Updated on 2026/01/22

写真a

 
TANAKA KEISUKE
 
Organization
School of Computing Professor
Title
Professor
External link

News & Topics

Degree

  • Ph.D. ( Japan Advanced Institute of Science and Technology )

Research Interests

  • Computer Science

  • 計算機科学

Research Areas

  • Informatics / Theory of informatics

Education

  • Japan Advanced Institute of Science and Technology   Graduate School, Division of Information Science

    - 1997

      More details

  • Japan Advanced Institute of Science and Technology

    - 1997

      More details

    Country: Japan

    researchmap

  • University of Yamanashi   Faculty of Engineering

    - 1992

      More details

    Country: Japan

    researchmap

Research History

  • Tokyo Institute of Technology   Department of Mathematical and Computing Sciences   Associate Professor

    2004

      More details

  • Tokyo Institute of Technology   Department of Mathematical and Computing Sciences   Assistant Professor

    2001 - 2004

      More details

  • :NTT Information Sharing Platform Laboratories   Reseach Engineer

    1999 - 2001

      More details

  • :NTT Information Sharing Platform Laboratories   Employee

    1997 - 1999

      More details

Professional Memberships

▼display all

Committee Memberships

  • 電子情報通信学会   コンピュテーション研究専門委員会 幹事 、和文論文誌 D-I 編集委員  

    2000 - 2004   

      More details

    Committee type:Academic society

    電子情報通信学会

    researchmap

  • 情報処理学会   アルゴリズム研究会 運営委員 、会誌 編集委員 (基礎・理論分野) 、アルゴリズム研究会 幹事  

    2000 - 2004   

      More details

    Committee type:Academic society

    情報処理学会

    researchmap

  • LAシンポジウム   会誌編集担当  

    1999 - 2000   

      More details

    Committee type:Academic society

    LAシンポジウム

    researchmap

Books

  • 計算理論の基礎 [原著第2版] 2. 計算可能性の理論

    共立出版  2008  ( ISBN:9784320122086

     More details

  • 計算理論の基礎 [原著第2版] 1. オートマトンと言語

    共立出版  2008  ( ISBN:9784320122079

     More details

  • 計算理論の基礎 [原著第2版] 3. 複雑さの理論

    共立出版  2008  ( ISBN:9784320122093

     More details

  • 計算理論の基礎

    共立出版  2000 

     More details

MISC

  • Conditional converge cast

    Daisuke Inoue, Keisuke Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E91A ( 6 )   1537 - 1540   2008.6

     More details

  • Schemes for encryption with anonymity and ring signature

    R Hayashi, K Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E89A ( 1 )   66 - 73   2006.1

     More details

  • A Cramer-Shoup variant related to the quadratic residuosity problem

    H Hiwatari, K Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E89A ( 1 )   203 - 205   2006.1

     More details

  • Shuffle for Paillier's encryption scheme

    T Onodera, K Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E88A ( 5 )   1241 - 1248   2005.5

     More details

  • Density attack to the knapsack cryptosystems with enumerative source encoding

    K Omura, K Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E87A ( 6 )   1564 - 1569   2004.6

     More details

    Language:English  

    Web of Science

    researchmap

  • Limiting negations in bounded-depth circuits: An extension of Markov's theorem

    SC Sung, K Tanaka

    INFORMATION PROCESSING LETTERS   90 ( 1 )   15 - 20   2004.4

     More details

  • An efficient anonymous group identification scheme with short secret keys

    T Isshiki, K Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E87A ( 3 )   757 - 760   2004.3

     More details

    Language:English   Publishing type:Rapid communication, short report, research note, etc. (scientific journal)  

    Web of Science

    researchmap

  • Families of RSA-type Trap-door Permutations with a Common Domain

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1505 - 1510   2004

     More details

  • An Efficient Anonymous Group Identification Scheme with Short Secret Keys

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1431 - 1434   2004

     More details

  • 同じ値域をもつ RSA 関数族の構成

    林良太郎, 田中圭介

    2004 年冬の LA シンポジウム   2004

     More details

  • Anonymity on Public-Key Cryptosystems

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1511 - 1516   2004

     More details

  • Threshold Ring Signatures in the Random Oracle Model

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1185 - 1190   2004

     More details

  • (n-t)-out-of-n しきい値付きリング署名

    一色寿幸, 田中圭介

    2004 年冬の LA シンポジウム   2004

     More details

  • Anonymity on Public-Key Cryptosystems

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1511 - 1516   2004

     More details

  • Short Signatures with Message Recovery in the Random Oracle Model

    Proceedings of the 2004 Symposium on Cryptography and Information Security   637 - 640   2004

     More details

  • Threshold Ring Signatures in the Random Oracle Model

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1185 - 1190   2004

     More details

  • A Verifiable Secret Shuffle of the Paillier's Encryption Scheme

    Proceedings of the 2004 Symposium on Cryptography and Information Security   955 - 960   2004

     More details

  • A Verifiable Secret Shuffle of the Paillier's Encryption Scheme

    ONODERA T.

    955 - 960   2004

     More details

  • Short Signatures with Message Recovery in the Random Oracle Model

    Proceedings of the 2004 Symposium on Cryptography and Information Security   637 - 640   2004

     More details

  • Families of RSA-type Trap-door Permutations with a Common Domain

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1505 - 1510   2004

     More details

  • An Efficient Anonymous Group Identification Scheme with Short Secret Keys

    Proceedings of the 2004 Symposium on Cryptography and Information Security   1431 - 1434   2004

     More details

  • An Efficient Anonymous Group Identification Scheme with Short Secret Keys

    Toshiyuki Isshiki Keisuke Tanaka

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E87-A ( 3 )   757 - 760   2004

     More details

  • Density atack and Different Enumerative Source Encoding (Extended Abstract)

    529 - 534   2003

     More details

  • Quantum Bit-Commitment for Small Strage Based on Quantum One-Way Permutations

    1041 - 1046   2003

     More details

  • Density atack and Different Enumerative Source Encoding (Extended Abstract)

    529 - 534   2003

     More details

  • 一方向性置換に基づく小さい保存領域のための量子ビットコミットメント

    一色寿幸, 田中圭介

    2003 年冬の LA シンポジウム   27 - 32   2003

     More details

  • Key-Privacy in Digital Signature

    55 - 60   2003

     More details

  • Quantum Bit-Commitment for Small Storage Based on Quantum One-Way Permutations

    KEISUKE TANAKA

    New Generation Computing   21   339 - 345   2003

     More details

  • Limiting negations in bounded-depth circuits: An extension of Markov's theorem

    SC Sung, K Tanaka

    ALGORITHMS AND COMPUTATION, PROCEEDINGS   2906   108 - 116   2003

     More details

    Language:English  

    Web of Science

    researchmap

  • 別の数え上げ符号を用いたナップザック暗号

    大村慶二, 田中圭介

    2003 年冬の LA シンポジウム   128 - 133   2003

     More details

  • Key-Privacy in Digital Signature

    55 - 60   2003

     More details

  • Quantum bit-commitment for small storage based on quantum one-way permutations

    K Tanaka

    NEW GENERATION COMPUTING   21 ( 4 )   339 - 345   2003

     More details

    Language:English  

    Web of Science

    researchmap

  • Quantum Bit-Commitment for Small Strage Based on Quantum One-Way Permutations

    1041 - 1046   2003

     More details

  • An exponential gap with the removal of one negation gate

    SC Sung, K Tanaka

    INFORMATION PROCESSING LETTERS   82 ( 3 )   155 - 157   2002.5

     More details

  • A New Approach to Knapsack Cryptosystems (Extended Abstract)

    Tatsuaki Okamoto, Keisuke Tanaka

    Proceedings of the 3rd International Workshop on Information Security Applications   2002

     More details

  • A New Approach to Knapsack Cryptosystems (Extended Abstract)

    Tatsuaki Okamoto, Keisuke Tanaka

    Proceedings of the 3rd International Workshop on Information Security Applications   2002

     More details

  • 量子ゼロ知識対話証明について

    田中圭介, 岡本龍明

    2002年冬のLAシンポウジウム   2002

     More details

  • 量子公開鍵暗号

    田中圭介, 岡本龍明

    電子情報通信学会誌   85 ( 8 )   613 - 617   2002

     More details

  • Succinct Quantum Proofs for Graph Non-Isomorphism

    Tatsuaki Okamoto, Keisuke Tanaka, Osamu Watanabe

    2001

     More details

  • 量子公開鍵暗号と量子計算暗号

    岡本龍明, 田中圭介

    電子情報通信学会 第5回量子情報技術研究会 招待講演   2001

     More details

  • Succinct Quantum Proofs for Graph Non-Isomorphism

    Tatsuaki Okamoto, Keisuke Tanaka, Osamu Watanabe

    2001

     More details

  • 量子公開鍵暗号

    岡本龍明, 田中圭介

    Computer Today 2001 年 9 月号, サイエンス社   30 - 35   2001

     More details

  • A Quantum Public-Key Encryption Scheme and Its Improvement

    Keisuke Tanaka, Tatsuaki Okamoto

    2001

     More details

  • 量子公開鍵暗号とその改良

    田中圭介, 岡本龍明

    2001年冬のLAシンポジウム   2001

     More details

  • A Quantum Public-Key Encryption Scheme and Its Improvement

    Keisuke Tanaka, Tatsuaki Okamoto

    2001

     More details

  • 素因数分解とデータベース検索に対する量子アルゴリズム

    田中圭介

    電子情報通信学会 ソサイエティ大会 情報システムソサイエティ チュートリアル講演 「量子計算機構」   2000

     More details

  • Lower Bounds on Negation-Limited Inverters

    Shao-Chin Sung, Keisuke Tanaka

    Discrete Mathematics and Theoretical Computer Science   360 - 368   1999

     More details

  • Lower bounds on negation-limited inverters

    SUNG S.

    Proc. 2nd DMTCS : Discrete Mathematics and Theoretical Computer Science Conference, 1999   360 - 368   1999

     More details

  • Minimizing maximum absolute lateness and range of lateness under generalized due dates on a single machine

    K Tanaka, M Vlach

    ANNALS OF OPERATIONS RESEARCH   86   507 - 526   1999

     More details

  • On the complexity of negation-limited Boolean networks

    R Beals, T Nishino, K Tanaka

    SIAM JOURNAL ON COMPUTING   27 ( 5 )   1334 - 1347   1998.10

     More details

  • Minimizing the range of lateness on a single machine under generalized due dates

    K Tanaka, M Vlach

    INFOR   35 ( 4 )   286 - 296   1997.11

     More details

    Language:English  

    Web of Science

    researchmap

  • Single machine scheduling to minimize the maximum lateness with both specific and generalized due dates

    K Tanaka, M Vlach

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E80A ( 3 )   557 - 563   1997.3

     More details

    Language:English  

    Web of Science

    researchmap

  • Single machine scheduling with fuzzy due dates

    TANAKA K.

    Proceedings of the VII International Fuzzy Systems Association World Congress, IFSA'97   195 - 199   1997

     More details

  • Single Machine Scheduling with Fuzzy Due Dates

    Keisuke Tanaka Milan Vlach

    7th International Fuzzy Systems Association World Congress   195 - 199   1997

     More details

  • Negation-limited circuit complexity of symmetric functions

    K Tanaka, T Nishino, R Beals

    INFORMATION PROCESSING LETTERS   59 ( 5 )   273 - 279   1996.9

     More details

  • A relationship between the number of negations and the circuit size

    K Tanaka, T Nishino

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E79D ( 9 )   1355 - 1357   1996.9

     More details

    Language:English   Publishing type:Rapid communication, short report, research note, etc. (scientific journal)  

    Web of Science

    researchmap

  • A Relationship between the Number of Negations and the Circuit Size

    Keisuke Tanaka, Tetsuro Nishino

    IEICE Transactions on Information and Systems   E79-D ( 9 )   1355 - 1357   1996

     More details

  • Improved algorithms for single machine scheduling with fuzzy due dates

    Tanaka Keisuke, Vlach Milan

    Research report   96   260 - 269   1996

     More details

    Language:English   Publisher:Japan Advanced Institute of Science and Technology  

    CiNii Books

    researchmap

  • Single Machine Scheduling to Minimize the Maximum Lateness with Both Specific and Generalized Due Dates

    Keisuke Tanaka Milan Vlach

    Proceedings of the Second International Symposium on Operations Research and its Applications   250 - 259   1996

     More details

  • Improved Algorithms for Single Machine Scheduling with Fuzzy Due Dates

    Keisuke Tanaka Milan Vlach

    Proceedings of the Second International Symposium on Operations Research and its Applications   260 - 269   1996

     More details

  • Single Machine Scheduling to Minimize the Maximum Lateness with Both Specific and Generalized Due Dates

    Keisuke Tanaka Milan Vlach

    Proceedings of the Second International Symposium on Operations Research and its Applications   250 - 259   1996

     More details

  • Approximation and special cases of common subtrees and editing distance

    MM Halldorsson, K Tanaka

    ALGORITHMS AND COMPUTATION   1178   75 - 84   1996

     More details

    Language:English  

    Web of Science

    researchmap

  • Single machine scheduling with generalized due dates

    TANAKA K.

    Symposium on Combinatorial Optimization   1996

     More details

  • Single Machine Scheduling with Generalized Due Dates

    Keisuke Tanaka Milan Vlach

    Symposium on Combinatorial Optimization   1996

     More details

  • ON THE NEGATION-LIMITED CIRCUIT COMPLEXITY OF CLIQUE FUNCTIONS

    T NISHINO, K TANAKA

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E78D ( 1 )   86 - 89   1995.1

     More details

    Language:English   Publishing type:Rapid communication, short report, research note, etc. (scientific journal)  

    Web of Science

    researchmap

  • On the Negation-Limited Circuit Complexity of Clique Functions

    Tetsuro Nishino, Keisuke Tanaka

    IEICE Transactions on Information and Systems   E78-D ( 1 )   86 - 89   1995

     More details

  • More on the Complexity of Negation-Limited Circuits

    Robert Beals Tetsuro, Nishino Keisuke Tanaka

    Proceedings of the 27th Annual ACM Symposium on Theory of Computing   585 - 595   1995

     More details

  • More on the Complexity of Negation-Limited Circuits

    Robert Beals Tetsuro, Nishino Keisuke Tanaka

    Proceedings of the 27th Annual ACM Symposium on Theory of Computing   585 - 595   1995

     More details

  • On the complexity of negation-limited boolean networks (Preliminary version)

    Keisuke Tanaka, Tetsuro Nishino

    Proceedings of the Annual ACM Symposium on Theory of Computing   129502   38 - 47   1994.5

     More details

    Language:English   Publisher:Association for Computing Machinery  

    DOI: 10.1145/195058.195099

    Scopus

    researchmap

  • On the Complexity of Negation-Limited Boolean Networks (Preliminary Version)

    Keisuke Tanaka, Tetsuro Nishino

    Proceedings of the 26th Annual ACM Symposium on Theory of Computing   38 - 47   1994

     More details

▼display all

Presentations

  • Signcryption with Batch Verification

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • 中程度の難しさをもつ関数のモデルと方式

    2005 

     More details

  • Cramer-Shoup の構成法による平方剰余問題と関連する暗号方式

    2005 

     More details

  • Universal Designated-Verifier Signature with Aggregation

    Third International Conference on Information Technology and Applications  2005 

     More details

  • Security for Authenticated Key Exchange Based on Non-Malleability

    Third International Conference on Information Technology and Applications  2005 

     More details

  • Universally Anonymizable Public-Key Encryption

    11th International Conference on the Theory and Application of Cryptology and Information Security  2005 

     More details

  • An (n-t)-out-of-n Threshold Ring Signature Scheme

    10th Australasian Conference on Information Security and Privacy - ACISP 2005  2005 

     More details

  • ElGamal 暗号と Cramer-Shoup 暗号をもとにした匿名性を持つ暗号方式

    2005 

     More details

  • 認証付き鍵交換プロトコルにおける non-malleability に基づく安全性

    2005 

     More details

  • 指定検証者署名への変換が可能な Aggregate Signature

    2005 

     More details

  • 匿名性をもつ RSA 暗号方式のための Sampling Twice テクニック

    2005 

     More details

  • Multi-Bit Cryptosystems based on Lattice Problems

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Computational Bilinear Diffie-Hellman問題に基づく複数キーワード検索つき公開鍵暗号方式

    2005 

     More details

  • Universally Anonymizable Public-Key Encryption

    11th International Conference on the Theory and Application of Cryptology and Information Security  2005 

     More details

  • An (n-t)-out-of-n Threshold Ring Signature Scheme

    10th Australasian Conference on Information Security and Privacy - ACISP 2005  2005 

     More details

  • ランダムオラクルモデルを用いたプロトコルの指標と方式

    2005 

     More details

  • The Sampling Twice Technique for the RSA-based Cryptosystems with Anonymity

    PKC 2005 - The 8th International Workshop on Practice and Theory in Public Key Cryptography  2005 

     More details

  • The Sampling Twice Technique for the RSA-based Cryptosystems with Anonymity

    PKC 2005 - The 8th International Workshop on Practice and Theory in Public Key Cryptography  2005 

     More details

  • PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity

    11th Australasian conference - ACISP 2006  2006 

     More details

  • Universal Designated-Verifier Signature with Aggregation

    Third International Conference on Information Technology and Applications  2005 

     More details

  • Security for Authenticated Key Exchange Based on Non-Malleability

    Third International Conference on Information Technology and Applications  2005 

     More details

  • An RSA Family of Trap-door Permutations with a Common Domain and its Applications

    Public Key Cryptography - PKC2004  2004 

     More details

  • Quantum Public-Key Cryptosystems

    2000 

     More details

  • An RSA Family of Trap-door Permutations with a Common Domain and its Applications

    Public Key Cryptography - PKC2004  2004 

     More details

  • Quantum Public-Key Cryptosystems

    2000 

     More details

  • イデアル版 LWE 仮定に基づく IND-CCA2 安全な暗号方式

    2009年 暗号と情報セキュリティシンポジウム  2009 

     More details

  • NFALSE : 多項式環に基づくより高速な公開鍵暗号

    2009年 暗号と情報セキュリティシンポジウム  2009 

     More details

  • New Security Notions for Public-Key Encryption with Keyword Search

    2009 

     More details

  • Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Extended Abstruct)

    2009 

     More details

  • NTRU 暗号に関するゼロ知識証明

    大津  2009 

     More details

  • 暗号化関数とその性質についてーRSA関数とPaillier関数

    2008年度冬のLAシンポジウム  2009 

     More details

  • On the Weak Ideal Compression Functions

    2009 

     More details

  • Security of the OAEP Encryption Scheme in the Weakened Random Oracle Models

    2009 

     More details

  • Key generation on fast inversion of the Paillier encryption function

    2009 

     More details

  • A Random Oracle Model with Setting and Watching Queries

    2009 

     More details

  • Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Extended Abstruct)

    2009 

     More details

  • 近似サンプリング法の精度保証

    2009年 暗号とセキュリティシンポジウム  2009 

     More details

  • Key generation on fast inversion of the Paillier encryption function

    2009 

     More details

  • Security of the OAEP Encryption Scheme in the Weakened Random Oracle Models

    2009 

     More details

  • New Security Notions for Public-Key Encryption with Keyword Search

    2009 

     More details

  • A Random Oracle Model with Setting and Watching Queries

    2009 

     More details

  • On the Weak Ideal Compression Functions

    2009 

     More details

  • 認証つき公開鍵ステガノグラフィー

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • The semantic security and the non-mailleability with the randomness revealed for public-key encryption

    2008 

     More details

  • 鍵交換可能署名

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • ペアリングを用いた署名方式と Strong Diffie-Hellman 問題の関係

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • 忘却通信に関連するプロトコルの対称性

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • 二つのモデルの差を示す新たな暗号の実例

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • Relations Among Combined Notions of Security for Public-Key Encryption Schemes

    2008 

     More details

  • 条件付き紛失通信の対称性

    2008年冬のLAシンポジウム  2008 

     More details

  • ハッシュ関数に対する攻撃を考慮したIDベース暗号の安全性

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • イデアル格子問題に基づくコンパクトな署名方式

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • Encryption with partial information deletion

    The First AAAC Annual Meeting (AAAC 2008)  2008 

     More details

  • A Compact Signature Scheme with Ideal Lattice (Extended Abstract)

    Proceedings of the 2008 IEICE General Conference  2008 

     More details

  • Public-key cryptosystems with primitive power roots of unity

    The 13th Australasian Conference on Information Security and Privacy (ACISP 2008)  2008 

     More details

  • Public-Key Cryptosystems with Primitive Power Roots of Unity

    13th Australasian Conference, ACISP 2008  2008 

     More details

  • The semantic security and the non-mailleability with the randomness revealed for public-key encryption

    2008 

     More details

  • Relations Among Combined Notions of Security for Public-Key Encryption Schemes

    2008 

     More details

  • Schmidt-Takagi 暗号方式の変形

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems

    Advances in Cryptology - Asiacrypt 2008 (ASIACRYPT 2008)  2008 

     More details

  • ハッシュ関数に対する攻撃を考慮した電子署名の安全性

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • 暗号文の単純な分解

    2008年暗号と情報セキュリティシンポジウム  2008 

     More details

  • Analysis of the Waseda-Soshi-Miyaji scheme and on Quantum Computation Signature

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Secret Handshake with Multiple Groups

    7th International Workshop on Information Security Applications - WISA2006  2007 

     More details

  • 格子問題に基づく認証および署名方式

    2007年度夏のLAシンポジウム  2007 

     More details

  • Generic Conversion for the Anonymity against the Adaptive Chosen Ciphertext Attack

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Relationships between Data-Privacy and Key-Privacy

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Multi-bit cryptosystems based on lattice problems

    Public Key Cryptography - PKC 2007  2007 

     More details

  • Multi-Bit Cryptosystems Based on Lattice Problems

    PKC 2007, 110th International Workshop on Practice and Theory in Public Key Cryptography (PKC2007)  2007 

     More details

  • Anonymity on Paillier's trap-door permutation

    The 12th Australasian Conference on Information Security and Privacy (ACISP 2007)  2007 

     More details

  • 誤り訂正符号を用いた公開鍵暗号方式

    2007年夏のLAシンポジウム  2007 

     More details

  • Security of digital signature schemes in weakened random oracle models

    The 11th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2008)  2007 

     More details

  • Secret Handshake with Multiple Groups

    7th International Workshop on Information Security Applications - WISA2006  2007 

     More details

  • Anonymity on Paillier's trap-door permutation

    The 12th Australasian Conference on Information Security and Privacy (ACISP 2007)  2007 

     More details

  • Security of digital signature schemes in weakened random oracle models

    The 11th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2008)  2007 

     More details

  • Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems

    Advances in Cryptology - Asiacrypt 2008 (ASIACRYPT 2008)  2008 

     More details

  • Multi-bit cryptosystems based on lattice problems

    Public Key Cryptography - PKC 2007  2007 

     More details

  • Multi-Bit Cryptosystems Based on Lattice Problems

    PKC 2007, 110th International Workshop on Practice and Theory in Public Key Cryptography (PKC2007)  2007 

     More details

  • Public-Key Cryptosystems with Primitive Power Roots of Unity

    13th Australasian Conference, ACISP 2008  2008 

     More details

  • Encryption with partial information deletion

    The First AAAC Annual Meeting (AAAC 2008)  2008 

     More details

  • Public-key cryptosystems with primitive power roots of unity

    The 13th Australasian Conference on Information Security and Privacy (ACISP 2008)  2008 

     More details

  • 統計的距離を考慮したサンプリング

    2008年夏のLAシンポジウム  2008 

     More details

  • A Compact Signature Scheme with Ideal Lattice (Extended Abstract)

    Proceedings of the 2008 IEICE General Conference  2008 

     More details

  • Secret Handshake with Multiple Groups

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Sanitizable Signature with Secret Information

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Universal Designated-Verifier Ring Signature

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Analysis of the Waseda-Soshi-Miyaji scheme and on Quantum Computation Signature

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Fair Exchange of Signatures in the Many-to-One Model

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • A Password-Based Authenticated Key Exchange Protocol in the Three Party Setting

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Generic Conversion for the Anonymity against the Adaptive Chosen Ciphertext Attack

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Relationships between Data-Privacy and Key-Privacy

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Signcryption with Batch Verification

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Universally Anonymizable Public-Key Encryption

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Multi-Bit Cryptosystems based on Lattice Problems

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Secret Handshake with Multiple Groups

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity

    11th Australasian conference - ACISP 2006  2006 

     More details

  • A Password-Based Authenticated Key Exchange Protocol in the Three Party Setting

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Universal Designated-Verifier Ring Signature

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Sanitizable Signature with Secret Information

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Fair Exchange of Signatures in the Many-to-One Model

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

  • Universally Anonymizable Public-Key Encryption

    2006年 暗号と情報セキュリティシンポジウム  2006 

     More details

▼display all

Works

  • 量子公開鍵暗号の安全性及び匿名性をもつ公開鍵暗号に関する研究

    2004

     More details

    Work type:Artistic work  

    researchmap

  • 公開鍵暗号の安全性に関する研究

    2003

     More details

    Work type:Artistic work  

    researchmap

  • 量子暗号および量子計算に関する研究

    2001

     More details

    Work type:Artistic work  

    researchmap

Research Projects

  • Foundations of Secure Distributed Quantum Computing on Medium-Scale Quantum Computers

    Grant number:24H00071  2024.4 - 2029.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (S)

      More details

    Grant amount:\203450000 ( Direct Cost: \156500000 、 Indirect Cost:\46950000 )

    researchmap

  • Construction of Quantum Computaional Infrastracture towards Quantum Information Society

    Grant number:21H04879  2021.4 - 2026.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

      More details

    Grant amount:\41470000 ( Direct Cost: \31900000 、 Indirect Cost:\9570000 )

    researchmap

  • Constructions for Cryptographic Primitives with Incentives

    Grant number:17H01695  2017.4 - 2021.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    Tanaka Keisuke

      More details

    Grant amount:\15860000 ( Direct Cost: \12200000 、 Indirect Cost:\3660000 )

    We conducted a survey and research on incentive design techniques. Through detailed surveys and comparisons of techniques, we attempted to design models and techniques for incentive-based digital signatures and authentication. In particular, we focused on an element called Secure Message Transmission (SMT), which is closely related to these elements, and showed that even if multiple communication channels are all controlled by an adversary, communication can be performed securely when a rational adversary is considered. In addition, we conducted a survey and research on blockchain. In particular, we returned to the origin of proof-of-work and examined the situation where a time and memory gap occurs between the prover and the verifier.

    researchmap

  • Interpolative Expansion of Quantum Protocol Theory

    Grant number:16H01705  2016.4 - 2021.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

    Takeshi Koshiba

      More details

    Grant amount:\41730000 ( Direct Cost: \32100000 、 Indirect Cost:\9630000 )

    The computational power of the DQC1 model, which is a formalization of non-universal quantum computation with initialization-hard quantum states, is shown to be superior to classical computation. Many quantum distributed algorithms are developed. Under the standard model for distributed algorithms, efficient quantum protocols for several fundamental problems such as the shortest path problem. Secure quantum delegated computation cannot achieve the perfect security for classical clients. By introducing the notion of rewards in quantum computations, classical verification of having the quantum power of the server is affirmatively settled. This is a game-theoretic solution and gives a novel method in quantum computation.

    researchmap

  • Deepening Theory of Quantum Protocols

    Grant number:24240001  2012.4 - 2016.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

    KOSHIBA Takeshi

      More details

    Grant amount:\36010000 ( Direct Cost: \27700000 、 Indirect Cost:\8310000 )

    We propose a generalized model of quantum interactive proof systems and show the existence of complete problems and a quantum version of Babai's collapse theorem. We construct efficient quantum algorithms for matrix multiplication of semi-rings and for finding triangles in graphs and develop their analysis to obtain their quantum distribution protocols. In ancilla-driven model where computation systems and measurement systems are separable, we show that quantum blind computation is achievable. We characterize a classical computational complexity class AWPP, which corresponds to a quantum computational complexity class BQP, by using the notion of post-selection. We give a natural reason why AWPP is the tightest upper bound of BQP and develop a quantum complexity theoretic approach to the study of AWPP.

    researchmap

  • Game Theoretic Studies on Cryptographic Protocols

    Grant number:23500010  2011.4 - 2015.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    TANAKA Keisuke, YASUNAGA Kenji

      More details

    Grant amount:\5070000 ( Direct Cost: \3900000 、 Indirect Cost:\1170000 )

    We characterize the properties of two-message oblivious transfer protocols by using a game-theoretic concept. Specifically, we present a single two-player game for two-message oblivious transfer in the game-theoretic framework, where it captures the cryptographic properties of correctness and privacy in the presence of malicious adversaries.
    In addition we also focus on bit commitment, and study it from a perspective of game theory. In a similar manner to the work on oblivious transfer, we consider bit commitment in the malicious model. In order to naturally capture the security properties of bit commitment, we characterize them with a single game where both parties are rational. In particular, we define a security notion from a game theoretic viewpoint, and prove the equivalence between it and the standard security notion.

    researchmap

  • Advances in crossover between quantum information theory and quantum computational complexity theory

    Grant number:21300002  2009 - 2011

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    KOSHIBA Takeshi, MATSUMOTO Keiji, KOBAYASHI Hirotada, TANAKA Keisuke, KAWACHI Akinori

      More details

    Grant amount:\14430000 ( Direct Cost: \11100000 、 Indirect Cost:\3330000 )

    We developed useful techniques in quantum information theory and quantum computational complexity theory and applied them to interactive proof systems, cryptography, network theory and so on. With respect to quantum interactive proof systems, we investigated effects of quantum entanglements among multiple provers. Moreover, we considered the possibility of quantum communication in network coding and proposed efficient protocols. We proved the hard-core property of a function by the quantum computational complexity theory, while it had not been proved from the classical theory. Furthermore, we proposed several classical cryptographic protocols, which bring some ideas to quantum cryptography.

    researchmap

  • 新世代の計算限界-その解明と打破-

    Grant number:16092101  2004 - 2008

    日本学術振興会  科学研究費助成事業  特定領域研究

    岩間 一雄, 伊藤 大雄, 加藤 直樹, 徳山 豪, 田中 圭介, 櫻井 幸一, 浅野 孝夫, 浅野 哲夫, 平田 富夫

      More details

    Grant amount:\107400000 ( Direct Cost: \107400000 )

    近年のIT社会の大規模化と多様化によって, 従来は計算機があまり入り込まなかった分野においても, アルゴリズムが重要となってきている. また, 例えば配送計画問題をとっても, 配送コストのみではなく, 配送者の負荷の均質化や環境問題への配慮といった, 従来の評価尺度ではとらえきれない観点からの社会的要請があがっている. 本領域ではこうした状況に対処するため, 社会に役立つアルゴリズムをテーマに, 社会的評価基準のもとで数学的に保証されたアルゴリズムの開発・評価の体系化を目指している.
    本領域の研究活動は平成19年度で終了した. すでに多くの研究成果が出されており, それらの多くは本領域の設定した目標を順調に達成するものである. 得られた成果をまとめ効果的に公表するため, 総括班のみ平成20年度も活動を行った. 具体的な活動は以下の通りである.
    (1) 成果報告書の作成 : 総括班および研究課題別の成果をまとめた報告書を作成した. 本特定で開催した研究集会の資料も, とりまとめて記載した.
    (2) 教科書の出版 : 本領域の分野の教科書を出版する(全16巻). 共立出版より6巻が刊行済みであり, 新たに1巻を刊行した.
    (3) ニュースレターの発行 : 本領域の最新情報を掲載したニュースレターを発行する.
    (4) ウェブサイト : 本領域の活動内容の広報として立ち上げた, ウェブサイト(http://keisan-genkai.lab2.kuis.kyoto-u.ac.jp/)の充実をはかった.

    researchmap

  • 暗号解折手法の計算量理論とよる改良とそれに基づく暗号方式

    Grant number:16092206  2004 - 2007

    日本学術振興会  科学研究費助成事業  特定領域研究

    田中 圭介, 渡辺 治, 戸田 誠一郎, 河内 亮周

      More details

    Grant amount:\22600000 ( Direct Cost: \22600000 )

    暗号の安全性に関する精密な解析手法に関しては、昨年度までのコーグルグラフから離れて一般のグラフを対象とした同型性に関する研究を行った。暗号の効率に関する精密な解析手法に関しては、NP-困難な問題に対して、ヒューリスティックスの理論的な解析、低指数関数計算量アルゴリズムの開発、構造的な計算量解析を行った。さらに、量子質問計算量の上下界の解析、量子計算量理論に基づく暗号系設計も行った。
    具体的暗号方式に関しては、格子暗号の複数ビット化に関する研究を行った。ここでは、よく知られている1ビット格子暗号を対象に、共通の手法を導入し、公開鍵・秘密鍵・暗号文空間のサイズを変えることなく平文空間を複数ビット化した。具体的には、セキュリティパラメータをnとした際に、平文のビット数を0(log n)とすることができた。また、複数ビット化した格子暗号も、元の1ビット格子暗号と同様に安全性を証明することができた。その際、格子暗号中で使われているガウス分布と安全性の基となる格子問題の解析を行い、平文のビット数・復号エラーの確率と安全性の基となる格子問題の間にトレードオフがあることが分かった。また我々は、擬似準同型性、という概念を導入した。通常の暗号の準同型性は、2つの暗号文の和または積が暗号文になるという性質である。一方、擬似準同型性は、2つの暗号文の和が暗号文にはなるとは限らないが,無視できる確率を除いて正しく復号できるという性質である。複数ビット化した格子暗号は、ガウス分布の再生性により擬似準同型性をもつ。ただし、復号エラーを抑えるために、和の回数はある程度制限される。さらに、先と同様の手法により、その方式の安全性も証明した。

    researchmap

  • 量子計算と古典通信路を用いた電子署名方式

    Grant number:14780190  2002 - 2004

    日本学術振興会  科学研究費助成事業  若手研究(B)

    田中 圭介

      More details

    Grant amount:\3400000 ( Direct Cost: \3400000 )

    主に、大きく分けて二つの研究成果が得られた。一つめは本研究で対象となる電子署名方式と対をなす秘匿通信方式、特に本研究と密接に関わり合いをもつ、量子計算と古典通信路を同時に用いた秘匿通信方式に関する結果である。2000年に提案された既存方式はナップザック暗号とよばれる方式の一種であり、ナップザック暗号に対する強力な攻撃法として低密度攻撃とよばれる攻撃法が知られていた。本研究では、既存方式における平文に関する数え上げ符号に着目し、その符号方法を変更することによって低密度攻撃を回避する方法を提案した。
    二つめは、本研究で対象となる電子署名方式に関する結果である。この電子署名方式の一種である否認不可署名とリング署名とよばれる方式に対して、近年提案された安全性である匿名性について考察を行った。ここでは、匿名性を持つ方式を得るためのテクニックを提案するとともに、その提案技法の否認不可署名とリング署名に対する適用可能性について論じた。
    さらに上記以外にも、本研究に関連する暗号プロトコル研究として、ランダムオラクルを用いたプロトコルに対する新たな指標と具体的方式の提案、キーワード検索付き公開鍵秘匿通信方式の安全性の改良、新たな数学的仮定とそれに基づく公開鍵秘匿通信方式の提案、中程度の難しさを持つ関数のモデル化と具体的な関数の提案、認証付き鍵交換プロトコルの安全性指標に関する考察、指定検証者署名への変換が可能なaggregate signatureの提案、Paillierの暗号に対する証明可能なシャッフル方式の提案を行った。これらの研究成果は、研究会や国際会議で発表済みであり、現在、雑誌に投稿中である。

    researchmap

  • Computational Complexity

      More details

    Grant type:Competitive

    researchmap

  • 計算の複雑さ

      More details

    Grant type:Competitive

    researchmap

  • 暗号に関する理論と実装

      More details

    Grant type:Competitive

    researchmap

  • 暗号理論

      More details

    Grant type:Competitive

    researchmap

  • Theory and Practice on Cryptography

      More details

    Grant type:Competitive

    researchmap

  • Theory of Cryptography

      More details

    Grant type:Competitive

    researchmap

▼display all