 218-228 11 p.

研究成果: ジャーナルへの寄稿記事

Encryption
Cryptography
Attack
Public Key Encryption
Receiver
7 引用 (Scopus)

Improved attacks on multi-prime rsa with small prime difference

Zhang, H. & Takagi, T., 1 1 2014, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E97-A, 7, p. 1533-1541 9 p.

研究成果: ジャーナルへの寄稿記事

Attack
Exponent
Fermat
Factoring
Modulus
2 引用 (Scopus)

Key length estimation of pairing-based cryptosystems using ?t pairing over GF(3n)

Shinohara, N., Shimoyama, T., Hayashi, T. & TakagI, T., 1 1 2014, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E97-A, 1, p. 236-244 9 p.

研究成果: ジャーナルへの寄稿記事

Pairing-based Cryptosystems
Sieves
Pairing
Sieve
Cryptography
2 引用 (Scopus)

On normal subgroups of division rings which are radical over a proper division subring

Bien, M. & Dung, D., 6 1 2014, : : Studia Scientiarum Mathematicarum Hungarica. 51, 2, p. 231-242 12 p.

研究成果: ジャーナルへの寄稿記事

Division ring or skew field
Subring
Normal subgroup
Division
Generalise