Updated on 2026/03/10

写真a

 
MATSUDA TAKAHIRO
 
Organization
School of Computing Visiting Professor
Title
Visiting Professor
External link

Degree

  • PhD ( The University of Tokyo )

Research Interests

  • Cryptography

  • 暗号理論

Research Areas

  • Informatics / Theory of informatics  / Cryptography

Education

  • 東京大学大学院   情報理工学系研究科   電子情報学専攻 博士課程

    2008.4 - 2011.3

      More details

  • 東京大学大学院   情報理工学系研究科   電子情報学専攻 修士課程

    2006.4 - 2008.3

      More details

  • The University of Tokyo   The Faculty of Engineering   Department of Information and Communication Engineering

    2004.4 - 2006.3

      More details

  • The University of Tokyo   College of Arts and Sciences

    2002.4 - 2004.3

      More details

Research History

  • AIST   CPSEC   Team Leader

    2022.4

      More details

  • AIST   Planning Headquarters   Plannning Officer

    2021.4 - 2022.3

      More details

  • AIST   CPSEC   Senior Research Scientist

    2018.11 - 2021.3

      More details

  • AIST   ITRI   Senior Research Scientist

    2017.10 - 2018.10

      More details

  • AIST   ITRI   Researcher

    2015.4 - 2017.9

      More details

  • AIST   RISEC   Researcher

    2013.4 - 2015.3

      More details

  • AIST   RISEC   JSPS Postdoctral Researcher (PD)

    2012.4 - 2013.3

      More details

  • AIST   RCIS   JSPS Postdoctral Researcher (PD)

    2011.4 - 2012.3

      More details

  • 東京大学大学院   情報理工学系研究科   日本学術振興会特別研究員(DC2)

    2009.4 - 2011.3

      More details

▼display all

Committee Memberships

  •   INDOCRYPT 2022 Program Committee  

    2022.12   

      More details

    Committee type:Academic society

    researchmap

  •   ASIACRYPT 2021 Program Committee  

    2021.12   

      More details

    Committee type:Academic society

    researchmap

  •   ACNS 2021 Program Committee  

    2021.7   

      More details

    Committee type:Academic society

    researchmap

  •   PKC 2021 Program Committee  

    2021.5   

      More details

    Committee type:Academic society

    researchmap

  •   ASIACRYPT 2020 Program Committee  

    2020.12   

      More details

    Committee type:Academic society

    researchmap

  •   ASIACRYPT 2019 Program Committee  

    2019.12   

      More details

    Committee type:Academic society

    researchmap

  •   APKC 2019 Program Committee  

    2019.7   

      More details

    Committee type:Academic society

    researchmap

  •   ACNS 2019 Program Committee  

    2019.6   

      More details

    Committee type:Academic society

    researchmap

  •   PKC 2019 Program Committee  

    2019.4   

      More details

    Committee type:Academic society

    researchmap

  •   APKC 2018 Program Committee  

    2018.7   

      More details

    Committee type:Academic society

    researchmap

  •   Editorial Committee of IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences  

    2018 - 2022   

      More details

    Committee type:Academic society

    researchmap

  •   INDOCRYPT 2017 Program Committee  

    2017.12   

      More details

    Committee type:Academic society

    researchmap

  •   ASIACRYPT 2017 Program Committee  

    2017.12   

      More details

    Committee type:Academic society

    researchmap

  •   CSS 2017実行委員  

    2017.10   

      More details

    Committee type:Academic society

    researchmap

  •   PKC 2017 Program Committee  

    2017.3   

      More details

    Committee type:Academic society

    researchmap

  •   ASIACRYPT 2016 Program Committee  

    2016.12   

      More details

    Committee type:Academic society

    researchmap

  •   AsiaPKC 2016 Program Committee  

    2016.6   

      More details

    Committee type:Academic society

    researchmap

  •   PRIVAGEN 2015 General Co-Chairs  

    2015.9   

      More details

    Committee type:Other

    researchmap

  •   ASIAPKC 2014 Program Committee  

    2014.6   

      More details

    Committee type:Academic society

    researchmap

  •   SCIS 2013実行委員  

    2013.1   

      More details

    Committee type:Academic society

    researchmap

  •   CSS 2009学生実行委員  

    2009.10   

      More details

    Committee type:Academic society

    researchmap

▼display all

Papers

  • Fast and Private 1-to-$N$ Face Identification Protocols.

    Nuttapong Attrapadung, Reo Eriguchi, Goichiro Hanaoka, Takahiro Matsuda 0002, Naohisa Nishida, Tatsumi Oba, Jacob C. N. Schuldt, Koki Tejima, Tadanori Teruya, Yuji Unagami, Naoto Yanai

    IEEE Open Journal of the Computer Society   6   968 - 986   2025

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/OJCS.2025.3580739

    researchmap

  • Updatable Encryption Secure Against Randomness Compromise

    Yuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda, Kanta Matsuura

    Lecture Notes in Computer Science   47 - 69   2024.9

     More details

    Publishing type:Part of collection (book)   Publisher:Springer Nature Singapore  

    DOI: 10.1007/978-981-97-8016-7_3

    researchmap

  • On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives

    Yuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda, Kanta Matsuura

    Lecture Notes in Computer Science   303 - 323   2024.7

     More details

    Publishing type:Part of collection (book)   Publisher:Springer Nature Singapore  

    DOI: 10.1007/978-981-97-5025-2_16

    researchmap

  • Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality

    Ryu ISHII, Kyosuke YAMASHITA, Zihao SONG, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E107.A ( 4 )   619 - 633   2024.4

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.2023ssp0002

    researchmap

  • Signature for Objects: Formalizing How to Authenticate Physical Data and More

    Ryuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada, Shuichi Katsumata, Yusuke Sakai, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto

    Financial Cryptography and Data Security   182 - 199   2023.12

     More details

    Publishing type:Part of collection (book)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-47754-6_11

    researchmap

  • Fault-Tolerant Aggregate Signature Schemes Against Bandwidth Consumption Attack

    Kyosuke YAMASHITA, Ryu ISHII, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   2023

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.2022dmp0005

    researchmap

  • Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures

    Ryu ISHII, Kyosuke YAMASHITA, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO

    IEICE Transactions on Information and Systems   E105.D ( 11 )   1845 - 1856   2022.11

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2022ngp0010

    researchmap

  • Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.

    Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda 0002, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt

    Proceedings on Privacy Enhancing Technologies   2022 ( 4 )   746 - 767   2022

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.56553/popets-2022-0131

    researchmap

  • Oblivious Linear Group Actions and Applications

    Nuttapong Attrapadung, Goichiro Hanaoaka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa

    Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security   2021.11

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3460120.3484584

    researchmap

  • Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties

    Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   12710   389 - 420   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Science and Business Media Deutschland GmbH  

    DOI: 10.1007/978-3-030-75245-3_15

    Scopus

    researchmap

  • Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures

    Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto

    Lecture Notes in Computer Science   378 - 396   2021

     More details

    Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-81645-2_22

    researchmap

  • Oblivious Linear Group Actions and Applications.

    Nuttapong Attrapadung, Goichiro Hanaoka, Takahiro Matsuda 0002, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa

    CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security(CCS)   630 - 650   2021

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3460120.3484584

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ccs/ccs2021.html#AttrapadungH0MO21

  • Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance. Reviewed

    Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu

    Theor. Comput. Sci.   809   103 - 136   2020

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.tcs.2019.12.003

    researchmap

  • Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation.

    Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Jason Paul Cruz, Naoto Yanai, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda 0002, Goichiro Hanaoka

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci.   103-A ( 12 )   1367 - 1380   2020

     More details

  • MOBIUS: Model-Oblivious Binarized Neural Networks Reviewed

    Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka

    IEEE Access   7   1 - 14   2019.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2019.2939410

    researchmap

  • Proxy re-encryption that supports homomorphic operations for re-encrypted ciphertexts

    Yutaka Kawai, Takahiro Matsuda, Takato Hirano, Yoshihiro Koseki, Goichiro Hanaoka

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   ( 1 )   81 - 98   2019.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1587/transfun.E102.A.81

    Scopus

    researchmap

  • Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions. Reviewed

    Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara, Kazumasa Omote, Yusuke Sakai

    Security and Communication Networks   2019   4872403:1-4872403:36 - 36   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1155/2019/4872403

    researchmap

  • Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. Reviewed

    Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda 0002, Yusuke Sakai 0001, Jacob C. N. Schuldt

    IACR Cryptology ePrint Archive   2019   386 - 386   2019

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • Signature Schemes with a Fuzzy Private Key Reviewed

    Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki

    International Journal of Information Security   18 ( 5 )   581 - 617   2019

     More details

  • Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. Reviewed

    Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda 0002, Yusuke Sakai 0001, Jacob C. N. Schuldt

    Information Security and Privacy - 24th Australasian Conference(ACISP)   343 - 361   2019

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-21548-4_19

    researchmap

  • A new combiner for key encapsulation mechanisms

    Goichiro Hanaoka, Takahiro Matsuda, Jacob C.N. Schuldt

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E102A ( 12 )   1668 - 1675   2019

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1587/transfun.E102.A.1668

    Scopus

    researchmap

  • Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance

    Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   11443   441 - 471   2019

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-030-17259-6_15

    Scopus

    researchmap

  • Adaptively Single-Key Secure Constrained PRFs for $$\\mathrm {NC}^1$$

    Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   11443   223 - 253   2019

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-030-17259-6_8

    Scopus

    researchmap

  • Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions Reviewed

    Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka

    22nd International Conference on Practice and Theory of Public Key Cryptography (PKC 2019) (To appear)   2019

     More details

    Language:English  

    researchmap

  • Adaptively Single-key Secure Constrained PRFs for NC1 Reviewed

    Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa

    22nd International Conference on Practice and Theory of Public Key Cryptography (PKC 2019) (To appear)   2019

     More details

  • Provably Secure Password Reset Protocol: Model, Definition, and Construction

    Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura

    Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018   774 - 782   2018.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    DOI: 10.1109/TrustCom/BigDataSE.2018.00111

    Scopus

    researchmap

  • Chosen ciphertext secure keyed-homomorphic public-key cryptosystems Reviewed

    Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada

    Designs, Codes, and Cryptography   86 ( 8 )   1623 - 1683   2018.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer New York LLC  

    DOI: 10.1007/s10623-017-0417-6

    Scopus

    researchmap

  • A New Key Encapsulation Combiner Reviewed

    Takahiro Matsuda, Jacob C, N. Schuldt

    2018 International Symposium on Information Theory and Its Applications (ISITA 2018)   2018

     More details

    Language:English  

    researchmap

  • More Constructions of Re-Splittable Threshold Public Key Encryption Reviewed

    Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura

    IEICE Transactions   101-A ( 9 )   1473 - 1483   2018

     More details

  • Memory lower bounds of reductions revisited Reviewed

    Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   10820   61 - 90   2018

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-78381-9_3

    Scopus

    researchmap

  • Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening Reviewed

    Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka

    IEICE Transactions   101-D ( 11 )   2677 - 2687   2018

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2017ICP0003

    researchmap

  • Related Randomness Security for Public Key Encryption, Revisited Reviewed

    Takahiro Matsuda, Jacob C, N. Schuldt

    21st International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Part I   LNCS 10769   280 - 311   2018

     More details

  • On the Security of Linear Sketch Schemes against Recovering Attacks Reviewed

    Takahiro Matsuda, Kenta Takahashi, Goichiro Hanaoka

    15th International Conference on Security and Cryptography (SECRYPT 2018) at the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018), Volume 2   242 - 253   2018

     More details

    Language:English  

    DOI: 10.5220/0006847102420253

    researchmap

  • Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions Reviewed

    Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    11th International Conference on Security and Cryptography for Networks (SCN 2018)   LNCS 11035   140 - 159   2018

     More details

    Language:English  

    DOI: 10.1007/978-3-319-98113-0_8

    researchmap

  • Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority Reviewed

    Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida

    23rd Australasian Conference on Information Security and Privacy (ACISP 2018)   LNCS 10946   64 - 82   2018

     More details

    Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-319-93638-3_5

    researchmap

  • Constrained PRFs for NC1 in Traditional Groups Reviewed

    Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa

    38th Annual International Cryptology Conference (CRYPTO 2018), Part II   LNCS 10992   543 - 574   2018

     More details

  • Embedding Lemmas for Functional Encryption Reviewed

    Ryo kato, Naohisa Nishida, Ryo Hirano, Tatsumi Oba, Yuji Unagami, Shota Yamada, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka

    2018 International Symposium on Information Theory and Its Applications (ISITA 2018)   2018

     More details

    Language:English  

    researchmap

  • Private Similarity Searchable Encryption for Euclidean Distance Reviewed

    Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E100D ( 10 )   2319 - 2326   2017.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2016INP0011

    Web of Science

    researchmap

  • On the security of non-interactive key exchange against related-key attacks Reviewed

    Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E100A ( 9 )   1910 - 1923   2017.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1587/transfun.E100.A.1910

    Scopus

    researchmap

  • On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks Reviewed

    Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E100A ( 1 )   73 - 90   2017.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E100.A.73

    Web of Science

    researchmap

  • Time-specific encryption from forward-secure encryption: generic and direct constructions Reviewed

    Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai

    INTERNATIONAL JOURNAL OF INFORMATION SECURITY   15 ( 5 )   549 - 571   2016.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10207-015-0304-y

    Web of Science

    researchmap

  • Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models Reviewed

    Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda, Takashi Yamakawa

    SECURITY AND COMMUNICATION NETWORKS   9 ( 12 )   1676 - 1697   2016.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/sec.1444

    Web of Science

    researchmap

  • Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security Reviewed

    Takahiro Matsuda, Goichiro Hanaoka

    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I   9614   3 - 34   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-662-49384-7_1

    Web of Science

    researchmap

  • Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction.

    Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura

    IACR Cryptology ePrint Archive   2016   345   2016

     More details

  • Private Similarity Searchable Encryption for Euclidean Distance Reviewed

    Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadungt, Takahiro Matsuda, Goichiro Hanaoku

    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016)   718 - 722   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Signatures Resilient to Uninvertible Leakage Reviewed

    Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016   9841   372 - 390   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-44618-9_20

    Web of Science

    researchmap

  • Fuzzy Signatures: Relaxing Requirements and a New Construction Reviewed

    Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka

    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016   9696   97 - 116   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-39555-5_6

    Web of Science

    researchmap

  • How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones Reviewed

    Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II   10032   465 - 495   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-662-53890-6_16

    Web of Science

    researchmap

  • On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions Reviewed

    Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I   9614   99 - 129   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-662-49384-7_5

    Web of Science

    researchmap

  • Tag-KEM/DEM Framework for Public-key Encryption with Non-interactive Opening Reviewed

    Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka

    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016)   231 - 235   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • On the security of the schnorr signature scheme and DSA against related-key attacks Reviewed

    Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9558   20 - 35   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-30840-1_2

    Scopus

    researchmap

  • A signature scheme with a fuzzy private key Reviewed

    Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9092   105 - 126   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-28166-7_6

    Scopus

    researchmap

  • Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms Reviewed

    Takahiro Matsuda, Goichiro Hanaoka

    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I   9014   561 - 590   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-662-46494-6_23

    Web of Science

    researchmap

  • Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length Reviewed

    Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro

    INFORMATION SECURITY (ISC 2013)   7807   100 - 109   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-27659-5_7

    Web of Science

    researchmap

  • An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption Reviewed

    Takahiro Matsuda, Goichiro Hanaoka

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I   9452   415 - 442   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-662-48797-6_18

    Web of Science

    researchmap

  • Anonymous Data Collection System with Mediators Reviewed

    Hiromi Arai, Keita Emura, Takahiro Matsuda

    CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS   9024   141 - 160   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-21356-9_10

    Web of Science

    researchmap

  • Completeness of Single-Bit Projection-KDM Security for Public Key Encryption Reviewed

    Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    The Cryptographers' Track at the RSA Conference 2015 (CT-RSA 2015)   LNCS 9048   201 - 219   2015

     More details

  • Re-encryption verifiability: How to detect malicious activities of a proxy in proxy re-encryption Reviewed

    Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9048   410 - 428   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-16715-2_22

    Scopus

    researchmap

  • Methodology for designing cryptographic systems with advanced functionality based on a modular approach: Towards reducing the barrier to introducing newly-designed cryptographic schemes into real-world systems Reviewed

    Goichiro Hanaoka, Satsuya Ohata, Takahiro Matsuda, Koji Nuida, Nuttapong Attrapadung

    Synthesiology   7 ( 2 )   93 - 104   2014.5

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Nat. Inst. of Adv. Industrial Science and Technology (AIST)  

    DOI: 10.5571/synth.7.93

    Scopus

    researchmap

  • Chosen Ciphertext Security via UCE Reviewed

    Takahiro Matsuda, Goichiro Hanaoka

    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014   8383   56 - 76   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-54631-0_4

    Web of Science

    researchmap

  • More constructions of re-splittable threshold public key encryption Reviewed

    Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   8639   109 - 118   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-09843-2_9

    Scopus

    researchmap

  • Chosen Ciphertext Security via Point Obfuscation Reviewed

    Takahiro Matsuda, Goichiro Hanaoka

    THEORY OF CRYPTOGRAPHY (TCC 2014)   8349   95 - 120   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-54242-8_5

    Web of Science

    researchmap

  • Efficient key dependent message security amplification against chosen ciphertext attacks Reviewed

    Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   8949   84 - 100   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-15943-0_6

    Scopus

    researchmap

  • On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations Reviewed

    Takahiro Matsuda

    THEORY OF CRYPTOGRAPHY (TCC 2014)   8349   265 - 290   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-54242-8_12

    Web of Science

    researchmap

  • Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited Reviewed

    Takahiro Matsuda, Goichiro Hanaoka

    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013   7778   332 - 351   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-36362-7_21

    Web of Science

    researchmap

  • Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism Reviewed

    Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro

    AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography   23 - 32   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/2484389.2484395

    Scopus

    researchmap

  • Ciphertext policy multi-dimensional range encryption Reviewed

    Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   7839   247 - 261   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-37682-5_18

    Scopus

    researchmap

  • Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption Reviewed

    Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada

    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013   7778   32 - 50   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-36362-7_3

    Web of Science

    researchmap

  • Achieving chosen ciphertext security from detectable public key encryption efficiently via hybrid encryption Reviewed

    Takahiro Matsuda, Goichiro Hanaoka

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   8231   226 - 243   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-41383-4_15

    Scopus

    researchmap

  • Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms Reviewed

    Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura

    PUBLIC KEY CRYPTOGRAPHY - PKC 2012   7293   576 - 594   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-30057-8_34

    Web of Science

    researchmap

  • Time-specific encryption from forward-secure encryption Reviewed

    Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   7485   184 - 204   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-32928-9_11

    Scopus

    researchmap

  • On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Reviewed

    Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt

    ADVANCES IN CRYPTOLOGY - CRYPTO 2012   7417   812 - 831   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-32009-5_47

    Web of Science

    researchmap

  • Group Signatures with Message-Dependent Opening Reviewed

    Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazumasa Omote

    5th International Conference on Pairing-Based Cryptography (Pairing 2012)   LNCS 7708   270 - 294   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-642-36334-4_18

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/pairing/pairing2012.html#SakaiEHK0O12

  • Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption Reviewed

    Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao

    TOPICS IN CRYPTOLOGY - CT-RSA 2012   7178   349 - +   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-27954-6_22

    Web of Science

    researchmap

  • On Black-Box Separations among Injective One-Way Functions Reviewed

    Takahiro Matsuda, Kanta Matsnura

    THEORY OF CRYPTOGRAPHY   6597   597 - 614   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-19571-6_36

    Web of Science

    researchmap

  • Completeness of single-bit projection-KDM security for public key encryption Reviewed

    Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9048   201 - 219   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-16715-2_11

    Scopus

    researchmap

  • Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting Reviewed

    Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura

    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011)   6715   220 - 237   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-21554-4_13

    Web of Science

    researchmap

  • Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks Reviewed

    Takahiro Matsuda, Kanta Matsuura

    PUBLIC KEY CRYPTOGRAPHY - PKC 2011   6571   246 - 264   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-19379-8_15

    Web of Science

    researchmap

  • Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability Reviewed

    Takahiro Matsuda, Yasumasa Nakai, Kanta Matsuura

    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010   6487   225 - 245   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-17455-1_15

    Web of Science

    researchmap

  • An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations Reviewed

    Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai

    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS   5473   16 - +   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-00862-7_2

    Web of Science

    researchmap

  • A Generic Construction of Timed-Release Encryption with Pre-open Capability Reviewed

    Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, Kanta Matsuura

    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS   5824   53 - 70   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-04846-3_5

    Web of Science

    researchmap

  • Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption Reviewed

    Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai

    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008   5461   1 - +   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-00730-9_1

    Web of Science

    researchmap

  • Efficient Constructions of Signcryption Schemes and Signcryption Composability Reviewed

    Takahiro Matsuda, Kanta Matsuura, Jacob C. N. Schuldt

    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS   5922   321 - 342   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-10628-6_22

    Web of Science

    researchmap

  • A strongly unforgeable signature under the CDH assumption without collision resistant hash functions Reviewed

    Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E91D ( 5 )   1466 - 1476   2008.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietisy/e91-d.5.1466

    Web of Science

    researchmap

  • A CDH-based strongly unforgeable signature without collision resistant hash function Reviewed

    Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai

    PROVABLE SECURITY, PROCEEDINGS   4784   68 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-540-75670-5_5

    Web of Science

    researchmap

  • A practical provider authentication system for bidirectional broadcast service Reviewed

    Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai

    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS   4694   967 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-540-74829-8_118

    Web of Science

    researchmap

▼display all

MISC

  • Efficient Secure Binarized CNN Protocol Reducing Accuracy Degradation

    ( 2019 )   1588 - 1595   2019.10

     More details

    Language:Japanese  

    researchmap

  • Designs and Implementation Evaluations of Privacy Preserving Prediction with Model Oblivious Binarized Neural Networks

    Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Nohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka

    2019 Symposium on Cryptography and Information Security (SCIS 2019)   2C1 ( 4 )   1 - 8   2019.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • データ提供者のプライバシーを保護する複数入力可能な内積暗号

    川合 豊, 平野 貴人, 小関 義博, Nuttapong Attrapadung, Jacob C, N. Schuldt, 松田 隆宏, 縫田 光司, 花岡 悟一郎

    2018年暗号と情報セキュリティシンポジウム(SCIS2018)予稿集   2018.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • LWE仮定に基づく鍵失効機能付き階層型IDベース暗号

    高安敦, 勝又秀一, 松田隆宏

    信学技報   vol.117 ( no. 285, ISEC2017-71 )   129 - 136   2017.11

     More details

  • 復号鍵漏洩耐性を持つ鍵失効機能付きIDベース暗号の一般的な構成

    高安敦, 勝又秀一, 松田隆宏

    2017年コンピュータセキュリティシンポジウム(CSS2017)   3E2-1   2017.10

     More details

  • Private Machine Learning Classification Based on Binarized Neural Networks

    Naohisa Nishida, Tatsumi Oba, Ryo Kato, Yuji Unagami, Shota Yamada, Nuttapong Attrapadung, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka

    Computer Security Symposium 2017   2E2 ( 1 )   592 - 599   2017.10

     More details

    Language:Japanese  

    researchmap

  • CryptoJanken: じゃんけんで学ぶ暗号技術

    Tadanori Teruya, Goichiro Hanaoka, Sosuke Ashihara, Satsuya Ohata, Kazumasa Shinagawa, Takahiro Matsuda, Takao Murakami, SeongHan Shin, Nuttapong Attrapadung, Koji Nuida

    Computer Security Symposium 2015   2015 ( DPS-10 )   2015.10

     More details

    Language:Japanese  

    researchmap

  • AI-1-1 A Brief Overview of Fully Homomorphic Encryption, Multilinear Maps, and Obfuscation

    Matsuda Takahiro

    Proceedings of the IEICE General Conference   2015   "SS - 69"-"SS-70"   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • 鍵付き準同型IDベース暗号

    江村 恵太, 花岡 悟一郎, 松田 隆宏, 縫田 光司, 山田 翔太

    2015年暗号と情報セキュリティシンポジウム(SCIS2015)予稿集   2015.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions

    Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda

    IACR Cryptology ePrint Archive   2014 ( 950 )   2014.11

     More details

    Language:English   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • On Provably Secure Password Recovery Protocol

    2014 ( 2 )   1081 - 1088   2014.10

     More details

    Language:Japanese  

    researchmap

  • Yet Another Method for Expanding the Plaintext Space of Chosen Ciphertext Secure Public Key Encyrption

    2014 ( 2 )   284 - 291   2014.10

     More details

    Language:Japanese  

    researchmap

  • 範囲指定型問い合わせに対する効率的なデータベース秘匿検索プロトコル

    Tadanori Teruya, Nuttapong Attrapadung, Masaki Inamura, Matsuda Takahiro, Sanami Nakagawa, Koji Nuida, Goichiro Hanaoka, Kana Shimizu

    Computer Security Symposium 2014 (CSS 2014), Dmonstration (Poster)   ( DPS-02 )   2014.10

     More details

    Language:Japanese  

    Awarded 1 / 8 demonstrations.<br />
    <br />
    To make our demonstration, we used a library https://github.com/aistcrypt/Lifted-ElGamal (currently, newer version of this library is in https://github.com/herumi/mcl)

    researchmap

  • Chosen Ciphertext Secure Public Key Encryption Based on Universal Computational Extractors

    2013 ( 4 )   184 - 191   2013.10

     More details

    Language:Japanese  

    researchmap

  • 双方向の情報を秘匿可能な効率的化合物データベース検索プロトコル

    縫田光司, 照屋唯紀, 花岡悟一郎, 清水佳奈, 松田隆宏, 矢内直人, 中川紗奈美

    Computer Security Symposium 2013 (CSS 2013), Demonstration (Poster) Session   ( DPS-07 )   2013.10

     More details

    Language:Japanese  

    Awarded 1 / 9 demonstrations.<br />
    <br />
    To make our demonstration, we used a library https://github.com/aistcrypt/Lifted-ElGamal (currently, newer version of this library is in https://github.com/herumi/mcl)

    researchmap

  • トモサガ: スマホで安心「共ダチ」探し

    照屋唯紀, 縫田光司, 花岡悟一郎, 清水佳奈, 松田隆宏, 矢内直人, 中川紗奈美

    Computer Security Symposium 2013 (CSS 2013), Demonstration (Poster) Session   2013.10

     More details

    Language:Japanese  

    To make our demonstration, we used a library https://github.com/aistcrypt/Lifted-ElGamal (currently, newer version of this library is in https://github.com/herumi/mcl)

    researchmap

  • Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme

    KANNO Shota, KUROSAWA Kaoru, HANAOKA Goichiro, MATSUDA Takahiro

    Technical report of IEICE. ISEC   112 ( 461 )   285 - 291   2013.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In proxy re-encryption (PRE) schemes, the proxy re-encrypts a ciphertext C for Alice into which Bob can decrypt. Recently, Hana)ka et al. constructed the first strictly CCA-secure unidirectional PRE scheme (in the standard model). However, their scheme is inefficient because the transformed ciphertext is an encryption of many components. In this paper, we show a more efficient strictly CCA-secure unidirectional PRE scheme in the random oracle model, where the security is proved under the DBDHI assumption.

    CiNii Books

    researchmap

  • Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme

    KANNO Shota, KUROSAWA Kaoru, HANAOKA Goichiro, MATSUDA Takahiro

    IEICE technical report. WBS, Wideband System   112 ( 462 )   285 - 291   2013.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In proxy re-encryption (PRE) schemes, the proxy re-encrypts a ciphertext C for Alice into which Bob can decrypt. Recently, Hana)ka et al. constructed the first strictly CCA-secure unidirectional PRE scheme (in the standard model). However, their scheme is inefficient because the transformed ciphertext is an encryption of many components. In this paper, we show a more efficient strictly CCA-secure unidirectional PRE scheme in the random oracle model, where the security is proved under the DBDHI assumption.

    CiNii Books

    researchmap

  • A-7-1 On the Plaintext Awareness of ECIES

    Takayama Takaomi, Kasamatsu Kouhei, Matsuda Takahiro, Hanaoka Goichiro, Imai Hideki

    Proceedings of the IEICE General Conference   2013   136 - 136   2013.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • DCR仮定より弱い仮定に基づく加法準同型暗号

    縫田 光司, 花岡 悟一郎, 松田 隆宏, Jacob C, N. Schuldt

    2013年暗号と情報セキュリティシンポジウム(SCIS2013)予稿集   2013

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • [Invited Talk] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order

    HANAOKA Goichiro, MATSUDA Takahiro, SCHULDT Jacob C.N.

    Technical report of IEICE. ISEC   112 ( 342 )   43 - 43   2012.12

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this invited talk, we introduce the lecture with the same title presented at the 32nd International Cryptology Conference (CRYPTO 2012) held from August 19th to 23rd, 2012, at Santa Barbara, USA.\\ \\[Abstract from the original paper (with a slight modification):] In this work, we focus on the problem of minimizing ciphertext overhead, and discuss the (im)possibility of constructing key encapsulation mechanisms (KEMs) with low ciphertext overhead. More specifically, we rule out the existence of algebraic black-box reductions from the (one-way, bounded) CCA security of a natural class of KEMs to any non-interactive problem. The class of KEMs captures the structure of the currently most efficient KEMs defined in standard prime order groups, but restricts an encapsulation to consist of a single group element and a string. This result suggests that we cannot rely on existing techniques to construct a CCA secure KEM in standard prime order groups with a ciphertext overhead lower than two group elements. Furthermore, we show how the properties of an (algebraic) programmable hash function can be exploited to construct a simple, efficient and (one-way, bounded) CCA secure KEM based on the hardness of the computational Diffie-Hellman problem with the ciphertext overhead of just a single group element. Since this KEM construction is covered by the above mentioned impossibility result, this enables us to derive a lower bound on the hash key size of an algebraic programmable hash function, and rule out the existence of algebraic $({\sf poly},n)$-programmable hash functions in prime order groups for any integer $n$. The latter result answers an open question posed by Hofheinz and Kiltz (CRYPTO'08, J. Cryptology'12) in the case of algebraic programmable hash functions in prime order groups.

    CiNii Books

    researchmap

  • 適応的選択暗号文攻撃者に対し安全な準同型暗号

    江村 恵太, 花岡 悟一郎, 松田 隆宏, 大竹 剛, 山田 翔太

    暗号と情報セキュリティシンポジウム (SCIS)   2012.1

     More details

  • A Generic Construction of Timed-Release Encryption from Forward Secure Encryption

    2011 ( 3 )   137 - 142   2011.10

     More details

    Language:Japanese  

    researchmap

  • More on KEMs Based on Extractable Hash Proof Systems

    2011 ( 3 )   732 - 737   2011.10

     More details

    Language:Japanese  

    researchmap

  • Simple Generic Constructions for SigncryptionSecure in the Multi-user Setting

    2009   1 - 6   2011.10

     More details

    Language:Japanese  

    researchmap

  • メッセージ依存開示可能グループ署名と匿名掲示板への応用

    江村 恵太, 花岡 悟一郎, 川合 豊, 松田 隆宏, 面 和成, 坂井 祐介

    暗号と情報セキュリティシンポジウム (SCIS)   2011.1

     More details

  • A Study of the contribution of L2 language proficiency and L1 reading ability to L2 reading performance of Japanese EFL high school students

    Matsuda Takahiro

    Joetsu english studies   3   33 - 46   2002

     More details

    Language:Japanese   Publisher:Joetsu University of Education  

    CiNii Books

    researchmap

▼display all

Awards

  • IPSJ Microsoft Faculty Award

    2021.3  

     More details

  • ACISP 2019 Best Paper Award

    2019.7  

    Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C, N. Schuldt

     More details

  • ASIACRYPT 2017 Best PC Member Award

    2017.12  

    Takahiro Matsuda

     More details

  • CSS 2017 奨励賞

    2017.10  

    高安 敦, 勝又 秀一, 松田 隆宏

     More details

  • 15th DOCOMO Mobile Science Award (Advanced Technology Award of Excellence)

    2016.10  

    Kenta Takahashi, Goichiro Hanaoka, Takao Murakami, Takahiro Matsuda

     More details

  • 編集活動感謝状

    2016.9   電子情報通信学会  

    松田 隆宏

     More details

  • 辻井重男セキュリティ論文賞 優秀賞

    2016.3   日本セキュリティマネジメント学会  

    大畑 幸矢, 松田 隆宏, 松浦 幹太

     More details

  • CSS 2015 学生論文賞

    2015.10  

    大畑 幸矢, 松田 隆宏, 松浦 幹太

     More details

  • SCIS 2014 イノベーション論文賞

    2015.1  

    松田 隆宏, 花岡 悟一郎

     More details

  • SCIS 2012 イノベーション論文賞

    2013.1  

    江村 恵太, 花岡 悟一郎, 松田 隆宏, 大竹 剛, 山田 翔太

     More details

  • 山下記念研究賞

    2012.3   情報処理学会  

    松田 隆宏

     More details

  • CSS 2010 優秀論文賞

    2010.10  

    松田 隆宏, 松浦 幹太

     More details

  • SCIS 2009 論文賞

    2010.1  

    松田 隆宏

     More details

  • CSS 2009 優秀論文賞

    2009.10  

    松田 隆宏, シュルツ ヤコブ, 松浦 幹太

     More details

▼display all

Research Projects

  • 真に高機能暗号の社会展開に資する物理・視覚暗号

    Grant number:23H00479  2023.4 - 2026.3

    日本学術振興会  科学研究費助成事業  基盤研究(A)

    花岡 悟一郎, 品川 和雅, 宮原 大輝, 矢内 直人, Attrapadung Nuttapong, 渡邉 洋平, 岩本 貢, 松田 隆宏, 水木 敬明, 宮本 賢伍, 山下 恭佑

      More details

    Grant amount:\47190000 ( Direct Cost: \36300000 、 Indirect Cost:\10890000 )

    researchmap

  • あらゆる高機能暗号方式の相互変換を可能にするアジャイルクリプト技術

    Grant number:19H01109  2019.4 - 2024.3

    日本学術振興会  科学研究費助成事業  基盤研究(A)

    Attrapadung Nuttapong, 縫田 光司, 照屋 唯紀, 花岡 悟一郎, 坂井 祐介, 松田 隆宏, 山田 翔太, 村上 隆夫, Schuldt Jacob

      More details

    Grant amount:\45110000 ( Direct Cost: \34700000 、 Indirect Cost:\10410000 )

    本研究は、複数の任意の高機能暗号方式における暗号文変換および方式の組み合わせ変換が可能とする「アジャイルクリプト技術」の実現を目指す。今年度の代表的な成果は以下である。
    - 秘匿計算という、情報を秘匿したままデータ解析ができる技術に関して、データベース処理に有用な秘密技術変換フレームワークを提案し、秘匿Shuffleや秘匿Sortなど効率的な秘匿計算プロトコルが得られ、成果は情報セキュリティ分野トップ1(*)国際会議ACM CCS21で発表した。(*Google Scholar Computer Security and Cryptography subcategory。) また、秘密分散の変換技術を応用し、プライバシー保護可能な機械学習プロトコルを提案し、成果は国際論文誌IEICE Transで発表した。また、効率的な通信ラウンドの秘密計算および準同型秘密分散方式の成果が得られた(国際会議CRYPTO21、ASIACRYPT21、IWSEC21)。
    - 放送型暗号から効率的なリング署名の一般的変換を提案し、国際論文誌DCCで発表した。
    - 高機能暗号について、様々な成果が得られた:関数暗号(国際会議CRYPTO21)、ブラインド署名(国際会議Eurocrypt21)、集約署名(国際論文誌IEICE)、IDベース暗号(国際論文誌IEICE, 国際会議APKC21)、高安全な公開鍵暗号(国際論文誌Journal of Cryptology)。

    researchmap

  • A Study on Locally Private Algorithms for Large-Scale Personal Data

    Grant number:19H04113  2019.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    Murakami Takao

      More details

    Grant amount:\17290000 ( Direct Cost: \13300000 、 Indirect Cost:\3990000 )

    In this work, we studied locally private algorithms for large-scale personal data, such as time-series data (e.g., location traces) and social graph data. Specifically, we proposed a locally private algorithm based on LSH (Locality Sensitive Hashing), a location trace synthesizer, and graph LDP (Local Differential Privacy) algorithms with utility guarantees. We also proposed a privacy notion called ULDP (Utility-Optimized LDP), which provides privacy guarantees equivalent to LDP for only sensitive data.

    researchmap

  • Social Nensor Networking Based on Multi-Layer Graph Structure

    Grant number:19H04096  2019.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)  Grant-in-Aid for Scientific Research (B)

    Matsuda Takahiro

      More details

    Grant amount:\17290000 ( Direct Cost: \13300000 、 Indirect Cost:\3990000 )

    A social sensor network is a system for acquiring environmental information from SNS (social networking service), and has a multi-layered graph structure consisting of a logical graph structure that represents the interaction between users on SNS and a physical graph structure that exists in social infrastructure. In this study, we focused on the multi-layered graph structure and investigated a social sensor network to obtain highly accurate environmental information.

    researchmap

  • 次世代暗号の実用化を支える新たな高度鍵更新手法の設計と安全性評価

    2016.4 - 2019.3

    日本学術振興会  科学研究費補助金 基盤研究(C) 

    江村 恵太

      More details

    Grant type:Competitive

    researchmap

  • 短い秘密情報に基づいた認証技術と鍵管理技術に関する研究開発

    2016.4 - 2019.3

    日本学術振興会  科学研究費補助金 基盤研究(B) 

    松田 隆宏

      More details

    Authorship:Principal investigator  Grant type:Competitive

    researchmap

  • 機械学習における統計的安全性の理論

    2016.4 - 2019.3

    日本学術振興会  科学研究費補助金 基盤研究(B) 

    佐久間 淳

      More details

    Grant type:Competitive

    researchmap

  • 第三者による安全性検証が容易な暗号技術の包括的設計手法に関する研究

    2014.4 - 2019.3

    日本学術振興会  科学研究費補助金 基盤研究(B) 

    花岡 悟一郎

      More details

    Grant type:Competitive

    researchmap

  • クラウドサービスに適した階層型計算委託に関する研究

    2014.4 - 2017.3

    日本学術振興会  科学研究費補助金 若手研究(B) 

    松田 隆宏

      More details

    Authorship:Principal investigator  Grant type:Competitive

    researchmap

  • クラウドコンピューティング環境でも高い安全性・信頼性を持つ公開鍵暗号技術の研究

    2011.4 - 2013.3

    日本学術振興会  科学研究費補助金 特別研究員奨励費 

    松田 隆宏

      More details

    Authorship:Principal investigator  Grant type:Competitive

    researchmap

  • ハッシュ関数の危殆化を考慮した暗号方式に関する研究

    2009.4 - 2011.3

    日本学術振興会  科学研究費補助金 特別研究員奨励費 

    松田 隆宏

      More details

    Authorship:Principal investigator  Grant type:Competitive

    researchmap

▼display all