東京大学 大学院情報理工学系研究科 数理情報学専攻 高木・高安研究室 暗号数理情報学研究室(数理情報第1研究室)

発表論文 2021 -

2024年

査読有

  • Keyang Liu, Tsuyoshi Takagi, "A transparent zero-knowledge dual membership set commitment based on perfect hash function", 12th International Symposium on Computing and Networking, CANDAR 2024, to appear.
  • Kohei Nakagawa, Hiroshi Onuki, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, Frederik Vercauteren, “SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies”, 30th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2024, to appear.
  • Hiroshi Onuki, Kohei Nakagawa, "Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign", 30th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2024, to appear.
  • Akimoto Genki, Tsuyoshi Takagi, "On the weak key of post-quantum key agreement SAA-5", JSIAM Letters, to appear.
  • Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima, "Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm", 27th Information Security Conference, ISC 2024, to appear.
  • Shota Inoue, Yusuke Aikawa, Tsuyoshi Takagi, "A faster variant of CGL hash function via efficient backtracking checks", 27th Information Security Conference, ISC 2024, to appear.
  • Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi, "Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings", 18th International Conference on Provable and Practical Security, ProvSec 2024, to appear.
  • Xuan Thanh Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Hyungrok Jo, Tsuyoshi Takagi, "Tightly Secure Identity-based Signature from Cryptographic Group Actions", 18th International Conference on Provable and Practical Security, ProvSec 2024, to appear.
  • Ryo Ohashi, Momonari Kudo, Shushi Harashita, "The a-numbers of non-hyperelliptic curves of genus 3 with cyclic automorphism group of order 6", Acta Arithmetica, to appear.
  • Yuta Kambe, Akira Katayama, Yusuke Aikawa, Yuki Ishihara, Msaaya Yasuda, Kazuhiro Yokoyama, "Computing Endomorphism Rings of Supersingular Elliptic Curves by Finding Cycles in Concatenated Supersingular Isogeny Graphs", Commentarii mathematici Universitatis Sancti Pauli, to appear.
  • Yusuke Aikawa, Ryokichi Tanaka, Takuya Yamauchi, "Isogeny Graphs on Superspecial Abelian Varieties: Eigenvalues and Connection to Bruhat-Tits buildings", Canadian Journal of Mathematics, to appear.
  • Hiroshi Onuki, “Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three”, Finite Fields and Their Applications, Vol.99, Article 102490, 2024.
  • Naoki Yoshiguchi, Yusuke Aikawa, Tsuyoshi Takagi, "Sieving Method with the Zero Window: An Improvement in Low Memory Environments", The 19th International Workshop on Security, IWSEC 2024, LNCS 14977, pp.158-176, 2024.
  • Keita Emura, Shingo Sato, Atsushi Takayasu, "Attribute-based Keyed Fully Homomorphic Encryption", The Fourteenth International Conference on Security and Cryptography for Networks, SCN 2024, LNCS 14974, pp.47-67, 2024.
  • Keyang Liu, Xingxin Li, Tsuyoshi Takagi, "Review the Cuckoo Hash-based Unbalanced Private Set Union: Leakage, Fix, and Optimization", 29th European Symposium on Research in Computer Security, ESORICS 2024, LNCS 14983, pp.331-352, 2024.
  • Kaito Sato, Hiroshi Onuki, Tsuyoshi Takagi, "Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography", JSIAM Letters, Vol.16, pp.65–68, 2024.
  • Ryo Ohashi, Momonari Kudo, "Computing superspecial hyperelliptic curves of genus 4 with automorphism group properly containing the Klein 4-group", Journal of Computational Algebra, Vol.11, Article 100020, 2024.
  • Kohei Nakagawa and Hiroshi Onuki, "QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras", 43rd Annual International Cryptology Conference, Crypto 2024, LNCS 14924, pp.75–106, 2024.
  • Quan Yuan, Chao Sun, Tsuyoshi Takagi, "Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks", The 29th Australasian Conference on Information Security and Privacy, ACISP24, LNCS 14896, pp.164–184, 2024.
  • LNCS 14924, pp.75–106, 2024.
  • Ryo Ohashi, "On the Rosenhain forms of superspecial curves of genus two", Finite Fields and Their Applications, Vol.97, 102445, 2024.
  • Tomoki Moriya, Hiroshi Onuki, Guoqing Zhou, Maozhi Xu, “Adaptive attacks against FESTA without input validation or constant-time implementation”, 15th International Conference on Post-Quantum Cryptography, PQCrypto 2024, LNCS 14772, pp.3–19, 2024.
  • Hiroki Furue, Momonari Kudo, "Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings", 15th International Conference on Post-Quantum Cryptography, PQCrypto 2024, LNCS 14772, pp.109–143, 2024.
  • Ren Taguchi, Atsushi Takayasu, "Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain", Quantum Information Processing, Vol.23, Article Number 122, 2024.
  • Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone, "Improved Cryptanalysis of HFERP", 27th International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, LNCS 14601, pp.413-440, 2024.
  • Ren Taguchi, Atsushi Takayasu, "On the Untapped Potential of the Quantum FLT-based Inversion", 22nd International Conference on Applied Cryptography and Network Security, ACNS2024, LNCS 14584, pp.79-100, 2024.
  • Yen-Ting Kuo, Atsushi Takayasu, "A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis", The 26th Annual International Conference on Information Security and Cryptology, ICISC 2023, LNCS 14561, pp.202-220, 2024.
  • Kyoichi Asano, Keita Emura, Atsushi Takayasu, "More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model", IEICE Transactions, Vol.E107–A, No.3, pp.248-259, 2024.

査読無

  • Yen-Ting Kuo, Atsushi Takayasu, "Improved Lattice Analysis on Correlation Power Analysis of CRYSTALS-Kyber", SCIS 2024, 1A1-4, 2024.
  • 吉口直輝, 相川勇輔, 高木剛, "シンドローム復号に対するSieving法の省メモリ環境下における高速化", SCIS 2024, 1A2-1, 2024.
  • 成定真太郎, 古江弘樹, 相川勇輔, 福島和英, "シンドローム復号問題に対するMMT法の高効率化とMcEliece-1409の解読", SCIS 2024, 1A2-2, 2024.
  • Hiroki Furue, Yasuhiko Ikematsu, Fumitaka Hoshino, Tsuyoshi Takagi, Kan Yasuda, Toshiyuki Miyazawa, Akira Nagai, Rika Akiyama, Koha Kinjo, "Further Security Analysis for Multivariate Polynomial Signature Scheme QR-UOV", SCIS 2024, 1A2-4, 2024.
  • Fumitaka Hoshino, Hiroki Furue, Yasuhiko Ikematsu, Tsuyoshi Takagi, Kan Yasuda, Toshiyuki Miyazawa, Akira Nagai, Rika Akiyama, Koha Kinjo, "More Efficient Software Implementation of QR-UOV", SCIS 2024, 1A2-5, 2024.
  • 相川勇輔, Jo Hyungrok, 佐竹翔平, "左右ケイリー複体に基づく暗号学的ハッシュ関数", SCIS 2024, 2A1-1, 2024.
  • 坂田康亮, 高木剛, "Hilbert級数を用いたMQ問題の高速求解アルゴリズムHDF4の計算量評価", SCIS 2024, 2A2-4, 2024.
  • 岡田大樹, 高木剛, "標準的な(Ring-)LWEに基づくシミュレーション安全なしきい値公開鍵暗号", SCIS 2024, 2A3-3, 2024.
  • 瀬戸友暁, 定兼邦彦, 戸澤一成, "可変長符号を用いたデータ圧縮の秘匿化", SCIS 2024, 2A4-1, 2024.
  • 田口廉, 高安敦, "量子FLT逆元計算アルゴリズムの深さ削減", SCIS 2024, 2B4-1, 2024.
  • 神戸祐太, 片山瑛, 相川勇輔, 石原侑樹, 安田雅哉, 横山和弘, "同種写像グラフ上のサイクル探索による同種写像求解法の高効率化", SCIS 2024, 3A1-1, 2024.
  • 柴田昌臣, 小貫啓史, 高木剛, "Fp上の超特異楕円曲線グラフの全探索におけるTime-Memory Trade-off", SCIS 2024, 3A3-1, 2024.
  • 吉住崚, 小貫啓史, 大橋亮, 工藤桃成, 縫田光司, "B-SIDH に対する Castryck-Decru 攻撃の構成と実装", SCIS 2024, 3A3-2, 2024.
  • 大橋亮, 小貫啓史, "超特別3次元アーベル多様体を用いたハッシュ関数の構成", SCIS 2024, 3A3-3, 2024.
  • 中川皓平, 小貫啓史, "SQIsign2D: 2次元の同種写像を用いた新たな署名方式", SCIS 2024, 3A3-4, 2024.
  • 池松泰彦, 古江弘樹, "UOV多項式系に対するRectangular MinRank攻撃の計算量評価についての考察", SCIS 2024, 3A4-3, 2024.
  • 江村恵太, 高安敦, "ペアリングフリー検索可能公開鍵認証暗号", SCIS 2024, 3C1-4, 2024.
  • 江村恵太, 佐藤慎悟, 高安敦, "属性ベース鍵付き完全準同型暗号の一般的構成", SCIS 2024, 3C2-3, 2024.
  • 安達瞭, 相川勇輔, 高木剛, "List Sieveの多面体的解釈による計算機実験", SCIS 2024, 4A1-1, 2024.
  • 西村佑介, 高安敦, "Module-LWE問題における格子の回転構造を利用した列挙法の計算量解析", SCIS 2024, 4A1-3, 2024.
  • 伊藤直也, 高木剛, "Multi-roundのFiat-Shamir変換に対するQROMにおける安全性評価", SCIS 2024, 4A2-2, 2024.
  • Quan Yuan, Tsuyoshi Takagi, "Quantum-access Security of Probablistic Fiat-Shamir Signature Schemes", SCIS 2024, 4A2-3, 2024.

2023年

査読有

  • Ryo Ohashi, Shushi Harashita, "Differential forms on the curves associated to Appell-Lauricella hypergeometric series and the Cartier operator on them", Yokohama Mathematical Journal, Vol.69, pp.1-32, 2023.
  • Keyang Liu, Maxim Jourenko, Mario Larangeira, "Reducing Latency of DAG-based Consensus in the Asynchronous Setting via the UTXO Model", The 21th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE ISPA 2023, 2023.
  • Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan, "Improving Privacy of Anonymous Proof-of-Stake Protocols", 22nd International Conference on Cryptology and Network Security, CANS 2023, LNCS 14342, pp.368–391, 2023.
  • Keyang Liu, Xingxin Li, Tsuyoshi Takagi, "Robust Property-Preserving Hash Meets Homomorphism", The 26th Information Security Conference, ISC 2023, LNCS 14411, pp. 537–556, 2023.
  • Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", Finite Fields and Their Applications, Vol.92, Article 102310, pp.1-45, 2023.
  • Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, "Efficient Noise Generation Protocols for Differentially Private Multiparty Computation", IEEE Transactions on Dependable and Secure Computing, Vol.20, No.6, pp.4486 - 4501, 2023.
  • Kosuke Sakata, "Development of Hybrid Approach for solving MQ Problem: Intermediate Hybrid Approach", JSIAM Letters, Vol.15, pp.109-112, 2023.
  • Momonari Kudo, Tasuku Nakagawa, Tsuyoshi Takagi, "Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing C6", Mathematics in Computer Science, Vol.17, Article Number 21, 2023.
  • Hiroki Furue, Yasuhiko Ikematsu, "A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack", The 18th International Workshop on Security, IWSEC 2023, LNCS 14128, pp.101–116, 2023.
  • Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi, "Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors", The 18th International Workshop on Security, IWSEC 2023, LNCS 14128, pp.117-136, 2023.
  • Yusuke Aikawa, Hyungrok Jo, Shohei Satake, "Left-Right Cayley Hashing: A New Framework for Provably Secure Hash Functions", 5th International Workshop on Mathematical Cryptology, MathCrypt 2023, 2023.
  • Yuta Kambe, Akira Katayama, Yusuke Aikawa, Yuki Ishihara, Masaya Yasuda, Kazuhiro Yokoyama, "Solving the supersingular isogeny problem over $\mathbb{F}_p$ via the Deuring correspondence (Short paper)", 5th International Workshop on Mathematical Cryptology, MathCrypt 2023, 2023.
  • Hiroki Furue, Tsuyoshi Takagi, "Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields", The 14th International Conference on Post-Quantum Cryptography, PQCrypto 2023, LNCS 14154, pp.357-378, 2023.
  • Saki Otsuki, Hiroshi Onuki, Tsuyoshi Takagi, "Improvement of the Square-Root Vélu Formulas for Isogeny-Based Cryptography", JSIAM Letters, Vol.15, pp.61-64, 2023.
  • Keitaro Hiwatashi and Koji Nuida, "Exponential Correlated Randomness is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation", Conference on Information-Theoretic Cryptography 2023, ITC 2023, No.18, pp.18:1–18:16, 2023.
  • Quan Yuan, Mehdi Tibouchi, Masayuki Abe, "Quantum-access Security of Hash-based Signature Schemes", 28th Australasian Conference on Information Security and Privacy, ACISP 2023, LNCS 13915, pp.343–380, 2023.
  • Naoto Kimura, Atsushi Takayasu, Tsuyoshi Takagi, "Memory-Efficient Quantum Information Set Decoding Algorithm", 28th Australasian Conference on Information Security and Privacy, ACISP 2023, LNCS 13915, pp.452–468, 2023.
  • Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence", 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, LNCS 13905, pp.695–724, 2023.
  • Keitaro Hiwatashi, Koji Nuida, "Explicit and Nearly Tight Lower Bound for 2-party Perfectly Secure FSS", 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, LNCS 13906, pp.541–554, 2023.
  • Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit, "M-SIDH and MD-SIDH: countering SIDH attacks by masking information", the 42nd Annual International Conference on the Theory and Applications of Cryptology and Information Security, EUROCRYPT 2023, LNCS 14008, pp.282–309, 2023.
  • Ren Taguchi, Atsushi Takayasu, "Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain", RSA Conference 2020 Cryptographer's Track, CT-RSA 2023, LNCS 13871, pp.57–83, 2023.
  • Reo Eriguchi, Noboru Kunihiro, Koji Nuida, "Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures", Designs, Codes and Cryptography, Vol.91, pp.1751–1778, 2023.
  • Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi, "Recent Progress in the Security Evaluation of Multivariate Public-Key Cryptography", IET Information Security, Vol.17, No.2, pp.210-226, 2023.
  • Keita Emura, Atsushi Takayasu, "A Generic Construction of CCA-secure Identity-based Encryption with Equality Test against Insider Attacks", IEICE Transactions, Vol.E106–A, No.3, pp.193-202, 2023.
  • Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi, "Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption", IEICE Transactions, Vol.E106–A, No.3, pp.228-240, 2023.
  • Reo Eriguchi, Noboru Kunihiro, Koji Nuida, "Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR", IEICE Transactions, Vol.E106–A, No.3, pp.263-271, 2023.
  • Ryo Ohashi, Momonari Kudo, Shushi Harashita, "Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4", International Workshop on the Arithmetic of Finite Fields, WAIFI 2022, LNCS 13638, pp.107–124, 2023.
  • Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi, "L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space", Discrete Applied Mathematics, Vol.328, pp.70-88, 2023.
  • Jintai Ding, Seungki Kim, TsuyoshiTakagi, Yuntao Wang, Bo-yin Yang, "A Physical Study of the LLL Algorithm", Journal of Number Theory, Vol.244, pp.339-368, 2023.

査読無

  • 梶田海成, 大竹剛, 高木剛, "N者アダプタ署名の構成とコンテンツの来歴情報管理システムへの応用", コンピュータセキュリティシンポジウム2023, CSS 2023, 2E3-4, pp.508-515, 2023.
  • 坂田康亮, 高木剛, "Hilbert級数を用いたMQ問題の高速解法とその実装", コンピュータセキュリティシンポジウム2023, CSS 2023, 3E2-2, pp.1092-1099, 2023.
  • Kohei Nakagawa, Hiroshi Onuki, "QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras", コンピュータセキュリティシンポジウム2023, CSS 2023, 3E2-4, pp.1108-1114, 2023.
  • 江村恵太, 佐藤慎悟, 高安敦, "属性ベース鍵付き準同型暗号の一般的構成", コンピュータセキュリティシンポジウム2023, CSS 2023, 3E3-2, pp.1121-1128, 2023.
  • 櫻井徳吾, 高安敦, "Module-LWE問題に対する格子の回転構造を利用したBDD列挙法", 電子情報通信学会情報セキュリティ研究会, 信学技報, vol.123, no.26, ISEC2023-10, pp.54-61, 2023.
  • Ren Taguchi, Atsushi Takayasu, "Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain (from CT-RSA 2023)", 電子情報通信学会情報セキュリティ研究会, 信学技報, vol.123, no.26, ISEC2023-13, pp.66-66, 2023.
  • 伊藤直也, 加藤拓, 古江弘樹, 高木剛, "多変数多項式求解問題に基づく効率的な閾値リング署名", SCIS 2023, 1A1-1, 2023.
  • Hiroki Furue, Yasuhiko Ikematsu, "A MinRank attack against variants of UOV signature scheme", SCIS 2023, 1A1-2, 2023.
  • 古江弘樹, 池松泰彦, 星野文学, 清村優太郎, 齋藤恆和, 高木剛, "Secure Parameters for Multivariate Polynomial Signature Scheme QR-UOV", SCIS 2023, 1A1-4, 2023.
  • Fumitaka Hoshino, Hiroki Furue, Yasuhiko Ikematsu, Tsunekazu Saito, Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Software Implementation of Signature Scheme QR-UOV", SCIS 2023, 1A1-4, 2023.
  • 秋山浩一郎, 坂田康亮, "近似イデアル分解問題に基づく不定方程式暗号", SCIS 2023, 1A2-2, 2023.
  • Quan Yuan, Tsuyoshi Takagi, "Revisiting Fiat-Shamir Signatures under Superposition Attacks", SCIS 2023, 1A2-5, 2023.
  • 伊藤直也, 杉崎行優, 土田光, 高木剛, "ゲート数が少ないbinary adder treeとmulti-key TFHEを用いた性能評価", SCIS 2023, 1B3-2, 2023.
  • Yen-Ting Kuo, Atsushi Takayasu, "Combined Power Analysis and Lattice Attack on CRYSTALS-Kyber", SCIS 2023, 2E2-1, 2023.
  • 枝村天真, 高安敦, "適応的シミュレーション安全なIDベース内積関数型暗号の構成", SCIS 2023, 3A1-3, 2023.
  • 樋渡啓太郎, 縫田光司, "online-optimalな2者間秘密計算における乱数長の下界について", SCIS 2023, 3B2-1, 2023.
  • 守谷共起, 工藤桃成, "種数3における分解 Richelot 同種写像計算アルゴリズムとその応用", SCIS 2023, 3B4-1, 2023.
  • 小貫啓史, "モジュラー多項式の拡張", SCIS 2023, 3B4-5, 2023.
  • 坂田康亮, "MQ問題を解くための改良されたHybrid approachの計算量評価", SCIS 2023, 4A1-3, 2023.
  • 坂田康亮, 秋山浩一郎, "近似イデアル分解問題に基づく不定方程式暗号に対する鍵復元攻撃の計算量評価", SCIS 2023, 4A1-4, 2023.
  • 青木大地, 峯松一彦, 岡村利彦, 高木剛, "符号付き整数に対する効率的な剰余乗算", SCIS 2023, 4A2-2, 2023.
  • 田口廉, 高安敦, "バイナリECDLPに対するShorのアルゴリズムの量子ビット削減", SCIS 2023, 4A2-4, 2023.

2022年

査読有

  • Momonari Kudo, Shushi Harashita, "Algorithmic study of superspecial hyperelliptic curves over finite fields", Commentarii mathematici Universitatis Sancti Pauli, Vol.70, pp.49-64, 2022.
  • Kyoichi Asano, Keita Emura, Atsushi Takayasu, "More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model", The 24th International Conference on Information Security, ISC 2022, LNCS 13640, pp.75-83, 2022.
  • Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, "On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR", The twentieth Theory of Cryptography Conference, TCC 2022, LNCS 13749, pp.60-88, 2022.
  • Momonari Kudo, Shushi Harashita, "Superspecial Trigonal Curves of Genus 5", Experimental Mathematics, Vol.31(3), pp.908-919, 2022.
  • Kyoichi Asano, Keita Emura, Atsushi Takayasu, and Yohei Watanabe, "A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test", The 16th International Conference on Provable and Practical Security, ProvSec 2022, LNCS 13600, pp. 3–19, 2022.
  • Shinya Okumura, Shusaku Uemura, Momonari Kudo, "Revisiting Lattice-Based Attacks Using Trace Map for Ring-LWE", 2022 International Symposium on Information Theory and Its Applications, ISITA 2022, 2022.
  • Daichi Aoki, Kazuhiko Minematsu, Toshihiko Okamura, Tsuyoshi Takagi, "Efficient Word Size Modular Multiplication over Signed Integers", 29th IEEE Symposium on Computer Arithmetic, ARITH 2022, pp.94-101, 2022. (pdf)
  • Hiroki Furue, Yutaro Kiyomura, Tatsuya Nagasawa, Tsuyoshi Takagi, "A New Fault Attack on UOV Multivariate Signature Scheme", 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022, LNCS 13512, pp.124–143, 2022.
  • Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi, "The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography", 4th International Workshop on Mathematical Cryptology, MathCrypt 2022, 2022. (pdf)
  • Hiroshi Onuki, "On the key generation in SQISign", Number-Theoretic Methods in Cryptology, NuTMiC 2021, 2022. (pdf)
  • Hiroki Furue, Momonari Kudo, "On the computational enumeration of superspecial curves: A survey and complements (extended abstract)", Computer Algebra in Scientific Computing 2022, CASC 2022, 2022. (pdf)
  • Tasuku Nakagawa, Momonari Kudo, Tsuyoshi Takagi, "Efficient search for superspecial hyperelliptic curves of genus 4 in large characteristic (extended abstract)", Computer Algebra in Scientific Computing 2022, CASC 2022, 2022. (pdf)
  • Kosuke Sakata, Momonari Kudo, Taku Kato, Kazuhiro Yokoyama, "Implementation report on computing Groebner bases over exterior algebra (extended abstract)", Computer Algebra in Scientific Computing 2022, CASC 2022, 2022. (pdf)
  • Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi, "Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values", 17th International Workshop on Security, IWSEC 2022, LNCS 13504, pp.147-165, 2022.
  • Hirotomo Shinoki, Koji Nuida, "On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption". 17th International Workshop on Security, IWSEC 2022, LNCS 13504, pp.189–207, 2022.
  • Nariyasu Heseri, Koji Nuida, "Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols", 17th International Workshop on Security, IWSEC 2022, LNCS 13504, pp.208–223, 2022.
  • Shu Takahashi, Hiroshi Onuki, Tsuyoshi Takagi, "Explicit Construction of the Square-root Vélu's Formula on Edwards Curves", JSIAM Letters, Vol.14, pp.108–110, 2022.
  • Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, "Multi-Server PIR with Full Error Detection and Limited Error Correction", 3rd Conference on Information-Theoretic Cryptography, ITC 2022, pp.1:1-1:20, 2022.
  • Shingo Sato, Keita Emura, Atsushi Takayasu, "Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation", 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, LNCS 13269, pp.3-23, 2022.
  • Keisuke Hakuta, Hiroyuki Ochiai, Tsuyoshi Takagi, "Comments on Efficient Batch Verification Test for Digital Signatures based on Elliptic Curves", Mathematica Slovaca, Vol.72, No.3, pp.575-590, 2022.
  • Yuta Kambe, Masaya Yasuda, Masayuki Noro, Kazuhiro Yokoyama, Yusuke Aikawa, Katsuyuki Takashima, Momonari Kudo, "Solving the Constructive Deuring Correspondence via the Kohel-Lauter-Petit-Tignol Algorithm", Mathematical Cryptology, Vol.1, No.2, pp.10–24, 2022.
  • Yuta Kambe, Yusuke Aikawa, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama, "Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence", 7th International Conference on Mathematics and Computing, ICMC2021, AISC 1412, pp.953-966, 2022.
  • Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida, "An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks", IEICE Transactions, Vol.E105.A, pp.404-416, 2022.
  • Hiroshi Onuki, Tomoki Moriya, "Radical Isogenies on Montgomery Curves", 25th International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, LNCS 13177, pp.473-497, 2022.
  • Yuji Hashimoto, Koji Nuida, Goichiro Hanaoka, "Tight Security of Twin-DH Hashed ElGamal KEM in Multi-user Setting", IEICE Transactions, Vol.E105.A, No.3, pp.173-181, 2022.
  • Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi, "Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem", IEICE Transactions, Vol.E105.A, No.3, pp.195-202, 2022.
  • Pengfei Wang, Xiangyu Su, Maxim Jourenko, Zixian Jiang, Mario Larangeira, Keisuke Tanaka, "Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases", The 13th International Symposium on Cyberspace Safety and Security, CSS 2021, LNCS 13172, pp.131-144, 2022.

査読無

  • 青木和麻呂, 大槻紗季, 小貫啓史, 高木剛, "数体篩法実装は双子smooth素数の探索に役立つか?", SCIS 2022, 1A1-1, 2022.
  • 青木大地, 岡村利彦, 峯松一彦, 高木剛, "SABERにおける数論変換のC言語実装", SCIS 2022, 1A1-4, 2022.
  • 加藤拓, 清村優太郎, 高木剛, "多変数多項式署名Rainbowに対する新たな乱数固定のフォルト攻撃", SCIS 2022, 1A1-6, 2022.
  • 大槻紗季, 青木和麻呂, 小貫啓史, 高木剛, "同種写像暗号B-SIDHの実験による計算量評価と効率的な素数pの条件", SCIS 2022, 1A2-2, 2022.
  • 古江弘樹, 工藤桃成, "A new efficient variant of the XL algorithm using the arithmetic over polynomial matrices", SCIS 2022, 1A2-5, 2022.
  • 坂田康亮, "MQ問題の解決のためのHybrid approachの改良の検討", SCIS 2022, 1A2-6, 2022.
  • 小貫啓史, "SQISignの公開鍵の安全性", SCIS 2022, 2A1-2, 2022.
  • 神戸祐太, 高橋康, 相川勇輔, 工藤桃成, 安田雅哉, 高島克幸, 横山和弘, "SIKEに対するvOW法の内部関数の新計算手法", SCIS 2022, 2A1-3, 2022.
  • 守谷共起, 小貫啓史, 相川勇輔, 高木剛, "Montgomery曲線のx座標を用いた3-同種計算の最小演算コスト", SCIS 2022, 2A5-3, 2022.
  • 篠木寛鵬, 縫田光司, "鍵付き準同型暗号における演算の拡張と安全性", SCIS 2022, 3D1-2, 2022.
  • 加藤拓, 古江弘樹, 高木剛, "帰着効率がタイトなhelper付きUnruh変換の提案と効率的なディジタル署名の構成", SCIS 2022, 3D1-3, 2022.
  • 仁平貴大, 縫田光司, "秘密分散を用いた秘匿浮動小数点数除算・平方根計算の改良", SCIS 2022, 3E1-3, 2022.
  • 奥村伸也, 上村周作, 工藤桃成, "トレース写像を用いたRing-LWE問題に対する格子攻撃の再考" SCIS 2022, 4A2-3, 2022.

2021年

査読有

  • Reo Eriguchi, Koji Nuida, "Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials", the 27th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2021, LNCS 13091, pp.191-221, 2021.
  • Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi, "A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV", the 27th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2021, LNCS 13093, pp.187-217, 2021.
  • Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi, "New complexity estimation on the Rainbow-Band-Separation attack", Theoretical Computer Science, Vol.896, pp.1-18, 2021.
  • Momonari Kudo, "Computing representation matrices for the Frobenius on cohomology groups", Journal of Symbolic Computation, Vol.109, pp.441-464, 2022.
  • Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi, "Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem", 16th International Workshop on Security, IWSEC 2021, LNCS 12835, pp.23-41, 2021.
  • Changze Yin, Yacheng Wang, Tsuyoshi Takagi, "Simple Matrix Signature Scheme", 16th International Workshop on Security, IWSEC 2021, LNCS 12835, pp.227-237, 2021.
  • Yuji Hashimoto, Koji Nuida, "Improved Supersingularity Testing of Elliptic Curves Using Legendre Form", Computer Algebra in Scientific Computing 2021, CASC 2021, LNCS 12865, pp.121-135, 2021.
  • Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, "Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation", Twenty-Fifth International Conference on Financial Cryptography and Data Security, FC 2021, LNCS 12674, pp.271-290, 2021.
  • Reo Eriguchi, Kazuma Ohara, Shota Yamada, Koji Nuida, "Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions", The 41st Annual International Cryptology Conference, CRYPTO2021, LNCS 12826, pp.305-334, 2021.
  • Hiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi, "Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem", 12th International Workshop on Post-Quantum Cryptography, PQCrypto 2021, LNCS 12841, pp.65-78, 2021.
  • Momonari Kudo, Shushi Harashita, "Parametrizing generic curves of genus five and its application to finding curves with many rational points", Effective Methods in Algebraic Geometry 2021, MEGA2021, 2021. (pdf)
  • Yuji Hashimoto, Katsuyuki Takashima, "Improved supersingularity testing of elliptic curves", JSIAM Letters, Vol.13, pp.29-32, 2021.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "A Compact Digital Signature Scheme Based on the Module-LWR problem", IEICE Transactions, Vol.E104–A, No.9, pp.1219-1234, 2021.
  • Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida, "Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks", The 16th ACM ASIA Conference on Computer and Communications Security, AsiaCCS 2021, pp.616–627, 2021.
  • Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-Constrained Implementation of Lattice-based Encryption Scheme on Standard Java Card Platform", IET Information Security, Vol.15, pp.267-281, 2021.
  • Koji Nuida, "Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic", 24th International Conference on Practice and Theory of Public-Key Cryptography, PKC 2021, LNCS 12711, pp.441-468, 2021.
  • Yuntao Wang, Tsuyoshi Takagi, "Studying Lattice Reduction Algorithms Improved by Quick Reordering Technique", International Journal of Information Security, Vol.20, pp.257-268, 2021.
  • Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi, "An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH", The 23rd Annual International Conference on Information Security and Cryptology, ICISC 2020, LNCS 12593, pp.58-84, 2021.
  • Bernhard Mühlherr and Koji Nuida, "Locally Finite Continuations and Coxeter Groups of Infinite Ranks", Journal of Pure and Applied Algebra, Vol.225, Article 106464, 2021.
  • Hiroshi Onuki, "On oriented supersingular elliptic curves", Finite Fields and Their Applications, Vol 69, Article 101777, 2021.
  • Kazumasa Shinagawa, Koji Nuida, "A Single Shuffle Is Enough for Secure Card-Based Computation of Any Boolean Circuit", Discrete Applied Mathematics, Vol.289, pp.248-261, 2021.

査読無

  • Hiroki Furue, Yutaro Kiyomura, Tatsuya Nagasawa, Tsuyoshi Takagi, "A New Fault Attack on UOV Multivariate Signature Scheme", コンピュータセキュリティシンポジウム2021, CSS 2021, 3E2-2, 2021.
  • 前田勇作, 縫田光司, "CCA安全な鍵付きレベル2準同型暗号の構成", SCIS2021, 1A1-5, 2021.
  • 上村周作, 福島和英, 清本晋作, 工藤桃成, 高木剛, "LWR問題に対するBai-Galbraith埋込法の格子に現れる最短ベクトル", SCIS2021, 2A3-3, 2021.
  • 小田川拓利, 縫田光司, "Optimal DeepLLL系基底簡約の停止性の証明と計算量評価", SCIS2021, 2A3-4, 2021.
  • 小川一人, 縫田光司, "MPCを用いたプライバシー保護付きいつでもどこでもコンテンツ配信", SCIS2021, 2E4-3, 2021.
  • 縫田光司, "ハイブリッド型記憶容量制約攻撃モデルの多段化に関する考察", SCIS2021, 3A1-1, 2021.
  • 大住友輝, 上村周作, 工藤桃成, 高木剛, "格子暗号SABERに対する鍵不一致攻撃", SCIS2021, 3A3-2, 2021.
  • 秋山浩一郎, 池松泰彦, 小貫啓史, 縫田光司, 高木剛, "近似イデアルGCD問題に基づく不定方程式暗号" SCIS2021, 3A4-1, 2021.
  • 守谷共起, 小貫啓史, 高木剛, "Edwards曲線における高速な高次の同種写像計算方式", SCIS2021, 3A4-3, 2021.
  • 光成滋生, 縫田光司, "Lifted-ElGamal暗号を用いた任意関数演算の二者間秘密計算プロトコルのmaliciousモデルにおける効率化", SCIS2021, 3B2-2, 2021.
  • 江利口礼央, 大原一真, 山田翔太, 縫田光司, "非対話型秘密計算プロトコルに対する通信量の削減と安全性解析", SCIS2021, 4B1-1, 2021.
  • 品川和雅, 江利口礼央, 縫田光司, "平方剰余に基づくPrivate Simultaneous Messagesについて", SCIS2021, 4B1-2, 2021.