/

論文リスト・受賞などTrastise / Awards

学術論文(査読有)

  1. M. Yasuda, Self-dual DeepBKZ for finding short lattice vectors, to appear in a MathCrypt special issue of Journal of Mathematical Cryptology (JMC).
  2. S. Okumura, S. Sugiyama, M. Yasuda and T. Takagi, Security analysis of cryptosystems using short generators over ideal lattices, Japan Journal of Industrial and Applied Mathematics, Volume 35, Issue 2, pp. 739–771, 2018.
  3. M. Yasuda, “Simple Analysis of Key Recovery Attack Against LWE,” Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, Springer, Vol. 29, pp. 221–238, 2018.
  4. Keiji Kimura, Hayato Waki and Masaya Yasuda, Application of mixed integer quadratic program to shortest vector problems, JSIAM Letters, Vol. 9, pp. 65–68, 2017.
  5. M. Yasuda, K. Yokoyama, T. Shimoyama, J. Kogure, and T. Koshiba, Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors, Journal of Mathematical Cryptology (JMC), Vol. 11, Issue 1, pp. 1–24, 2017.
  6. M. Yasuda, Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption, Information Security Journal: A Global Perspective, Vol. 26, Issue 2, pp. 85–103, 2017.
  7. Dung Hoang Duong, Pradeep Kumar Mishra, and Masaya Yasuda, Efficient secure matrix multiplication over LWE-based homomorphic encryption, Tatra Mountains Mathematical Publications, Vol. 67, Issue 1, pp. 69–83, 2016.
  8. M. Yasuda, Torsion points and reduction of elliptic curves, Acta Arithmetica, Vol. 176, No. 1, pp. 89—100, 2016.
  9. M. Yasuda, T. Shimoyama, J. Kogure and T. Izu, Computational hardness of IFP and ECDLP, Applicable Algebra in Engineering, Communications and Computing (AAECC), Vol. 27, Issue 6, pp. 493—521, 2016.
  10. M. Yasuda and Y. Sugimura, Biometric key-binding using lattice masking, Security and Communication Networks (SCN), Vol. 8, Issue 18, pp. 3405—3414, 2015.
  11. M. Yasuda, Ramification of the Kummer extension from torsion points of elliptic curves, International Journal of Number Theory (IJNT), Vol. 11, Issue 06, pp. 1725—1734, 2015.
  12. M. Yasuda, T. Shimoyama, J. Kogure, K.  Yokoyama and T. Koshiba, New packing method in somewhat homomorphic encryption and its applications, Security and Communication Networks (SCN), Vol. 8, Issue 13, pp. 2194—2213, 2015.
  13. M. Yasuda, T. Shimoyama and J. Kogure, Secret computation of purchase history data using somewhat homomorphic encryption, Pacific Journal of Mathematics for Industry, Volume 6, Issue 1, Article 5, 2014.
  14. M. Yasuda, K. Yokoyama, T. Shimoyama, J. Kogure and T. Koshiba, On the exact decryption for Gentry-Halevi’s implementation of fully homomorphic encryption, Journal of Mathematical Cryptology, Vol. 8, Issue 3, pp. 305—329, 2014.
  15. M. Yasuda, Kummer generators and torsion points of elliptic curves with bad reduction at some primes, International. Journal of Number Theory (IJNT), Vol. 9, Issue 7, pp. 1743—1752, 2013.
  16. M. Yasuda, Torsion points of elliptic curves with bad reduction at some primes II, Bull. Korean Math. Soc. 50, No. 1, pp. 83–96, 2013.
  17. M. Yasuda, Torsion points of elliptic curves with bad reduction at some primes, Commentarii Math. Univ. St. Pauli, Vol. 61, No. 1, pp. 1—7, 2012.
  18. M. Yasuda, On elliptic curves whose 3-torsion subgroup splits as $\mu_3 \oplus Z/3Z$, Commun. Korean Math. Soc., Vol. 27, No. 3, pp. 497—503, 2012.
  19. T. Yasuda, M. Yasuda, T. Shimoyama and J. Kogure, On the number of the pairing-friendly curves, International Journal of Pure and Applied Mathematics 77, No. 1, pp. 11–15, 2012.
  20. M. Yasuda, A generalization of the anomalous attack for the ECDLP over Qp, International Journal of Pure and Applied Mathematics 77, No. 1, pp. 1—9, 2012.
  21. M. Yasuda, T. Izu, T. Shimoyama and J. Kogure, On random walks of Pollard’s rho method for the ECDLP on Koblitz curves, Journal of Math-for-Industry, Vol. 3, pp. 107—112, 2011.
  22. M. Yasuda, The lifting problem for the elliptic curve discrete logarithm problem and the Selmer rank, International Journal of Pure and Applied Mathematics 71, No. 2, pp. 193–205, 2011.
  23. T. Izu, M. Takenaka and M. Yasuda, Experimental Analysis of Cheon’s Algorithm against Pairing-Friendly Curves, Journal of Information Processing 19, pp. 1—10, 2011.
  24. M. Yasuda, On the canonical bundle formula for abelian fiber spaces in positive characteristic, Kodai Math. J. 34, pp. 55-70, 2011.
  25. M. Yasuda, Torsion points of elliptic curves with good reduction, Kodai Math. J. 31, pp. 385-403, 2008.

国際会議予稿(査読有)

  1. Deevashwer Rathee, Pradeep Kumar Mishra and Masaya Yasuda, “Faster PCA and Linear Regression through Hypercubes in HElib,” Wokshop on Privacy in the Electronic Society–WPES 2018, ACM pp. 42–53, 2018.
  2. Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong and Masaya Yasuda, “Solving LWR via BDD Strategy: Modulus Switching Approach,” Cryptology and Network Security–CANS 2018, Springer LNCS 11124, pp. 357–376, 2018.
  3. Momonari Kudo, Yuki Yokota, Yasushi Takahashi and Masaya Yasuda, “Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation,” Cryptology and Network Security–CANS 2018, Springer LNCS 11124, pp. 377–393, 2018.
  4. Masaya Yasuda, Junpei Yamaguchi, Michiko Ooka and Satoshi Nakamura, “Development of a dual version of DeepBKZ and its application to solving the LWE challenge,” Progress in Cryptology–AFRICACRYPT 2018, Springer LNCS 10831, pp. 162–182, 2018.
  5. Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada and Junpei Yamaguchi, “Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016,” International Conference on Information Security Practice and Experience (ISPEC2017), Springer LNCS 10701, pp. 409–421, 2017.
  6. Pradeep Kumar Mishra, Dung Hoang Duong and Masaya Yasuda, “Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption,” International Conference on Information Security Practice and Experience (ISPEC2017), Springer LNCS 10701, pp. 320–330, 2017.
  7. Dung Hoang Duong, Masaya Yasuda and Tsuyoshi Takagi, “Choosing parameters for the subfield lattice attack against overstretched NTRU,” Information Security Conference (ISC2017), Springer LNCS 10599, pp. 79–91, 2017.
  8. Junpei Yamaguchi and Masaya Yasuda, “Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications,” Number Theory Methods in Cryptology (NuTMiC2017), Springer LNCS 10737, pp. 142–160, 2017.
  9. Yuki Yokota, Momonari Kudo and Masaya Yasuda, “Practical Limit of Index Calculus Algorithms for ECDLP over Prime Fields,” International Workshop on Coding and Cryptography (WCC2017), available at http://wcc2017.suai.ru/proceedings.html.
  10. Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi and Tetsutaro Kobayashi, “Secure and Efficient Pairing at 256-bit Security Level,” International Conference on Applied Cryptography and Network Security (ACNS2017), Springer LNCS 10355, pp. 59–79, 2017.
  11. M. Kudo, J. Yamaguchi, Y. Guo and M. Yasuda, “Practical analysis of key recovery attack against search-LWE problem”, International Workshop on Security (IWSEC2016), Springer LNCS 9836, pp. 164—181, 2016.
  12. Dung Hoang Duong, Pradeep Kumar Mishra, and Masaya Yasuda, “Efficient secure matrix multiplications using RLWE-based homomorphic encryption”, Central European Conference on Cryptology (CECC2016), 2016.
  13. M. Yasuda, T. Shimoyama, N. Abe, S. Yamada, T. Shinzaki, and T. Koshiba, “Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes”, International Symposium on Foundations & Practice of Security (FPS2015), Springer LNCS 9482, pp.117–133, 2016.
  14. A. Mandal, A. Roy, and M. Yasuda, “Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption”, Data Privacy Management (DPM2015), Springer LNCS 9481, pp. 183—198, 2015.
  15. M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama, T. Koshiba, “Secure statistical analysis using RLWE-based homomorphic encryption”, Australasian Conference on Information Security and Privacy (ACISP2015), Springer LNCS 9144, pp. 471–487, 2015.
  16. M. Yasuda, T. Koshiba, T. Shimoyama, J. Kogure, K. Yokoyama, “Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption”, International Workshop on Security in Cloud Computing (SCC@ASIACCS2015), pp. 53–61, ACM, 2015.
  17. Y. Sugimura, M. Yasuda, S. Yamada, N. Abe and T. Shinzaki, “A biometric key-binding scheme using lattice masking”, International Conference of the Biometrics Special Interest Group (BIOSIG2014), pp. 1—4, IEEE, 2014.
  18. M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama and T. Koshiba, “Privacy-Preserving Wildcards Pattern Matching using Symmetric Somewhat Homomorphic Encryption”, ACISP 2014, Springer LNCS 8544, pp. 338–353, 2014.
  19. M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama and T. Koshiba, “Practical Packing Method in Somewhat Homomorphic Encryption”, In Post-proceedings of Data Privacy Management (DPM2013), Springer LNCS 8247, pp. 34–50, 2014.
  20. M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama and T. Koshiba, “Secure Pattern Matching using Somewhat Homomorphic Encryption”, In Proceedings of Cloud Computing Security Workshop (CCSW), ACM, pp. 65–76, 2013.
  21. M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama and T. Koshiba, “Packed Homomorphic Encryption based on Ideal Lattices and its Application to Biometrics”, In Modern Cryptography and Security Engineering (MoCrySEn2013), Springer LNCS 8128, pp. 55–74, 2013.
  22. M. Yasuda, J. Yajima, T. Shimoyama, J. Kogure, “Analysis of lattice reduction attack against the somewhat homomorphic encryption scheme based on ideal lattices”, In Post-proceedings of European PKI Workshop: Research and Applications (EuroPKI2012), Springer LNCS 7868, pp. 1–16, 2013.
  23. M. Yasuda, T. Shimoyama, T. Izu, J. Kogure, “On the strength comparison of the ECDLP and the IFP”, In Security and Cryptography for Networks (SCN2012), Springer LNCS 7485, pp. 302–325, 2012.
  24. Y. Sakemi, G. Hanaoka, T. Izu, M. Takenaka and M. Yasuda, “Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-bit Elliptic Curve”, In Practice and Theory of Public-Key Cryptography (PKC2012), Springer LNCS 7293, pp. 595–608, 2012.
  25. M. Yasuda, T. Shimoyama, T. Izu and J. Kogure, “On the strength comparison of ECC and RSA”, In workshop record of Special-Purpose Hardware for Attacking Cryptographic Systems (SHARCS2012), pp. 61–79, 2012.
  26. Y. Sakemi, T. Izu, M. Takenaka and M. Yasuda, “Solving a DLP with Auxiliary Input with the rho-algorithm”, In International Workshop on Information Security Applications (WISA2011), Springer LNCS 7115, pp. 98—108, 2011.
  27. T. Izu, M. Takenaka and M. Yasuda, “Time Estimation of Cheon’s Algorithm over Elliptic Curves on Finite Fields with Characteristic 3″, In International Workshop on Advances in Information Security (WAIS2011), IEEE Computer Science, pp. 594–596, 2011.
  28. Y. Sakemi, T. Izu, M. Takenaka and M. Yasuda, “Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library”, WISTP 2011, Springer LNCS 6633, pp. 116–127, 2011.
  29. T. Izu, M. Takenaka and M. Yasuda, “Experimental Analysis of Cheon’s Algorithm against Pairing-Friendly Curves”, AINA 2011, pp. 90–96, IEEE Computer Science, 2011.
  30. M. Yasuda, “The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups”, ISPEC 2010, Springer LNCS 6047, pp. 110–122, 2010.
  31. T. Izu, M. Takenaka and M. Yasuda, “Experimental Results on Cheon’s Algorithm”, WAIS 2010, pp. 625–630 in the proceedings of ARES 2010, IEEE Computer Science, 2010.
  32. M. Yasuda, “The discrete logarithm problem on elliptic curves defined over Q (abstract only)”, Poster abstracts from the 8-th algorithmic number theory symposium, ANTS-8, 2008.

招待講演・解説記事など

  1. 安田雅哉, 「完全準同形暗号の応用」, 解説記事, 電子情報通信学会誌, Vol.99, No.12, pp. 1167—1175, 2016年12月.
  2. 小暮淳, 下山武司, 安田雅哉, 「暗号化したまま検索が可能な秘匿検索技術」, 解説記事, 電子情報通信学会会誌, Vol. 98, No. 3, pp. 202–206, 2015年3月.
  3. 安田雅哉, 「準同型暗号による秘匿検索」, 招待講演, 第5 回暗号フロンティア研究会(北陸先端科学技術大学院大学), 2014年3月.
  4. 安田雅哉, “On the strength comparison of the ECDLP and the IFP”, 招待講演, 第6回公開鍵暗号の安全な構成とその応用ワークショップ, 2013年3月.
  5. Masaya Yasuda, “The homomorphic encryption based on ideal lattices and its applications”, 招待講演, 九州大学ワークショップ(Cryptographic Technologies suitable for cloud computing), 2012年10月.
  6. 安田雅哉, “On the security evaluation of elliptic curve cryptography”, 招待講演, 九州大学ワークショップ(暗号理論の安全性を支える数論アルゴリズムとその応用に関する集会), 2010年6月.
  7. 安田雅哉, 「楕円曲線暗号の攻撃とその安全性」, 招待講演, 京都大学数理解析研究所研究集会(CA-ALIAS’09), 2009年11月.

特許(米国特許のみ)

  1. Cryptographic processing device and cryptographic processing method, M Yasuda – US Patent 9,960,905, 2018.
  2. Secret data matching device, computer-readable recording medium storing program for updating secret data, and secret data updating method, Y Jo, M Yasuda – US Patent 9,876,790, 2018.
  3. Cryptographic processing method and cryptographic processing device, I Morikawa, M Yasuda – US Patent 9,871,652, 2018.
  4. Information processing method, computer-readable recording medium, and information processing apparatus, Y Sakemi, M Takenaka, M Yasuda – US Patent 9,860,060, 2018.
  5. Information processing method, recording medium, and information processing apparatus, M Yasuda, T Shimoyama, J Kogure – US Patent 9,722,782, 2017.
  6. Encryption processing method, encryption processing device, and computer-readable recording medium storing program for encryption processing, M Takenaka, Y Sakemi, M Yasuda – US Patent 9,614,665, 2017.
  7. Information processing technique for pattern matching, M Yasuda, T Shimoyama, J Kogure – US Patent 9,596,083, 2017.
  8. Encrypted-data processing method, system, and apparatus, M Yasuda – US Patent App. 15/259,632, 2016.
  9. Information processing apparatus, and information processing method, T. Shimoyama, M. Yasuda, J. Kogure – US Patent 9,531,539, 2016.
  10. Information processing technique for secure pattern matching, M. Yasuda, T. Shimoyama, J. Kogure – US Patent 9,509,493, 2016.
  11. Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device, M. Yasuda, T. Shimoyama, J. Kogure – US Patent 9,473,302, 2016.
  12. Secret data matching device, secret data matching method, and recording medium, Y. Jo, M. Yasuda – US Patent 9,455,984, 2016.
  13. Encryption device, encryption method, and information processing device, M. Yasuda, T. Shimoyama, J. Kogure – US Patent 9,438,423, 2016.
  14. Authentication device, system and method, Y. Sakemi, T. Izu, M. Takenaka, M. Yasuda – US Patent 9,386,017, 2016.
  15. Cryptographic processing device and cryptographic processing method, M. Yasuda – US Patent App. 15/058,677, 2016.
  16. Information processing method, computer-readable recording medium, and information processing apparatus, Y. Sakemi, M. Takenaka, M. Yasuda – US Patent App. 14/969,125, 2015.
  17. Cryptographic processing device and cryptographic processing method, M. Yasuda, T. Shimoyama, J. Kogure – US Patent App. 14/934,740, 2015.
  18. Information processing method, recording medium, and information processing apparatus, M. Yasuda, T. Shimoyama, J. Kogure – US Patent App. 14/930,752, 2015.
  19. Cryptography processing device and cryptography processing method, M. Yasuda, T. Shimoyama, J. Kogure – US Patent 9,166,785, 2015.
  20. Cryptographic processing device and cryptographic processing method, M. Yasuda – US Patent App. 14/869,470, 2015.
  21. Cryptographic processing method and cryptographic processing device, I. Morikawa, M. Yasuda – US Patent App. 14/831,179, 2015.
  22. Proximity determination method, proximity determination device, and proximity determination system, M. Yasuda, J. Yajima, T. Shimoyama, J. Kogure – US Patent 9,098,107, 2015.
  23. Encryption processing apparatus and method, M. Yasuda, T. Shimoyama, J. Kogure – US Patent 9,100,185, 2015.
  24. Encryption processing method, encryption processing device, and computer-readable recording medium storing program for encryption processing, M. Takenaka, Y. Sakemi, M. Yasuda – US Patent App. 14/734,259, 2015.
  25. Secret data matching device, computer-readable recording medium storing program for updating secret data, and secret data updating method, Y. Jo, M. Yasuda – US Patent App. 14/730,389, 2015.
  26. Information processing technique for pattern matching, M. Yasuda, T. Shimoyama, J. Kogure – US Patent App. 14/697,573, 2015.
  27. Decryption method, recording medium storing decryption program, decryption device, key generation method, and recording medium storing key generation program, J. Yajima, M. Yasuda, T. Shimoyama, J. Kogure – US Patent App. 14/081,231, 2013.
  28. Contents processing device and contents partial integrity assurance method, K. Furukawa, T. Izu, M. Takenaka, M. Yasuda – US Patent App. 12/885,886, 2010.

受賞など

  • SCIS2012イノベーション論文賞(論文タイトル:「複数企業が持つ購買履歴データのクラウド秘匿集計」)
PAGE TOP