東京大学 大学院情報理工学系研究科 数理情報学専攻 高木・高安研究室 暗号数理情報学研究室(数理情報第1研究室)

発表論文 2011 - 2015

2015年

査読有

  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", The Third International Symposium on Computing and Networking, CANDAR'15, pp.58-67, 2015.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields", The Third International Symposium on Computing and Networking, CANDAR'15, pp.477-483, 2015.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Note on Some Recent Cheater Identifiable Secret Sharing Schemes", IEICE Transaction, Vol.98-A, No.8, pp.1814-1819, 2015.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for Code-Based Public-Key Encryption", IEICE Transaction, Vol.98-A, No.10, pp.2139-2151, 2015.
  • Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu, "Functional Encryption Resilient to Hard-to-Invert Leakage", The Computer Journal, Vol.58, No.4, pp.735-749, 2015.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient scalar product protocol and its privacy-preserving application", International Journal of Electronic Security and Digital Forensics, Vol.7, No.1, pp.1-19, 2015.
  • Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, "Revocable Identity-based Signcryption Scheme Without Random Oracles", International Journal of Network Security, Vol.17, No.2, pp.110-122, 2015.
  • Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi, "On the Security of A Privacy-Preserving Product Calculation Scheme", IEEE Transactions on Dependable and Secure Computing, Vol.12, No.3, pp.373-374, 2015.
  • Yun-Ju Huang , Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of FPPR method to solve ECDLP", Pacific Journal of Mathematics for Industry, Vol.7, No.1, pp.1-9, 2015.

査読無

  • Yuan Ye, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Efficient Implementation of Lattice-based Cryptosystems using JavaScript", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 1B1-1, p.24, 2015.
  • 矢城信吾, 高木 剛, "Matsumoto-Imai中間写像のTame分解に関する考察", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 2D1-1, p.37, 2015.
  • 米村智子, 高木 剛, "ペアリング計算高速化へ向けたパラメータ設定", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 2B4-3, p.52, 2015.
  • Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai, "MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3E2-1, p.67, 2015.
  • Chi CHENG, Tsuyoshi Takagi, "Homomorphic authentication for network coding", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3E3-3, p.73, 2015.
  • Yuntao Wang, Yoshinori Aono, Takuya Hayashi, Tsuyoshi Takagi, "A New Progressive BKZ Algorithm", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3E3-5, p.73, 2015.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "New results on cheater identifiable secret sharing", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3F3-1, p.73, 2015.

2014年

査読有

  • Yutaro Kiyomura, Noriyasu Iwamoto, Shun'ichi Yokoyama, Kenichiro Hayasaka, Yuntao Wang, Takanori Yasuda, Katsuyuki Takashima, Tsuyoshi Takagi, "Heuristic counting of Kachisa-Schaefer-Scott curves", JSIAM Letters, Vol.6, pp.73-76, 2014.
  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An experiment of number field sieve for discrete logarithm problem over GF(p^n)", JSIAM Letters, Vol.6, pp.53-56, 2014.
  • Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi, "A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics", 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, LNCS 8772, pp.40-58, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication", 9th International Workshop on Security, IWSEC 2014, LNCS 8639, pp.72-87, 2014.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 小林透, 高木剛, "Web Workersを用いた多変数公開鍵暗号Rainbowの並列実装", 情報処理学会論文誌, Vol.55, No.9, pp.2061-2071, 2014.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", IEICE Transaction, Vol.97-A, No.10, pp.2055-2063, 2014.
  • Hui Zhang, Tsuyoshi Takagi, "Improved Attacks on Multi-Prime RSA with Small Prime Difference", IEICE Transaction, Vol.E97-A, No.7, pp.1533-1541, 2014.
  • Takumi Tomita, Tsuyoshi Takagi, "Efficient System Parameters for Identity-Based Encryption using Supersingular Elliptic Curves", JSIAM Letters, Vol.6, pp.13-16, 2014.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", IEICE Transaction, Vol.E97-A, No.6, pp.1418-1425, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, Rong Hu, "Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data", IEICE Transaction, Vol.E97-D, No.2, pp.326-330, 2014.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3^n)", IEICE Transaction, Vol.E97-A, No.1, pp.236-244, 2014.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Security of Multivariate Signature Scheme Using Non-commutative Rings", IEICE Transaction, Vol.E97-A, No.1, pp.245-252, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments", IEICE Transaction, Vol.E97-A, No.1, pp.409-412, 2014.
  • Tsukasa Ishiguro, Shinsaku Kiyomoto,Yutaka Miyake, Tsuyoshi Takagi, "Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice", The 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2014, LNCS 8383, pp.411–428, 2014.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 高木剛, "Android携帯電話における多変数公開鍵暗号Rainbowの高速実装", 電子情報通信学会論文誌, Vol.J97-A, No.2, pp.86-95, 2014.
  • Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Toru Kobayashi, Tsuyoshi Takagi, "Parallel Implementation of Public Key Cryptosystems using Web Workers", The 11th Annual IEEE Consumer Communications and Networking Conference, CCNC 2014, pp.1153–1154, 2014.

査読無

  • 早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛, "3次元格子篩において用いられる格子点計算法の評価" コンピュータセキュリティシンポジウム CSS2014, 1E3-3, pp.135-142, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cryptanalysis of some recent cheater identifiable secret sharing schemes", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1A1-3, p.2, 2014.
  • Yuntao Wang, Hui Zhang, Tsuyoshi Takagi, "Improving BKZ Lattice Reduction Algorithm with Reordering Technique", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1C1-4, p.4, 2014.
  • 林卓也, 青木和麻呂, 下山武司, 篠原直行, 高木剛, "線形代数ステップにおけるLanczos法の実装実験", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1C2-1, p.12, 2014.
  • 三浦浩幸, 橋本康史, 高木剛, "奇標数の有限体上の多変数連立2次方程式の求解アルゴリズムの改良について", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1C2-2, p.12, 2014.
  • Zhenhua Liu, Tsuyoshi Takagi, Youwen Zhu, "Fully Secure Updatable Key Identity-based Signature Scheme from Lattices", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2D1-1, p.34, 2014.
  • 安田貴徳, 高木剛, 櫻井幸一, "固定された係数を持つペアリングフレンドリ曲線", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2E1-1, p.36, 2014.
  • 清村優太郎, 高木剛, "上位ビットを固定した合成数位数の効率的なペアリング", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2E1-3, p.36, 2014.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Confirmer Signatures from McEliece Assumptions", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2B3-3, p.51, 2014.
  • 菅野雄太, 草川恵太, 高木剛, "多変数公開鍵暗号Simple Matrix方式の復号化における問題点", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3E1-4, p.75, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cheater Identifiable Secret Sharing against Rushing Adversary", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3F1-4, p.77, 2014.
  • 上薗大地, 清村優太郎, 高木剛, "Window法に用いる2進数3進数混合形式w-HBTFの非零濃度", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3F4-3, p.106, 2014.
  • Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faug`ere et al.'s method to solve ECDLP", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3F5-4, p.118, 2014.
  • 安田貴徳, 齋藤恆和, 小林鉄太郎, 高木剛, "拡大体上の楕円曲線暗号へのGHS攻撃に対する安全性", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 4F2-3, p.138, 2014.

2013年

査読有

  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p^12)", Number Theory and Cryptography 2013, Buchmann Festschrift, LNCS 8260, pp.108–120, 2013.
  • Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faugere et al.'s Method to Solve ECDLP", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.115–132, 2013.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.201–216, 2013.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.258-271, 2013.
  • Hui Zhang, Tsuyoshi Takagi, "Attacks on Multi-Prime RSA with Small Prime Difference", 18th Australasian Conference on Information Security and Privacy ACISP 2013, LNCS 7959, pp.41–56, 2013.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.118–135, 2013.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Multivariate Signature Scheme Using Quadratic Forms", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.243–258, 2013.
  • Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai, "A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation", 2013 ACM Asia Public-Key Cryptography Workshop, AsiaPKC 2013, pp.57-62, 2013.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited", 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, pp.535-540, 2013.
  • Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai, "General Fault Attacks on Multivariate Public Key Cryptosystems", IEICE Transaction, Vol.E96-A, No.1, pp.196-205, 2013.

査読無

  • 矢城信吾, 高木剛, "Matsumoto-Imai 中間写像のtame 分解性について", コンピュータセキュリティシンポジウム CSS2013, 1C1-1, 2013.
  • 石黒司, 清本晋作, 三宅優, 高木剛, "並列Gauss Sieveアルゴリズムを用いた128次元イデアル格子の最短ベクトル問題の求解", コンピュータセキュリティシンポジウム CSS2013, 1C1-2, 2013.
  • 早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛, "拡大体GF(pˆn)上の数体篩法における3次元Lattice Sieveの構成", コンピュータセキュリティシンポジウム CSS2013, 1C1-3, 2013.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 小林透, 高木剛, "Web Workersを用いた多変数公開鍵暗号Rainbowの並列実装", コンピュータセキュリティシンポジウム CSS2013, 2D1-3, 2013.
  • Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi "Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions", Cryptology ePrint Archive: Report 2013/388, 2013.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "On Proof of Plaintext Knowledge for Code-Based Public Key Encryption", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 2B3-5, 2013.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 高木剛, "Android携帯電話における多変数公開鍵暗号Rainbowの高速実装", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 2E1-4, 2013.
  • 清村優太郎, 高木剛, "合成数位数のTateペアリングの効率的な計算方法", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 2E4-2, 2013.
  • Huang Yun Ju, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faugere et al.'s Method to Solve ECDLP", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 3A2-3, 2013.
  • Youwen ZHU, Rui Xu, Tsuyoshi Takagi, "Secure k-NN Computation on Encrypted Cloud Data Without Sharing Key with Query Users", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 3A3-2, 2013.
  • 安田貴徳, 高木剛, 櫻井幸一, "ヤコビ4次曲線を用いた効率的なペアリングフレンドリ曲線", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 3E1-1, 2013.
  • 三浦浩幸, 橋本康史, 高木剛, "有限体上の多変数連立2次方程式の求解問題における適用範囲の拡張について", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 4A1-1, 2013.
  • 早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛, "GF(p^12)上の離散対数問題に対する数体篩法の計算機実験", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 4A1-3, 2013.
  • Hui Zhang, Tsuyoshi Takagi, "Attacks on Multi-Prime RSA with Small Prime Difference", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 1A1-2, 2013.

2012年

査読有

  • Hui Zhang and Tsuyoshi Takagi, "An Exhaustive Search method to Find All Small Solutions of a Multivariate Modular Linear Equation", JSIAM Letters, Vol.4, pp.37-40, 2012.
  • Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi, "Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)", the 18th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, LNCS 7658, pp.43-60, 2012.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Application of Scalar Multiplication of Edwards Curves to Pairing-based Cryptography", The 7th International Workshop on Security, IWSEC 2012, LNCS 7631, pp.19-36, 2012.
  • Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang, "Efficient Secure Primitive for Privacy Preserving Distributed Computations", The 7th International Workshop on Security, IWSEC 2012, LNCS 7631, pp.233-243, 2012.
  • Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for the McEliece Encryption", The 17th Australasian Conference on Information Security and Privacy, ACISP 2012, LNCS 7372, pp.180-193, 2012.
  • 井山政志, 清本晋作, 福島和英, 田中俊昭, 高木剛, "携帯電話におけるペアリング暗号の実装", 電子情報通信学会論文誌, Vol.J95-A, No.7, pp.579-587, 2012.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems using EtaT Pairing", ISPEC 2012, LNCS 7232, pp.228-244, 2012.
  • Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi, "Secret Key Reduction of Rainbow using Non-commutative Rings", The Cryptographer's Track at the RSA Conference, CT-RSA 2012, LNCS 7178, pp.68-83, 2012.
  • Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi, "Further Improvement of an Identity-Based Signcryption Scheme in the Standard Model", Computers & Electrical Engineering, Vol.38, No.2, pp.413-421, 2012.
  • Mingwu Zhang, Fagen Li, Tsuyoshi Takagi, "Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks", IEICE Transaction, Vol.E95-D, No.2, 2012.
  • Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi, "Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})", IEICE Transaction, Vol.E95-A, No.1, pp.204-212, 2012.
  • Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li, "Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-Delegatability and Non-Transferability", IEICE Transaction, Vol.E95-A, No.1, pp.259-262, 2012.
  • Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, "Identity-Based Online/Offline Signcryption for Low Power Devices", Journal of Network and Computer Applications, Vol.35, No.1, pp.340-347, 2012.

査読無

  • 石黒司, 清本晋作, 三宅優, 高木剛, "格子の最短ベクトル問題に対する並列化Gauss Sieveアルゴリズム", 電子情報通信学会, 信学技報, 2012.
  • 安田貴徳, 高木剛, 櫻井幸一, "非可換環を用いた多変数多項式署名方式に対するランク攻撃に関する考察", コンピュータセキュリティシンポジウム2012, CSS2012, 2C3-1, pp.477-484, 2012.
  • 林卓也, 下山武司, 篠原直行, 高木剛, "GF(3^n)上のηTペアリングを用いたペアリング暗号の安全性評価", 電子情報通信学会, 信学技報, IEICE-ISEC2012-43, 2012.
  • 安田貴徳, 高木剛, 櫻井幸一, "Edwards曲線が有効なペアリング暗号の埋め込み次数", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B1-1, 2012.
  • 井山政志, 福島和英, 清本晋作, 三宅優, 高木剛, "Android 携帯電話におけるペアリングの高速実装", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B1-5, 2012.
  • 伯田恵輔, 佐藤尚宜, 高木剛, "φ-GNAFのHamming weightの非最小性に関する理論的考察", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B2-4, 2012.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tuyoshi Takagi, "Estimation of Time Complexity of Solving DLP over GF(3^{6n})", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B3-1, 2012.
  • 加藤陽介, 高木剛, "標数3 の超特異楕円曲線におけるGPUを用いたρ法の実装", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B3-2, 2012.
  • Mingwu Zhang, Kirill Morozov, Fagen Li, Tuyoshi Takagi, "On the Definitions, Security and Transformations of Functional Encryption Systems", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2A2-1E, 2012.
  • Hui Zhang, Tuyoshi Takagi, "An Exhaustive Search Algorithm for Finding All Small Solutions of a Multivariate Modular Linear Equation", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2A3-1E, 2012.
  • Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai, "Some Efficient Variants of UOV and Rainbow", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2A3-3, 2012.
  • 坂本恭一, 林卓也, 高木剛, "数体篩法におけるJoux-Lercier の多項式選択法について", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2B1-2, 2012.
  • Kirill Morozov, Tsuyoshi Takagi, "Proof of Plaintext Knowledge for the McEliece Encryption", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 3B3-1E, 2012.

2011年

査読有

  • Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai, "General Fault Attacks on Multivariate Public Key Cryptosystems", The Fourth International Conference on Post-Quantum Cryptography, PQCrypto 2011, LNCS 7071, pp.1-18, 2011.
  • Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi, "Efficient Identity-Based Signcryption in the Standard Model", The Fifth International Conference on Provable Security, ProvSec 2011, LNCS 6980, pp.120-137, 2011.
  • Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi, "Anonymous Encryption with Partial-Order Subset Delegation Functionality", The Fifth International Conference on Provable Security, ProvSec 2011, LNCS 6980, pp.154-169, 2011.
  • Fagen Li, Jiang Deng, Tsuyoshi Takagi, "An Improved Authenticated Encryption Scheme", IEICE Transaction, Vol.E94-D, No.11, pp.2171-2172, 2011.
  • Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, "Group-oriented Setting's Multisigncryption Scheme With Threshold Designcryption", Information Sciences, No.181, pp.4041-4050, Elsevier, 2011.
  • Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi, "Efficient Implementation of the EtaT Pairing on GPU", 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, Industrial Track, pp.119-133, 2011.
  • Mingwu Zhang, Tsuyoshi Takagi, "GeoEnc: Geometric Area based Keys and Policies in Functional Encryption Systems", 16th Australasian Conference on Information Security and Privacy, ACISP 2011, LNCS 6812, pp.241-258, 2011.
  • Mingwu Zhang, Tsuyoshi Takagi and Bo Yang, "Dual-Veriers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks", Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, LNCS 6749, pp.71-84, 2011.
  • Kenichiro Hayasaka, Tsuyoshi Takagi, "An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic", International Workshop on Coding and Cryptology, IWCC 2011, LNCS 6639, pp. 191-200, 2011.
  • Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi, "Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3", IEICE Transaction, Vol.E94-A, No.1, pp.150-155, 2011.
  • Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi, "Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor", International Journal of Network Security, Vol.12, No.1, pp.50-57, 2011.
  • Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi, "Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings ", International Journal of Network Security, Vol.12, No.3, pp.130-136, 2011.

査読無

  • Takuya Sumi, Kirill Morozov, Tsuyoshi Takagi, "Efficient Implementation of the McEliece Cryptosystem", コンピュータセキュリティシンポジウム2011, CSS2011, pp.582-587, 2011.
  • Mingwu Zhang, Tusyoshi Takagi, Fagen Li, "Revisit on Secret Broadcast Schemes with Decryption Consistency", コンピュータセキュリティシンポジウム2011, CSS2011, pp.744-749, 2011.
  • 伯田恵輔, 佐藤尚宜, 高木剛, "3 変数Matsumoto-Imai中間写像の従順性について", コンピュータセキュリティシンポジウム2011, CSS2011, pp.750-755, 2011.
  • 安田貴徳, 櫻井幸一, 高木 剛, "Rainbow型電子署名の鍵長削減に関する一考察", 電子情報通信学会信学技報, vol.111, no.34, ISEC2011-2, pp.9-16, 2011.
  • 川原祐人, 山本剛, 小林鉄太郎, 高木剛, "ペアリング暗号システムにおける自己訂正を用いた復号モジュールの構成および実装", 2011年暗号と情報セキュリティシンポジウム, SCIS2011, 2F1-2, 2011.
  • 伯田恵輔, 加藤陽介, 佐藤尚宜, 高木剛, "効率的に計算可能な自己準同型写像を用いた楕円曲線に基づく署名の高速な一括検証", 2011年暗号と情報セキュリティシンポジウム, SCIS2011, 3A4-4, 2011.
  • 橋本康史, 高木剛, 櫻井幸一, "多変数暗号に対する故障利用攻撃について", 2011年暗号と情報セキュリティシンポジウム, SCIS2011, 3D3-5, 2011.
  • MingwuZhang, Tsuyoshi Takagi, Bo Yang, "sDDVS: Dual Strong Designated Verifiers Signature with Message Recovery for Tolerant Routing Path in WSNs", 2011年暗号と情報セキュリティシンポジウム, SCIS2011, 4A1-2, 2011.