Mitsugu Iwamoto

Department of InformaticsProfessor
Cluster II (Emerging Multi-interdisciplinary Engineering)Professor
  • Profile:
    2001-present: Information Security, Cryptography, Information theory
    1999-2001: High-performance computing

Target Resource

Degree

  • Ph.D. (information Science and technology), The University of Tokyo
  • 修士(工学), 東京大学
  • 博士(情報理工学), 東京大学

Research Keyword

  • Cryptography
  • Information Theory
  • Information Theoretic Cryptography
  • Information Security
  • Fundamental theory of information processing in general

Field Of Study

  • Informatics, Information theory
  • Manufacturing technology (mechanical, electrical/electronic, chemical engineering), Communication and network engineering
  • Informatics, Information security
  • Informatics, Statistical science
  • Informatics, Mathematical informatics

Career

  • 01 Apr. 2021
    Graduate School of Information and Engineering, The University of Electro-Communications, Department of Informatics, Professor, Afghanistan
  • 01 Apr. 2016 - 31 Mar. 2021
    Graduate School of Information and Engineering, The University of Electro-Communications, Department of Informatics, Associate Professor, Afghanistan
  • 01 Apr. 2015 - 31 Mar. 2016
    Graduate School of Information and Engineering, The University of Electro-Communications, Department of Informatics, Associate Professor, Afghanistan
  • 01 Dec. 2012 - 31 Mar. 2015
    Cernter for Frontier Science and Engineering, The University of Electro-Communications, Tenure Track Associate Professor, Afghanistan
  • 01 Jun. 2010 - 30 Nov. 2012
    Cernter for Frontier Science and Engineering, The University of Electro-Communications, Tenure Track Assistant Professor, Afghanistan
  • 01 Apr. 2007 - 31 May 2010
    Graduate School of Information Systems, the University of Electro-Communications, Department of Information Network System, Assistant Professor, Afghanistan
  • 01 Apr. 2004 - 31 Mar. 2007
    Graduate School of Information Sysytems, University of Electro-communications, Department of Information System Science, Research Associate, Afghanistan

Educational Background

  • Mar. 2004
    The University of Tokyo, Graduate School of Infoemarion Science and Technology, Department of Mathematical Informatics, Afghanistan
  • Mar. 2001
    The University of Tokyo, Graduate School, Division of Engineering, 計数工学, Afghanistan
  • Mar. 1999
    The University of Tokyo, Faculty of Engineering, Mathmatical Engineering and Information Physics, Afghanistan
  • 01 Apr. 1992 - 31 Mar. 1995
    Sugamo High School, Japan

Member History

  • Jun. 2025 - May 2026
    President-Elect, Engineering Sciences Society, IEICE, IEICE, Society
  • Mar. 2025 - Apr. 2026
    編集委員, 2026年 電子情報通信学会論文誌 情報理論とその応用小特集 編集委員会, Society
  • Apr. 2025 - Mar. 2026
    編集委員, 2026年 電子情報通信学会論文誌 暗号と情報セキュリティ小特集 編集委員会, Society
  • Apr. 2024 - Mar. 2025
    編集委員, 2025年 電子情報通信学会論文誌 情報理論とその応用小特集 編集委員会, Society
  • Apr. 2024 - Mar. 2025
    編集委員, 2025年 電子情報通信学会論文誌 暗号と情報セキュリティ小特集 編集委員会, Society
  • Jan. 2024 - Sep. 2024
    Program Committee Member, 2024 IWSEC (International Workshop on Security), Society
  • Jun. 2023 - May 2024
    Editor-in-Chief, IEICE Trans. Fundamentals, Society
  • Jun. 2022 - May 2024
    Editor-in-Chief, IEICE Trans. Fundamentals (Japanese Edition), Society
  • Apr. 2023 - Mar. 2024
    編集委員, 2024年 電子情報通信学会論文誌暗号と情報セキュリティ小特集号編集委員, Society
  • Aug. 2023
    Program Committee Member, IWSEC2023, Society
  • Jun. 2017 - May 2023
    専門委員, 電子情報通信学会 情報理論研究専門委員会, Society
  • Apr. 2022 - Mar. 2023
    編集委員, 2023年 電子情報通信学会論文誌暗号と情報セキュリティ小特集号, Society
  • Apr. 2022 - Mar. 2023
    暗号技術調査ワーキンググループ(高機能暗号)委員, CRYPTREC, Government, 暗号に関するガイドラインの策定,執筆
  • Jan. 2022 - Dec. 2022
    実行委員(アドバイザ), 情報理論とその応用シンポジウム (SITA2022), Society
  • Aug. 2019 - Oct. 2021
    Program co-chair, IEEE Information Theory Workshop, IEEE Information Theory Society, Society
  • 05 Jun. 2014 - 03 Jun. 2020
    専門委員, 電子情報通信学会 情報セキュリティ研究会, Society
  • 02 Jun. 2016 - 31 May 2017
    幹事補佐, 電子情報通信学会 情報理論研究会, Society
  • 05 Jun. 2014 - 01 Jun. 2016
    幹事, 電子情報通信学会 情報理論研究専門委員会, Society
  • 25 May 2013 - 03 Jun. 2015
    電子広報担当幹事, 電子情報通信学会 基礎・境界ソサイエティ 運営委員会, Society
  • 25 May 2007 - 24 May 2013
    専門委員, 電子情報通信学会 情報理論研究会研究専門委員会, Society
  • May 2010 - Apr. 2013
    委員(広報担当), 電子情報通信学会 情報理論とその応用サブソサイエティ運営委員会, Society
  • Apr. 2009 - Mar. 2011
    編集幹事, 情報理論とその応用学会, Society
  • Apr. 2007 - Mar. 2009
    WEB担当幹事, 情報理論とその応用学会, Society

Award

  • Aug. 2025
    Program Committee, AsiaPKC2025
    Single-Shuffle Physical Zero-Knowledge Proof for Sudoku Using Interactive Inputs
    Best paper award, Tomoki Ono;Suthee Ruangwises;Yoshiki Abe;Kyosuke Hatsugai;Mitsugu Iwamoto
    International academic award, Afghanistan
  • May 2025
    電子情報通信学会 情報セキュリティ研究専門委員会
    招待講演 “Single-Shuffle Card-Based Protocols with Six Cards” に対して
    ISEC研究会活動貢献感謝状, 小野知樹;品川和雅;中井雄士;渡邉洋平;岩本貢
    International academic award, Afghanistan
  • May 2025
    電子情報通信学会 情報セキュリティ研究専門委員会
    招待講演“The Two-Sherrifs Problem: Cryptographic Formalization and Generalization (from COCOA2023)” に対して
    ISEC研究会活動貢献感謝状, 杉本航太;中井雄士;渡邉洋平;岩本貢
    International academic award, Afghanistan
  • Oct. 2024
    検索可能暗号に対するより効果的なクエリ復元攻撃
    CSS奨励賞, 並木拓海;岩本貢;渡邉洋平
    International academic award, Afghanistan
  • Oct. 2024
    コンピュータセキュリティシンポジウム
    TFHEを用いた高速な否認可能完全準同型暗号
    CSS奨励賞, 豊岡叶望;渡邉洋平;岩本貢
    International academic award, Afghanistan
  • Jan. 2023
    電子情報通信学会 情報セキュリティ研究会
    (指導学生の受賞)
    SCIS論文賞, 安部芳紀
    International academic award, Afghanistan
  • Oct. 2022
    情報誌処理学会, CSS2022全論文(200件以上)の中から5編以内.最優秀論文賞(2編)に次ぐ賞. https://www.iwsec.org/css/2022/award.html#css
    カードを用いた秘匿和集合プロトコル
    CSS優秀論文賞, 土井 アナスタシヤ;小野 知樹;安部 芳紀;産業技術総;渡邉 洋平;産業技術総;岩本 貢
    Japan society, Japan
  • Jan. 2021
    IEICE情報セキュリティ研究会
    (指導学生の受賞)
    SCIS論文賞, 中井雄士
    Japan society, Afghanistan
  • Oct. 2020
    コンピュータセキュリティシンポジウム
    より少ない漏洩の下で安全な動的検索可能暗号への変換手法
    CSS2020 奨励賞, 渡邉洋平;大原一真;岩本貢;太田和夫
    Japan society, Japan
  • Sep. 2020
    IEICE, IEICE和文論文誌の幹事と2年勤めたため
    Japan
    電子情報通信学会貢献賞
    Others, Japan
  • Jun. 2020
    電子情報通信学会ISEC研究専門委員会
    長年にわたる専門委員としての研究会運営に対する協力
    ISEC研究活動貢献感謝状, 岩本貢
    Official journal, Afghanistan
  • Jan. 2020
    電子情報通信学会情報セキュリティ研究会 (ISEC)
    (指導学生の受賞)初期文字列が29文字の4入力多数決Private PEZプロトコル
    情報セキュリティ研究奨励賞, 安部芳紀;太田;岩本;渡邉研究室
    Japan society, Afghanistan
  • Oct. 2019
    このピュータセキュリティシンポジウム
    (強)フォワード安全な動的検索可能暗号の効率的な構成
    CSS2019 奨励賞, 渡邉洋平;大原一真;岩本貢;太田和夫
    Japan society, Japan
  • Sep. 2019
    IEICE, 電子情報通信学会論文誌・情報理論とその応用小特集号.幹事としての貢献
    Japan
    電子情報通信学会貢献賞
    Official journal, Japan
  • Aug. 2019
    International Workshop on Information Security (IWSEC)
    IWSEC best poster award, Yoshiki Abe;Mitsugu Iwamoto;Kazuo Ohta
    International society, Afghanistan
  • Sep. 2018
    IEICE, IEICE和文・英文論文誌の編集委員を2期4年勤めたため
    Japan
    電子情報通信学会貢献賞
    Others, Japan
  • Mar. 2018
    サイバーセキュリティシンポジウム道後
    サイバーセキュリティシンポジウム道後2018学生研究賞, 庄司奈津;菅原健;岩本貢;崎山一男
    Japan society, Afghanistan
  • Sep. 2017
    IEICE, 基礎・境界ソサイエティ,情報理論研究会の幹事および幹事補佐を計3年務めたため
    Japan
    電子情報通信学会貢献賞
    Others, Japan
  • Feb. 2017
    サイバーセキュリティシンポジウム道後
    サイバーセキュリティシンポジウム道後2017学生研究賞, 八代理紗;町田卓謙;岩本貢;崎山一男
    Japan society, Afghanistan
  • Sep. 2015
    IEICE, 基礎・境界ソサイエティの電子広報担当幹事を2年務めたため
    Japan
    電子情報通信学会貢献賞
    Others, Japan
  • Sep. 2014
    IEICE, 査読委員として,査読本数が多いことによる
    Japan
    電子情報通信学会感謝状
    Others, Japan
  • Sep. 2012
    IEICE, 査読委員として,査読本数が多いことによる
    Japan
    電子情報通信学会感謝状
    Others, Japan
  • Nov. 2005
    情報理論とその応用学会
    SITA奨励賞, 岩本貢
    International academic award, Afghanistan

Paper

  • Experimental Evaluations of Fault Sensitivity Imbalance for Masked AES Using t-Test and Entropy
    H. Hirata; K. Furuno; D. Miyahara; M. Iwamoto; K. Sakiyama; Y. Li
    Lead, CANDAR2025, Nov. 2025, Peer-reviwed, Null
    International conference proceedings, English
  • Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation
    Takumi Namiki; Takumi Amada; Mitsugu Iwamoto; Yohei Watanabe
    Lead, Lecture Notes in Computer Science, Springer Nature Switzerland, 294-313, 12 Oct. 2025, Peer-reviwed, Null
    In book, Abkhazian
  • Experimental Evaluation of Information-Theoretic Deception Strategies against Robot Surveillance Systems
    堀越健; 澤田賢治; 岩本貢; 渡邉洋平; 田中崇資
    Lead, 計測自動制御学会制御部門マルチシンポジウム(CD-ROM), 12th, to appear, Sep. 2025, Peer-reviwed, Null
    Scientific journal, English
  • Information Theoretic Security, Revisited
    Mitsugu Iwamoto
    Lead, 2025 Asia Pacific Workshop on Data Science and Information Theory (APWDSIT2025), to appear, Sep. 2025, Peer-reviwed, Invited, Null
    International conference proceedings, English
  • Protecting against Partial Key Exposure in Key-Insulated Encryption.
    Kyoichi Asano; Mitsugu Iwamoto; Yohei Watanabe 0001
    Lead, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 108, 9, 1139-1151, Sep. 2025, Peer-reviwed, True
    Scientific journal, English
  • A Generic Zero-Knowledge Range Argument with Preprocessing.
    Yuki Sawai; Kyoichi Asano; Yohei Watanabe 0001; Mitsugu Iwamoto
    Last, AsiaJCIS, 1-15, Aug. 2025, Peer-reviwed, Null
    International conference proceedings, Abkhazian
  • Anonymous Credentials with Credential Redaction and Its Application to SSI-Based Plug&Charge for Shared Vehicles.
    Kyosuke Hatsugai; Kyoichi Asano; Yuki Sawai; Yohei Watanabe 0001; Mitsugu Iwamoto
    Last, ACISP (3), 42-62, Jul. 2025, Peer-reviwed, Null
    International conference proceedings, Abkhazian
  • Covert Vehicle Misguidance and Its Detection: A Hypothesis Testing Game over Continuous-Time Dynamics
    Takeshi Tanaka; Kenji Sawada; Yohei Watanabe; Mitsugu Iwamoto
    Last, Proc. of ACC 2025, Jul. 2025, Peer-reviwed, Null
    Scientific journal, English
  • Single-Shuffle Physical Zero-Knowledge Proof for Sudoku Using Interactive Inputs.
    Tomoki Ono; Suthee Ruangwises; Yoshiki Abe; Kyosuke Hatsugai; Mitsugu Iwamoto
    Last, APKC@AsiaCCS, 1-8, Aug. 2025, Peer-reviwed, Null
    International conference proceedings, English
  • Revisiting Relations of Security Notions in Searchable Encryption.
    Kazuki Sato; Takumi Amada; Kyoichi Asano; Yohei Watanabe 0001; Mitsugu Iwamoto; Kazuo Ohta
    Lead, APKC@AsiaCCS, 17-24, Aug. 2025, Peer-reviwed, Null
    International conference proceedings, English
  • Covert Vehicle Misguidance and Its Detection: A Hypothesis Testing Game Over Continuous-Time Dynamics
    Takashi Tanaka; Kenji Sawada; Yohei Watanabe; Mitsugu Iwamoto
    Last, IEEE Control Systems Letters, Institute of Electrical and Electronics Engineers (IEEE), 8, 2889-2894, Dec. 2024, Peer-reviwed, Null
    Scientific journal, English
  • Dynamic Collateral Management in Decentralized Sealed-Bid Auctions
    Kholiq Abdullah; Mitsugu Iwamoto; Yohei Watanabe
    Lead, ICIMCIS 2024, to appear, Nov. 2024, Peer-reviwed, Null
    International conference proceedings, English
  • On the Attack Detection Performance of Information-theoretic Method in Industrial Control System
    T. Nishiuchi; Y. Abe; Y. Watanabe; M. Iwamoto; K. Sawada; S. Shin
    Lead, IECON 2024, to appear, Nov. 2024, Peer-reviwed, Null
    International conference proceedings, English
  • Perfectly-Sound Physical Zero-Knowledge Proofs for Instant Insanity
    初貝恭祐; 安部芳紀; 安部芳紀; 中井雄士; 品川和雅; 品川和雅; 渡邉洋平; 渡邉洋平; 岩本貢
    Last, 電子情報通信学会論文誌 A(Web), J107-A, 6, to appear, Nov. 2024, Peer-reviwed, Null
    Scientific journal, Japanese
  • Double-Sided Multimodal Attack Sensing and Partial Re-Keying in Shared Group Key System
    R. Ikemoto; S. Fujii; K. Naruse; J. Shiomiand; Y. Midoh; Y. Yamashita; M. Taguchi; T. Miki; M. Nagata; Y. Komano; M. Iwamoto; K. Sakiyama; N. Miura
    Lead, ESSERC2024, to appear, Sep. 2024, Peer-reviwed, Null
    International conference proceedings, English
  • Card-Based Protocols for Private Set Intersection and Union.
    Anastasiia Doi; Tomoki Ono; Yoshiki Abe; Takeshi Nakai; Kazumasa Shinagawa; Yohei Watanabe 0001; Koji Nuida; Mitsugu Iwamoto
    Last, New Gener. Comput., 42, 3, 359-380, Sep. 2024, Peer-reviwed, Null
    Scientific journal, Abkhazian
  • Printing Protocol: Physical ZKPs for Decomposition Puzzles.
    Suthee Ruangwises; Mitsugu Iwamoto
    Last, New Gener. Comput., 42, 3, 331-343, Sep. 2024, Peer-reviwed, Null
    Scientific journal, Abkhazian
  • Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model.
    Takeshi Nakai; Keita Iwanari; Tomoki Ono; Yoshiki Abe; Yohei Watanabe 0001; Mitsugu Iwamoto
    Last, New Gener. Comput., Springer Science and Business Media LLC, 42, 3, 345-358, Sep. 2024, Peer-reviwed, Null, Abstract

    Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public and private models. We adopt private one that allows players to handle cards privately. While much of the existing works for card-based cryptography use two-colored cards, it is also a vital task to construct an efficient protocol with playing cards. In the public model, 2n cards are necessary for any n-bit input protocol since at least two cards are required to express a Boolean value. It holds true for both two-colored and playing-card settings. On the other hand, the private model enables us to construct a protocol with fewer than 2n cards. However, all existing protocols that achieve such properties are only in the two-colored setting. This paper shows that the private model enables us to construct a protocol with fewer than 2n cards using the playing cards. We first show two-bit input protocols with fewer than four cards for logical operations, AND, OR, and XOR. Furthermore, we show a three-input majority voting protocol using only three cards, which is constructed by combining our AND and OR protocols. Notably, our proposed protocols require no randomness. All operations are deterministic and depend only on players’ private inputs.
    Scientific journal, Abkhazian
  • Multi-user Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives
    Takato Hirano; Yutaka Kawai; Yoshihiro Koseki; Satoshi Yasuda; Yohei Watanabe; Takumi Amada; Mitsugu Iwamoto; Kazuo Ohta
    Lead, Proc. of SAC 2024, Aug. 2024, Peer-reviwed, Null
    International conference proceedings, English
  • Card-Based Overwriting Protocol for Equality Function and Applications
    Suthee Ruangwises; Tomoki Ono; Yoshiki Abe; Kyosuke Hatsugai; Mitsugu Iwamoto
    Lead, Proc. of UCNC 2024, Springer Nature Switzerland, 18-27, 18 Jun. 2024, Peer-reviwed, Null
    In book, English
  • Single-Shuffle Card-Based Protocols with Six Cards per Gate
    Tomoki Ono; Kazumasa Shinagawa; Takeshi Nakai; Yohei Watanabe; Mitsugu Iwamoto
    Lead, Proc. of ICISC 2023, Springer Nature Singapore, 157-169, 08 Mar. 2024, Peer-reviwed, Null
    In book, Abkhazian
  • Information-Theoretic Perspectives for Simulation-Based Security in Multi-Party Computation.
    Mitsugu Iwamoto
    Lead, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 107, 3, 360-372, Mar. 2024, Peer-reviwed, Invited, Null
    Scientific journal, English
  • Card-Based Overwriting Protocol for Equality Function and Applications.
    Suthee Ruangwises; Tomoki Ono; Yoshiki Abe; Kyosuke Hatsugai; Mitsugu Iwamoto
    Last, CoRR, abs/2402.16290, 2024, Null
    Scientific journal, Abkhazian
  • The Two Sheriffs Problem: Cryptographic Formalization and Generalization.
    Kota Sugimoto; Takeshi Nakai; Yohei Watanabe 0001; Mitsugu Iwamoto
    Last, COCOA (1), Springer Nature Switzerland, 512-523, 09 Dec. 2023, Peer-reviwed, Null
    International conference proceedings, Abkhazian
  • Physical and Visual Cryptography to Accelerate Social Implementation of Advanced Cryptographic Technologies
    花岡悟一郎; 岩本貢; 渡邉洋平; 水木敬明; 安部芳紀; 品川和雅; 新井美音; 矢内直人
    Lead, 電子情報通信学会論文誌 A(Web), J106-A, 8, Aug. 2023, Peer-reviwed, Invited, Null
    Scientific journal, Japanese
  • A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model.
    Yoshiki Abe; Takeshi Nakai; Yohei Watanabe 0001; Mitsugu Iwamoto; Kazuo Ohta
    Last, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communications Engineers (IEICE), 106, 3, 315-324, Mar. 2023, Peer-reviwed, Null
    Scientific journal, Abkhazian
  • Packet Analysis and Information Theory on Attack Detection for Modbus TCP
    西内達哉; 藤田真太郎; 渡邉洋平; 岩本貢; 澤田賢治
    Lead, システム制御情報学会研究発表講演会講演論文集(CD-ROM), 67th, 1-6, 2023, Peer-reviwed, Null
    Scientific journal, Abkhazian
  • Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.
    Takumi Amada; Mitsugu Iwamoto; Yohei Watanabe 0001
    Lead, ICISC (2), 170-193, 2023, Peer-reviwed, Null
    International conference proceedings, Abkhazian
  • Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.
    Shun Uchizono; Takeshi Nakai; Yohei Watanabe 0001; Mitsugu Iwamoto
    Last, ICISC (2), Springer Nature Singapore, 133-156, 2023, Peer-reviwed, Null
    International conference proceedings, Abkhazian
  • Abstraction Model of Probing and DFA Attacks on Block Ciphers.
    Yuiko Matsubara; Daiki Miyahara; Yohei Watanabe 0001; Mitsugu Iwamoto; Kazuo Sakiyama
    Lead, IACR Cryptology ePrint Archive, 2023, 443-443, Mar. 2023, Null
    Scientific journal, Abkhazian
  • Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations.
    Takeshi Nakai; Satoshi Shirouchi; Yuuki Tokushige; Mitsugu Iwamoto; Kazuo Ohta
    Last, New Generation Computing, Springer Science and Business Media LLC, 40, 1, 95-113, 08 Feb. 2022, Peer-reviwed, Null, Abstract

    Card-based cryptography is a variant of multi-party computation using physical cards like playing cards. There are two models on card-based cryptography, called public and private models. The public model assumes that all operations are executed publicly, while the private model allows the players private operations called private permutations (PP, for short). Much of the existing card-based protocols were developed under the public model. Under the public model, 2n cards are necessary for every protocol with n-bit input since at least two cards are required to express a bit. In this paper, we propose n-bit input protocols with fewer than 2n cards by utilizing PP, which shows the power of PP. In particular, we show that a protocol for (n-bit input) threshold function can be realized with only $$n+1$$ cards by reducing the threshold function to the majority voting. Toward this end, we first offer that two-bit input protocols for logic gates can be realized with fewer than four cards. Furthermore, we construct a new protocol for three-input majority voting with only four cards by observing the relationship between AND/OR operations. This protocol can be easily extended to more participants, and to the protocol for threshold functions.
    Scientific journal, Abkhazian
  • Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function.
    Yuichi Komano; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Lead, Innovative Security Solutions for Information Technology and Communications - 15th International Conference(SecITC), Springer, 203-221, 2022, Peer-reviwed, Null
    International conference proceedings, Abkhazian
  • Card-based Cryptographic Protocols for Private Set Intersection.
    Anastasiia Doi; Tomoki Ono; Takeshi Nakai; Kazumasa Shinagawa; Yohei Watanabe 0001; Koji Nuida; Mitsugu Iwamoto
    Last, ISITA, IEEE, 239-243, Oct. 2022, Peer-reviwed, Null
    International conference proceedings, English
  • An Improvement of Multi-Party Private Set Intersection Based on Oblivious Programmable PRFs.
    Seiya Shimizu; Takeshi Nakai; Yohei Watanabe 0001; Mitsugu Iwamoto
    Last, ISITA, IEEE, 234-238, Oct. 2022, Peer-reviwed, Null
    International conference proceedings, English
  • Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage.
    Yohei Watanabe 0001; Kazuma Ohara; Mitsugu Iwamoto; Kazuo Ohta
    Lead, CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy(CODASPY), ACM, -, -, 312-323, 24 Apr. 2022, Peer-reviwed, Null
    International conference proceedings, English
  • Efficient Card-Based Majority Voting Protocols.
    Yoshiki Abe; Takeshi Nakai; Yoshihisa Kuroki; Shinnosuke Suzuki; Yuta Koga; Yohei Watanabe 0001; Mitsugu Iwamoto; Kazuo Ohta
    Last, New Generation Computing, Springer Science and Business Media LLC, 40, 1, 173-198, 23 Mar. 2022, Peer-reviwed, Null, Abstract

    Card-based cryptography is a variety of secure multiparty computation (MPC). Recently, a new technique called private operations was introduced because the protocol can be implemented with fewer cards than that by using the conventional technique called the shuffle. For example, Nakai et al. showed that if the private operations are available, secure computations of AND and OR operations for two inputs can be realized simultaneously by using four cards, and the protocol is applied to a four-card majority voting protocol with three inputs. This paper shows that only three cards are sufficient to construct a majority voting protocol with three inputs. Specifically, we propose two constructions of three-input majority voting protocols. One is a protocol assuming that players can announce their output, and the other is not allowed. Compared to Nakai et al.’s protocol, the protocol with the announcement is realized without any additional private operations and communications. On the other hand, the second construction requires two more private operations and communications because it removes the assumption on the announcement from the first construction. More importantly, the idea of the second protocol can be extended to an n-input majority voting protocol with n cards, which is the main result of this paper.
    Scientific journal, Abkhazian
  • How to Make a Secure Index for Searchable Symmetric Encryption, Revisited.
    Yohei Watanabe 0001; Takeshi Nakai; Kazuma Ohara; Takuya Nojima; Yexuan Liu; Mitsugu Iwamoto; Kazuo Ohta
    Lead, IACR Cryptology ePrint Archive, Institute of Electronics, Information and Communications Engineers (IEICE), 2021, 12, 948-948, 2021, Peer-reviwed, Null
    Scientific journal, Abkhazian
  • How to Solve Millionaires' Problem with Two Kinds of Cards.
    Takeshi Nakai; Yuto Misawa; Yuuki Tokushige; Mitsugu Iwamoto; Kazuo Ohta
    Last, New Generation Computing, Springer, 39, 1, 73-96, 05 Jan. 2021, Peer-reviwed, Null
    Scientific journal, English
  • A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule.
    Tomoki Uemura; Yohei Watanabe 0001; Yang Li 0001; Noriyuki Miura; Mitsugu Iwamoto; Kazuo Sakiyama; Kazuo Ohta
    Last, International Symposium on Information Theory and Its Applications(ISITA), IEEE, -, -, 382-386, 24 Oct. 2020, Peer-reviwed, Null
    International conference proceedings, English
  • An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
    Kohei Matsuda; Sho Tada; Makoto Nagata; Yuichi Komano; Yang Li; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama; Noriyuki Miura
    Lead, Japanese Journal of Applied Physics, IOP Publishing, 59, SG, SGGL02-SGGL02, 01 Apr. 2020, Peer-reviwed, Null, Abstract

    Laser fault injection (LFI) attacks on cryptographic processor ICs are a critical threat to information systems. This paper proposes an IC-level integrated countermeasure employing an information leakage sensor against an LFI attack. Distributed bulk current sensors monitor abnormal bulk current density caused by laser irradiation for LFI. Time-interleaved sensor operation and sensitivity tuning can obtain partial secret key leakage bit information with small layout area penalty. Based on the leakage information, the secret key can be securely updated to realize high-availability resilient systems. The test chip was designed and fabricated in a 0.18 μm standard CMOS, integrating a 128-bit advanced encryption standard cryptographic processor with the proposed information leakage sensor. This evaluation successfully demonstrated bulk current density and leakage bit monitoring.
    Scientific journal, Abkhazian
  • How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs.
    Yoshiki Abe; Mitsugu Iwamoto; Kazuo Ohta
    Lead, International Symposium on Information Theory and Its Applications(ISITA), IEEE, -, -, 377-381, 24 Oct. 2020, Peer-reviwed, Null
    International conference proceedings, English
  • Efficient Private PEZ Protocols for Symmetric Functions.
    Yoshiki Abe; Mitsugu Iwamoto; Kazuo Ohta
    Last, Theory of Cryptography - 17th International Conference, Springer, 372-392, Dec. 2019, Peer-reviwed, Null
    International conference proceedings, Abkhazian
  • Efficient Private PEZ Protocols for Symmetric Functions.
    Yoshiki Abe; Mitsugu Iwamoto; Kazuo Ohta
    Last, IACR Cryptology ePrint Archive, Springer, 2019, 1069-1069, 01 Dec. 2019, Null
    Scientific journal, English
  • Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing.
    Kazuma Ohara; Yohei Watanabe 0001; Mitsugu Iwamoto; Kazuo Ohta
    Last, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, IEICE, 102-A, 9, 1079-1090, 01 Sep. 2019, Peer-reviwed, Null
    Scientific journal, English
  • How to improve the private PEZ protocol for general functions,
    Yoshiki Abe; Mitsugu Iwamoto; Kazuo Ohta
    Lead, Advances in Information and Computer Security - The 14th International Workshop on Security (IWSEC2019), poster session, Aug. 2019, Peer-reviwed, Null
    International conference proceedings, English
  • Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory.
    A. J. Han Vinck; Kees A. Schouhamer Immink; Tadashi Wadayama; Van Khu Vu; Akiko Manada; Kui Cai 0001; Shunsuke Horii; Yoshiki Abe; Mitsugu Iwamoto; Kazuo Ohta; Xingwei Zhong; Zhen Mei; Renfei Bu; Jos H. Weber; Vitaly Skachek; Hiroyoshi Morita; N. Hovhannisyan; Hiroshi Kamabe; Shan Lu 0003; Hirosuke Yamamoto; Kengo Hashimoto; Øyvind Ytrehus; Shigeaki Kuzuoka; Mikihiko Nishiara; Han Mao Kiah; Jun Muramatsu; Shigeki Miyake
    Lead, CoRR, abs/1907.02944, 2019, Null
    Scientific journal, Abkhazian
  • An Abstraction Model for 1-bit Probing Attack on Block Ciphers.
    Natsu Shoji; Takeshi Sugawara 0001; Mitsugu Iwamoto; Kazuo Sakiyama
    Lead, IEEE 4th International Conference on Computer and Communication Systems(ICCCS), IEEE, -, -, 502-506, 2019, Peer-reviwed, Null
    International conference proceedings, English
  • Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes.
    Reo Eriguchi; Noboru Kunihiro; Mitsugu Iwamoto
    Lead, IEEE International Symposium on Information Theory(ISIT), IEEE, 3047-3051, Jul. 2019, Peer-reviwed, Null
    International conference proceedings, English
  • Single-Round Pattern Matching Key Generation Using Physically Unclonable Function.
    Yuichi Komano; Kazuo Ohta; Kazuo Sakiyama; Mitsugu Iwamoto; Ingrid Verbauwhede
    Lead, Security and Communication Networks, Hindawi, 2019, 1719585, 1719585-13, 2019, Peer-reviwed, Null
    Scientific journal, English
  • Card-Based Majority Voting Protocols with Three Inputs Using Three Cards.
    Yohei Watanabe 0001; Yoshihisa Kuroki; Shinnosuke Suzuki; Yuta Koga; Mitsugu Iwamoto; Kazuo Ohta
    Lead, International Symposium on Information Theory and Its Applications(ISITA), IEEE, 218-222, 20 Oct. 2018, Peer-reviwed, Null
    International conference proceedings, English
  • Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography.
    Mitsugu Iwamoto; Kazuo Ohta; Junji Shikata
    Lead, IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers Inc., 64, 1, 654-685, 01 Jan. 2018, Peer-reviwed, Null
    Scientific journal, English
  • Q-Class Authentication System for Double Arbiter PUF.
    Risa Yashiro; Takeshi Sugawara 0001; Mitsugu Iwamoto; Kazuo Sakiyama
    Lead, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communication, Engineers, IEICE, 101-A, 1, 129-137, 01 Jan. 2018, Peer-reviwed, Null
    Scientific journal, English
  • A proactive secret image sharing scheme with resistance to machine learning based steganalysis.
    Angelina Espejel Trujillo; Mitsugu Iwamoto; Mariko Nakano-Miyatake
    Lead, Multimedia Tools and Applications, Springer New York LLC, 77, 12, 15161-15179, 01 Jun. 2018, Peer-reviwed, Null
    Scientific journal, English
  • Worst-case guessing secrecy is meaningful in secret sharing schemes
    M. Iwamoto
    Lead, ICITS2017, workshop track, Dec. 2017, Peer-reviwed, Null
    International conference proceedings, English
  • Proceedings of Workshop AEW10: Concepts in Information Theory and Communications.
    Kees A. Schouhamer Immink; Stan Baggen; Ferdaous Chaabane; Yanling Chen; Peter H. N. de With; Héla Gassara; Hamed Gharbi; Adel Ghazel; Khaled Grati; Naira M. Grigoryan; Ashot N. Harutyunyan; Masayuki Imanishi; Mitsugu Iwamoto; Ken-ichi Iwata; Hiroshi Kamabe; Brian M. Kurkoski; Shigeaki Kuzuoka; Patrick Langenhuizen; Jan Lewandowsky; Akiko Manada; Shigeki Miyake; Hiroyoshi Morita; Jun Muramatsu; Safa Najjar; Arnak V. Poghosyan; Fatma Rouissi; Yuta Sakai; Ulrich Tamm; Joost van der Putten; Fons van der Sommen; A. J. Han Vinck; Tadashi Wadayama; Dirk Wübben; Hirosuke Yamamoto
    Lead, CoRR, abs/1707.08567, 2017, Peer-reviwed, Null
    Scientific journal, Abkhazian
  • 秘密分散型放送暗号
    岩本貢; 渡邉洋平
    Lead, SCIS 2017 予稿集, 2017, Null
    Symposium, Japanese
  • Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations.
    Takeshi Nakai; Satoshi Shirouchi; Mitsugu Iwamoto; Kazuo Ohta
    Lead, Information Theoretic Security - 10th International Conference(ICITS), Springer, 10681, 153-165, 2017, Peer-reviwed, Null
    International conference proceedings, English
  • Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption
    K. Hayasaka; Y. Kawai; Y. Koseki; T. Hirano; K. Ohta; M. Iwamoto
    Lead, CANS2016, Springer-Verlag, 500-517, Nov. 2016, Peer-reviwed, Null
    International conference proceedings, English
  • Application of Joux-Lucks Search Algorithm for Multi-Collisions to MicroMint
    Y. Kamoshida; M. Iwamoto
    Lead, IWSEC2016, poster session, Sep. 2016, Peer-reviwed, Null
    International conference proceedings, English
  • Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
    Kenichiro Hayasaka; Yutaka Kawai; Yoshihiro Koseki; Takato Hirano; Kazuo Ohta; Mitsugu Iwamoto
    Lead, Cryptology and Network Security - 15th International Conference(CANS), LNCS 10052, Springer-Verlag, 350-364, 14 Nov. 2016, Peer-reviwed, Null
    International conference proceedings, English
  • Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations.
    Takeshi Nakai; Yuuki Tokushige; Yuto Misawa; Mitsugu Iwamoto; Kazuo Ohta
    Lead, Cryptology and Network Security - 15th International Conference(CANS), LNCS 10052, Springer-Verlag, 500-517, 14 Nov. 2016, Peer-reviwed, Null
    International conference proceedings, English
  • Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants.
    Risa Yashiro; Takanori Machida; Mitsugu Iwamoto; Kazuo Sakiyama
    Lead, Advances in Information and Computer Security - 11th International Workshop on Security(IWSEC), 9836, 267-285, 2016, Peer-reviwed, Null
    International conference proceedings, English
  • Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
    Takato Hirano; Mitsuhiro Hattori; Yutaka Kawai; Nori Matsuda; Mitsugu Iwamoto; Kazuo Ohta; Yusuke Sakai 0001; Tatsuji Munaka
    Lead, Advances in Information and Computer Security - 11th International Workshop on Security(IWSEC), 9836, 91-110, 2016, Peer-reviwed, Null
    International conference proceedings, English
  • Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations.
    Takeshi Nakai; Yuuki Tokushige; Yuto Misawa; Mitsugu Iwamoto; Kazuo Ohta
    Lead, Cryptology and Network Security - 15th International Conference(CANS), Springer-Verlag, 500-517, Nov. 2016, Peer-reviwed, Null
    International conference proceedings, English
  • Toward Reducing Shuffling in Card-based Cryptographic Protocol for Millionaire Problem
    T. Nakai; Y. Tokushige; M. Iwamoto; K. Ohta
    Lead, International Workshop on Information Security and Crytptograohy, poster session, Aug. 2015, Peer-reviwed, Null
    International conference proceedings, English
  • Comparison of Security on Coded Signs with Public/Private Code Book
    Y. Misawa; Y. Tokushige; M. Iwamoto; K. Ohta
    Lead, International Workshop on Information Security and Crytptograohy, poster session, Aug. 2015, Peer-reviwed, Null
    International conference proceedings, English
  • Constructions of symmetric-key encryption with guessing secrecy.
    Mitsugu Iwamoto; Junji Shikata
    Lead, IEEE International Symposium on Information Theory(ISIT), 725-729, 2015, Peer-reviwed, Null
    International conference proceedings, English
  • Implementation of double arbiter PUF and its performance evaluation on FPGA.
    Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
    Lead, The 20th Asia and South Pacific Design Automation Conference(ASP-DAC), 6-7, 2015, Peer-reviwed, Null
    International conference proceedings, English
  • A New Arbiter PUF for Enhancing Unpredictability on FPGA
    Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
    Lead, Scientific World Journal, Hindawi Publishing Corporation, 2015, 864812, 2015, Peer-reviwed, Null
    Scientific journal, English
  • A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs.
    Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Masahiko Takenaka; Kouichi Itoh; Naoya Torii
    Lead, Journal of Cryptographic Engineering, 5, 3, 187-199, 2015, Peer-reviwed, Null
    Scientific journal, English
  • A New Model of Client--Server Communications under Information Theoretic Security
    M. Iwamoto; T. Omino; Y. Komano; K. Ohta
    Lead, IEEE Information Thoery Workshop 2014, IEEE, 512-516, Nov. 2014, Peer-reviwed, Null
    International conference proceedings, English
  • クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵
    Toshiki Nakasone; Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Lead, IEICE Trans. JA, J97-A, 11, 695-703, Nov. 2014, Peer-reviwed, Null
    Scientific journal, Japanese
  • A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA
    T.Machida; D.Yamamoto; M.Iwamoto; K.Sakiyama
    Lead, 1st Workshop on Emerging Aspects in Information Security (EAIS'14), 877-884, Sep. 2014, Peer-reviwed, Null
    International conference proceedings, English
  • Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies
    M. Iwamoto; J. Shikata
    Lead, Proc. of The 31th Symposium on Cryptography and Information Security (SCIS 2014), 1E2-3, 21 Jan. 2014, Null
    Scientific journal, English
  • Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography.
    Mitsugu Iwamoto; Kazuo Ohta; Junji Shikata
    Lead, CoRR, abs/1410.1120, 2014, Null
    Scientific journal, Abkhazian
  • A new model of Client-Server Communications under information theoretic security.
    Mitsugu Iwamoto; Tsukasa Omino; Yuichi Komano; Kazuo Ohta
    Lead, 2014 IEEE Information Theory Workshop(ITW), 511-515, 2014, Peer-reviwed, Null
    International conference proceedings, English
  • A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA.
    Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
    Lead, Proceedings of the 2014 Federated Conference on Computer Science and Information Systems(FedCSIS), 2, 871-878, 2014, Peer-reviwed, Null
    International conference proceedings, English
  • Secure (M+1) st-Price Auction with Automatic Tie-Break.
    Takashi Nishide; Mitsugu Iwamoto; Atsushi Iwasaki; Kazuo Ohta
    Lead, Trusted Systems - 6th International Conference(INTRUST), 9473, 422-437, 2014, Peer-reviwed, Null
    International conference proceedings, English
  • Cheating on a visual secret sharing scheme under a realistic scenario.
    Pichanee Lumyong; Mitsugu Iwamoto; Kazuo Ohta
    Lead, International Symposium on Information Theory and its Applications(ISITA), 575-579, 2014, Peer-reviwed, Null
    International conference proceedings, English
  • Secret Sharing Schemes Based on Min-Entropies.
    Mitsugu Iwamoto; Junji Shikata
    Lead, CoRR, abs/1401.5896, 401-405, 2014, Peer-reviwed, Null
    Scientific journal, English
  • Privacy-preserving smart metering with verifiability for both billing and energy management.
    Kazuma Ohara; Yusuke Sakai 0001; Fumiaki Yoshida; Mitsugu Iwamoto; Kazuo Ohta
    Lead, ASIAPKC'14(AsiaPKC@AsiaCCS), ACM, 23-32, 2014, Peer-reviwed, Null
    International conference proceedings, English
  • An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl.
    Yu Sasaki; Yuuki Tokushige; Lei Wang 0031; Mitsugu Iwamoto; Kazuo Ohta
    Lead, Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014(CT-RSA), Springer, 8366, 424-443, 2014, Peer-reviwed, Null
    International conference proceedings, English
  • Practical DFA Strategy for AES Under Limited-access Conditions.
    Kazuo Sakiyama; Yang Li 0001; Shigeto Gomisawa; Yu-ichi Hayashi; Mitsugu Iwamoto; Naofumi Homma; Takafumi Aoki; Kazuo Ohta
    Lead, Journal of Information Processing, Information Processing Society of Japan, 22, 2, 142-151, 2014, Peer-reviwed, Null
    Scientific journal, English
  • Revisiting Conditional Renyi Entropy and its Application to Encryption: Part I --Properties of Conditional Renyi Entropy--
    M. Iwamoto; J. Shikata
    Lead, Proc. of The 30th Symposium on Cryptography and Information Security (SCIS 2013), 22 Jan. 2013, Null
    Scientific journal, English
  • Revisiting Conditional Renyi Entropy and its Application to Encryption: Part II --Fano's Inequality and Shannon's Bound--
    J. Shikata; M. Iwamoto
    Lead, Proc. of The 30th Symposium on Cryptography and Information Security (SCIS 2013), 22 Jan. 2013, Null
    Scientific journal, English
  • Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful.
    Mitsugu Iwamoto; Thomas Peyrin; Yu Sasaki
    Lead, IACR Cryptology ePrint Archive, 2013, 611-611, 2013, Null
    Scientific journal, Abkhazian
  • Information Theoretic Security for Encryption Based on Conditional Renyi Entropies.
    Mitsugu Iwamoto; Junji Shikata
    Lead, IACR Cryptology ePrint Archive, 2013, 440-440, 2013, Null
    Scientific journal, Abkhazian
  • Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful.
    Mitsugu Iwamoto; Thomas Peyrin; Yu Sasaki
    Lead, Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, 8270, 504-523, 2013, Peer-reviwed, Null
    International conference proceedings, English
  • Information Theoretic Security for Encryption Based on Conditional Rényi Entropies.
    Mitsugu Iwamoto; Junji Shikata
    Lead, Information Theoretic Security - 7th International Conference(ICITS), 8317, 103-121, 2013, Peer-reviwed, Null
    International conference proceedings, English
  • A New Model of Modeling Attacks against Arbiter PUF on FPGA
    T. Machida; T. Nakasone; M. Iwamoto; K. Sakiyama
    Lead, International Workshop on Information Security and Crytptograohy, poster session, 2013, Peer-reviwed, Null
    International conference proceedings, English
  • Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL.
    Yu Sasaki; Wataru Komatsubara; Yasuhide Sakai; Lei Wang 0031; Mitsugu Iwamoto; Kazuo Sakiyama; Kazuo Ohta
    Lead, SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography(SECRYPT), SciTePress, 111-122, Jul. 2013, Peer-reviwed, Null
    International conference proceedings, English
  • Variety enhancement of PUF responses using the locations of random outputting RS latches.
    Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Masahiko Takenaka; Kouichi Itoh
    Lead, Journal of Cryptographic Engineering, 3, 4, 197-211, Nov. 2013, Peer-reviwed, Null
    Scientific journal, English
  • A t-resilient Unconditionally Secure First-Price Auction Protocol
    K.Ohara; Y.Sakai; M.Iwamoto; K.Ohta
    Lead, International Workshop on Information Security and Crytptograohy, poster session, Nov. 2012, Peer-reviwed, Null
    International conference proceedings, English
  • Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks.
    Mitsugu Iwamoto; Hiroki Koga; Hirosuke Yamamoto
    Lead, IEEE Transactions on Information Theory, 58, 9, 6194-6206, Sep. 2012, Peer-reviwed, Null
    Scientific journal, English
  • A cheating prevention EVC scheme using watermarking techniques
    Angelina Espejel Trujillo; Mariko Nakano Miyatake; Mitsugu Iwamoto; Hector Perez Meana
    Lead, REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 63, 63, 30-42, Jun. 2012, Peer-reviwed, Null
    Scientific journal, English
  • A Weak Security Notion for Visual Secret Sharing Schemes.
    Mitsugu Iwamoto
    Lead, IEEE Transactions on Information Forensics and Security, 7, 2, 372-382, Feb. 2012, Peer-reviwed, Null
    Scientific journal, English
  • Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher.
    Toshiki Nakasone; Yang Li 0001; Yu Sasaki; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Lead, Information Security and Cryptology - ICISC 2012 - 15th International Conference(ICISC), Springer, 7839, 395-409, 2012, Peer-reviwed, Null
    International conference proceedings, English
  • Information-Theoretic Approach to Optimal Differential Fault Analysis.
    Kazuo Sakiyama; Yang Li 0001; Mitsugu Iwamoto; Kazuo Ohta
    Lead, IEEE Transactions on Information Forensics and Security, 7, 1, 109-120, Jan. 2012, Peer-reviwed, Null
    Scientific journal, English
  • Variations of Information Theoretic Security Notions
    M. Iwamoto; K. Ohta
    Lead, Asian-Europian Workshop on Information Theory (AEW), 73-77, Jul. 2011, Peer-reviwed, Null
    International conference proceedings, English
  • Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
    Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Takao Ochiai; Masahiko Takenaka; Kouichi Itoh
    Lead, Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop(CHES), 6917, 390-406, 2011, Peer-reviwed, Null
    International conference proceedings, English
  • Security notions for information theoretically secure encryptions.
    Mitsugu Iwamoto; Kazuo Ohta
    Lead, 2011 IEEE International Symposium on Information Theory Proceedings(ISIT), abs/1106.1731, 1777-1781, 2011, Peer-reviwed, Null
    International conference proceedings, English
  • Security Notions for Information Theoretically Secure Encryptions
    Mitsugu Iwamoto; Kazuo Ohta
    Lead, CoRR, IEEE, abs/1106.1731, 1777-1781, 2011, Peer-reviwed, Null
    Scientific journal, English
  • Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
    Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Takao Ochiai; Masahiko Takenaka; Kouichi Itoh
    Lead, Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop(CHES), 6917, 390-406, 2011, Peer-reviwed, Null
    International conference proceedings, English
  • Coding Theorems for Cheating-Detectable Secret Sharing Schemes with Two Shares
    Mitsugu Iwamoto; Hiroki Koga; Hirosuke Yamamoto
    Lead, CoRR, abs/1004.4530, 2010, Null
    Scientific journal, Abkhazian
  • Visual Secret Sharing Schemes for Multiple Secret Images Including Shifting Operation of Shares
    A. Espejel-Trujillo; M. Nakano-Miyatake; M. Iwamoto
    Lead, Proc. of 6th International Conference on Electrical Engineering, Computing Science and Automatic Control, IEEE, 443-438, Nov. 2009, Peer-reviwed, Null
    International conference proceedings, English
  • Visual secret sharing schemes allowing arbitrary rotation angles of shares
    Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Lead, TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 33-38, 2009, Null
    International conference proceedings, English
  • A Coding Theorem for Cheating-DetectabIe(2,2)-Threshold Schemes
    古賀弘樹; 岩本貢; 山本博資
    Lead, 電子情報通信学会技術研究報告, 108, 472(IT2008 43-130), 1308-1312, 2009, Peer-reviwed, Null
    Scientific journal, English
  • Coding Theorems for a (2,2)-Threshold Scheme Secure against Impersonation by an Opponent
    Hiroki Koga; Mitsugu Iwamoto; Hirosuke Yamamoto
    Lead, 2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), 188-192, 2009, Peer-reviwed, Null
    International conference proceedings, English
  • Weakly Secure Visual Secret Sharing Schemes
    Mitsugu Iwamoto
    Lead, 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 41-46, 2008, Peer-reviwed, Null
    International conference proceedings, English
  • A Remark on Visual Secret Sharing Schemes Allowing the Rotation of Shares
    M. Iwamoto; L. Wang; K. Yoneyama; N. Kunihiro; K. Ohta
    Lead, 5th Asia-Europe workshop on information theory, SITA, 37-42, Oct. 2006, Null
    International conference proceedings, English
  • Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
    Mitsugu Iwamoto; Lei Wang; Kazuki Yoneyama; Noboru Kunihiro; Kazuo Ohta
    Lead, IEICE Transactons, E89-A, 5, 1382-1395, May 2006, Peer-reviwed, Null
    Scientific journal, English
  • Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares.
    Mitsugu Iwamoto; Lei Wang 0031; Kazuki Yoneyama; Noboru Kunihiro; Kazuo Ohta
    Lead, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 89-A, 5, 1382-1395, May 2006, Peer-reviwed, Null
    Scientific journal, English
  • Strongly secure ramp secret sharing schemes for general access structures.
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Lead, Information Processing Letters, 97, 2, 52-57, 2006, Peer-reviwed, Null
    Scientific journal, English
  • Quantum secret sharing schemes and reversibility of quantum operations
    T Ogawa; A Sasaki; M Iwamoto; H Yamamoto
    Lead, PHYSICAL REVIEW A, 72, 3, 032318, Sep. 2005, Peer-reviwed, Null
    Scientific journal, English
  • Strongly secure ramp secret sharing schemes.
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Lead, Proceedings of the 2005 IEEE International Symposium on Information Theory(ISIT), 1221-1225, 2005, Peer-reviwed, Null
    International conference proceedings, English
  • Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
    Mitsugu Iwamoto; Hirosuke Yamamoto; Hirohisa Ogawa
    Lead, CoRR, abs/cs/0506064, 1, 101-112, 2005, Peer-reviwed, Null
    Scientific journal, English
  • Quantum Secret Sharing Schemes and Reversibility of Quantum Operations
    Tomohiro Ogawa; Akira Sasaki; Mitsugu Iwamoto; Hirosuke Yamamoto
    Lead, Proceeding of international symposium on information theory and its applications, SITA, 1440-1445, Oct. 2004, Peer-reviwed, Null
    International conference proceedings, English
  • Optimal multiple assignments based on integer programming in secret sharing schemes.
    Mitsugu Iwamoto; Hirosuke Yamamoto; Hirohisa Ogawa
    Lead, Proceedings of the 2004 IEEE International Symposium on Information Theory(ISIT), 16-16, 2004, Peer-reviwed, Null
    International conference proceedings, English
  • A Construction Method of Visual Secret Sharing Schemes for Plural Secret Images.
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Lead, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 86-A, 10, 2577-2588, Oct. 2003, Peer-reviwed, Null
    Scientific journal, English
  • The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images.
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Lead, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 85-A, 10, 2238-2247, Oct. 2002, Peer-reviwed, Null
    Scientific journal, English
  • Cache Line Impact on 3D PDE Solvers.
    Masaaki Kondo; Mitsugu Iwamoto; Hiroshi Nakamura
    Lead, High Performance Computing(ISHPC), Springer, 2327, 301-309, 2002, Peer-reviwed, Null
    International conference proceedings, English
  • The Security Condition of Visual Secret Sharing Schemes for Plural Images.
    岩本貢; 山本博資
    Lead, 電子情報通信学会技術研究報告, 101, 730(SST2001 190-217), 283-283, 2002, Peer-reviwed, Null
    Scientific journal, English
  • An analytic construction of the visual secret sharing scheme for color images
    H Koga; M Iwamoto; H Yamamoto
    Lead, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E84A, 1, 262-272, Jan. 2001, Peer-reviwed, Null
    Scientific journal, English

MISC

  • 安全なオンライン取引を支える暗号
    岩本貢; 渡邉洋平; 山田久美
    Corresponding, Newton別冊, Jan. 2025, Newton別冊 数式いらずの数学入門, Japanese, Invited, Introduction commerce magazine, False
  • 数式いらずの数学入門「暗号」
    岩本貢; 渡邉洋平; 山田久美
    Corresponding, Newton Press, Nov. 2023, Newton 2024年1月号, 112-121, Abkhazian, Invited, Introduction commerce magazine, False
  • コンピューターの裏側で現代社会を支えるアルゴリズム
    太田和夫; 岩本貢; 渡邉洋平
    Corresponding, Newton Press, Sep. 2023, Newton別冊 新AI時代の数学, 76-91, Japanese, Invited, Introduction commerce magazine, False
  • 巨大な素数で暗号をつくる
    太田和夫; 岩本貢; 渡邉洋平
    Corresponding, Newton Press, Apr. 2022, 14歳からのニュートン超絵解本 素数, Japanese, Invited, Introduction commerce magazine, False
  • オンライン時代を支える「素数と暗号」
    太田和夫; 岩本貢; 渡邉洋平
    Corresponding, Newton Press, Mar. 2021, ニュートン別冊 数学の世界 現代編 (増補第2版), 98-115, Abkhazian, Invited, Introduction commerce magazine, False
  • 暗号王になる
    太田和夫; 岩本貢
    Corresponding, Nov. 2016, 子供の科学, 11-21, Japanese, Invited, Introduction commerce magazine, Null

Books and other publications

  • 数学ゲーム必勝法
    小林欣吾; 佐藤創; 監
    Scholarly book, Japanese, Joint translation, Vol.1, Chapter 5., 共立出版, 20 Dec. 2016, 9781568811307
  • 情報理論ー基礎と広がりー
    山本博資; 古賀弘樹; 有村光晴; 岩本貢
    Scholarly book, Japanese, Joint translation, 4,11,16,17章, 共立出版, 2012

Lectures, oral presentations, etc.

  • シャカシャカに対する物理的ゼロ知識証明
    初貝 恭祐; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    31 Jan. 2025
    31 Jan. 2025
  • 大規模なシステムに適した二段階秘密計算プロトコル
    杉本 航太; 大原 一真; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, Afghanistan, Domestic conference
    30 Jan. 2025
  • (多人数)秘匿差集合計算の実現に向けて
    笠島 悠吾; 杉本 航太; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    30 Jan. 2025
  • スマートコントラクトにおけるVerkle Treeの実装評価
    金廣 理央; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    30 Jan. 2025
  • 制御システムに対する尤度比検定の2次漸近解析に基づく攻撃検知
    西内 達哉; 田中 崇資; 渡邉 洋平; 岩本 貢; 澤田 賢治; 新 誠一
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    30 Jan. 2025
  • 逆像オラクル付きランダム関数の和の一方向性
    儀保 駿; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    29 Jan. 2025
  • 検索可能暗号の安全性定義間の関係性の再考
    佐藤 和樹; 甘田 拓海; 淺野 京一; 渡邉 洋平; 岩本 貢; 太田 和夫
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    29 Jan. 2025
  • 検索可能暗号に対するSubgraph攻撃の類似度最大化を用いた改良
    並木 拓海; 岩本 貢; 渡邉 洋平
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    29 Jan. 2025
  • 乱数長の短い否認可能完全準同型暗号
    豊岡 叶望; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    29 Jan. 2025
  • 証明可能安全なロジックロッキング方式の効率的な実現
    渡邉 洋平; 小野 知樹; 平田 遼; 淺野 京一; 楊 明宇; 原 祐子; 岩本 貢
    Oral presentation, Japanese, SCIS2025, Afghanistan, Domestic conference
    29 Jan. 2025
  • The Two Sheriffs Problem: Cryptographic Formalization and Generalization (from COCOA 2023)
    杉本航太; 中井雄士; 渡邉洋平; 渡邉洋平; 岩本貢
    Oral presentation, Japanese, 電子情報通信学会技術研究報告(Web), Afghanistan, Domestic conference
    22 May 2025
    22 May 2025 2025
  • Multi-party Private Set Intersection with Dynamically Updatable Preprocessing
    杉本航太; 廣政良; 岩本貢; 渡邉洋平
    Oral presentation, Japanese, 電子情報通信学会技術研究報告(Web), Afghanistan, Domestic conference
    14 Mar. 2025
    2025 2025
  • Efficient CCA-secure Public Key Encryption with Public Verifiability
    吉村昌也; 淺野京一; 淺野京一; 岩本貢; 渡邉洋平; 渡邉洋平
    Oral presentation, Japanese, 電子情報通信学会技術研究報告(Web), Afghanistan, Domestic conference
    06 Mar. 2025
    2025 2025
  • Privacy Performance Analysis of Vehicle Platoon Reference State Using Encryption and Information Separation
    兵藤剛士; 澤田賢治; 渡邊洋平; 岩本貢
    Oral presentation, Japanese, 電子情報通信学会技術研究報告(Web), Afghanistan, Domestic conference
    03 Mar. 2025
    2025 2025
  • Privacy Preservation of Reference State in Platoon Control Based on Information Separation and Encryption
    兵藤剛士; 澤田賢治; 渡邊洋平; 岩本貢
    Oral presentation, Japanese, 計測自動制御学会制御部門マルチシンポジウム(CD-ROM), Afghanistan, Domestic conference
    03 Mar. 2025
    2025 2025
  • TFHEを用いた高速な否認可能完全準同型暗号
    豊岡 叶望; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, CSS 2024, Afghanistan, Domestic conference
    25 Oct. 2024
  • 逆像オラクル付きランダム関数を用いた一方向性関数の構成条件の拡張
    儀保 駿; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, CSS2024, Afghanistan, Domestic conference
    24 Oct. 2024
  • 耐量子性を備える効率的な範囲証明
    澤井 佑樹; 淺野 京一; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, CSS2024, Afghanistan, Domestic conference
    23 Oct. 2024
  • 委託型匿名認証技術の効率的な構成
    初貝 恭祐; 淺野 京一; 澤井 祐樹; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, Afghanistan, Domestic conference
    22 Oct. 2024
  • 検索可能暗号に対するより効果的なクエリ復元攻撃
    並木 拓海; 岩本 貢; 渡邉 洋平
    Oral presentation, Japanese, CSS2024, Afghanistan, Domestic conference
    22 Oct. 2024
  • Single-Shuffle Physical Zero-Knowledge Proof for Sudoku using Interactive Inputs
    T. Ono; S. Ruangwises; Y. Abe; K. Hatsugai; M. Iwamoto
    Oral presentation, English, ISEC研究会, Afghanistan, Domestic conference
    15 May 2024
  • 暗号理論にみる情報理論ー定式化と安全性証明ー
    岩本貢
    Invited oral presentation, Japanese, 電子情報通信学会総合大会チュートリアルセッション(情報理論研究会), Invited, Afghanistan, Domestic conference
    07 Mar. 2024
    04 Mar. 2024- 08 Mar. 2024
  • カードベースガーブルド回路における入力ゲートに用いるカード枚数の削減
    小野 知樹; 品川 和雅; 渡邉 洋平; 岩本 貢
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    25 Jan. 2024
  • 前処理型多者間秘匿積集合計算プロトコル
    奥山 亮太郎; 杉本 航太; 廣政 良; 岩本 貢; 渡邉 洋平
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    25 Jan. 2024
  • 前処理型範囲証明
    小野 知樹; 品川 和雅; 渡邉 洋平; 岩本 貢
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    25 Jan. 2024
  • 制御システムの攻撃検知における尤度比検定を用いた誤検知・検知漏れの一評価
    制御システムの攻撃検知における尤度比検定を用いた誤検知; 検知漏れの一評価
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    25 Jan. 2024
  • 桁上がりモジュールを用いた物理的ゼロ知識証明
    初貝 恭祐; 安部 芳紀; 渡邉 洋平; 岩本 貢
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    25 Jan. 2024
  • Card-Based Zero-Knowledge Proofs for Decomposition Puzzles
    S. Ruangwises; M. Iwamoto
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    25 Jan. 2024
  • 任意の勝者数に対する保証金が一定なビットコインベース宝くじプロトコル
    内薗 駿; 中井 雄士; 渡邉 洋平; 岩本 貢
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    24 Jan. 2024
  • 検索可能暗号に対する漏洩悪用攻撃の正確な性能評価に向けて
    甘田 拓海; 並木 拓海; 岩本 貢; 渡邉 洋平
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム, Afghanistan, Domestic conference
    24 Jan. 2024
  • グループ共有鍵システムにおける軽量部分鍵更新のためのマルチモーダル物理攻撃センサ
    池本龍生; 藤井聡一朗; 成瀬厚太郎; 塩見準; 御堂義博; 山下憂記; 田口美里; 三木拓司; 永田真; 駒野雄一; 岩本貢; 崎山一男; 三浦典之
    Oral presentation, Japanese, 電子情報通信学会技術研究報告(Web), Afghanistan, Domestic conference
    01 Nov. 2024
    2024 2024
  • Cryptography Through a Information-Theoretic Lens
    岩本貢
    Oral presentation, Abkhazian, 電子情報通信学会大会講演論文集(CD-ROM), Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2024
    2024 2024
  • モビリティ環境向け委託型匿名認証技術
    淺野 京一; 初貝 恭祐; 澤井 佑樹; 渡邉 洋平; 愛知 功; 岩本 貢
    Oral presentation, Abkhazian, コンピューターセキュリティシンポジウム, Afghanistan, Domestic conference
    31 Oct. 2023
  • 制御システムにおける攻撃検知手法の理論的かつ網羅的評価の一検討
    杉本 航太; 安部 芳紀; 西内 達哉; 渡邉 洋平; 澤田 賢治; 岩本 貢
    Oral presentation, Abkhazian, コンピューターセキュリティシンポジウム (CSS), Afghanistan, Domestic conference
    30 Oct. 2023
  • モジュラーデザインによる物理的ゼロ知識証明
    初貝 恭祐; 安部 芳紀; 渡邉 洋平; 岩本 貢
    Oral presentation, Abkhazian, コンピューターセキュリティシンポジウム (CSS), Afghanistan, Domestic conference
    30 Oct. 2023
  • 制御システムのサイバー攻撃における尤度比検定からの一評価
    西内 達哉; 安部 芳紀; 渡邉 洋平; 岩本 貢; 澤田 賢治
    Oral presentation, Abkhazian, 第66回 自動制御連合講演会, Afghanistan, Domestic conference
    08 Oct. 2023
  • 情報理論を用いたModbus TCP通信のパケット解析と攻撃検知に関する検討
    西内 達哉; 藤田 真太郎; 渡邉 洋平; 岩本 貢; 澤田 賢治
    Oral presentation, Abkhazian, 第67回システム制御情報学会研究発表講演会, Afghanistan, Domestic conference
    17 May 2023
  • マルチユーザ検索可能暗号の安全性と効率性の向上
    平野 貴人; 渡邉 洋平; 岩本 貢; 太田 和夫
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    26 Jan. 2023
  • 天体ショーに対する物理的ゼロ知識証明
    初貝 恭祐; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    26 Jan. 2023
  • 鍵更新機能付き検索可能暗号の安全性証明
    坂上 司龍; 甘田 拓海; 岩本 貢; 渡邉 洋平
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    26 Jan. 2023
  • 任意の論理回路に対する1ゲートあたり6枚のカードベースプロトコル
    小野 知樹; 品川 和雅; 中井 雄士; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    26 Jan. 2023
  • 秘匿置換を用いた効率的なトランプベース秘密計算プロトコル
    岩成 慶太; 小野 知樹; 安倍 芳紀; 中井 雄士; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    26 Jan. 2023
  • 効率的かつ安全な更新処理を備えた結果秘匿可能な検索可能暗号
    甘田 拓海; 岩本 貢; 渡邉 洋平
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    26 Jan. 2023
  • m値n入力関数を計算するprivate PEZプロトコルの初期文字列長の漸近評価
    安部 芳紀; 岩本 貢; 太田 和夫
    Oral presentation, Abkhazian, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    26 Jan. 2023
  • Modbus TCP通信のパケット解析と相対エントロピーによる攻撃検知に関する検討
    西内 達哉; 藤田 真太郎; 渡邉 洋平; 岩本 貢; 澤田 賢治
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    25 Jan. 2023
  • 認証信号付きカルマンフィルタに対するレギュレーション性能と攻撃検知率の実験的評価
    関根 悠司; 安部 芳紀; 藤田 真太郎; 渡邉 洋平; 澤田 賢治; 岩本 貢
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Peer-reviewed, Afghanistan, Domestic conference
    25 Jan. 2023
  • Two Sheriffs Problemの一般化と鍵共有プロトコルへの応用
    杉本 航太; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    24 Jan. 2023
  • 保証金が一定なビットコインベース宝くじプロトコルの拡張
    内薗 駿; 中井 雄士; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, 暗号と情報セキュリティシンポジウム (SCIS), Afghanistan, Domestic conference
    24 Jan. 2023
  • カードを用いた秘匿和集合プロトコル
    土井 アナスタシヤ; 小野 知樹; 安部 芳紀; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, Computer Security Symposium, IPSJ, オンライン, Peer-reviewed, Afghanistan, Domestic conference
    28 Oct. 2022
  • 効率的かつ検索結果秘匿可能な動的検索可能暗号
    甘田 拓海; 岩本 貢; 渡邉 洋平
    Oral presentation, Japanese, Computer Security Symposium, IPSJ, オンライン, Peer-reviewed, Afghanistan, Domestic conference
    28 Oct. 2022
  • 任意のブール回路に対する秘匿操作を用いたカードベースプロトコル
    小野 知樹; 中井 雄士; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, Computer Security Symposium, IPSJ, オンライン, Peer-reviewed, Afghanistan, Domestic conference
    28 Oct. 2022
  • 攻撃成功確率からみたTwo Sheriffs Problem
    杉本 航太; 中井 雄士; 渡邉 洋平; 岩本 貢
    Oral presentation, Japanese, Computer Security Symposium, IPSJ, オンライン, Peer-reviewed, Afghanistan, Domestic conference
    28 Oct. 2022
  • 出力埋め込み可能な紛失擬似ランダム関数に基づく多者間秘匿積集合プロトコルの効率化
    清水 聖也; 中井 雄士; 渡邉 洋平; 岩本 貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 大阪, Peer-reviewed, Afghanistan, Domestic conference
    20 Jan. 2022
  • 一様で閉じたシャッフルの効率的な実装
    岩成 慶太; 中井 雄士; 渡邉 洋平; 栃窪 孝也; 岩本 貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 大阪, Peer-reviewed, Afghanistan, Domestic conference
    19 Jan. 2022
  • プロービング攻撃による漏洩情報を用いたAES鍵復元アルゴリズムの改良
    植村 友紀; 渡邉 洋平; 李 陽; 三浦 典之; 岩本 貢; 崎山 一男; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 大阪, Peer-reviewed, Afghanistan, Domestic conference
    18 Jan. 2022
  • 秘匿置換を用いた効率的なn入力多数決カードプロトコル
    安部 芳紀; 中井 雄士; 渡邉 洋平; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 大阪, Peer-reviewed, Afghanistan, Domestic conference
    18 Jan. 2022
  • 効率的な漏洩耐性鍵隔離暗号
    淺野 京一; 岩本 貢; 渡邉 洋平
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 大阪, Peer-reviewed, Afghanistan, Domestic conference
    18 Jan. 2022
  • 鍵失効可能な検索可能暗号
    平野 貴人; 川合 豊; 小関 義博; 渡邉 洋平; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 大阪, Peer-reviewed, Afghanistan, Domestic conference
    18 Jan. 2022
  • Key-Insulated Public-Key Encryption with Secret-Key Leakage Resilience
    淺野京一; 渡邉 洋平; 岩本貢
    Oral presentation, Japanese, Computer Security Symposium, IPSJ, オンライン, Peer-reviewed, Afghanistan, Domestic conference
    28 Oct. 2021
  • Card-based Cryptographic Protocols for Private Set Intersection
    土井 アナスタシヤ; 中井 雄士; 品川 和雅; 渡邉 洋平; 岩本貢
    Oral presentation, Japanese, Computer Security Symposium, IPSJ, オンライン, Peer-reviewed, Afghanistan, Domestic conference
    26 Oct. 2021
  • 紛失通信ベース三者間秘匿積集合プロトコルにおけるラウンド数の削減
    清水 聖也; 安部 芳紀; 中井 雄士; 品川 和雅; 渡邉 洋平; 岩本 貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, virtual, Peer-reviewed, Afghanistan, Domestic conference
    22 Jan. 2021
  • 検索可能暗号の鍵更新について
    平野 貴人; 川合 豊; 小関 義博; 渡邉 洋平; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, virtual, Peer-reviewed, Afghanistan, Domestic conference
    21 Jan. 2021
  • AES鍵スケジュールからの固定ビット数漏洩を用いた鍵復元アルゴリズムの性能評価
    植村 友紀; 渡邉 洋平; 李 陽; 三浦 典之; 岩本 貢; 崎山 一男; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, virtual, Peer-reviewed, Afghanistan, Domestic conference
    20 Jan. 2021
  • 秘匿置換を用いたカードベースしきい値関数プロトコル
    中井 雄士; 徳重 佑樹; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, virtual, Peer-reviewed, Afghanistan, Domestic conference
    20 Jan. 2021
  • 時間ドロボー問題に対する健全性誤りのない物理的ゼロ知識証明
    初貝 恭祐; 安部 芳紀; 中井 雄士; 品川 和雅; 渡邉 洋平; 岩本 貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, virtual, Peer-reviewed, Afghanistan, Domestic conference
    20 Jan. 2021
  • 視覚復号型秘密分散法における任意の改ざんを検知する手法
    根岸 奎人; 渡邉 洋平; 岩本 貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, virtual, Peer-reviewed, Afghanistan, Domestic conference
    20 Jan. 2021
  • より少ない漏洩の下で安全な動的検索可能暗号への変換手法
    渡邉 洋平; 大原 一真; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Computer Security Symposium, ISEC, IEICE, 新潟, Peer-reviewed, Afghanistan, Domestic conference
    24 Oct. 2020
  • 任意の始集合を持つ関数を計算する private PEZ プロトコル
    安部芳紀; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 高知市, Peer-reviewed, Afghanistan, Domestic conference
    30 Jan. 2020
  • 鍵のランダムな漏洩に対するAES鍵スケジュール復元アルゴリズム
    植村友紀; 李陽; 三浦典之; 岩本貢; 崎山一男; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 高知市, Peer-reviewed, Afghanistan, Domestic conference
    29 Jan. 2020
  • 気泡検出器を用いたゼロ知識非破壊検査
    品川和雅; 三浦典之; 岩本貢; 崎山一男; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 高知市, Peer-reviewed, Afghanistan, Domestic conference
    29 Jan. 2020
  • (強)フォワード安全な動的検索可能暗号の効率的な構成
    渡邉洋平; 大原一真; 岩本貢; 太田和夫
    Oral presentation, Japanese, コンピュータセキュリティシンポジウム, 情報処理学会, 長崎, Peer-reviewed, Afghanistan, Domestic conference
    23 Oct. 2019
  • How to Improve the Private PEZ Protocol for General Functions
    安部芳紀; 岩本貢; 太田和夫
    Oral presentation, Japanese, Computer Security Symposium, IPSJ, 長崎, Peer-reviewed, Afghanistan, Domestic conference
    21 Oct. 2019
  • How to Improve the Private PEZ Protocol for General Functions
    Yoshiki Abe; Mitsugu Iwamoto; Kazuo Ohta
    Poster presentation, English, International Workshop on Information Security (IWSEC), Peer-reviewed, Afghanistan, International conference
    28 Aug. 2019
  • 初期文字列が 29 文字の 4 入力多数決 Private PEZ プロトコル
    安部 芳紀; 山本 翔太; 岩本 貢; 太田 和夫
    Oral presentation, Japanese, Technical meeting of IEICE (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    08 Mar. 2019
  • A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
    安部芳紀; 山本翔太; 岩本貢; 太田和夫
    Oral presentation, Abkhazian, 電子情報通信学会技術研究報告, Peer-reviewed, Afghanistan, Domestic conference
    2019
    2019 2019
  • 秘密計算の安全性~プライバシーを保ちつつどこまで計算できるか
    岩本貢
    Invited oral presentation, Japanese, 第8回バイオメトリクスと認識・認証シンポジウム, Invited, 電子情報通信学会 バイオメトリクス研究専門委員会 (BioX), 東京都千代田区, Peer-reviewed, http://www.ieice.org/~biox/sbra2018/, Afghanistan, Domestic conference
    20 Nov. 2018
  • 現実的な結託者のもとで最もシェア長の短いロバスト秘密分散法
    渡邉洋平; 大原一真; 岩本貢; 太田和夫
    Oral presentation, Japanese, Technical meeting of IEICE (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    25 Jul. 2018
  • マルチユーザで利用可能な共通鍵型秘匿検索に向けて
    早坂 健一郎; 川合 豊; 小関 義博; 平野 貴人; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 新潟, Peer-reviewed, Afghanistan, Domestic conference
    25 Jan. 2018
  • ダミーエントリの作成方法に着目した共通鍵検索可能暗号CGKO方式の改良
    野島 拓也; 渡邉 洋平; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 新潟, Peer-reviewed, Afghanistan, Domestic conference
    25 Jan. 2018
  • PUF応用に向けた新たな物理仮定と端末認証方式への応用
    駒野雄一; 岩本 貢; 太田和夫; 崎山 一男
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 新潟, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2018
  • ロバスト秘密分散法CFOR方式における精密な安全性解析
    鈴木慎之介; 渡邉洋平; 岩本 貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 新潟, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2018
  • 3枚のカードで実現可能な3入力多数決プロトコル
    黒木慶久; 古賀優太; 渡邉洋平; 岩本 貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 新潟, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2018
  • カードを用いた複数人でのマッチングプロトコル
    古賀優太; 鈴木 慎之介; 渡邉 洋平; 岩本 貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 新潟, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2018
  • Truly Efficient Robust Secret Sharing for the Real World
    渡邉洋平; 渡邉洋平; 大原一真; 大原一真; 岩本貢; 太田和夫
    Oral presentation, Abkhazian, 電子情報通信学会技術研究報告, Peer-reviewed, Afghanistan, Domestic conference
    2018
    2018 2018
  • 情報理論的安全性 〜さまざまな視点から〜
    岩本貢
    Oral presentation, Japanese, 誤り訂正符号のワークショップ, Invited, 誤り訂正符号のワークショップ 実行委員会, 山口県, Peer-reviewed, http://manau.jp/WS/ECCWS/index2017.html, Afghanistan, Domestic conference
    06 Sep. 2017
  • PUF based Device Authentication without Error Correction
    駒野 雄一; 岩本 貢; 太田 和夫
    Oral presentation, Japanese, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 電子情報通信学会, Peer-reviewed, http://id.ndl.go.jp/bib/028443592, Afghanistan, Domestic conference
    14 Jul. 2017
    14 Jul. 2017- 14 Jul. 2017
  • 誤り補正を不要とするPUF ベース端末認証方式
    駒野雄一; 岩本貢; 太田和夫
    Oral presentation, Japanese, Technical meeting of IEICE (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    14 Jul. 2017
  • Secret sharing schemes under guessing secrecy
    Mitsugu Iwamoto
    Invited oral presentation, English, Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling, Invited, Math for Industry, Kyushu University, Fukuoka, Japan, Peer-reviewed, http://www.imi.kyushu-u.ac.jp/eng/events/view/1240, Afghanistan, International conference
    12 Jun. 2017
  • 検索可能暗号における最小漏洩情報に関する考察
    中井雄士; 野島拓也; 岩本貢; 太田和夫
    Oral presentation, Japanese, 電子情報通信学会 情報理論研究会 (IT/ISEC/WBS), Peer-reviewed, Afghanistan, Domestic conference
    10 Mar. 2017
  • A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
    中井 雄士; 野島 拓也; 岩本 貢; 太田 和夫
    Oral presentation, Japanese, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 電子情報通信学会, Peer-reviewed, http://id.ndl.go.jp/bib/028102830, Afghanistan, Domestic conference
    09 Mar. 2017
    09 Mar. 2017- 09 Mar. 2017
  • A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
    中井 雄士; 野島 拓也; 岩本 貢; 太田 和夫
    Oral presentation, Japanese, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 電子情報通信学会, Peer-reviewed, http://id.ndl.go.jp/bib/028101582, Afghanistan, Domestic conference
    09 Mar. 2017
    09 Mar. 2017- 09 Mar. 2017
  • 秘密分散型放送暗号
    岩本貢; 渡邉 洋平
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    27 Jan. 2017
  • マルチパーティ計算に関する安全性概念の定式化について
    岩本貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    25 Jan. 2017
  • リクエストベース比較可能暗号におけるシミュレー ションベースの安全性
    平野貴人; 小関義博; 川合豊; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2017
  • 電子決済方式MicroMintの潜在的な偽造脅威に対する安全性評価
    鴨志田優一; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2017
  • 秘匿操作を用いた効率的なカードベース論理演算プロトコル
    城内聡志; 中井雄士; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2017
  • カードを用いた複数人での金持ち比べプロトコル
    徳重佑樹; 中井雄士; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2017
  • Steganalysis of Bit Replacement Steganography for a Proactive Secret Image Sharing
    A. Espejel-Trujillo; M. Iwamoto
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2017
  • 最悪推測秘匿性を満たす秘密分散法に関する基本的性質
    岩本貢; 四方順司
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2017
  • 検索クエリからの漏洩情報を削減 した効率的な共通鍵型検索可能暗号
    早坂健一郎; 川合 豊; 小関 義博; 平野 貴人; 岩本貢; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    24 Jan. 2017
  • 複数の暗号化索引を持つ共通鍵ベース秘匿検索の効率的なトラップドア生成
    平野貴人; 岩本貢; 太田和夫
    Public symposium, Japanese, Computer Security Symposium, CSEC, IPSJ, 秋田, Peer-reviewed, Afghanistan, Domestic conference
    12 Oct. 2016
  • 長期間にわたって安全な地域医療連携システムの構築 を目指して
    小美濃つかさ; 駒野雄一; 岩本貢; 太田和夫
    Oral presentation, Japanese, 第 36 回医療情報学連合大会, Peer-reviewed, Afghanistan, Domestic conference
    21 Sep. 2016
  • Deep Learning を用いたRSAに対する単純電磁波解析
    八代理紗; 藤井達哉; 岩本貢; 崎山一男
    Oral presentation, Japanese, 電子情報通信学会ソサイエティ大会, Peer-reviewed, Afghanistan, Domestic conference
    21 Sep. 2016
  • A-7-13 Security Evaluation of Double Arbiter PUF Using Deep Learning
    Yashiro Risa; Machida Takanori; Iwamoto Mitsugu; Sakiyama Kazuo
    Oral presentation, Japanese, Proceedings of the IEICE Engineering Sciences Society/NOLTA Society Conference, The Institute of Electronics, Information and Communication Engineers, Peer-reviewed, Afghanistan, Domestic conference
    01 Mar. 2016
    01 Mar. 2016- 01 Mar. 2016
  • Deep Learning を用いたDouble Arbiter PUF の安全性評価
    八代理紗; 町田卓謙; 岩本貢; 崎山一男
    Oral presentation, Japanese, 電子情報通信学会総合大会, Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2016
  • Deep Learningを用いたDouble Arbiter PUFの安全性評価
    八代理紗; 町田卓謙; 岩本貢; 崎山一男
    Oral presentation, Abkhazian, 電子情報通信学会大会講演論文集(CD-ROM), Peer-reviewed, Afghanistan, Domestic conference
    2016
    2016 2016
  • Toward long-term secure social healthcare systems
    小美濃つかさ; 駒野雄一; 岩本貢; 太田和夫
    Oral presentation, Abkhazian, 医療情報学連合大会論文集, Peer-reviewed, Afghanistan, Domestic conference
    2016
    2016 2016
  • Deep Learningを用いたRSAに対する単純電磁波解析
    八代理紗; 藤井達哉; 岩本貢; 崎山一男
    Oral presentation, Abkhazian, 電子情報通信学会大会講演論文集(CD-ROM), Peer-reviewed, Afghanistan, Domestic conference
    2016
    2016 2016
  • マルチパーティ計算の情報理論的解析
    岩本貢; 太田和夫; 西出隆志
    Oral presentation, Abkhazian, 電気通信普及財団研究調査助成報告書(Web), Peer-reviewed, Afghanistan, Domestic conference
    2016
    2016 2016
  • カード操作の分類とカードベース暗号プロトコル
    中井雄士; 三澤裕人; 徳重佑樹; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 熊本, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2016
  • 人間向け暗号/認証プロトコルの統一的安全性評価
    三澤裕人; 徳重佑樹; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 熊本, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2016
  • Joux-Lucks のマルチコリジョン探索アルゴリズムのMicroMint への応用
    鴨志田優一; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 熊本, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2016
  • Proactive Secret Image Sharing with Quality and Payload Trade-off in Stego-images
    A. E. Trujillo; M. Iwamoto
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 熊本, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2016
  • 共通鍵暗号型の秘匿部分一致検索(その2)
    早坂健一郎; 川合豊; 平野貴人; 太田和夫; 岩本貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 熊本, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2016
  • 共通鍵暗号型の秘匿部分一致検索(その1)
    平野貴人; 川合豊; 太田和夫; 岩本貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 熊本, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2016
  • グループ認証付鍵交換プロトコルのweak-SK-secure 性の形式検証
    徳重佑樹; 花谷嘉一; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 熊本, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2016
  • Impact of Code Book on Security of Coded Sign
    Yuto Misawa; Yuuki Tokushige; Mitsugu Iwamoto; Kazuo Ohta
    Public symposium, Japanese, Computer Security Symposium, CSEC, IPSJ, 長崎, Peer-reviewed, Afghanistan, Domestic conference
    23 Oct. 2015
  • An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically
    徳重佑樹; 三澤裕人; 吉田文晶; 上床昌也; 岩本貢; 太田和夫
    Oral presentation, Abkhazian, 電子情報通信学会技術研究報告, Peer-reviewed, Afghanistan, Domestic conference
    2015
    2015 2015
  • 正規言語を用いた鍵更新可能暗号の安全性解析
    大宮翔児; 徳重佑樹; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • 推測成功確率に基づいた安全性基準をみたす秘密分散法
    岩本貢; 四方順司
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • 推測確率に基づいた安全性基準をみたす暗号化方式の構成法
    岩本貢; 四方順司
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • あるCKA2 安全な検索可能暗号方式のトラップドアサイズを削減するための安全な分割手法
    平野貴人; 川合豊; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • Joux-Lucks の3-collisions 探索アルゴリズムに対する改良および計算量の詳細な検討
    鴨志田優一; 徳重佑樹; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • Corrupt 耐性を持つセッションキー安全な秘密鍵失効機能付きSecret Handshake 方式
    土屋喬文; 花谷嘉一; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • カードを用いた効率的な金持ち比べプロトコル
    中井雄士; 徳重佑樹; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • カードベース暗号プロトコルにおける安全な選択処理
    徳重佑樹; 中井雄士; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • 簡易なブロックサインに対する暗号理論的安全性解析
    三澤裕人; 徳重佑樹; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2015
  • 秘密分散法と視覚復号型秘密分散法 - 共通点と相違点 —共通点と相違点
    Mitsugu Iwamoto
    Public discourse, Japanese, EMM研究会, Invited, 電子情報通信学会EMM研究会, 東京理科大学葛飾キャンパス, Peer-reviewed, Afghanistan, Domestic conference
    16 May 2014
  • ハッシュ関数に対する制限付き誕生日識別攻撃−誕生日下界を上回る衝突攻撃の識別攻撃に対する有効性
    岩本貢; 佐々木悠
    Invited oral presentation, Japanese, 電子情報通信学会 情報セキュリティ研究会, Invited, 電子情報通信学会情報セキュリティ専門委員会, 機械振興会館, Peer-reviewed, Afghanistan, Domestic conference
    09 May 2014
  • 最小エントロピーに基づく秘密分散法
    岩本貢; 四方順司
    Invited oral presentation, Japanese, 暗号理論ワークショップ, Invited, 東京大学柏キャンパス, Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2014
  • Practical DFA Strategy for AES Under Limited-access Conditions
    Kazuo Sakiyama; Yang Li; Shigeto Gomisawa; Yu-ichiHayashi; Mitsugu Iwamoto; Naofumi Homma; Takafumi Aoki; Kazuo Ohta
    Oral presentation, English, 情報処理学会論文誌, Peer-reviewed, http://id.nii.ac.jp/1001/00098502/, Afghanistan, Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.142------------------------------Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.142------------------------------, Domestic conference
    15 Feb. 2014
    15 Feb. 2014- 15 Feb. 2014
  • Secret Sharing Schemes and Visual Secret Sharing Schemes What is in comon, and what is different?
    岩本貢
    Oral presentation, Abkhazian, 電子情報通信学会技術研究報告, Peer-reviewed, Afghanistan, Domestic conference
    2014
    2014 2014
  • FPGA 実装されたArbiter-based PUF のユニーク性向上に向けた実装法の検討
    町田卓謙; 山本大; 岩本貢; 崎山一男
    Public symposium, Japanese, Hot Channel Workshop, Peer-reviewed, Afghanistan, Domestic conference
    2014
  • Cheating on Visual Secret Sharing Schemes in Practical Setting
    P. Lumyong; M. Iwamoto; K. Ohta
    Public symposium, English, Symposium on Cryptography and Information Security, ISEC, IEICE, 鹿児島, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2014
  • “Optimal Non-Perfectly Secure Client-Server Communications in a Symmetric Key Setting,
    M. Iwamoto; T. Omino; Y. Komano; K. Ohta
    Public symposium, English, Symposium on Cryptography and Information Security, ISEC, IEICE, 鹿児島, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2014
  • 情報理論的に安全なクライアント・サーバ暗号通信方式の応用に関する考察
    小美濃つかさ; 岩本貢; 駒野雄一; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 鹿児島, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2014
  • FPGA 実装されたArbiter PUF のユニーク性向上に向けた一考察
    町田卓謙; 山本大; 岩本貢; 崎山一男
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 鹿児島, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2014
  • 自動タイブレークの仕組みを持つ第M+1 価格暗号オークション方式
    西出隆志; 岩本貢; 岩崎敦; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 鹿児島, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2014
  • 同時実行攻撃に耐性を持つシンプルなSecret Handshake
    土屋喬文; 徳重佑樹; 坂井祐介; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 鹿児島, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2014
  • Improved Rebound Attack 手順の自動探索手法の提案と評価
    徳重佑樹; 佐々木悠; 王磊; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 鹿児島, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2014
  • Information Theoretic Cryptography based on Conditional Rényi Entropies
    Mitsugu Iwamoto; Junji Shikata
    Invited oral presentation, Japanese, 暗号理論ワークショップ, Invited, 東京工業大学大岡山キャンパス, Peer-reviewed, Afghanistan, Domestic conference
    Feb. 2013
  • Security notions of visual secret sharing schemes
    M. Iwamoto
    Invited oral presentation, English, International Workshop on Advanced Image Technology, Invited, Nagoya, Peer-reviewed, Afghanistan, International conference
    06 Jan. 2013
  • Information Theoretic Analysis of a t-resilient First-Price Auction Protocol
    M. Iwamoto; K. Ohara; Y. Sakai; K. Ohta
    Public symposium, English, Symposium on Cryptography and Information Security, ISEC, IEICE, 京都, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2013
  • CC-EMA とCEMA の攻撃性能の比較
    中曽根俊貴; 李陽; 佐々木悠; 岩本貢; 太田和夫; 崎山一男
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 京都, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2013
  • レスポンス数の向上手法を適用したラッチPUFのASIC 実装評価
    山本大; 崎山一男; 岩本貢; 太田和夫; 武仲正彦; 伊藤孝一; 鳥居直哉
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 京都, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2013
  • PUF 出力の一部を用いるパターン照合鍵生成システムの安全性
    駒野雄一; 太田和夫; 崎山一男; 岩本貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 京都, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2013
  • Revisiting Conditional Renyi Entropy and its Application to Encryption: Part I ―Properties of Conditional Renyi Entropy
    M. Iwamoto; J. Shikata
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 京都, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2013
  • PUF を用いる鍵生成方法とその安全性
    駒野雄一; 太田和夫; 崎山一男; 岩本貢
    Public symposium, Japanese, Hot Channel Workshop, Peer-reviewed, Afghanistan, Domestic conference
    2013
  • FPGA 上のArbiter PUF に対する機械学習攻撃の新たなモデル作成に向けて
    町田卓謙; 中曽根俊貴; 岩本貢; 崎山一男
    Public symposium, Japanese, Hot Channel Workshop, Peer-reviewed, Afghanistan, Domestic conference
    2013
  • Revisiting Conditional Renyi Entropy and its Application to Encryption: Part II ―Fano’s Inequality and Shannon's Bound
    J. Shikata; M. Iwamoto
    Public symposium, English, Symposium on Cryptography and Information Security, ISEC, IEICE, 京都, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2013
  • 巡回シフトを用いたPUF に基づくパターン照合鍵生成システムの実装評価
    岩井祐樹; 福島崇文; 森山大輔; 松尾真一郎; 駒野雄一; 岩本貢; 太田和夫; 崎山一男
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 京都, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2013
  • A-7-9 IMPROVED PATTERN MATCHING KEY GENERATION USING PUF
    Komano Yuichi; Ohta Kazuo; Sakiyama Kazuo; Iwamoto Mitsugu
    Oral presentation, Japanese, Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, Peer-reviewed, Afghanistan, Domestic conference
    06 Mar. 2012
    06 Mar. 2012- 06 Mar. 2012
  • Entropic Security for Predicates and Functions
    M.Iwamoto; A.Russell
    Invited oral presentation, Japanese, 統計数理研究所共同利用研究集会(エルゴード理論,情報理論,計算機科学とその周辺, Invited, 東京工業大学大岡山キャンパス, Peer-reviewed, http://ura3.c.ism.ac.jp/stats/msg01569.html, Afghanistan, Domestic conference
    05 Mar. 2012
  • しきい値法の一般化とその構成法
    岩本貢
    Oral presentation, Japanese, 電子情報通信学会総合大会, Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2012
  • PUF を用いるパターン照合鍵生成方法の改良
    駒野雄一; 太田和夫; 崎山一男; 岩本貢
    Oral presentation, Japanese, 電子情報通信学会総合大会, Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2012
  • 関数に対するentropic securityの安全性
    M.Iwamoto; A.Russell
    Invited oral presentation, Japanese, CompView暗号理論ワークショップ, Invited, 東工大GCOE「計算世界観の深化と展開」, 東京工業大学大岡山キャンパス, Peer-reviewed, Afghanistan, Domestic conference
    Feb. 2012
  • 二つの情報理論的安全なオークションプロトコル
    大原一真; 坂井祐介; 岩本貢; 太田和夫
    Invited oral presentation, Japanese, CompView暗号理論ワークショップ, Invited, 東工大GCOE「計算世界観の深化と展開」, 東工大蔵前会館, Peer-reviewed, Afghanistan, Domestic conference
    Feb. 2012
  • PUFを用いるパターン照合鍵生成方法の改良
    駒野雄一; 太田和夫; 崎山一男; 岩本貢
    Oral presentation, Abkhazian, 電子情報通信学会大会講演論文集, Peer-reviewed, Afghanistan, Domestic conference
    2012
    2012 2012
  • PUF を用いる証明可能安全なパターン照合鍵生成方法
    駒野雄一; 太田和夫; 崎山一男; 岩本貢
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 金沢, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2012
  • 情報理論的に安全な First-Price オークションプロトコル
    大原一真; 坂井祐介; 岩本貢; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 金沢, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2012
  • Uniqueness Enhancement of PUF Responses based on the locations of random outputting latches PUF Responses Based on the Locations of Random Outputting RS Latches
    山本大; 崎山一男; 岩本貢; 太田和夫; 落合隆夫; 武仲正彦; 伊藤孝一
    Invited oral presentation, Japanese, 電子情報通信学会 情報セキュリティ研究会, Invited, 電子情報通信学会情報セキュリティ専門委員会, 機械振興会館, Peer-reviewed, Afghanistan, Domestic conference
    Dec. 2011
  • A Coding Theorem for Cheating-Detectable (2,2)-Threshold Schemes
    岩本貢; 太田和夫
    Oral presentation, Japanese, Technical meeting of IEICE (IT), Peer-reviewed, Afghanistan, Domestic conference
    May 2011
  • Trivium のセットアップタイム違反に基づく新しい故 障差分解析
    李奇; 五味澤重友; 岩本貢; 太田和夫; 崎山一男
    Oral presentation, Japanese, Technical meeting of IEICE (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2011
  • New Differential Fault Analysis on Trivium Based on Setup-Time Violations
    LI Qi; GOMISAWA Shigeto; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
    Oral presentation, English, IEICE technical report, The Institute of Electronics, Information and Communication Engineers, Peer-reviewed, http://id.ndl.go.jp/bib/11048486, Afghanistan, This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup-time violations. Trivium is a hardware-oriented synchronous stream cipher, designed by De Canniere and Preneel in 2005. In 2008, Hojsik and Rudolf first presented differential fault analysis of Trivium and proposed two types of DFA on Trivium. Setup-time violations are common fault injection methods for hardware implementations. We show that we have succeeded in injecting faults into FPGA on SASEBO-GII in which Trivium is implemented, and in obtaining 147 out of 288 secret bits with 93 fault injections at different rounds. According to our experiments, we found it is difficult to inject 1-bit errors into random positions of the registers of Trivium at a specific round that was proposed in the previous work of Hojsik and Rudolf., Domestic conference
    24 Feb. 2011
    24 Feb. 2011- 24 Feb. 2011
  • New Differential Fault Analysis on Trivium Based on Setup-Time Violations
    LI Qi; GOMISAWA Shigeto; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
    Oral presentation, English, IEICE technical report, The Institute of Electronics, Information and Communication Engineers, Peer-reviewed, http://id.ndl.go.jp/bib/11047284, Afghanistan, This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup-time violations. Trivium is a hardware-oriented synchronous stream cipher, designed by De Canniere and Preneel in 2005. In 2008, Hojsik and Rudolf first presented differential fault analysis of Trivium and proposed two types of DFA on Trivium. Setup-time violations are common fault injection methods for hardware implementations. We show that we have succeeded in injecting faults into FPGA on SASEBO-GII in which Trivium is implemented, and in obtaining 147 out of 288 secret bits with 93 fault injections at different rounds. According to our experiments, we found it is difficult to inject 1-bit errors into random positions of the registers of Trivium at a specific round that was proposed in the previous work of Hojsik and Rudolf., Domestic conference
    24 Feb. 2011
    24 Feb. 2011- 24 Feb. 2011
  • Threshold based visual cryptography: A tutorial review
    Mariko Nakano; Enrique Escamilla; Héctor Pérez; Mitsugu Iwamoto
    Oral presentation, Spanish, Castilian, Informacion Tecnologica, Peer-reviewed, Afghanistan, Domestic conference
    2011
    2011 2011
  • Joux-Lucks の 3-collisions 探索アルゴリズムに関する計算量 の詳細な検討
    名渕大樹; 岩本貢; 崎山一男; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2011
  • FDH 署名の安全性証明の再考
    坂井 祐介; 岩本 貢; 駒野 雄一; 太田 和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2011
  • ラッチの乱数出力位置を利用した PUF による ID 生成/認証システムの信頼性向上手法
    山本大; 崎山一男; 岩本貢; 太田和夫; 落合 隆夫; 武仲 正彦; 伊藤 孝一
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2011
  • 電磁波解析における局所性と放射磁界方向について
    落合隆夫; 山本大; 伊藤 孝一; 武仲正彦; 鳥居直哉; 内田大輔; 永井利明; 若菜伸一; 岩本貢; 太田和夫; 崎山一男; 山 一男
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 小倉, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2011
  • 情報理論的に安全な暗号化のための安全性概念
    Mitsugu Iwamoto; Kazuo Ohta
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    Dec. 2010
  • A general construction method of visual secret sharing scheme with share rotations
    IWMAOTO Mitsugu; LI Yang; SAKIYAMA Kazuo; OHTA Kazuo
    Oral presentation, English, Technical report of IEICE. ISEC, The Institute of Electronics, Information and Communication Engineers, Peer-reviewed, http://id.ndl.go.jp/bib/10846085, Afghanistan, In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations with arbitrary degrees, as an extension of the S-extended (n,n) visual secret sharing scheme proposed by Droste. As a result, it is pointed out that the proposed visual secret sharing scheme can be naturally derived from the S-extended (n,n) visual secret sharing scheme., Domestic conference
    03 Sep. 2010
    03 Sep. 2010- 03 Sep. 2010
  • A general construction method of visual secret sharing schemes with share rotations
    M. Iwamoto; Y. Li; K. Sakiyama; K. Ohta
    Oral presentation, English, Technical meeting of IEICE (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    May 2010
  • PUF-HB認証プロトコルに対する能動的な攻撃
    長井大地; 塙知剛; 岩本貢; 崎山一男; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 香川, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2010
  • A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
    Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, Japanese, Technical meeting of IEICE (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    May 2009
  • A Coding Theorem for Cheating-Detectable (2,2)-Threshold Schemes
    Hiroki Koga; Hirosuke Yamamoto
    Oral presentation, Japanese, Technical meeting of IEICE (IT), Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2009
  • Weakly Secure Visual Secret Sharing Schemes
    Mitsugu Iwamoto
    Public symposium, English, Symposium on Cryptography and Information Security, ISEC, IEICE, 大津, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2009
  • Secret Sharing Schemes with Asymptotically Almost Sure Cheating Detection
    Mitsugu Iwamoto; Hirosuke Yamamoto; Hiroki Koga
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 大津, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2009
  • Secret Sharing Schemes with Asymptotically Almost Sure Cheating Detection
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    Oct. 2008
  • 漸近的にほぼ確実に不正検出が可能な秘密分散法
    岩本貢; 山本博資
    Oral presentation, Abkhazian, 情報理論とその応用シンポジウム予稿集(CD-ROM), Peer-reviewed, Afghanistan, Domestic conference
    2008
    2008 2008
  • A Dynamic Key Predistribution Scheme Taking Users' Behavior into Consideration
    Masyuki Taguchi; Mitsugu Iwamoto
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    Dec. 2006
  • Coding theorems for secret sharing schemes
    Mitsugu Iwamoto
    Invited oral presentation, Japanese, 電子情報通信学会ソサイエティ大会, Invited, IEICE, 金沢大学, Peer-reviewed, Afghanistan, Domestic conference
    Sep. 2006
  • Visual Secret Sharing Schemes for Plural Secret Images with General Access Structures Allowing the Rotation of Shares
    IWAMOTO Mitsugu; WANG Lei; YONEYAMA Kazuki; KUNIHIRO Noboru; OHTA Kazuo
    Oral presentation, Japanese, 情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications, Peer-reviewed, Afghanistan, Domestic conference
    20 Nov. 2005
    20 Nov. 2005- 20 Nov. 2005
  • 回転を許す一般アクセス構造に対して複数の画像を隠す視覚復号型秘密分散法
    Mitsugu Iwamoto; Lei Wang; Kazuki Yoneyama; Noboru Kunihiro; Kazuo Ohta
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    Nov. 2005
  • 画像の回転に関して複数の画像が復号可能な視覚復号型秘密分散法
    清田耕一郎; 王磊; 岩本貢; 米山一樹; 國廣昇; 太田和夫
    Public symposium, Japanese, Symposium on Cryptography and Information Security, ISEC, IEICE, 舞子, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2005
  • Strongly Secure Ramp Secret Sharing Schemes for General Access Structures
    IWAMOTO Mitsugu; YAMAMOTO Hirosuke
    Oral presentation, Japanese, 情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications, Peer-reviewed, Afghanistan, Domestic conference
    14 Dec. 2004
    14 Dec. 2004- 14 Dec. 2004
  • 強い秘密保護特性をもつランプ型秘密分散法
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    Dec. 2004
  • 量子秘密分散法の符号化効率評価と構成法
    Tomohiro Ogawa; Akira Sasaki; Mitsugu Iwamoto; Hirosuke Yamamoto
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    Dec. 2003
  • A General Construction Method of Secret Sharing Schemes Based on (k, n)-threshold Schemes and Integer Programming
    IWAMOTO Mitsugu; YAMAMOTO Hirosuke; OGAWA Hirohisa
    Oral presentation, Japanese, Technical report of IEICE. ISEC, The Institute of Electronics, Information and Communication Engineers, Peer-reviewed, http://id.ndl.go.jp/bib/6619768, Afghanistan, It is known that secret sharing schemes (SSSs) for general access structures can be constructed from the (k,n)-threshold schemes by using the so-called cumulative map. However, the original cumulative map can treat only the case of k = n. Furthermore, a known modified cumulative map that can deal with general (k,n)-threshold schemes is not always more efficient than the cumulative map. In this paper, we propose a new method to construct the SSSs for general access structures from the (k,n)-threshold schemes. In the proposed method, integer programming is used to derive the optimal distribution of shares to each participant, and as results, it can attain lower coding rate than the cumulative maps generally., Domestic conference
    14 May 2003
    14 May 2003- 14 May 2003
  • (k,n)しきい値法と整数計画法による秘密分散法の一般的構成法(共著)
    岩本貢; 山本博資; 小川博久
    Oral presentation, Japanese, Technical meeting of IEICE (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    May 2003
  • A General Construction Method of Secret Sharing Schemes Based on (k,n)-threshold Schemes and Integer Programming
    岩本貢; 山本博資; 小川博久
    Oral presentation, Abkhazian, 電子情報通信学会技術研究報告, Peer-reviewed, Afghanistan, Domestic conference
    2003
    2003 2003
  • The Security Condition of Visual Secret Sharing Schemes for Plural Images
    IWAMOTO Mitsugu; YAMAMOTO Hirosuke
    Oral presentation, Japanese, Technical report of IEICE. SST, The Institute of Electronics, Information and Communication Engineers, Peer-reviewed, http://id.ndl.go.jp/bib/6145104, Afghanistan, The security condition of visual secret sharing schemes for q plural images (VSSS-q-PI) is considered in [9]. However, the condition is insufficient because some informations of the other secret images leak out from decrypted images even if the definition of VSSS-q-PI shown in [9] is satisfied. Hence, we give the new perfect definition of the security condition, and we propose a construction method which satisfies the new definition of the VSSS-q-PI. The proposed method is an extension of the known methods shown in [3] [8] [9]., Domestic conference
    19 Mar. 2002
    19 Mar. 2002- 19 Mar. 2002
  • 複数の秘密画像をもつ視覚復号型秘密分散法の安全性条件
    岩本貢; 山本博資
    Oral presentation, Japanese, 電子情報通信学会 情報セキュリティ研究会 (ISEC), Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2002
  • 一般アクセス構造に対する非理想的ランプ型秘密分散法
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    2002
  • A visual secret sharing scheme for plural images
    IWAMOTO Mitsugu; YAMAMOTO Hirosuke
    Oral presentation, Japanese, 情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications, Peer-reviewed, Afghanistan, Domestic conference
    04 Dec. 2001
    04 Dec. 2001- 04 Dec. 2001
  • 複数のカラー画像を秘密画像とする視覚復号型秘密分散法
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, Peer-reviewed, Afghanistan, Domestic conference
    Dec. 2001
  • 濃淡画像に対する最適な(n,n)視覚復号型秘密分散法
    Mitsugu Iwamoto; Hirosuke Yamamoto
    Public symposium, Japanese, Computer Security Symposium, CSEC, IPSJ, 盛岡, Peer-reviewed, Afghanistan, Domestic conference
    Oct. 2001
  • キャッシュラインを考慮した3次元PDE Solverの最適化手法(共著)
    近藤正章; 岩本貢; 中村宏
    Oral presentation, Japanese, 情報処理学会研究報告, Peer-reviewed, Afghanistan, Domestic conference
    Mar. 2001
  • Cache Line Impact on 3D PDE Solvers.
    近藤正章; 岩本貢; 中村宏
    Oral presentation, Abkhazian, 情報処理学会研究報告, Peer-reviewed, Afghanistan, Domestic conference
    2001
    2001 2001
  • NAS PB CG, FTにおけるSCIMAの性能評価(共著)
    岩本貢; 渡辺亮介; 近藤正章; 中村宏; 朴泰祐
    Oral presentation, Japanese, 情報処理学会研究報告, Peer-reviewed, Afghanistan, Domestic conference
    Oct. 2000
  • Performance evaluation of SCIMA for NASPB Kernel CG, FT.
    岩本貢; 渡辺亮介; 近藤正章; 中村宏; 朴泰祐
    Oral presentation, Abkhazian, 情報処理学会研究報告, Peer-reviewed, Afghanistan, Domestic conference
    2000
    2000 2000
  • An analytic construction of the visual secret sharing scheme for color images
    Hiroki Koga; Mitsugu Iwamoto; Hirosuke Yamamaoto
    Public symposium, English, Symposium on Cryptography and Information Security, ISEC, IEICE, 沖縄, Peer-reviewed, Afghanistan, Domestic conference
    Jan. 2000
  • カラー画像に対する一般のアクセス構造をもつ視覚復号型秘密分散法の一構成法
    Mitsugu Iwamoto; Hiroki Koga; Hirosuke Yamamoto
    Public symposium, Japanese, Symposium on Information Theory and Its Applications (SITA), 情報理論とその応用学会, 越後湯沢, Peer-reviewed, Afghanistan, Domestic conference
    Nov. 1999

Affiliated academic society

  • International Association of Cryptographic Research
  • Society of Information Theory and its Applications
  • 電子情報通信学会
  • IEEE

Research Themes

  • 効率的で安全に利用可能な高機能暗号の数理基盤の構築と展開
    Tsuyoshi Takagi; Mitsugu Iwamoto; Kazuo Sakiyama; Yang Li; Yohei Watanabe; Yuntao Wang; Daiki Miyahara
    Japan Science and Technology Agency, K Program, The University of Electro-Communications, 個別研究型, 25-JPMJKP24U2-03
    Apr. 2025 - Mar. 2030
  • Trustworthy IoTシステム設計基盤の構築
    岩本貢
    科学技術振興機構, 戦略的な研究開発の推進 戦略的創造研究推進事業 CREST, 東京工業大学, 近年、IC製造工程に外部企業が関わることで、IC設計技術(IP)盗用や非正規品流通の問題が深刻化しています。本研究は、ICサプライチェーン全体の安全性要件を抽出・モデル化し、その要件を満たす新たな仕組みを高機能暗号を基盤として構築することで、ICのIP保護と真正性確認の一括した実現を目指します。この仕組みをIC設計時にby-Designで設計情報に組み込むための設計手法とその設計環境を開発します。, JPMJCR23M2
    2023 - 2028
  • Foundations of Security Quantification by Integrating Information, Computation, and Cryptography Theories
    安永 憲司,渡辺峻,河内 亮周,岩本貢,山下 恭佑,齋藤 翔太
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Institute of Science Tokyo, Grant-in-Aid for Scientific Research (A), セキュリティ強度を定量的に評価するビットセキュリティの枠組みとして,MicciancioとWalter (Eurocrypt 2018) が提案したものと研究代表者ら(WatanabeとYasunaga (Asiacrypt 2021))が提案したものがあるが,両者の関係性を明らかにした(Asiacrypt 2023).MWの枠組みで提案された条件付き二乗(CS)優位性とWYの枠組みの特徴付けであるRenyi優位性について,一般にはCS優位性の方が大きく,両者が大きく異なるような例も存在するが,攻撃者を適切に変換させることでCS優位性をRenyi優位性と同程度にできることを示した.つまり,攻撃者に関して最大値を取れば両者はほぼ同等である.その他,任意の探索型安全性ゲームはビットセキュリティを保ったまま判定型ゲームに変換できること,安全性ゲームにおける分布置き換え定理を示した. 量子信号処理のフレームワークから秘密計算を実現する秘密量子信号処理プロトコルを構成し,そのプロトコルが満たす秘匿性の情報理論的な評価技術を確立した.またその応用として1量子ビットしかないサーバが広いクラスの関数を計算する秘密計算を提案し,その通信量と正当性のトレードオフを評価した. 情報理論的な視点で差分プライバシー (DP) を見ることで,DPは次数∞のRenyiダイバージェンスで表現されており,次数αのRenyiダイバージェンスを用いてDPを拡張したRenyi差分プライバシー(RDP)が提案されていた.そこで,f-ダイバージェンスを用いたDPの拡張を提案し,これにより従来のRDPよりもタイトな結果が得られる可能性を示した. 一般に,リング署名から複数検証者指定署名方式(MDVS)が構成できると信じられてきたが,そのような構成はブラックボックス的に不可能であることを示した., 23H00468
    Apr. 2023 - Mar. 2027
  • New theory for security analysis: from information inequality to computational inequality
    渡辺 峻; 河内 亮周; 岩本 貢; 安永 憲司
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Tokyo University of Agriculture and Technology, Grant-in-Aid for Challenging Research (Pioneering), 現代暗号理論における暗号技術は情報理論的暗号と計算量理論的暗号に大別される。前者は安全性の評価が定量的にしやすい反面、実現するためのコストが高く、大規模なシステムに適用するのが容易でない。一方、後者は安全性の定量的評価がしにくいものの、実現するためのコストが低く、柔軟性にも富んでいる。本研究では、情報理論的な解析手法を計算量理論的な安全性解析に適用するための新理論の確立を目的としている。 本年度の研究では、2021年にWatanabe-Yasunagaによって提案されたビットセキュリティの定義が、2018年にMiciancio-Walterによって提案されたビットセキュリティの定義と本質的に等価であることを示した。前者の定義は攻撃者の成功確率を1に近づけるためのコストとして操作的に定義されていたが、後者の定義との関係が不明であった。二つの定義の等価性が示されたことにより、状況に応じて二つの定義の使いやすい方を採用できるようになったため、本成果の意義は大きい。 また、秘匿計算のシミュレーションベースの安全性を、統計学における十分統計量ならびに情報量に基づく別表現を提案することに成功している。この表現によって、従来のプロトコルの見通しの良い安全性証明を与えることが可能になった。 また、Even-Mansour暗号に対する量子攻撃のクエリー複雑量の下界を導出することに成功した。本下界によって、Even-Mansour暗号への桑門ー森によって提案された攻撃が、クエリー複雑量の観点から最適であることが明らかになった。, 23K17455
    30 Jun. 2023 - 31 Mar. 2026
  • 公開鍵暗号の識別不可能性に対する総合的評価技術の開発
    四方 順司; 岩本 貢; 白川 真一; 有村 光晴
    日本学術振興会, 科学研究費助成事業, 横浜国立大学, 基盤研究(B), 公開鍵暗号の安全性強度及び必要な鍵サイズを評価する際、従来のようにメジャーな計算問題への帰着及びその困難性を評価する手法だけに依るのではなく、多角的視点から、暗号技術の基盤となる判定問題の困難性を直接的かつ総合的に評価するシステムを研究開発することが本研究の目的である。また、評価システム開発にあたっては、数理構造及び帰着計算量による評価技術の深化、情報理論及び統計的手法による評価技術の深化、人工知能(機械学習)による評価技術の開拓、これら各専門領域から多角的にアプローチする研究を進め、その後、得られた解析結果の関連性と差異について学術的立場及び実証的立場から解析し、それら評価手法の背景にある仕組みを融合させることで、分野横断的技術として総合的評価システムを完成させる。 令和5年度は前年度における3つ研究アプローチをさらに発展させた。数理構造及び帰着計算量による研究アプローチの観点からは、緊密な帰着性をもつ複数の(高機能)暗号技術を研究対象とし、その基盤となる計算問題と暗号構成の間の帰着効率について深く解析しながら複数の(高機能)暗号技術を提案した。情報理論及び統計的手法による研究アプローチの観点からは、前年度に解析したLZ78符号に加えて更に広いクラスのデータ圧縮手法や符号化手法に関する解析を行った。人工知能(機械学習)による研究アプローチの観点からは、Deep Neural Network (DNN)を一般化加法モデルの形状関数として利用するNeural Additive Models (NAM)を対象に、学習するDNNの数を任意の数に減らす手法を提案した。以上より、令和5年度は上記3種類の研究アプローチの基礎的検討を発展させ、それぞれの観点から興味深い知見が得られたため、これら成果を判定問題の困難性に効果的に適用することが期待できる。, 23K24846
    01 Apr. 2022 - 31 Mar. 2026
  • 公開鍵暗号の識別不可能性に対する総合的評価技術の開発
    四方順司
    日本学術振興会, 科学研究費助成事業 基盤研究(B), 横浜国立大学, 基盤研究(B), 22H03590
    01 Apr. 2022 - 31 Mar. 2026
  • 真に高機能暗号の社会展開に資する物理・視覚暗号
    花岡 悟一郎; Attrapadung Nuttapong; 松田隆宏; 品川和雅; 宮本賢伍; 岩本貢; 渡邉洋平; 宮原大輝; 水木敬明; 矢内直人; 山下恭佑
    日本学術振興会, 科学研究費助成事業 基盤研究(A), 国立研究開発法人産業技術総合研究所, 基盤研究(A), 本研究は、高機能暗号の社会展開を円滑に行うための物理・視覚暗号の設計・実装・評価を行うことを目指すものである。具体的には、【課題1】高機能暗号の物理・視覚化、【課題2】物理・視覚暗号の数理モデル化と安全性解析・機能拡張、【課題3】提案方式の評価方法の確立、の三つを課題として設定している。2023年度においては、以下の研究を行った。 【課題1】秘密計算の仕組みや安全性について直感的な理解を促す動画を作成し、産総研YouTubeを通じて社会に発信しただけでなく、実際にZenmuTech社が広報活動に同動画を使用した。また、検索可能暗号の仕組みや安全性について直感的な理解を促すためのスライドによる説明資料を作成(CSS学生論文賞、UWS学生論文賞)し、GMOサイバーセキュリティbyイエラエ社が、自社イベントでその内容について紹介を行った。これらの活動については国際会議MobiSec 2023において招待講演として発表を行った。そして、AIセキュリティの教育コンテンツ(CSS最優秀デモンストレーション賞)や琴を用いた暗号技術(IWSEC Best Poster Award)を提案した。加えて、秘密計算やゼロ知識証明のカードベースプロトコル(CSS優秀論文賞を含む)、視覚暗号を用いた物理・視覚プロトコル、ARグラスを用いた視覚復号型秘密分散を新しく開発し、株式会社ハナヤマと共同で視覚復号型秘密分散を用いた地図パズルを作成した。 【課題2】物理・視覚暗号の数理モデル化と安全性解析の研究として、物理的な天秤を用いる秘密計算の数理モデル化(DICOMO優秀論文賞)と有限群の分解を用いたシャッフル操作の研究を行った。 【課題3】秘密計算の動画および検索可能暗号のスライドについて、提案方式の評価方法の確立を目的として、ユーザ調査を行った。, 23H00479
    Apr. 2023 - Mar. 2026
  • 十分統計量に基づくシミュレーションベース安全性の深化
    岩本 貢; 四方 順司; 渡邉 洋平
    日本学術振興会, 科学研究費助成事業, 電気通信大学, 基盤研究(B), 本研究では,暗号理論分野で生まれたシミュレーションベース安全性を,情報理論的・数理統計学的な立場で考察し,情報理論的安全性(情報理論)と計算量的安全性(計算量理論)の間に新しい関係を見いだすことを目指している.具体的には以下の3つの課題を解決することを目標としている. (A) 分離定理に基づく,新しく簡潔なシミュレーションベース安全性証明手法の開発. (B) シミュレーションベース安全性では陽に意識されない,漏洩情報量の定量化とそれに基づく安全性証明. (C) 計算量理論的な観点から見た,十分統計量や分離定理,条件付相互情報量の探求.それに基づく,情報理論と計算量理論の新しい関係性の模索. 研究課題(A), (B)については,本年度までに得られた成果を総合してBGW (Ben-Or, Goldwasser, Wigderson) プロトコル(Shamirの秘密分散法に基づく,和・積に関するマルチパーティ計算(MPC))に対する (A) 分解定理と (B)漏洩情報量に基づく,新しい一般的な安全性証明を得ることに成功した.(A)の分離定理による証明は,確率分布の変形のみで安全性が証明できる新しい方法ということができ,実質的に乱数の一様性が重要であることがわかった.また(B)については,しきい値法ベースの秘密計算の安全性証明が,秘密分散法の安全性証明とほぼ同じ技法で証明できることを明らかにした.この成果は電子情報通信学会英文論文誌(A)の2024年3月号に招待論文として掲載された.また,同学会総合大会(2024年3月)のチュートリアルセッションでも,本成果に関する招待講演を行った.以上を持って研究課題(A), (B)については一定の目処がついたと考えている. 本研究に関連して,マルチパーティ計算や高機能暗号に関するいくつかの成果を得て,国内・国際会議で発表することが出来た., 23K21644
    01 Apr. 2021 - 31 Mar. 2025
  • 十分統計量に基づくシミュレーションベース安全性の深化
    Mitsugu Iwamoto
    日本学術振興会, 科学研究費助成事業 基盤研究(B), 電気通信大学, 基盤研究(B), 本年度は研究初年度であるため,基盤となる理論の検討を行いつつ,シミュレーションベース安全性に基づくいくつかの暗号方式を提案し,安全性証明を行った.具体的には秘密計算(Multi-Party Computation: MPC),カードベース暗号,高機能暗号技術などが挙げられる. MPCについては,近年盛んに研究されている秘匿集合積プロトコルを扱った.Kolesnikovら(CCS2017)秘匿集合積計算の安全性証明を見直すことで,プロトコルの部品として用いられているOPPRF (Oblivious Programmable Pseudorandom Function) がプロトコルのある箇所では不必要な安全性を保証していることを見いだし,そこを削ったプロトコルに変更することでプロトコルの効率化に成功した. カードベース暗号では,秘匿積集合計算プロトコル,n入力多数決プロトコルなどを扱った.我々が進めているカードベース暗号における秘匿置換の概念は,MPCやシミュレーションベース安全性と相性が良いことが分かっている.トランプのような物理的なカードを用いることで,安全性の直観もききやすく,本研究を進める上での重要な具体例になると考えている. 高機能暗号技術としては,鍵漏洩耐性暗号と検索可能暗号がある.どちらもシミュレーションベースで安全性を証明するが,鍵漏洩耐性暗号では「鍵が漏洩しても安全」であることを,検索可能暗号では「あまり重要でないと考えられる情報が漏洩しても安全」であることを数学的に保証する必要がある.どちらも情報が何らかの形で漏洩する場合が扱われており,その様な場合のシミュレーションベース安全性と十分統計量を考察するための重要な具体例になると考えて研究を進めている.また,どちらも計算量的に安全な方式であり,計算量的な統計量を考えるためにも重要である., 21H03395
    01 Apr. 2021 - 31 Mar. 2025
  • Resilience Enhancement of IoT Ecosystem by Cryptographic Technologies
    崎山一男
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (S), The University of Electro-Communications, Grant-in-Aid for Scientific Research (S), Against physical attacks that read signals inside IoT devices by laser irradiation or direct probing, by regarding the circulation of security states as a function of the IoT ecosystem, we worked on leakage-resilient cryptography (cryptography field), information distillation (information theory field), and leakage detection technology (hardware security field.) We have presented the research results at top-tier international conferences and academic journals. Furthermore, by promoting cross-disciplinary research beyond conventional research, we have developed leakage sensor circuits that detect attacks, algorithms that securely restore keys, and protocols that operate them securely. As a result, we have achieved significant results that contribute to constructing a resilient IoT system using cryptographic hardware., 18H05289
    11 Jun. 2018 - 31 Mar. 2023
  • Searchable Symmetric Encryption for a Long Term Use
    Kazuo Ohta
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C), The University of Electro-Communications, Grant-in-Aid for Scientific Research (C), Searchable encryption is a technology that entrusts encrypted database to the cloud and performs keyword searches while the data is encrypted without leaking the private information. In this research, we examine the update functionality of the database where pairs of documents and keywords are kept securely and efficiently using symmetric key encryption. A patent application has been filed for a single-user type dynamic searchable encryption (DSSE) that can update the database in the server at anytime. On the other hand, after scrutinizing representative paper (Currtmola et al. 2003), we pointed out that infinite loops may occur in SSE-1 when searches are performed under unexpected conditions, and that a subtle information that is not allowed by an improved security definition is leaked in SSE-2. So we formulated a strong forward security. The method for solving the point-outed problems and the DSSE method for which the patent application was filed have been integrated into a full paper., 18K11293
    01 Apr. 2018 - 31 Mar. 2023
  • A new look at security proofs of cryptographic primitives from logic
    Iwamoto Mitsugu
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Research (Exploratory), The University of Electro-Communications, Grant-in-Aid for Challenging Research (Exploratory), In this study, we revisited the security proofs of cryptographic protocols from the viewpoint of logic and tried to understand them easily. As the tools for this purpose, we used so-called physical cryptography such as card-based protocols and private PEZ protocols, which have been studied extensively in recent years. Since the card-based protocols are based on the technique called a private permutation, the proposed protocols have a similar structure to ordinary (algebraic) multi-party computations. The security of private PEZ protocols is easier to understand compared to algebraic multi-party computations because it is free from simulation-based security. We proposed several new card-based and private PEZ protocols with higher efficiency, which contributed to understanding the security of cryptographic protocols simply. Some of these results have been published in international journals and major international conferences., 18K19780
    29 Jun. 2018 - 31 Mar. 2022
  • Developing a Paradigm for Constructions in Information Theoretic Cryptography and Its Applications
    Shikata Junji
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Yokohama National University, Grant-in-Aid for Scientific Research (B), In order to develop information-theoretic cryptography, the purpose of this research is to construct complicated and advanced cryptographic protocols with information-theoretic security by a broad and systematic paradigm from both information theory and modern cryptography, and to apply resulting techniques to other research topics including construction of protocols with complexity-based security. The contribution of this research includes new constrictions of information-theoretically secure advanced protocols including fully homomorphic encryption and MPC including card-based protocols. In addition, from viewpoints of applications, our contribution includes new constructions of various advanced protocols with complexity-based security, and implementation analysis of randomness extractors and fully homomorphic encryption in resource-constrained devices., 18H03238
    01 Apr. 2018 - 31 Mar. 2021
  • Development of Information-Theoretic Security Based on Guessing Secrecy
    Iwamoto Mitsugu
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), The University of Electro-Communications, Grant-in-Aid for Scientific Research (B), In this study, we investigated the recently proposed information-theoretic security notion called guessing secrecy for developing information-theoretic security. First, we proposed several definitions of guessing secrecy and investigated their relationship. Then, by proposing several cryptographic protocols satisfying guessing secrecy, we found that the existence of the security gap depends on the protocols. We also measured the computation time required to guess a key of AES under a probing attack and clarified the relationship between guessing and computation time. Besides the study of guessing secrecy, we proposed several cryptographic protocols that satisfy perfect secrecy, especially secret sharing and multi-party computation., 17H01752
    01 Apr. 2017 - 31 Mar. 2021
  • A Unified Paradigm in Information Theoretic Cryptography and Its Applications
    SHIKATA Junji
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Yokohama National University, Grant-in-Aid for Scientific Research (B), In this research project, we studied a unified paradigm in information theoretic cryptography which can deal with various security notions in cryptography and information theory from systematic and bird’s-eye viewpoints. By overlooking security notions of computational security and information-theoretic security from various aspects, we showed new formalizations of security, construction of cryptographic systems, and their relationships. In particular, we formalized various security notions of encryption and key agreement which have meaningful operations, and showed relationships among security formalizations including the existing ones. We also showed (im)possibility of information theoretic security for encryption, authentication and secret sharing only from biased randomness. Furthermore, as applications of this paradigm, we showed new security formalizations and/or new construction methodology for advanced cryptographic systems., 15H02710
    01 Apr. 2015 - 31 Mar. 2018
  • Construction and Analysis of Information Theoretically Secure Multicast Communication
    Iwamoto Mitsugu
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C), The University of Electro-Communications, Grant-in-Aid for Scientific Research (C), We discussed how to unify broadcast encryption (BE) and secure network coding (SNC), and clarified that it is possible when the network is (t,d)-combinatorial network where a source node is connected to t intermediate nodes, and each sink node is connected to t intermediate nodes. Furthermore, the proposed scheme is highly practical compared to the original BE. For instance, 834TB and 809TB are necessary for encryption and decryption keys, respectively, to implement (≦100, ≦3)-BE by traditional method. On the other hand, in the case of (5,3)-combinatorial network, 2.6TB and 75GB are enough for encryption and decryption keys, respectively, by the proposed scheme. Key lengths of proposed scheme are not short, but are more practical compared to the traditional BE., 26420345
    01 Apr. 2014 - 31 Mar. 2017
  • Information Theoretic Cryptography with Statistical Cheating Detection and Its Applications
    IWAMOTO Mitsugu
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B), The University of Electro-Communications, Grant-in-Aid for Young Scientists (B), In this research, we investigated the way of detecting cheating in information theoretic cryptography. In particular, we clarified that the trade-off between share size and the exponent of the success probability in impersonation attack on (2,2)-threshold secret sharing schemes. This result implies how we can easily detect the impersonation by making each share redundant. In addition, we proposed a method of preventing the cheating in visual secret sharing schemes (VSSS). We also discussed how to cheat the visual secret sharing schemes in a practical setting by focusing on the situation where VSSS is decrypted without computers. Other than the above, we clarified several fundamental results on information theoretic cryptography., 23760330
    2011 - 2013
  • Research on Attack Limits of Side-Channel Analysis and Clarification of Information Leakage Mechanism
    SAKIYAMA Kazuo; OHTA Kazuo; IWAMOTO Mitsugu
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C), The University of Electro-Communications, Grant-in-Aid for Scientific Research (C), Side-channel attacks are methods, where attackers retrieve secret information by using physical phenomena leaked from cryptographic hardware such as power consumption and electromagnetic radiation. Exploring the attack limits of side-channel analysis, this research focused on the clarification of information leakage. We succeeded in deriving the theoretical bound for the amount of information leakage, and extended the understanding of the relationship between secret and random information handled in cryptology., 22500008
    2010 - 2012
  • Development of a randomness test method based on T-complexity for cryptography
    YAMAMOTO Hirosuke; KUNIHIRO Noboru; IWAMOTO Mitsugu
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Exploratory Research, The University of Tokyo, Grant-in-Aid for Challenging Exploratory Research, T-randomness test is proposed based on T-complexity and the performance of the test is evaluated by theoretical analyses and simulation. LZ-randomness test based on LZ-complexity has a defect such that its probability is discrete. But, it is shown that T-complexity has the ideal normal distribution and T-randomness test works well. RP-complexity, which has an intermediate characteristic between LZ-complexity and T-complexity, is also defined and evaluated., 22656085
    2010 - 2011
  • Theoretical Study for Practical Applications of Information Theoretically Secure Cryptosystems
    IWAMOTO Mitsugu
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B), The University of Electro-Communications, Grant-in-Aid for Young Scientists (B), We studied information theoretically secure cryptosystems in order to make them more practical. As a result, we obtained three results along with this research direction. Three main results are : (1) coding theorems for (2,2)-threshold secret sharing schemes secure against cheaters, (2) a proposal of efficient visual secret sharing schemes by relaxing information theoretical security notion, and (3) a new look at relations among information theoretically secure and computationally secure symmetric key encryptions. Furthermore, we obtained several results in cryptography and information security in which information theoretic methods are effectively utilized., 20760236
    2008 - 2010
  • 逐次検定と乱数生成の情報スペクトル理論
    韓 太舜; 岩本 貢
    日本学術振興会, 科学研究費助成事業 基盤研究(C), 基盤研究(C), 本研究では、情報理論的諸問題へ適用されて成功をおさめている情報スペクトル的方法を大偏差問題に適用してその理論体系を再構築した。, 19560372
    2007 - 2009
  • 情報理論的に安全な多重符号化に関する符号化定理とその応用
    山本 博資
    日本学術振興会, 科学研究費助成事業 萌芽研究, 東京大学, 萌芽研究, 安全な多重符号化法に関して,本年度は下記の成果を得た. 1.盗聴通信路(盗聴者がいる雑音のある通信路)では,符号化法を工夫することにより,秘密鍵を一切使用しなくても秘密情報を安全に伝送可能なことが知られている.昨年度は,複数の秘密情報を一度に多重符号化することにより,盗聴通信路を通して個々の情報を完全に安全に保ちながら,全体の情報伝送レートを通信路容量まで大きくできることを理論的に明らかにした.本年度は,無記憶通信路および情報スペクトル理論の意味での一般通信路の場合に対して,その証明を洗練したものに改良した. 2.通信ネットワーク上で互いに情報を交換するとき,後出しなどの不正が問題となる.そのような不正を防止する基礎技術としてビットコミットメントがあるが,盗聴通信路の符号化法を利用してビットコミットメントを実現できる.昨年度は,上記1で示した盗聴通信路に対する多重符号化法をビットコミットメントに適用できることを示したが,本年度はその符号化定理の証明法についても改良を行った. 3.インターネットのような複雑なネットワークを通して情報を効率よく伝送するための符号化をネットワーク符号化という.ネットワーク符号化で,盗聴者が盗聴できる通信路数に制限がある場合に,安全な符号化が可能なことが知られているが,それらは単一の情報に対する符号化法であった.本年度の研究において,複数の受信者に対する共通情報とそれぞれの受信者への個別情報を同時に安全に符号化できる可能性があることを明らかにした., 18656110
    2006 - 2007
  • 高い符号化効率を実現するランプ型秘密分散法の構成とその安全性評価
    岩本 貢
    日本学術振興会, 科学研究費助成事業 若手研究(B), 電気通信大学, 若手研究(B), 本年度は,partial broadcast channelを用いた秘密分散法に関して研究を行う予定であったが,残念ながら,まとまった結果を得ることが出来なかった.そのため途中から,不正者に対する耐性を持つ秘密分散法を情報理論的に構成する方法を研究した.従来の設定では,完全に不正を防ぐ(不正者の不正成功確率を0にするということ)は不可能であるという結果があるが(Ogata, et. al.),設定をShannon理論的な設定に(わずかに)変更するだけでこの問題が回避できるのではないかというのが,本研究の重要な点である.この問題については平成19年度中に解決を見ることが出来こなかったが最近,認証に関するShannon理論的暗号システムの扱いに関する論文(Koga, et. al.)においても似たような議論が成立していることに気がついた.引き続き研究していく予定である. 続いて,ランプ型のVSSSに関しては,理論的な研究が完成せず,論文として発表するにはもう一工夫が必要である.しかし,情報漏洩と秘密画像のサイズに関して現在までに得られている新しい知見については平成20年度中に開催される国際会議に投稿の予定である. 昨年度にある程度論文が出版されたこともあって,研究期間最終年としては来年度以降に引き続き行うべき点が多く残ったことが残念ではあるが,平成20年度以降も研究としては続けていき,成果を発表していく予定である.また,研究課題に関しては昨年度までの結果も含め,一定の成果があったと感じている., 17760298
    2005 - 2007
  • 秘密分散法に対する情報理論的性能解析とその一般的構成法に関する研究
    山本 博資
    日本学術振興会, 科学研究費助成事業 特定領域研究, 東京大学, 特定領域研究, 秘密分散法(SSS)は,秘密情報Sをn個の分散情報に分散符号化し,有資格集合に属する分散情報が全て集まるとSが復号できるが,禁止集合に属する分散情報が集まってもSに関して全く情報が漏れない符号化方式である. 分散情報の任意の部会集合が,有資格集合または禁止集合のどちらかである場合,そのSSSのアクセス構造は完全であるという.また,有資格集合でも禁止集合でもない中間的な特性を持つ分散情報の集合が存在するとき,そのSSSのアクセス構造はランプ型であるという.有資格集合と禁止集合が,分散情報の部分集合のサイズにより決まるとき,アクセス構造はしきい値型であるという.特に,分散情報の部分集合のサイズがk以上で有資格集合,サイズがk-L以下で禁止集合,サイズがk-t(1≦t≦L)で秘密情報Sに対して(t/L)H(S)の曖昧さが残るランプ型SSSを,(k,L,n)しきい値ランプ型SSSといい,L=1の場合を(k,n)しきい値SSSという.また,しきい値型に限らないアクセス構造を,一般アクセス構造という. 通常のSSSでは,秘密情報は数値情報であるが,将来,量子計算機や量子通信が実現し,量子状態を長期に記憶できるようになると,量子状態そのものを秘密情報として保管したい場合がある.そのような量子状態を符号化するSSSを,量子秘密分散法という. 本年度は本特定領域研究の最終年であり,今までの研究成果の取りまとめを行うとともに,本研究を通じて得られた「量子秘密分散法」および「一般アクセス構造に対する強いランプ型秘密法」に関する研究成果を論文誌に発表した.さらに,本年度新たにネットワーク符号化(Network Coding)へのしきい値ランプ型秘密分散法の応用に関して研究を行い,その成果をシンポジウムにおいて発表した., 16016224
    2004 - 2005

Industrial Property Rights

  • 動的検索可能暗号処理システム
    Patent right, 渡邉洋平, 岩本貢, 太田和夫, 特願2019-111977, Date applied: 17 Jun. 2019, 特開2020-112773, Date announced: 27 Jul. 2020, 特許7276767, Date registered: 10 May 2023, Domestic, Domestic
  • GENERATING DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, GENERATING METHOD, ENCRYPTION METHOD, DECRYPTION METHOD, AND COMPUTER PROGRAM PRODUCT
    Patent right, Tsukasa Omino, Yuuichi Komano, Mitsugu Iwamoto, Kazuo Ohta, US 2014-0294176 A1, Date applied: 02 Oct. 2014, Tsukasa Endo, Yuichi Komano, Kazuo Ohta, Mitsugu Iwamoto, 10,027,479, Date issued: 27 Jun. 2018, Domestic, Domestic
  • 温度センサ、暗号化装置、暗号化方法、及び個体別情報生成装置
    Patent right, 山本大, 落合隆夫, 武仲正彦, 伊藤孝一, 﨑山一男, 岩本貢, 太田和夫, 特願2011-279000, Date applied: Dec. 2011, 特開2013-130434, Date announced: 04 Jul. 2013, 特許5870675, Date issued: 22 Jan. 2016, Domestic, Domestic
  • 温度センサ,暗号化装置,暗号化方法,及び個体別情報生成装置
    Patent right, 山本大, 落合隆夫, 武仲正彦, 伊藤孝一, 﨑山一男, 岩本貢, 太田和夫, 特願2011-279001, Date applied: 20 Dec. 2011, 特開2013-131868, Date announced: 04 Jul. 2013, 特許5857726, Date issued: 25 Dec. 2015, Domestic, Domestic
  • 固体別情報生成装置及び個体別情報生成方法
    Patent right, 特願2011-279002, Date applied: 10 Dec. 2011, 山本大,武仲正彦,伊藤孝一,落合隆夫,﨑山一男,岩本貢,太田和夫, 特開2013-131869, Date announced: 04 Jul. 2014, 特許5831203, Date issued: 06 Nov. 2015, Domestic, Domestic
  • 温度センサ,暗号化装置,暗号化方法,及び個体別情報生成装置
    Patent right, 山本大, 落合隆夫, 武仲正彦, 伊藤孝一, 﨑山一男, 岩本貢, 太田和夫, 特願2011-278999, Date applied: 20 Dec. 2011, 山本大,武仲正彦,伊藤孝一,落合隆夫,﨑山一男,岩本貢,太田和夫, 特開2013-131867, Date announced: 04 Jul. 2013, 特許5831202, Date issued: 06 Nov. 2015, Domestic, Domestic
  • 生成装置、暗号化装置、復号装置、生成方法、暗号化方法、復号方法およびプログラム
    Patent right, 遠藤つかさ, 駒野雄一, 岩本貢, 太田和夫, 特願2013-064890, Date applied: 26 Mar. 2013, 特開2014-192612, Date announced: 06 Oct. 2014, Domestic, Domestic
  • 生成装置、暗号化装置、復号装置、生成方法、暗号化方法、復号方法 およびプログラム
    Patent right, 小美濃つかさ, 駒野雄一, 岩本貢, 太田和夫, 2013-64890, Date applied: Oct. 2013, Domestic, Domestic
  • 個体別情報生成装置,暗号化装置,認証装置,及び個体別情報生成方 法
    Patent right, 2011-279002, Date applied: Dec. 2011, Domestic, Domestic