Takagi-Takayasu Laboratory Mathematical Informatics 1st Laboratory

2011 - 2015

2015

  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", The Third International Symposium on Computing and Networking, CANDAR'15, pp.58-67, 2015.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields", The Third International Symposium on Computing and Networking, CANDAR'15, pp.477-483, 2015.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Note on Some Recent Cheater Identifiable Secret Sharing Schemes", IEICE Transaction, Vol.98-A, No.8, pp.1814-1819, 2015.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for Code-Based Public-Key Encryption", IEICE Transaction, Vol.98-A, No.10, pp.2139-2151, 2015.
  • Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu, "Functional Encryption Resilient to Hard-to-Invert Leakage", The Computer Journal, Vol.58, No.4, pp.735-749, 2015.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient scalar product protocol and its privacy-preserving application", International Journal of Electronic Security and Digital Forensics, Vol.7, No.1, pp.1-19, 2015.
  • Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, "Revocable Identity-based Signcryption Scheme Without Random Oracles", International Journal of Network Security, Vol.17, No.2, pp.110-122, 2015.
  • Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi, "On the Security of A Privacy-Preserving Product Calculation Scheme", IEEE Transactions on Dependable and Secure Computing, Vol.12, No.3, pp.373-374, 2015.
  • Yun-Ju Huang , Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of FPPR method to solve ECDLP", Pacific Journal of Mathematics for Industry, Vol.7, No.1, pp.1-9, 2015.

2014

  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An experiment of number field sieve for discrete logarithm problem over GF(p^n)", JSIAM Letters, Vol.6, pp.53-56, 2014.
  • Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi, "A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics", 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, LNCS 8772, pp.40-58, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication", 9th International Workshop on Security, IWSEC 2014, LNCS 8639, pp.72-87, 2014.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", IEICE Transaction, Vol.97-A, No.10, pp.2055-2063, 2014.
  • Hui Zhang, Tsuyoshi Takagi, "Improved Attacks on Multi-Prime RSA with Small Prime Difference", IEICE Transaction, Vol.E97-A, No.7, pp.1533-1541, 2014.
  • Takumi Tomita, Tsuyoshi Takagi, "Efficient System Parameters for Identity-Based Encryption using Supersingular Elliptic Curves", JSIAM Letters, Vol.6, pp.13-16, 2014.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", IEICE Transaction, Vol.E97-A, No.6, pp.1418-1425, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, Rong Hu, "Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data", IEICE Transaction, Vol.E97-D, No.2, pp.326-330, 2014.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3^n)", IEICE Transaction, Vol.E97-A, No.1, pp.236-244, 2014.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Security of Multivariate Signature Scheme Using Non-commutative Rings", IEICE Transaction, Vol.E97-A, No.1, pp.245-252, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments", IEICE Transaction, Vol.E97-A, No.1, pp.409-412, 2014.
  • Tsukasa Ishiguro, Shinsaku Kiyomoto,Yutaka Miyake, Tsuyoshi Takagi, "Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice", The 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2014, LNCS 8383, pp.411–428, 2014.
  • Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Efficient Implementation of Multivariate Public Key Cryptosystem Rainbow on Android Mobile Phone", IEICE Transaction, Vol.J97-A, No.2, pp.86-95, 2014. (In Japanese)
  • Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Toru Kobayashi, Tsuyoshi Takagi, "Parallel Implementation of Public Key Cryptosystems using Web Workers", The 11th Annual IEEE Consumer Communications and Networking Conference, CCNC 2014, pp.1153–1154, 2014.

2013

  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p^12)", Number Theory and Cryptography 2013, Buchmann Festschrift, LNCS 8260, pp.108–120, 2013.
  • Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faugere et al.'s Method to Solve ECDLP", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.115–132, 2013.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.201–216, 2013.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.258-271, 2013.
  • Hui Zhang, Tsuyoshi Takagi, "Attacks on Multi-Prime RSA with Small Prime Difference", 18th Australasian Conference on Information Security and Privacy ACISP 2013, LNCS 7959, pp.41–56, 2013.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.118–135, 2013.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Multivariate Signature Scheme Using Quadratic Forms", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.243–258, 2013.
  • Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai, "A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation", 2013 ACM Asia Public-Key Cryptography Workshop, AsiaPKC 2013, pp.57-62, 2013.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited", 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, pp.535-540, 2013.
  • Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai, "General Fault Attacks on Multivariate Public Key Cryptosystems", IEICE Transaction, Vol.E96-A, No.1, pp.196-205, 2013.

2012

  • Hui Zhang and Tsuyoshi Takagi, "An Exhaustive Search method to Find All Small Solutions of a Multivariate Modular Linear Equation", JSIAM Letters, Vol.4, pp.37-40, 2012.
  • Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi, "Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)", Asiacrypt 2012, LNCS 7658, pp.43-60, 2012.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Application of Scalar Multiplication of Edwards Curves to Pairing-based Cryptography", IWSEC 2012, LNCS 7631, pp.19-36, 2012.
  • Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang, "Efficient Secure Primitive for Privacy Preserving Distributed Computations", IWSEC 2012, LNCS 7631, pp.233-243, 2012.
  • Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for the McEliece Encryption", ACISP 2012, LNCS 7372, pp.180-193, 2012.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems using EtaT Pairing", ISPEC 2012, LNCS 7232, pp.228-244, 2012.
  • Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi, "Secret Key Reduction of Rainbow using Non-commutative Rings", CT-RSA 2012, LNCS 7178, pp.68-83, 2012.
  • Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi, "Further Improvement of an Identity-Based Signcryption Scheme in the Standard Model", Computers & Electrical Engineering, Vol.38, No.2, pp.413-421, 2012.
  • Mingwu Zhang, Fagen Li, Tsuyoshi Takagi, "Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks", IEICE Transaction, Vol.E95-D, No.2, 2012.
  • Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi, "Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})", IEICE Transaction, Vol.E95-A, No.1, pp.204-212, 2012.
  • Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li, "Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-Delegatability and Non-Transferability", IEICE Transaction, Vol.E95-A, No.1, pp.259-262, 2012.
  • Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, "Identity-Based Online/Offline Signcryption for Low Power Devices", Journal of Network and Computer Applications, Vol.35, No.1, pp.340-347, 2012.

2011

  • Yasufumi Hashimoto, Tsuyoshi Takagi, Koichi Sakurai, "General Fault Attacks on Multivariate Public Key Cryptosystems", PQCrypto 2011, LNCS 7071, pp.1-18, 2011.
  • Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi, "Efficient Identity-Based Signcryption in the Standard Model", The Fifth International Conference on Provable Security, ProvSec 2011, LNCS 6980, pp.120-137, 2011.
  • Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi, "Anonymous Encryption with Partial-Order Subset Delegation Functionality", The Fifth International Conference on Provable Security, ProvSec 2011, LNCS 6980, pp.154-169, 2011.
  • Fagen Li, Jiang Deng, Tsuyoshi Takagi, "An Improved Authenticated Encryption Scheme", IEICE Transaction, Vol.E94-D, No.11, pp.2171-2172, 2011.
  • Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, "Group-oriented Setting's Multisigncryption Scheme With Threshold Designcryption", Information Sciences, No.181, pp.4041-4050, Elsevier, 2011.
  • Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi, "Efficient Implementation of the EtaT Pairing on GPU", 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, Industrial Track, pp.119-133, 2011.
  • Mingwu Zhang, Tsuyoshi Takagi, "GeoEnc: Geometric Area based Keys and Policies in Functional Encryption Systems", 16th Australasian Conference on Information Security and Privacy, ACISP 2011, LNCS 6812, pp.241-258, 2011.
  • Mingwu Zhang, Tsuyoshi Takagi and Bo Yang, "Dual-Veriers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks", Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, LNCS 6749, pp.71-84, 2011.
  • Kenichiro Hayasaka, Tsuyoshi Takagi, "An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic", International Workshop on Coding and Cryptology, IWCC 2011, LNCS 6639, pp. 191-200, 2011.
  • Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi, "Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3", IEICE Transaction, Vol.E94-A, No.1, pp.150-155, 2011.
  • Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi, "Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor", International Journal of Network Security, Vol.12, No.1, pp.50-57, 2011.
  • Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi, "Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings ", International Journal of Network Security, Vol.12, No.3, pp.130-136, 2011.