Takagi-Takayasu Laboratory Mathematical Informatics 1st Laboratory

2021 -

2024

  • Quan Yuan, Chao Sun, Tsuyoshi Takagi, "Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks", The 29th Australasian Conference on Information Security and Privacy, ACISP24, to appear.
  • Hiroki Furue, Momonari Kudo, "Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings", 15th International Conference on Post-Quantum Cryptography, PQCrypto 2024, to appear.
  • Ren Taguchi, Atsushi Takayasu, "Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain", Quantum Information Processing, to appear.
  • Ryo Ohashi, Shushi Harashita, "Differential forms on the curves associated to Appell-Lauricella hypergeometric series and the Cartier operator on them", Yokohama Mathematical Journal, to appear.
  • Yuta Kambe, Akira Katayama, Yusuke Aikawa, Yuki Ishihara, Msaaya Yasuda, Kazuhiro Yokoyama, "Computing Endomorphism Rings of Supersingular Elliptic Curves by Finding Cycles in Concatenated Supersingular Isogeny Graphs", Commentarii mathematici Universitatis Sancti Pauli, to appear.
  • Yusuke Aikawa, Ryokichi Tanaka, Takuya Yamauchi, "Isogeny Graphs on Superspecial Abelian Varieties: Eigenvalues and Connection to Bruhat-Tits buildings", Canadian Journal of Mathematics, to appear.
  • Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone, "Improved Cryptanalysis of HFERP", 27th International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, LNCS 14601, pp.413-440, 2024.
  • Ren Taguchi, Atsushi Takayasu, "On the Untapped Potential of the Quantum FLT-based Inversion", 22nd International Conference on Applied Cryptography and Network Security, ACNS2024, LNCS 14584, pp.79-100, 2024.
  • Yen-Ting Kuo, Atsushi Takayasu, "A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis", The 26th Annual International Conference on Information Security and Cryptology, ICISC 2023, LNCS 14561, pp.202-220, 2024.
  • Kyoichi Asano, Keita Emura, Atsushi Takayasu, "More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model", IEICE Transactions, Vol.E107–A, No.3, pp.248-259, 2024.

2023

  • Keyang Liu, Maxim Jourenko, Mario Larangeira, "Reducing Latency of DAG-based Consensus in the Asynchronous Setting via the UTXO Model", The 21th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE ISPA 2023, 2023.
  • Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan, "Improving Privacy of Anonymous Proof-of-Stake Protocols", 22nd International Conference on Cryptology and Network Security, CANS 2023, LNCS 14342, pp.368–391, 2023.
  • Keyang Liu, Xingxin Li, Tsuyoshi Takagi, "Robust Property-Preserving Hash Meets Homomorphism", The 26th Information Security Conference, ISC 2023, LNCS 14411, pp. 537–556, 2023.
  • Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", Finite Fields and Their Applications, Vol.92, Article 102310, pp.1-45, 2023.
  • Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, "Efficient Noise Generation Protocols for Differentially Private Multiparty Computation", IEEE Transactions on Dependable and Secure Computing, Vol.20, No.6, pp.4486 - 4501, 2023.
  • Kosuke Sakata, "Development of Hybrid Approach for solving MQ Problem: Intermediate Hybrid Approach", JSIAM Letters, Vol.15, pp.109-112, 2023.
  • Momonari Kudo, Tasuku Nakagawa, Tsuyoshi Takagi, "Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing C6", Mathematics in Computer Science, Vol.17, Article Number 21, 2023.
  • Hiroki Furue, Yasuhiko Ikematsu, "A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack", The 18th International Workshop on Security, IWSEC 2023, LNCS 14128, pp.101–116, 2023.
  • Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi, "Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors", The 18th International Workshop on Security, IWSEC 2023, LNCS 14128, pp.117-136, 2023.
  • Yusuke Aikawa, Hyungrok Jo, Shohei Satake, "Left-Right Cayley Hashing: A New Framework for Provably Secure Hash Functions", 5th International Workshop on Mathematical Cryptology, MathCrypt 2023, 2023.
  • Yuta Kambe, Akira Katayama, Yusuke Aikawa, Yuki Ishihara, Masaya Yasuda, Kazuhiro Yokoyama, "Solving the supersingular isogeny problem over $\mathbb{F}_p$ via the Deuring correspondence (Short paper)", 5th International Workshop on Mathematical Cryptology, MathCrypt 2023, 2023.
  • Hiroki Furue, Tsuyoshi Takagi, "Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields", The 14th International Conference on Post-Quantum Cryptography, PQCrypto 2023, LNCS 14154, pp.357-378, 2023.
  • Saki Otsuki, Hiroshi Onuki, Tsuyoshi Takagi, "Improvement of the Square-Root Vélu Formulas for Isogeny-Based Cryptography", JSIAM Letters, Vol.15, pp.61-64, 2023.
  • Keitaro Hiwatashi and Koji Nuida, "Exponential Correlated Randomness is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation", Conference on Information-Theoretic Cryptography 2023, ITC 2023, No.18, pp.18:1–18:16, 2023.
  • Quan Yuan, Mehdi Tibouchi, Masayuki Abe, "Quantum-access Security of Hash-based Signature Schemes", 28th Australasian Conference on Information Security and Privacy, ACISP 2023, LNCS 13915, pp.343–380, 2023.
  • Naoto Kimura, Atsushi Takayasu, Tsuyoshi Takagi, "Memory-Efficient Quantum Information Set Decoding Algorithm", 28th Australasian Conference on Information Security and Privacy, ACISP 2023, LNCS 13915, pp.452–468, 2023.
  • Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence", 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, LNCS 13905, pp.695–724, 2023.
  • Keitaro Hiwatashi, Koji Nuida, "Explicit and Nearly Tight Lower Bound for 2-party Perfectly Secure FSS", 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, LNCS 13906, pp.541–554, 2023.
  • Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit, "M-SIDH and MD-SIDH: countering SIDH attacks by masking information", the 42nd Annual International Conference on the Theory and Applications of Cryptology and Information Security, EUROCRYPT 2023, LNCS 14008, pp.282–309, 2023.
  • Ren Taguchi, Atsushi Takayasu, "Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain", RSA Conference 2020 Cryptographer's Track, CT-RSA 2023, LNCS 13871, pp.57–83, 2023.
  • Reo Eriguchi, Noboru Kunihiro, Koji Nuida, "Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures", Designs, Codes and Cryptography, Vol.91, pp.1751–1778, 2023.
  • Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi, "Recent Progress in the Security Evaluation of Multivariate Public-Key Cryptography", IET Information Security, Vol.17, No.2, pp.210-226, 2023.
  • Keita Emura, Atsushi Takayasu, "A Generic Construction of CCA-secure Identity-based Encryption with Equality Test against Insider Attacks", IEICE Transactions, Vol.E106–A, No.3, pp.193-202, 2023.
  • Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi, "Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption", IEICE Transactions, Vol.E106–A, No.3, pp.228-240, 2023.
  • Reo Eriguchi, Noboru Kunihiro, Koji Nuida, "Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR", IEICE Transactions, Vol.E106–A, No.3, pp.263-271, 2023.
  • Ryo Ohashi, Momonari Kudo, Shushi Harashita, "Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4", International Workshop on the Arithmetic of Finite Fields, WAIFI 2022, LNCS 13638, pp.107–124, 2023.
  • Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi, "L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space", Discrete Applied Mathematics, Vol.328, pp.70-88, 2023.
  • Jintai Ding, Seungki Kim, TsuyoshiTakagi, Yuntao Wang, Bo-yin Yang, "A Physical Study of the LLL Algorithm", Journal of Number Theory, Vol.244, pp.339-368, 2023.
  • Hiroki Furue, Yasuhiko Ikematsu, Fumitaka Hoshino, Yutaro Kiyomura, Tsunekazu Saito, Tsuyoshi Takagi, "Secure Parameters for Multivariate Polynomial Signature Scheme QR-UOV", 2023 Symposium on Cryptography and Information Security, SCIS 2023, 1A1-4, 2023. (pdf)
  • Fumitaka Hoshino, Hiroki Furue, Yasuhiko Ikematsu, Tsunekazu Saito, Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Software Implementation of Signature Scheme QR-UOV", 2023 Symposium on Cryptography and Information Security, SCIS 2023, 1A1-5, 2023. (pdf)

2022

  • Momonari Kudo, Shushi Harashita, "Algorithmic study of superspecial hyperelliptic curves over finite fields", Commentarii mathematici Universitatis Sancti Pauli, Vol.70, pp.49-64, 2022.
  • Kyoichi Asano, Keita Emura, Atsushi Takayasu, "More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model", The 24th International Conference on Information Security, ISC 2022, LNCS 13640, pp.75-83, 2022.
  • Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, "On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR", The twentieth Theory of Cryptography Conference, TCC 2022, LNCS 13749, pp.60-88, 2022.
  • Momonari Kudo, Shushi Harashita, "Superspecial Trigonal Curves of Genus 5", Experimental Mathematics, Vol.31(3), pp.908-919, 2022.
  • Kyoichi Asano, Keita Emura, Atsushi Takayasu, and Yohei Watanabe, "A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test", The 16th International Conference on Provable and Practical Security, ProvSec 2022, LNCS 13600, pp. 3–19, 2022.
  • Shinya Okumura, Shusaku Uemura, Momonari Kudo, "Revisiting Lattice-Based Attacks Using Trace Map for Ring-LWE", 2022 International Symposium on Information Theory and Its Applications, ISITA 2022, 2022.
  • Daichi Aoki, Kazuhiko Minematsu, Toshihiko Okamura, Tsuyoshi Takagi, "Efficient Word Size Modular Multiplication over Signed Integers", 29th IEEE Symposium on Computer Arithmetic, ARITH 2022, pp.94-101, 2022. (pdf)
  • Hiroki Furue, Yutaro Kiyomura, Tatsuya Nagasawa, Tsuyoshi Takagi, "A New Fault Attack on UOV Multivariate Signature Scheme", 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022, LNCS 13512, pp.124–143, 2022.
  • Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi, "The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography", 4th International Workshop on Mathematical Cryptology, MathCrypt 2022, 2022. (pdf)
  • Hiroshi Onuki, "On the key generation in SQISign", Number-Theoretic Methods in Cryptology, NuTMiC 2021, 2022. (pdf)
  • Hiroki Furue, Momonari Kudo, "On the computational enumeration of superspecial curves: A survey and complements (extended abstract)", Computer Algebra in Scientific Computing 2022, CASC 2022, 2022. (pdf)
  • Tasuku Nakagawa, Momonari Kudo, Tsuyoshi Takagi, "Efficient search for superspecial hyperelliptic curves of genus 4 in large characteristic (extended abstract)", Computer Algebra in Scientific Computing 2022, CASC 2022, 2022. (pdf)
  • Kosuke Sakata, Momonari Kudo, Taku Kato, Kazuhiro Yokoyama, "Implementation report on computing Groebner bases over exterior algebra (extended abstract)", Computer Algebra in Scientific Computing 2022, CASC 2022, 2022. (pdf)
  • Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi, "Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values", 17th International Workshop on Security, IWSEC 2022, LNCS 13504, pp.147-165, 2022.
  • Hirotomo Shinoki, Koji Nuida, "On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption". 17th International Workshop on Security, IWSEC 2022, LNCS 13504, pp.189–207, 2022.
  • Nariyasu Heseri, Koji Nuida, "Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols", 17th International Workshop on Security, IWSEC 2022, LNCS 13504, pp.208–223, 2022.
  • Shu Takahashi, Hiroshi Onuki, Tsuyoshi Takagi, "Explicit Construction of the Square-root Vélu's Formula on Edwards Curves", JSIAM Letters, Vol.14, pp.108–110, 2022.
  • Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, "Multi-Server PIR with Full Error Detection and Limited Error Correction", 3rd Conference on Information-Theoretic Cryptography, ITC 2022, pp.1:1-1:20, 2022.
  • Shingo Sato, Keita Emura, Atsushi Takayasu, "Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation", 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, LNCS 13269, pp.3-23, 2022.
  • Keisuke Hakuta, Hiroyuki Ochiai, Tsuyoshi Takagi, "Comments on Efficient Batch Verification Test for Digital Signatures based on Elliptic Curves", Mathematica Slovaca, Vol.72, No.3, pp.575-590, 2022.
  • Yuta Kambe, Masaya Yasuda, Masayuki Noro, Kazuhiro Yokoyama, Yusuke Aikawa, Katsuyuki Takashima, Momonari Kudo, "Solving the Constructive Deuring Correspondence via the Kohel-Lauter-Petit-Tignol Algorithm", Mathematical Cryptology, Vol.1, No.2, pp.10–24, 2022.
  • Yuta Kambe, Yusuke Aikawa, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama, "Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence", 7th International Conference on Mathematics and Computing, ICMC2021, AISC 1412, pp.953-966, 2022.
  • Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida, "An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks", IEICE Transactions, Vol.E105.A, pp.404-416, 2022.
  • Hiroshi Onuki, Tomoki Moriya, "Radical Isogenies on Montgomery Curves", 25th International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, LNCS 13177, pp.473-497, 2022.
  • Yuji Hashimoto, Koji Nuida, Goichiro Hanaoka, "Tight Security of Twin-DH Hashed ElGamal KEM in Multi-user Setting", IEICE Transactions, Vol.E105.A, No.3, pp.173-181, 2022.
  • Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi, "Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem", IEICE Transactions, Vol.E105.A, No.3, pp.195-202, 2022.
  • Pengfei Wang, Xiangyu Su, Maxim Jourenko, Zixian Jiang, Mario Larangeira, Keisuke Tanaka, "Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases", The 13th International Symposium on Cyberspace Safety and Security, CSS 2021, LNCS 13172, pp.131-144, 2022.

2021

  • Reo Eriguchi, Koji Nuida, "Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials", the 27th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2021, LNCS 13091, pp.191-221, 2021.
  • Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi, "A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV", the 27th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2021, LNCS 13093, pp.187-217, 2021.
  • Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi, "New complexity estimation on the Rainbow-Band-Separation attack", Theoretical Computer Science, Vol.896, pp.1-18, 2021.
  • Momonari Kudo, "Computing representation matrices for the Frobenius on cohomology groups", Journal of Symbolic Computation, Vol.109, pp.441-464, 2022.
  • Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi, "Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem", 16th International Workshop on Security, IWSEC 2021, LNCS 12835, pp.23-41, 2021.
  • Changze Yin, Yacheng Wang, Tsuyoshi Takagi, "Simple Matrix Signature Scheme", 16th International Workshop on Security, IWSEC 2021, LNCS 12835, pp.227-237, 2021.
  • Yuji Hashimoto, Koji Nuida, "Improved Supersingularity Testing of Elliptic Curves Using Legendre Form", Computer Algebra in Scientific Computing 2021, CASC 2021, LNCS 12865, pp.121-135, 2021.
  • Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, "Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation", Twenty-Fifth International Conference on Financial Cryptography and Data Security, FC 2021, LNCS 12674, pp.271-290, 2021.
  • Reo Eriguchi, Kazuma Ohara, Shota Yamada, Koji Nuida, "Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions", The 41st Annual International Cryptology Conference, CRYPTO2021, LNCS 12826, pp.305-334, 2021.
  • Hiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi, "Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem", 12th International Workshop on Post-Quantum Cryptography, PQCrypto 2021, LNCS 12841, pp.65-78, 2021.
  • Momonari Kudo, Shushi Harashita, "Parametrizing generic curves of genus five and its application to finding curves with many rational points", Effective Methods in Algebraic Geometry 2021, MEGA2021, 2021. (pdf)
  • Yuji Hashimoto, Katsuyuki Takashima, "Improved supersingularity testing of elliptic curves", JSIAM Letters, Vol.13, pp.29-32, 2021.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "A Compact Digital Signature Scheme Based on the Module-LWR problem", IEICE Transactions, Vol.E104–A, No.9, pp.1219-1234, 2021.
  • Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida, "Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks", The 16th ACM ASIA Conference on Computer and Communications Security, AsiaCCS 2021, pp.616–627, 2021.
  • Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-Constrained Implementation of Lattice-based Encryption Scheme on Standard Java Card Platform", IET Information Security, Vol.15, pp.267-281, 2021.
  • Koji Nuida, "Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic", 24th International Conference on Practice and Theory of Public-Key Cryptography, PKC 2021, LNCS 12711, pp.441-468, 2021.
  • Yuntao Wang, Tsuyoshi Takagi, "Studying Lattice Reduction Algorithms Improved by Quick Reordering Technique", International Journal of Information Security, Vol.20, pp.257-268, 2021.
  • Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi, "An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH", The 23rd Annual International Conference on Information Security and Cryptology, ICISC 2020, LNCS 12593, pp.58-84, 2021.
  • Bernhard Mühlherr and Koji Nuida, "Locally Finite Continuations and Coxeter Groups of Infinite Ranks", Journal of Pure and Applied Algebra, Vol.225, Article 106464, 2021.
  • Hiroshi Onuki, "On oriented supersingular elliptic curves", Finite Fields and Their Applications, Vol 69, Article 101777, 2021.
  • Kazumasa Shinagawa, Koji Nuida, "A Single Shuffle Is Enough for Secure Card-Based Computation of Any Boolean Circuit", Discrete Applied Mathematics, Vol.289, pp.248-261, 2021.