英語 日本語
発表論文

発表論文 2017 -

2018年

査読有

  • Hiroki Sudo, Koji Nuida, Kana Shimizu, "An efficient private evaluation of a decision graph", ICISC 2018, to appear.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "On the Complexity of the LWR-Solving BKW Algorithm", ICISC 2018, to appear.
  • Kento Oonishi, Noboru Kunihiro, "Attacking Noisy Secret CRT-RSA Exponents in Binary Method", ICISC 2018, to appear.
  • Yusuke Aikawa, Koji Nuida, Masaaki Shirase, "Elliptic Curve Method Using Complex Multiplication Method", IEICE Transaction, to appear.
  • Atsushi Takayasu, Noboru Kunihiro, "Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound", Theoretical Computer Science, to appear.
  • Atsushi Takayasu, Yao Lu, Liqiang Peng, "Small CRT-exponent RSA Revisited", Journal of Cryptology, to appear.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", Japan Journal of Industrial and Applied Mathematics, to appear.
  • Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, and Goichiro Hanaoka, "Tree-Based Secure Comparison of Secret Shared Data", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.557-561, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, and Kiyoshi Asai, "Secure Division Protocol and Applications to Privacy-Preserving Chi-Squared Tests", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.562-566, 2018.
  • Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.389-393, 2018.
  • Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Portable Implementation of Post-Quantum Encryption Schemes and Key Exchange Protocols on JavaScript-enabled Platforms", Security and Communication Networks, Volume 2018, Article ID 9846168, 14 pages, 2018.
  • Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, "Hardness Evaluation for Search LWE Problem using Progressive BKZ Simulator", IEICE Transaction, Vol.E101-A, No.12, 2018.
  • Yuntao Wang, Thomas Wunderer, "Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE", 14th International Conference on Information Security Practice and Experience, ISPEC 2018, LNCS 11125, pp.440-452, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida and Goichiro Hanaoka, "Constant-Round Client-Aided Secure Comparison Protocol", 23rd European Symposium on Research in Computer Security, ESORICS 2018, LNCS 11099, pp.395-415, 2018.
  • Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017", 13th International Workshop on Security, IWSEC 2018, LNCS 11049, pp.3-18, 2018.
  • Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, "Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques", 13th International Workshop on Security, IWSEC 2018, LNCS 11049, pp.87-103, 2018.
  • Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi, "Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem," 5th International Conference on Information Science and Control Engineering, ICISCE 2018, pp.533-537, 2018.
  • Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi, "Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes", 23rd Australasian Conference on Information Security and Privacy, ACISP2018, LNCS 10946, pp.487-501, 2018.
  • Yuntao Wang and Tsuyoshi Takagi, "Improving the BKZ Reduction Algorithm by Quick Reordering Technique", 23rd Australasian Conference on Information Security and Privacy, ACISP2018, LNCS 10946, pp.787-795, 2018.
  • Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi, "Security analysis of cryptosystems using short generators over ideal lattices", Japan Journal of Industrial and Applied Mathematics, Volume 35, Issue 2, pp.739–771, 2018.
  • Yasuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates, "HFERP - A New Multivariate Encryption Scheme", PQCrypto 2018, LNCS 10786, pp.396-416, 2018.
  • Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, "An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem", The 19th International Conference on Information and Communications Security, ICICS 2017, LNCS 10631, pp.541-553, 2018.
  • Tsuyoshi Takagi, "Recent Developments in Post-Quantum Cryptography", IEICE Transaction, Vol.E101-A, No.1, pp.3-11, 2018.
  • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "An Efficient Key Generation of ZHFE Public Key Cryptosystem", IEICE Transaction, Vol.E101-A, No.1, pp.29-38, 2018.
  • Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida and Goichiro Hanaoka, "A Public-key Encryption Scheme based on Non-linear Indeterminate Equations", The 24th Annual Conference on Selected Areas in Cryptography, SAC 2017, LNCS 10719, pp.215-234, 2018.
  • 査読無

    • 黄暁萱, 大西健斗, 國廣昇, "Sliding window法からの漏洩情報を用いた秘密鍵復元攻撃の改良", コンピュータセキュリティシンポジウム, CSS2018, 2A2-3, pp.299-306, 2018.
    • Trong-Thuc Trang, Yoshinori Aono, Tsuyoshi Takagi, "A Continuous Genetic Algorithm for Optimizing Pruning Function for Lattice Enumeration", コンピュータセキュリティシンポジウム, CSS2018, 2A2-4, pp.307-314, 2018.
    • Yacheng Wang, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Estimating Secure Parameters for the Multivariate Encryption Scheme EFCp-", コンピュータセキュリティシンポジウム, CSS2018, 2A3-2, pp.398-405, 2018.
    • 高安敦, "適応的に安全な鍵失効機能付き階層型IDベース暗号の構成", 信学技報, Vol.118, No.151, ISEC2018-14, pp.9-16, 2018.
    • Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Code-Based Signature Scheme without Trapdoors", 信学技報, Vol.118, No.151, ISEC2018-15, pp.17-22, 2018.
    • Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, "A New Embedding Method for Generalized LWE", 信学技報, Vol.118, No.151, ISEC2018-46, pp.363-370, 2018.
    • 安井捷, 國廣昇, "安全性を高めた共通鍵暗号の量子アルゴリズムに対する詳細な安全性評価", 信学技報, Vol.118, No.151, ISEC2018-47, pp.371-378, 2018.
    • 秋山浩一郎, 池松泰彦, 高木剛, "不定方程式暗号における鍵復元攻撃の改良及びパラメータの考察", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 1B2-4, 2018.
    • Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 1B2-5, 2018.
    • Jintai Ding, Tsuyoshi Takagi, Xinwei Gao, Yuntao Wang, "Ding Key Exchange -- A Proposal to NIST PQC Competition", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 2B1-1, 2018.
    • Yuntao Wang, Xinwei Gao, Jintai Ding, Tsuyoshi Takagi, "Security Evaluation for Ding Key Exchange", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 2B1-2, 2018.
    • 山崎努, 高島克幸, 高木剛, "同種写像部分木計算とその暗号方式への応用", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 2B4-1, 2018.
    • Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Portable implementation of post-quantum encryption schemes and key exchange protocols on JavaScript-enabled platforms", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 3A4-4, 2018.
    • 小野澤綜大, 高安敦, 國廣昇, "Edwards型楕円曲線におけるHidden Number Problem", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 3B3-3, 2018.
    • 井上晶登, 齋藤恆和, 金城皓羽, 高木剛, "モンゴメリリダクションの改良によるNTTの高速化", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 3C1-4, 2018.
    • Yacheng Wang, Yasuhiko Ikematsu, Dung H. Duong, Tsuyoshi Takagi, "An Efficient Decryption Algorithm for Extension Field Cancellation", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 4A1-1, 2018.
    • 2017年

      査読有

    • Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key", IEICE Transaction, Vol.E100-A, No.12, pp.2691-2698, 2017.
    • Hyungrok Jo, Christophe Petit, and Tsuyoshi Takagi, "Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs", IEICE Transaction, Vol.E100-A, No.9, pp.1891-1899, 2017.
    • 高木剛, 下山武司, 篠原直行, 林卓也, "ペアリング暗号解読の世界記録とその安全性評価", 電子情報通信学会論文誌, Vol.J100-B, No.9, pp.582-592, 2017.
    • Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi, "Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU", The 20th International Conference on Information Security, ISC 2017, LNCS 10599, pp.79-91, 2017.
    • Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang, "The Beauty and the Beasts — The Hard Cases in LLL Reduction", 12th International Workshop on Security, IWSEC 2017, LNCS 10418, pp.19–35, 2017.
    • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Efficient Outsourcing of Secure k-Nearest Neighbour Query over Encrypted Database", Computers & Security, Vol.69, pp.65-83, 2017.
    • Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi, "Secure and Efficient Pairing at 256-bit Security Level", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.59-79, 2017
    • Rui Xu, Yeo Sze Ling, Kazuhide Fukushima, Tsuyoshi Takagi, Seo Hwajung, Shinsaku Kiyomoto, Henricksen Matt, "An Experimental Study of the BDD Approach for the Search LWE Problem", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.253-272, 2017.
    • Atsushi Takayasu, Yohei Watanabe, "Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance", ACISP 2017, LNCS 10342, pp.184-204, 2017.
    • Atsushi Takayasu, Yao Lu, Liqiang Peng, "Small CRT-exponent RSA Revisited", Eurocrypt 2017, LNCS 10211, pp.130-159, 2017.
    • Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-constrained implementation of lattice-based encryption scheme on standard Java Card", IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, pp.47-50, 2017.
    • Hikari Tachibana, Katsuyuki Takashima, Tsuyoshi Takagi, "Constructing an Efficient Hash Function from 3-Isogenies ", JSIAM Letters, Vol.9, p.29-32, 2017.
    • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "Revisiting the Efficient Key Generation of ZHFE", The 2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017, LNCS 10194, pp.195-212, 2017.
    • Chi Cheng, Rongxing Lu, Albrecht Petzoldt, Tsuyoshi Takagi, "Securing Internet of Things in a Quantum World", IEEE Communications Magazine, Vol.55, No.2, pp.116-120, 2017.
    • Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi, "Revisiting the Cubic UOV Signature Scheme", The 19th Annual International Conference on Information Security and Cryptology, ICISC 2016, LNCS 10157, pp.223-238, 2017.
    • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Secret Sharing with Cheaters Using Multi-Receiver Authentication", IEICE Transaction, Vol.E100-A, No.1, pp.115-125, 2017.

    査読無

    • 小野澤綜大, 高安敦, 國廣昇, "楕円曲線Diffie-Hellman鍵共有に対する格子簡約攻撃", 信学技報, Vol.117, No.285, ISEC2017-69, pp.115-122, 2017.
    • 高安敦, 勝又秀一, 松田隆宏, "LWE仮定に基づく鍵失効機能付き階層型IDベース暗号", 信学技報, Vol.117, No.285, ISEC2017-71, pp.129-136, 2017.
    • 岡田大樹,高安敦,福島和英,清本晋作,高木剛, "LWR問題解読のためのサンプル増幅法を用いたBKWアルゴリズム", コンピュータセキュリティシンポジウム, CSS2017, 1E4-2, pp.256-263, 2017.
    • Junting Xiao, Ye Yuan,Kazuhide Fukushima,Shinsaku Kiyomoto, Tsuyoshi Takagi, "Efficient Implementation of discrete Gaussian sampling for Lattice-based Cryptography using JavaScript", コンピュータセキュリティシンポジウム, CSS2017, 1E4-4, pp.272-279, 2017.
    • 高安敦,勝又秀一,松田隆宏, "復号鍵漏洩耐性を持つ鍵失効機能付きIDベース暗号の一般的な構成", コンピュータセキュリティシンポジウム, CSS2017, 3E2-1, pp.1156-1163, 2017.
    • 井上明子, 安田雅哉, 高木剛, 清村優太郎, 川原祐人, 小林鉄太郎, "256ビット安全性を持つペアリング暗号の鍵長見積もり", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 1B1-1, 2017.
    • 清村優太郎, 川原祐人, 小林鉄太郎, 井上明子, 安田雅哉, 高木剛,"ペアリング暗号を効率的に実装可能な256ビット安全性を持つペアリングフレンドリ曲線",2017年暗号と情報セキュリティシンポジウム, SCIS2017, 1B1-2, 2017.
    • Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi, "Experimental Analysis of LWE Problem", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 2B4-1, 2017.
    • Wang Kun, 林卓也, 高木剛, "A Comparison of Three-Dimensional Sieve Methods for Number Field Sieve over GF(p^6)", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 3A1-1, 2017.
    • Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi "Revisiting the Efficient Key Generation of ZHFE", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 3A3-2, 2017.
    • Yacheng Wang, Dung H. Duong, Tsuyoshi Takagi,"On Gu's Attack Against Simple Matrix Scheme", 2017年暗号と情報セキュリティシンポジウム,SCIS2017,3A3-4, 2017.
    • Dung H. Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi,"SVSv - A New Multivariate Signature Scheme with Vinegar",2017年暗号と情報セキュリティシンポジウム,SCIS2017, 3A3-5, 2017.
    • 立花ひかり, 高島克幸, 高木剛,"SIDH鍵共有法における効率的な計算法", 2017年暗号と情報セキュリティシンポジウム, SCIS2017,3B2-4, 2017.


    PAGE TOP