English Japanese
publications

Publications 2012 - 2016

2016

  • Shinya Okumura, Koichiro Akiyama, Tsuyoshi Takagi, "An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces", The Fourth International Symposium on Computing and Networking, CANDAR 2016, pp.28-36, 2016.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", 11th International Workshop on Security, IWSEC 2016, LNCS 9836, pp.305-315, 2016.
  • Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang, "Special Issue on Provable Security", Security and Communication Networks, Vol.9, No.12, pp.1635-1637, 2016.
  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", International Journal of Networking and Computing, Vol.6, No.2, pp.309–327, 2016.
  • Duong Hoang Dung, Albrecht Petzoldt, Tsuyoshi Takagi, "Reducing the Key Size of the SRP Encryption Scheme", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9723, pp.427-434, 2016.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Privacy-preserving k-Nearest Neighbour Query on Outsourced Database", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9722, pp.181-197, 2016.
  • Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi, "Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator", The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2016, LNCS 9665, pp.789-819, 2016.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "On tameness of Matsumoto-Imai central maps in three variables over the finite field F2", Advances in Mathematics of Communications, Vol.10, No.2, pp.221–228, 2016.
  • Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi, "Secure and controllable k-NN query over encrypted cloud data with key confidentiality", Journal of Parallel and Distributed Computing, Vol.89, pp.1-12, 2016.
  • Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi, "Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding", IEEE Transactions on Information Forensics and Security, Vol.11, No.5, pp.993-1002,2016.

2015

  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", The Third International Symposium on Computing and Networking, CANDAR'15, pp.58-67, 2015.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields", The Third International Symposium on Computing and Networking, CANDAR'15, pp.477-483, 2015.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Note on Some Recent Cheater Identifiable Secret Sharing Schemes", IEICE Transaction, Vol.98-A, No.8, pp.1814-1819, 2015.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for Code-Based Public-Key Encryption", IEICE Transaction, Vol.98-A, No.10, pp.2139-2151, 2015.
  • Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu, "Functional Encryption Resilient to Hard-to-Invert Leakage", The Computer Journal, Vol.58, No.4, pp.735-749, 2015.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient scalar product protocol and its privacy-preserving application", International Journal of Electronic Security and Digital Forensics, Vol.7, No.1, pp.1-19, 2015.
  • Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, "Revocable Identity-based Signcryption Scheme Without Random Oracles", International Journal of Network Security, Vol.17, No.2, pp.110-122, 2015.
  • Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi, "On the Security of A Privacy-Preserving Product Calculation Scheme", IEEE Transactions on Dependable and Secure Computing, Vol.12, No.3, pp.373-374, 2015.
  • Yun-Ju Huang , Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of FPPR method to solve ECDLP", Pacific Journal of Mathematics for Industry, Vol.7, No.1, pp.1-9, 2015.

2014

  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An experiment of number field sieve for discrete logarithm problem over GF(p^n)", JSIAM Letters, Vol.6, pp.53-56, 2014.
  • Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi, "A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics", 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, LNCS 8772, pp.40-58, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication", 9th International Workshop on Security, IWSEC 2014, LNCS 8639, pp.72-87, 2014.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", IEICE Transaction, Vol.97-A, No.10, pp.2055-2063, 2014.
  • Hui Zhang, Tsuyoshi Takagi, "Improved Attacks on Multi-Prime RSA with Small Prime Difference", IEICE Transaction, Vol.E97-A, No.7, pp.1533-1541, 2014.
  • Takumi Tomita, Tsuyoshi Takagi, "Efficient System Parameters for Identity-Based Encryption using Supersingular Elliptic Curves", JSIAM Letters, Vol.6, pp.13-16, 2014.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", IEICE Transaction, Vol.E97-A, No.6, pp.1418-1425, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, Rong Hu, "Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data", IEICE Transaction, Vol.E97-D, No.2, pp.326-330, 2014.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3^n)", IEICE Transaction, Vol.E97-A, No.1, pp.236-244, 2014.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Security of Multivariate Signature Scheme Using Non-commutative Rings", IEICE Transaction, Vol.E97-A, No.1, pp.245-252, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments", IEICE Transaction, Vol.E97-A, No.1, pp.409-412, 2014.
  • Tsukasa Ishiguro, Shinsaku Kiyomoto,Yutaka Miyake, Tsuyoshi Takagi, "Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice", The 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2014, LNCS 8383, pp.411–428, 2014.
  • Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Efficient Implementation of Multivariate Public Key Cryptosystem Rainbow on Android Mobile Phone", IEICE Transaction, Vol.J97-A, No.2, pp.86-95, 2014. (In Japanese)
  • Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Toru Kobayashi, Tsuyoshi Takagi, "Parallel Implementation of Public Key Cryptosystems using Web Workers", The 11th Annual IEEE Consumer Communications and Networking Conference, CCNC 2014, pp.1153–1154, 2014.

2013

  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p^12)", Number Theory and Cryptography 2013, Buchmann Festschrift, LNCS 8260, pp.108–120, 2013.
  • Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faugere et al.'s Method to Solve ECDLP", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.115–132, 2013.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.201–216, 2013.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.258-271, 2013.
  • Hui Zhang, Tsuyoshi Takagi, "Attacks on Multi-Prime RSA with Small Prime Difference", 18th Australasian Conference on Information Security and Privacy ACISP 2013, LNCS 7959, pp.41–56, 2013.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.118–135, 2013.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Multivariate Signature Scheme Using Quadratic Forms", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.243–258, 2013.
  • Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai, "A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation", 2013 ACM Asia Public-Key Cryptography Workshop, AsiaPKC 2013, pp.57-62, 2013.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited", 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, pp.535-540, 2013.
  • Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai, "General Fault Attacks on Multivariate Public Key Cryptosystems", IEICE Transaction, Vol.E96-A, No.1, pp.196-205, 2013.

2012

  • Hui Zhang and Tsuyoshi Takagi, "An Exhaustive Search method to Find All Small Solutions of a Multivariate Modular Linear Equation", JSIAM Letters, Vol.4, pp.37-40, 2012.
  • Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi, "Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)", Asiacrypt 2012, LNCS 7658, pp.43-60, 2012.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Application of Scalar Multiplication of Edwards Curves to Pairing-based Cryptography", IWSEC 2012, LNCS 7631, pp.19-36, 2012.
  • Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang, "Efficient Secure Primitive for Privacy Preserving Distributed Computations", IWSEC 2012, LNCS 7631, pp.233-243, 2012.
  • Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for the McEliece Encryption", ACISP 2012, LNCS 7372, pp.180-193, 2012.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems using EtaT Pairing", ISPEC 2012, LNCS 7232, pp.228-244, 2012.
  • Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi, "Secret Key Reduction of Rainbow using Non-commutative Rings", CT-RSA 2012, LNCS 7178, pp.68-83, 2012.
  • Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi, "Further Improvement of an Identity-Based Signcryption Scheme in the Standard Model", Computers & Electrical Engineering, Vol.38, No.2, pp.413-421, 2012.
  • Mingwu Zhang, Fagen Li, Tsuyoshi Takagi, "Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks", IEICE Transaction, Vol.E95-D, No.2, 2012.
  • Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi, "Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})", IEICE Transaction, Vol.E95-A, No.1, pp.204-212, 2012.
  • Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li, "Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-Delegatability and Non-Transferability", IEICE Transaction, Vol.E95-A, No.1, pp.259-262, 2012.
  • Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, "Identity-Based Online/Offline Signcryption for Low Power Devices", Journal of Network and Computer Applications, Vol.35, No.1, pp.340-347, 2012.


PAGE TOP