
WANG YUNTAO
Department of Informatics | Associate Professor |
Cluster II (Emerging Multi-interdisciplinary Engineering) | Associate Professor |
Researcher Information
Career
- Feb. 2025 - Present
株式会社ニッシン, 特別研究員, Japan - Jul. 2024 - Present
Kyoto University, Graduate School of Informatics, Advisor, Japan - Mar. 2024 - Present
The University of Electro-Communications, Graduate School of Informatics and Engineering, Department of Informatics, Associate Professor, Japan - Sep. 2024 - Jan. 2025
株式会社スニード, 特別研究員, Japan - Oct. 2022 - Feb. 2024
Japan Advanced Institute of Science and Technology, School of Information Science, Adjunct Instructor - Mar. 2022 - Feb. 2024
Osaka University, Graduate School of Engineering, Lecturer - Apr. 2020 - Feb. 2022
Japan Advanced Institute of Science and Technology, School of Information Science, Assistant Professor, Japan - Oct. 2019 - Mar. 2020
The University of Tokyo, The Graduate School of Information Science and Technology, JSPS Research Fellowship for Young Scientists (PD), Japan - Oct. 2018 - Sep. 2019
The University of Tokyo, The Graduate School of Information Science and Technology, Project Researcher, Japan - Apr. 2017 - Sep. 2018
Kyushu University, Graduate School of Mathematics, JSPS Research Fellowship for Young Scientists (DC2), Japan
Educational Background
- Apr. 2016 - Sep. 2018
Kyushu University, Graduate School of Mathematics, Department of Mathematics, Ph.D., early graduation, Japan - Apr. 2014 - Mar. 2016
Kyushu University, Graduate School of Mathematics, Department of Mathematics, Master Degree, Japan - Sep. 2007 - Jul. 2011
Yunnan University, Faculty of Mathematics and Information Science, Bachelor Degree, China
Member History
- Apr. 2025 - Present
Professional Committee, Computer Security (CSEC) Group, Society - Feb. 2025 - Present
Program Committee, ISC 2025: The 28th Information Security Conference, Society - Nov. 2024 - Present
Local Organizing Committee of IWSEC2025, CSEC研究会, ISEC研究会, Society - Sep. 2024 - Present
Guest Editor, IET Blockchain (Special Issue): Blockchain-Assisted Secure Data Sharing and Access Control, Society - Sep. 2024 - Present
II類セキュリティ情報学プログラム卒研発表会世話人(兼取りまとめ), 電気通信大学, Others - Jun. 2024 - Present
論文誌ジャーナル/JIP「AI社会を安全にするコンピュータセキュリティ技術」 特集号編集委員, 情報処理学会, Society - Apr. 2024 - Present
大学院 情報理工学研究科 情報学専攻 セキュリティ情報学プログラム修論発表会世話人, 電気通信大学, Others - Mar. 2025 - Mar. 2026
Program Committee, ProvSec 2025: The 19th International Conference on Provable and Practical Security, Society - Jun. 2024 - Mar. 2025
Program Committee, KSE 2024: The 16th International Conference on Knowledge and Systems Engineering 2024, Society - Jun. 2024 - Mar. 2025
学力検査部会専門委員, 電気通信大学 学域入学試験委員会, Society - May 2024 - Mar. 2025
Program Committee, ISPEC 2024: The 19th International Conference on Information Security Practice and Experience, Society - Apr. 2024 - Mar. 2025
General Co-chairs, Mini-Symposium of "Code, Cryptography, AI" at Japanese Conference on Combinatorics and its Applications 2024 (JCCA2024), Society - Apr. 2024 - Mar. 2025
Program Committee, IWSEC 2024: The 19th International Workshop on Security, Society - Mar. 2024 - Mar. 2025
Program Committee, QCNC 2024: International Conference on Quantum Communications, Networking, and Computing, Society - Jan. 2024 - Mar. 2025
Program Committee of "Selected Areas in Cryptography 2024 (SAC 2024)", IACR, Society - Jan. 2024 - Mar. 2025
Program Committee, ProvSec 2024: The 18th International Conference on Provable and Practical Security, Society - Jun. 2023 - Mar. 2025
論文誌ジャーナル/JIP「サプライチェーンを安全にするサイバーセキュリティ技術 」 特集号編集委員, 情報処理学会, Society - Apr. 2021 - Mar. 2025
Steering Committee, Computer Security (CSEC) Group, Society - Aug. 2024 - Jan. 2025
Publicity Co-Chairs, MobiSec 2024: The 8th International Conference on Mobile Internet Security, Society - Apr. 2023 - Mar. 2024
Program Committee of "Selected Areas in Cryptography 2023 (SAC 2023)", IACR, Society - Jul. 2022 - Mar. 2024
論文誌ジャーナル/JIP「サイバー空間を安全にするコンピュータセキュリティ技術」特集号編集委員, 情報処理学会, Society - Aug. 2023 - Jan. 2024
Publicity Co-Chairs, MobiSec 2023: The 7th International Conference on Mobile Internet Security, Society - Mar. 2023 - Dec. 2023
Program Committee, ProvSec 2023: The 17th International Conference on Provable and Practical Security, Society - Jan. 2023 - Dec. 2023
Workshops Co-Chairs, ProvSec 2023: The 17th International Conference on Provable and Practical Security, Society - Oct. 2022 - Sep. 2023
国際会議IWSEC2023組織委員, CSEC研究会, ISEC研究会, Society - Apr. 2022 - Sep. 2023
Journal of Surveillance, Security and Safety「Post-Quantum Cryptography and AI Privacy (PQAP)」特集号ゲストエディタ, OAE Publishing Inc., Society - Apr. 2023 - Aug. 2023
Program Committee, AIGC 2023: The 1st International Conference on AI-generated Content, Society - Apr. 2023 - Aug. 2023
Program Committee, KSE 2023: The 15th IEEE International Conference on Knowledge and Systems Engineering, Society - Feb. 2023 - Aug. 2023
Publicity Co-Chairs, SocialSec 2023: The 9th International Symposium on Security and Privacy in Social Networks and Big Data, Society - Jan. 2023 - Aug. 2023
Technical Program Committee, NSS 2023 : The 17th International Conference on Network and System Security, Society - Jan. 2023 - Aug. 2023
Publicity Co-Chairs, NSS 2023 : The 17th International Conference on Network and System Security, Society - Apr. 2022 - Mar. 2023
Program Committee of "Selected Areas in Cryptography 2022 (SAC 2022)", IACR, Society - Apr. 2022 - Mar. 2023
"Special Session: Next Generation of Affective Computing (NGAC) in 14th IEEE International Conference on Knowledge and Systems Engineering (KSE 2022)", IEEE, Society - Apr. 2021 - Mar. 2023
The editorial committee of Journal of Information Processing, Special issue of “Computer Security technologies for Quantum-Safe World”., 情報処理学会, Society - Nov. 2022 - Nov. 2022
一般研究・研究集会(II)「高度化する暗号技術と数学的技法の進展」組織委員, 九州大学 IMI研究所, Society - Apr. 2022 - Sep. 2022
Program Committee, IWSEC 2022: The 17th International Workshop on Security, Society - Oct. 2021 - Sep. 2022
Local Organizing Committee of IWSEC2022, CSEC研究会, ISEC研究会, Society - Mar. 2022 - Mar. 2022
Organizing Committee of "International Workshop on Affective Interaction between Humans and Machines in Multicultural Society (IWAM2022)" - Apr. 2021 - Mar. 2022
第39回 暗号と情報セキュリティシンポジウム(SCIS2022) プログラム実行委員, Society - Apr. 2021 - Mar. 2022
Program Committee of "Selected Areas in Cryptography (SAC) 2021", IACR, Society - Oct. 2021 - Feb. 2022
The editorial committee of lecture note of IMI Workshop of the Joint Usage Research Projects of “Exploring Mathematical and Practical Principles of Secure Computation and Secret Sharing”., 九州大学 IMI研究所, Society - Jan. 2022 - Jan. 2022
Organizing Committee of "The 39th Symposium on Cryptography and Information Security (SCIS 2022)", ISEC研究会, Society - Nov. 2021 - Nov. 2021
共同利用・研究集会「秘密計算・秘密分散の数理と実用の探求」組織委員, 九州大学 IMI研究所, Society - Nov. 2021 - Nov. 2021
共同利用・研究集会「新世代暗号の設計・評価」主催(代表者), 九州大学 IMI研究所, Society - Jun. 2021 - Jun. 2021
Program Co-Chair of "The 8th ACM ASIA Public-Key Cryptography Workshop (APKC 2021)", Society - Apr. 2020 - Mar. 2021
Program Committee of "Selected Areas in Cryptography (SAC) 2020", IACR, Society - Sep. 2019 - Sep. 2019
Organizing Committee of "International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC 2019)" - Mar. 2019 - Mar. 2019
CREST暗号数理ミニワークショップ「若手研究者講演」 世話人, Society - Dec. 2018 - Dec. 2018
CREST暗号数理平成30年度第二回全体会議 「チュートリアルワークショップ」 世話人, Society
Research Activity Information
Award
- Dec. 2024
The 8th International Conference on Mobile Internet Security(MobiSec2024)
Certificate of Appreciation, Yuntao Wang - Aug. 2024
The 19th Asia Joint Conference on Information Security (AsiaJCIS 2024)
Backdoored-input Detection by Trigger Embedding
Best Paper Award, Akira Fujimoto;Shintaro Yamashita;Yuntao Wang;Atsuko Miyaji - Nov. 2021
The 24th Annual International Conference on Information Security and Cryptology (ICISC 2021)
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
Best Paper Award, Kazuki Yamamura;Yuntao Wang;Eiichiro Fujisaki - Jul. 2021
JSSM
One Sample Ring-LWE with Rounding and Its Application to Key Exchange
Tsujii Shigeo Security Paper Award (Special Award), Yuntao Wang;Jintai Ding;Xinwei Gao;Tsuyoshi Takagi - Jun. 2020
JSSM
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
Tsujii Shigeo Security Paper Award (Special Award), Yuntao Wang;Weiyao Wang;Atsushi Takayasu;Tsuyoshi Takagi - Sep. 2018
Kyushu University
Academic Research Award to Outstanding PhD Graduate, Yuntao Wang - Sep. 2018
International Workshop on Security 2018 (IWSEC 2018)
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
Best Student Paper Award, Weiyao Wang;Yuntao Wang;Atsushi Takayasu;Tsuyoshi Takagi - Nov. 2016
Forum “Math-for-Industry” 2016 (FMfI 2016)
Breaking Lattice Challenge by Progressive BKZ Algorithm
Best Poster Award, Yuntao Wang - Jan. 2015
The 8th Workshop among Asia Information Security Labs (WAIS 2015)
Biggest Applause Award, Yuntao Wang - Oct. 2014
Forum “Math-for-Industry” 2014 (FMfI 2014)
An Improved Reordering-BKC Algorithm for High-Dimensional Lattices
Excellent Poster Award, Yuntao Wang;Po-Chun Kuo;Chen-Mou Cheng;Tsuyoshi Takagi - Nov. 2013
International Workshop on Security 2013 (IWSEC 2013)
Best Poster Award, Yuntao Wang;Hui Zhang;Tsuyoshi Takagi
Paper
- A Reversible-Zero Watermarking Scheme for Medical Volume Data via Difference Expansion
Jiangnan Zhu; Yuntao Wang; Yujie Gu
2025 IEEE Conference on Artificial Intelligence (CAI 2025), May 2025, Peer-reviwed
International conference proceedings - Anti-Collusion and Latency-Tolerant Privacy-Preserving Federated Learning Framework via Multi-Key Homomorphic Aggregation
Yuntao Wang; Yujie Gu; Xun Shen
Lead, 2025 IEEE Conference on Artificial Intelligence (CAI 2025), May 2025, Peer-reviwed
International conference proceedings - Quantum-resistant ring signature-based authentication scheme against secret key exposure for VANETs
Xiaoling Yu; Yuntao Wang; Xin Huang
Corresponding, Computer Networks, May 2025, Peer-reviwed
Scientific journal - A Study on Parallel Tuple Sieve Algorithm
Yuntao Wang; Keiichi Imai; Eiichiro Fujisaki
Lead, The 8th International Conference on Mobile Internet Security (Mobisec 2024), Dec. 2024, Peer-reviwed
International conference proceedings, English - Controlled Multi-client Functional Encryption for Flexible Access Control
Mingwu Zhang; Yulu Zhong; Yifei Wang; Yuntao Wang
Last, Lecture Notes in Computer Science, Springer Nature Singapore, 329-346, 25 Oct. 2024, Peer-reviwed
International conference proceedings - Backdoored-input Detection by Trigger Embedding
Akira Fujimoto; Shintaro Yamashita; Yuntao Wang; Atsuko Miyaji
Corresponding, 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), IEEE, 121-128, 13 Aug. 2024, Peer-reviwed
International conference proceedings - Lattice-Based Commitment Scheme for Low Communication Costs
Hideaki Miyaji; Yuntao Wang; Atsuko Miyaji
IEEE Access, Institute of Electrical and Electronics Engineers (IEEE), 12, 111400-111410, 2024, Peer-reviwed
Scientific journal - Forward Secure Lattice-based Ring Signature Scheme in the Standard Model
Xiaoling Yu; Yuntao Wang
Last, The 25th International Conference on Information and Communications Security (ICICS 2023), 14252, 146-158, Nov. 2023, Peer-reviwed - Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH
Kaiming Chen; Atsuko Miyaji; Yuntao Wang
Last, The 5th International Conference on Science of Cyber Security (SciSec 2023), 14299, 157-177, Oct. 2023, Peer-reviwed - A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator
Leizhang Wang; Yuntao Wang; Baocang Wang
Corresponding, Proceedings of the ACM Asia Conference on Computer and Communications Security, ACM, 664-677, 10 Jul. 2023, Peer-reviwed
International conference proceedings - A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things
Mingwu Zhang; Mingxuan Yang; Gang Shen; Zhe Xia; Yuntao Wang
Last, Information Sciences, Elsevier BV, 623, 293-310, Apr. 2023, Peer-reviwed
Scientific journal - A physical study of the LLL algorithm
Jintai Ding; Seungki Kim; Tsuyoshi Takagi; Yuntao Wang; Bo-yin Yang
Journal of Number Theory, Elsevier BV, 244, 339-368, Mar. 2023, Peer-reviwed
Scientific journal - PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption
Mingwu Zhang; Shuo Huang; Gang Shen; Yuntao Wang
Last, Computer Standards & Interfaces, Elsevier BV, 103678-103678, Mar. 2023, Peer-reviwed
Scientific journal - Improved lattice enumeration algorithms by primal and dual reordering methods
Kazuki Yamamura; Yuntao Wang; Eiichiro Fujisaki
IET Information Security, Institution of Engineering and Technology (IET), 17, 1, 35-45, Jan. 2023, Peer-reviwed, Invited
Scientific journal - A Privacy-Preserving Distributed Medical Data Integration Security System for Accuracy Assessment of Cancer Screening: Development Study of Novel Data Integration System
Atsuko Miyaji; Kaname Watanabe; Yuuki Takano; Kazuhisa Nakasho; Sho Nakamura; Yuntao Wang; Hiroto Narimatsu
JMIR Medical Informatics, JMIR Publications Inc., 10, 12, e38922-e38922, 30 Dec. 2022, Peer-reviwed, Background
Big data useful for epidemiological research can be obtained by integrating data corresponding to individuals between databases managed by different institutions. Privacy information must be protected while performing efficient, high-level data matching.
Objective
Privacy-preserving distributed data integration (PDDI) enables data matching between multiple databases without moving privacy information; however, its actual implementation requires matching security, accuracy, and performance. Moreover, identifying the optimal data item in the absence of a unique matching key is necessary. We aimed to conduct a basic matching experiment using a model to assess the accuracy of cancer screening.
Methods
To experiment with actual data, we created a data set mimicking the cancer screening and registration data in Japan and conducted a matching experiment using a PDDI system between geographically distant institutions. Errors similar to those found empirically in data sets recorded in Japanese were artificially introduced into the data set. The matching-key error rate of the data common to both data sets was set sufficiently higher than expected in the actual database: 85.0% and 59.0% for the data simulating colorectal and breast cancers, respectively. Various combinations of name, gender, date of birth, and address were used for the matching key. To evaluate the matching accuracy, the matching sensitivity and specificity were calculated based on the number of cancer-screening data points, and the effect of matching accuracy on the sensitivity and specificity of cancer screening was estimated based on the obtained values. To evaluate the performance, we measured central processing unit use, memory use, and network traffic.
Results
For combinations with a specificity ≥99% and high sensitivity, the date of birth and first name were used in the data simulating colorectal cancer, and the matching sensitivity and specificity were 55.00% and 99.85%, respectively. In the data simulating breast cancer, the date of birth and family name were used, and the matching sensitivity and specificity were 88.71% and 99.98%, respectively. Assuming the sensitivity and specificity of cancer screening at 90%, the apparent values decreased to 74.90% and 89.93%, respectively. A trial calculation was performed using a combination with the same data set and 100% specificity. When the matching sensitivity was 82.26%, the apparent screening sensitivity was maintained at 90%, and the screening specificity decreased to 89.89%. For 214 data points, the execution time was 82 minutes and 26 seconds without parallelization and 11 minutes and 38 seconds with parallelization; 19.33% of the calculation time was for the data-holding institutions. Memory use was 3.4 GB for the PDDI server and 2.7 GB for the data-holding institutions.
Conclusions
We demonstrated the rudimentary feasibility of introducing a PDDI system for cancer-screening accuracy assessment. We plan to conduct matching experiments based on actual data and compare them with the existing methods.
Scientific journal - TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs
Mingwu Zhang; Boyao Zhu; Yumei Li; Yuntao Wang
Last, Symmetry, MDPI AG, 14, 6, 1123-1123, 30 May 2022, Peer-reviwed, With the establishment of intelligent transportation systems (ITS), research on vehicle ad-hoc networks (VANETs) has played an irreplaceable role in improving traffic safety and efficiency. However, because the deployment of devices based on the IoV is in an open field, the IoV is extremely vulnerable to various attacks without security protection, e.g., remote intrusion, control, trajectory tracking, etc. In order to avoid the above-mentioned attacks and resource abuses, provably secure cryptography primitives are generally considered to guarantee and realize the security of VANETs. This paper proposes a TPM-based conditional privacy-preserving authentication protocol (T-CPPA) which achieves both the integrity and the authenticity of the message/instruct content. The vehicle’s privacy is protected by embedding the system master private key into the trust platform module (TPM) which is responsible for generating pseudonyms and signature keys. The authenticity of message content is ensured by calculating message similarity in a cluster-based model. We give the concrete construction of our T-CPPA authentication scheme in symmetric bilinear groups and design a batch validation algorithm to improve efficiency. Security analysis shows that our scheme can resist various traditional attacks in VANETs, and the experimental results indicate that our scheme is efficient and useful in practice.
Scientific journal - Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem
Xiaoling YU; Yuntao WANG; Chungen XU; Tsuyoshi TAKAGI
Corresponding, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communications Engineers (IEICE), E105.A, 3, 195-202, 01 Mar. 2022, Peer-reviwed
Scientific journal - A Commitment Scheme with Output Locality-3 Fit for the IoT Device
Hideaki Miyaji; Yuntao Wang; Akinori Kawachi; Atsuko Miyaji
Security and Communication Networks, Hindawi Limited, 2021, 1-10, 29 Nov. 2021, Peer-reviwed, Low output locality is a property of functions, in which every output bit depends on a small number of input bits. In IoT devices with only a fragile CPU, it is important for many IoT devices to cooperate to execute a single function. In such IoT’s collaborative work, a feature of low output locality is very useful. This is why it is desirable to reconstruct cryptographic primitives with low output locality. However, until now, commitment with a constant low output locality has been constructed by using strong randomness extractors from a nonconstant-output-locality collision-resistant hash function. In this paper, we construct a commitment scheme with output locality-3 from a constant-output-locality collision-resistant hash function for the first time. We prove the computational hiding property of our commitment by the decisional -bSVP assumption and prove the computational binding property by the
-bSVP assumption, respectively. Furthermore, we prove that the
-bSVP assumption can be reduced to the decisional
-bSVP assumption. We also give a parameter suggestion for our commitment scheme with the 128 bit security.
Scientific journal, English - Recovery Attack on Bob’s Reused Randomness in CRYSTALS-KYBER and SABER
Satoshi Okada; Yuntao Wang
Corresponding, Provable and Practical Security, Springer International Publishing, 13059, 155-173, Nov. 2021, Peer-reviwed
International conference proceedings - Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
Xiaoling Yu; Chungen Xu; Bennian Dou; Yuntao Wang
Last, Multimedia Tools and Applications, Springer Science and Business Media LLC, 80, 2, 3193-3211, 19 Sep. 2020, Peer-reviwed
Scientific journal - Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada; Yuntao Wang; Tsuyoshi Takagi
ACISP 2020: Information Security and Privacy, Springer International Publishing, 12248, 505-524, 06 Aug. 2020, Peer-reviwed
International conference proceedings - Lattice-based searchable encryption scheme against inside keywords guessing attack
Yu, X.; Xu, C.; Xu, L.; Wang, Y.
Last, Computers, Materials and Continua, 64, 2, 1107-1125, Jun. 2020, Peer-reviwed
Scientific journal, English - LLL and stochastic sandpile models.
Jintai Ding; Seungki Kim; Tsuyoshi Takagi; Yuntao Wang 0002
Last, IACR Cryptol. ePrint Arch., 2019, 1009-1009, 2019
Scientific journal - One Sample Ring-LWE with Rounding and Its Application to Key Exchange.
Jintai Ding; Xinwei Gao; Tsuyoshi Takagi; Yuntao Wang 0002
Last, ACNS’19, Springer, 11464, 323-343, 2019, Peer-reviwed
International conference proceedings - Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
Yuntao Wang; Thomas Wunderer
Lead, Information Security Practice and Experience, Springer International Publishing, 11125 LNCS, 440-452, 06 Sep. 2018, Peer-reviwed
In book - Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem
Xiaoling Yu; Yuntao Wang; Chungen Xu; Tsuyoshi Takagi
Corresponding, 2018 5th International Conference on Information Science and Control Engineering (ICISCE) (ICISCE), IEEE, 533-537, Jul. 2018, Peer-reviwed
International conference proceedings - Improving the BKZ Reduction Algorithm by Quick Reordering Technique
Yuntao Wang; Tsuyoshi Takagi
Lead, ACISP2018, Springer International Publishing, 787-795, 13 Jun. 2018, Peer-reviwed
International conference proceedings - An Experimental Study of Kannan’s Embedding Technique for the Search LWE Problem
Yuntao Wang; Yoshinori Aono; Tsuyoshi Takagi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer International Publishing, 10631 LNCS, 541-553, 2018, Peer-reviwed
Scientific journal - Why 1.02? The root Hermite factor of LLL and stochastic sandpile models.
Jintai Ding; Seungki Kim; Tsuyoshi Takagi; Yuntao Wang 0002
Last, CoRR, abs/1804.03285, 2018 - Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Weiyao Wang; Yuntao Wang 0002; Atsushi Takayasu; Tsuyoshi Takagi
IWSEC2018, Springer, 11049, 87-103, 2018, Peer-reviwed
International conference proceedings - The beauty and the beasts—The hard cases in LLL reduction
Alsayigh, S.; Ding, J.; Takagi, T.; Wang, Y.
Last, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10418 LNCS, 19-35, 2017, Peer-reviwed
Scientific journal - Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator.
Yoshinori Aono; Yuntao Wang 0002; Takuya Hayashi 0001; Tsuyoshi Takagi
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 789-819, 2016, Peer-reviwed
International conference proceedings - Heuristic counting of Kachisa-Schaefer-Scott curves
Yutaro Kiyomura; Noriyasu Iwamoto; Shun'ichi Yokoyama; Kenichiro Hayasaka; Yuntao Wang; Takanori Yasuda; Katsuyuki Takashima; Tsuyoshi Takagi
JSIAM Letters, The Japan Society for Industrial and Applied Mathematics, 6, 73-76, 2014, Peer-reviwed, Estimating the number of pairing-friendly elliptic curves is important for obtaining such a curve with a suitable security level and high efficiency. For 128-bit security level, M. Naehrig and J. Boxall estimated the number of Barreto-Naehrig (BN) curves. For future use, we extend their results to higher security levels, that is, to count Kachisa-Schaefer-Scott (KSS) curves with 192- and 224-bit security levels. Our efficient counting is based on a number-theoretic conjecture, called the Bateman-Horn conjecture. We verify the validity of using the conjecture and confirm that an enough amount of KSS curves can be obtained for practical use.
Scientific journal, English
MISC
- Revisiting the Meet-LWE Attack
Yuntao Wang; Eunmin Lee; Joohee Lee
23 Oct. 2024, Computer Security Symposium 2024 (CSS 2024), Japanese - 機械学習へのバックドア攻撃に対する防御手法の改良
Akira Fujimoto; Yuntao Wang; Atsuko Miyaji
Mar. 2024, Information and Communication System Security 2024 (ICSS 2024) - 格子ベース署名3方式の性能比較 ~ Squirrels, Raccoon 128, HAWK 512 の性能比較 ~
Ryoto Morizono; Yuntao Wang; Atsuko Miyaji
Mar. 2024, IEICE, ISEC2024-03 - 格子基底ベクトルの並び替えによるBKZの考察
Katsuya Nakashima; Yuntao Wang; Atsuko Miyaji
Mar. 2024, IEICE, ISEC2024-03 - イデアルの性質を用いたTriple Sieveアルゴリズムの計算量について
Seishiro Terada; Yuntao Wang; Atsuko Miyaji
Mar. 2024, IEICE, ISEC2024-03 - 署名技術を用いた機械学習におけるバックドア攻撃の検知
Shintaro Yamashita; Yuntao Wang; Atsuko Miyaji
Mar. 2024, IEICE, ISEC2024-03 - 格子基底ベクトルの並び替えによる ENUM のコスト削減
Katsuya Nakashima; Yuntao Wang; Atsuko Miyaji
Mar. 2024, 電子情報通信学会2024年総合大会 - Toward Practical Application of Cancer Screening Study Using a Privacy-Preserving Distributed Data Integration System
Atsuko Miyaji; Yuntao Wang; Kazuhisa Nakasho; KanameWatanabe; Hiroto Narimatsu
Nov. 2023, 第43回医療情報学連合大会(第24回日本医療情報学会学術大会),公募シンポジウム 医療情報の安全な二次利用とセキュリティ基盤技術, Japanese - イデアル格子におけるTriple Sieveアルゴリズムの改良
Seishiro Terada; Yuntao Wang; Atsuko Miyaji
Nov. 2023, ISEC2023-65 - グラムシュミットベクトルの順序変更によるProgressive BKZの考察
Katsuya Nakashima; Yuntao Wang; Atsuko Miyaji
Nov. 2023, ISEC2023-65 - pqeベース暗号方式における安全性の証明
Katsuhiro Sato; Yuntao Wang; Atsuko Miyaji
Mar. 2023, 第100回CSEC発表会 - Digital Watermarks in Text-to-Image Generation Models
Paul Kunal; Yuntao Wang; Atsuko Miyaji
Mar. 2023, 第100回CSEC発表会 - Proposing a Trade-off SVP-solving Strategy by Improving pnj-BKZ Simulator
Leizhang Wang; Yuntao Wang; Baocang Wang
Jan. 2023, The 40th Symposium on Cryptography and Information Security (SCIS2023) - A Lattice-based Ring Signature Scheme Secure against Key Exposure
Yuntao Wang; Xiaoling Yu
Jan. 2023, The 40th Symposium on Cryptography and Information Security (SCIS2023) - A Proposal of Embedding Signature Technique on Detecting Backdoor Attacks against DNN Models
Shintaro Yamashita; Yuntao Wang; Atsuko Miyaji
Nov. 2022, 人工知能学会合同研究会2022,第3回 安全性とセキュリティ研究会 - Privacy-preserving Distributed Medical Data Integration Security System
Atsuko Miyaji; Yuntao Wang; Kazuhisa Nakasho; KanameWatanabe; Hiroto Narimatsu
Nov. 2022, 第42回医療情報学連合大会(第23回日本医療情報学会学術大会),公募シンポジウム 医療情報の安全な二次利用とセキュリティ基盤技術 - メッセージ長を拡張する耐量子コミットメント方式
Hideaki Miyaji; Yuntao Wang; Atsuko Miyaji
Jan. 2022, The 39th Symposium on Cryptography and Information Security (SCIS2022) - Tuple Sieve Algorithmの並列化の提案
Keiichi Imai; Yuntao Wang; Eiichiro Fujisaki
Jan. 2022, The 39th Symposium on Cryptography and Information Security (SCIS2022) - A Practical Lattice-based Threshold Signature
Yi Xu; Yuntao Wang; Eiichiro Fujisaki
Jan. 2022, The 39th Symposium on Cryptography and Information Security (SCIS2022) - One Sample Ring-LWE with Rounding and Its Application to Key Exchange
Yuntao Wang; Jintai Ding; Xinwei Gao; Tsuyoshi Takagi
Lead, Nov. 2021, JSSM, 35, 2, 44-46, Peer-reviwed, Introduction scientific journal - メッセージ長を拡張する耐量子コミットメント方式
Hideaki Miyaji; Yuntao Wang; Atsuko Miyaji
Jun. 2021, Information and Communication System Security 2021 (ICSS 2021) - TLS への Bleichenbacher’s CAT 攻撃の考察および実装
Shuto Yamanami; Yuntao Wang; Eiichiro Fujisaki
Mar. 2021, 第92回CSEC発表会 - General Sieve Kernelの考察および改良
Sho Hasegawa; Yuntao Wang; Eiichiro Fujisaki
Mar. 2021, 第92回CSEC発表会 - 格子暗号CRYSTALS-KYBERとSABERに対する鍵再利用攻撃の提案
Satoshi Okada; Yuntao Wang
Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021) - 格子基底の順序変更によるENUMの計算量削減の考察
Kazuki Yamamura; Yuntao Wang; Eiichiro Fujisaki
Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021) - Public Key Cryptosystems Combining Lattice and Multivariate Polynomial
Yuntao Wang; Yasuhiko Ikematsu; Takanori Yasuda
Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021) - Study Signature Embedding Method against Backdoor Attack on DNN Model
Wenbo Liu; Rui Wen; Yuntao Wang
Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021) - Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
Weiyao Wang; Yuntao Wang; Atsushi Takayasu; Tsuyoshi Takagi
Aug. 2020, JSSM, 34, 1, 43-44, Peer-reviwed, Introduction scientific journal - 一方向性を仮定した不定方程式暗号のバリエーションに関する考察
Koichiro Akiyama; Yuntao Wang; Yasuhiko Ikematsu; Tsuyoshi Takagi
Jan. 2020, The 37th Symposium on Cryptography and Information Security (SCIS2020) - 格子暗号NewHopeに対する鍵不一致攻撃の改良
Satoshi Okada; Yuntao Wang; Tsuyoshi Takagi
Jan. 2020, The 37th Symposium on Cryptography and Information Security (SCIS2020) - 少ないサンプル数のLWE問題に対するKannanの埋め込み法の挙動評価
Akito Inoue; Yuntao Wang; Atsushi Takayasu; Tsuyoshi Takagi
Jan. 2019, The 36th Symposium on Cryptography and Information Security (SCIS2019) - 不定方程式暗号のバリエーションに対する鍵復元攻撃に関する考察
Koichiro Akiyama; Yasuhiko Ikematsu; Yuntao Wang; Tsuyoshi Takagi
Jan. 2019, The 36th Symposium on Cryptography and Information Security (SCIS2019) - Experimental Analysis for Linear Algebraic Attack on a Variant of Indeterminate Equation Public-Key Cryptosystems
Yasuhiko Ikematsu; Yuntao Wang; Koichiro Akiyama; Tsuyoshi Takagi
Jan. 2019, The 36th Symposium on Cryptography and Information Security (SCIS2019) - Study the Quantitative Bound of Required Samples in Attacking GACD-based FHE Schemes
Yuntao Wang
Oct. 2018, The International Symposium on Information Theory and Its Applications (ISITA) - A New Embedding Method for Generalized LWE
Weiyao Wang; Yuntao Wang; Atsushi Takayasu; Tsuyoshi Takagi
Jul. 2018, 第82回CSEC発表会 - Security Evaluation of Lattice-based Cryptography based on Progressive BKZ
Yuntao Wang; Yoshinori Aono; Takuya Hayashi; Tsuyoshi Takagi
Jan. 2018, JST CREST・さきがけ 数学関係領域合同シンポジウム - Security Evaluation for Ding Key Exchange
Yuntao Wang; Xinwei Gao; Jintai Ding; Tsuyoshi Takagi
Jan. 2018, The 35th Symposium on Cryptography and Information Security (SCIS2018) - Ding Key Exchange -- A Proposal to NIST PQC Competition
Jintai Ding; Tsuyoshi Takagi; Xinwei Gao; Yuntao Wang
Jan. 2018, The 35th Symposium on Cryptography and Information Security (SCIS2018) - Ding Key Exchange
Jintai Ding; Tsuyoshi Takagi; Xinwei Gao; Yuntao Wang
Last, Dec. 2017, a proposal to NIST PQC standardization project 1st round - Using Embedding Technique on Solving Darmstadt LWE Challenges
Yuntao Wang
Jan. 2017, The 9th Workshop among Asia Information Security Labs (WAIS2017) - Experimental Analysis of LWE Problem
Yuntao Wang; Yoshinori Aono; Tsuyoshi Takagi
Jan. 2017, The 34th Symposium on Cryptography and Information Security (SCIS2017) - Breaking Lattice Challenges by Progressive BKZ algorithm
Yuntao Wang; Yoshinori Aono; Tsuyoshi Takagi
Nov. 2016, Forum "Math-for-Industry" 2016 (FMfI 2016) - A New Progressive BKZ Algorithm
Yuntao Wang; Yoshinori Aono; Takuya Hayashi; Tsuyoshi Takagi
Jan. 2015, The 8th Workshop among Asia Information Security Labs (WAIS2015) - A New Progressive BKZ Algorithm
Yuntao Wang; Yoshinori Aono; Takuya Hayashi; Tsuyoshi Takagi
Jan. 2015, The 32th Symposium on Cryptography and Information Security (SCIS2015) - An Improved Reordering-BKZ Algorithm for High-dimensional Lattices
Yuntao Wang; Po-Chun Kuo; Chen-Mou Cheng; Tsuyoshi Takagi
Oct. 2014, Forum "Math-for-Industry" 2014 (FMfI 2014) - An Improved Reordering-BKZ Algorithm for High-dimensional Lattices
Yuntao Wang; Po-Chun Kuo; Chen-Mou Cheng; Tsuyoshi Takagi
Oct. 2014, Computer Security Symposium 2014 (CSS2014) - An Improved Reordering-BKZ Algorithm for High-dimensional Lattices
Yuntao Wang; Po-Chun Kuo; Chen-Mou Cheng; Tsuyoshi Takagi
Aug. 2014, International Workshop on Security 2014 (IWSEC2014) - Improving BKZ Algorithm with Reordering Technique
Yuntao Wang; Hui Zhang; Tsuyoshi Takagi
Jan. 2014, The 31th Symposium on Cryptography and Information Security (SCIS2014) - Improving BKZ Algorithm with Reordering Technique
Yuntao Wang; Hui Zhang; Tsuyoshi Takagi
Oct. 2013, International Workshop on Security 2013 (IWSEC2013)
Books and other publications
Lectures, oral presentations, etc.
- An Introduction to Meet-LWE Attacks
Yuntao Wang
Public discourse, Lattice Summer School at Shanghai Jiao Tong University, Invited
24 Jul. 2024
23 Jul. 2024- 26 Jul. 2024 - 格子解読アルゴリズムの数理構造および解読記録について
Yuntao Wang
Public discourse, 第6回情報数理セミナー, Invited
Jan. 2024 - Recent Trends in Post-Quantum Cryptography
Yuntao Wang
Keynote oral presentation, The Third International Conference on Emerging Information Security and Application (EISA 2022), Invited
Oct. 2022
29 Oct. 2022- 30 Oct. 2022 - Recent Progress in Post-Quantum Cryptography
Yuntao Wang
Invited oral presentation, Hubei University of Technology Intelligent Science and Technology Innovation Demonstration Base – Academic Report, Invited
Sep. 2022 - Recent Progress in Post-Quantum Cryptography
Yuntao Wang
Oral presentation, JCCA離散数学とその応用研究集会2021ミニシンポジウム 符号・暗号・人工知能, Invited
Aug. 2021 - 格子暗号における数学的困難問題の解読
Yuntao Wang
Oral presentation, 第4回金沢暗号理論勉強会
Jun. 2021 - Lattice Algorithms and Cryptography
Yuntao Wang
Public discourse, ANTS 2020 summer school on algorithmic number theory, Invited
Jun. 2020 - Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack
Yuntao Wang; Yasuhiko Ikematsu; Koichiro Akiyama; Tsuyoshi Takagi
Oral presentation, The 37th Symposium on Cryptography and Information Security (SCIS2020)
Jan. 2020 - An introduction to a lattice-based key exchange protocol and its cryptanalysis
Yuntao Wang
Oral presentation, IMI Crypto Seminar, Invited
Jul. 2019 - Lattice reduction algorithms, Key exchange protocol, and their implementations.
Yuntao Wang
Public discourse, invited lectures in Ewha Womans University, Invited
Jul. 2019 - Introduction to Post-Quantum Cryptography
Yuntao Wang
Poster presentation, JSPS HOPE MEETINGS with Nobel Laureates
Mar. 2019 - Recent Progress in Lattice-based Cryptography
Yuntao Wang
Oral presentation, The 11th Workshop among Asian Information Security Labs (WAIS2019)
Feb. 2019 - Recent Progress in Lattice-based Cryptography
Yuntao Wang
Invited oral presentation, NICT Advanced ICT Research Institute "Seminar on long-term security systems based on secret sharing and post-quantum cryptography", Invited
Nov. 2018 - Sandpileモデルを用いるLLLアルゴリズムの評価
Yuntao Wang
Oral presentation, CREST暗号数理「未解決問題ワークショップ」
Sep. 2018 - Symmetric Structures Derive Hard Cases in Lattice Reduction World
Yuntao Wang
Poster presentation, Forum "Math-for-Industry" 2017 (FMfI 2017)
Oct. 2017 - The Beauty and the Beasts --The Hard Cases in LLL Reduction
Jintai Ding; Saed Alsayigh; Yuntao Wang; Tsuyoshi Takagi
Oral presentation, The 33th Symposium on Cryptography and Information Security (SCIS2016)
Jan. 2016
Courses
- Special Lecture on Informatics and Engineering A
Sep. 2024 - Present
The University of Electro-Communications - Algorithms and Data Structures and Programming Exercises
Apr. 2024 - Present
The University of Electro-Communications - Innovative Comprehensive Communications Design 1
Apr. 2024 - Present
The University of Electro-Communications - 情報理論
Oct. 2023 - Feb. 2024
大阪大学 - 情報通信工学基礎演習
Oct. 2022 - Feb. 2024
Osaka University - Special Course of Secure Data Design
Oct. 2022 - Feb. 2024
Osaka University - Advanced Information Security and Algorithms
Oct. 2022 - Feb. 2024
Osaka University - English Seminar in Division of Electrical, Electronic and Information Engineering
Apr. 2022 - Feb. 2024
Osaka University - Practical Discrete Mathematics and Theory of Computation
Apr. 2022 - Feb. 2024
Osaka University - サイバーセキュリティ(全学共通科目「学問への扉」)
Apr. 2023 - Sep. 2023
大阪大学 - Practical Course of Modern Security I
Apr. 2022 - Sep. 2022
Osaka University - Programming Techniques II
Apr. 2022 - Sep. 2022
Osaka University - Cryptography (English)
Apr. 2021 - Sep. 2021
Japan Advanced Institute of Science and Technology - Literacy in Information Security Management
Apr. 2020 - Sep. 2021
Japan Advanced Institute of Science and Technology - Cryptography
Oct. 2020 - Mar. 2021
Japan Advanced Institute of Science and Technology
Research Themes
Academic Contribution Activities
- IEEE Transactions on Information Forensics & Security (IEEE TIFS)
Peer review etc, Peer review, IEEE, Apr. 2025 - Mar. 2026 - Advances in Mathematics of Communications (AMC)
Peer review etc, Peer review, American Institute of Mathematical Sciences, Mar. 2025 - Mar. 2026 - IEICE Transactions on Information and Systems
Peer review etc, Peer review, IEICE, Mar. 2025 - Mar. 2026 - 情報処理学会 論文誌ジャーナル/JIP「AI社会を安全にするコンピュータセキュリティ技術」 特集号
Peer review etc, Review, Jun. 2024 - Mar. 2026 - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Discrete Mathematics and Its Applications)
Peer review etc, Peer review, 01 Oct. 2024 - 31 Mar. 2025 - Japan Journal of Industrial and Applied Mathematics (JIAM)
Peer review, Apr. 2024 - Mar. 2025 - Designs, Codes and Cryptography (DCC)
Peer review etc, Peer review, Apr. 2024 - Mar. 2025 - 情報処理学会 論文誌ジャーナル/JIP「サプライチェーンを安全にするサイバーセキュリティ技術」 特集号
Peer review etc, Review, Jun. 2023 - Mar. 2025 - PQCrypto 2025
Peer review etc, Peer review, 01 Oct. 2024 - 31 Dec. 2024 - 書籍「現代暗号理論」
Peer review etc, Peer review, Apr. 2024 - Aug. 2024 - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Peer review, Apr. 2023 - Mar. 2024 - 情報処理学会 論文誌ジャーナル/JIP「サイバー空間を安全にするコンピュータセキュリティ技術」 特集号
Peer review etc, Review, Jul. 2022 - Mar. 2024 - Heliyon Special issue on Security and Privacy in IoT Networks
Peer review, Apr. 2022 - Mar. 2023 - 情報処理学会 論文誌ジャーナル/JIP 「量子時代をみすえたコンピュータセキュリティ技術」 特集号
Peer review etc, Review, Jun. 2021 - Mar. 2023 - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Peer review etc, Peer review, Apr. 2021 - Mar. 2022 - SIAM Journal on Discrete Mathematics (SIDMA)
Peer review etc, Peer review, Apr. 2020 - Mar. 2021 - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Peer review etc, Peer review, Apr. 2020 - Mar. 2021 - IEEE Transactions on Industrial Informatics
Peer review etc, Peer review, Apr. 2020 - Mar. 2021 - Computer Standards & Interfaces
Peer review etc, Peer review, Apr. 2020 - Mar. 2021 - Journal of Mathematical Cryptology (JoC)
Peer review etc, Peer review, Apr. 2019 - Mar. 2020 - Advances in Mathematics of Communications (AIMS)
Peer review etc, Peer review, Apr. 2019 - Mar. 2020 - Designs, Codes and Cryptography (DCC)
Peer review etc, Peer review, Apr. 2019 - Mar. 2020 - Advances in Mathematics of Communications (AIMS)
Peer review etc, Peer review, Mar. 2018 - Apr. 2019 - Pacific Journal of Mathematics for Industry
Peer review etc, Peer review, Apr. 2018 - Mar. 2019