Publications
For a complete list of publications including domestic conferences, please see the Japanese page.
2026
2024
International Conference PapersPeer-Reviewed
Multi-key Homomorphic Encryption with Threshold Re-encryption
31st International Conference on Selected Areas in Cryptography (SAC 2024), Lecture Notes in Computer Science, Vol.15516, pp.84-104, 2024.
2023
International Conference PapersPeer-Reviewed
Threshold Fully Homomorphic Encryption over the Torus
28th European Symposium on Research in Computer Security (ESORICS 2023), Lecture Notes in Computer Science, Vol.14344, pp.45-65, 2023.
2021
Journal PapersPeer-Reviewed
Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.104-A, No.1, pp.182-189, 2021.
2020
Journal PapersPeer-Reviewed
Group Signatures with Time-bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation
IEEE Transactions on Dependable and Secure Computing, Vol.17, No.2, pp.292-305, 2020.
Journal PapersPeer-Reviewed
A Revocable Group Signature Scheme with Scalability from Simple Assumptions
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.103-A, No.1, pp.125-140, 2020.
2019
International Conference PapersPeer-Reviewed
A Fast Privacy-Preserving Multi-Layer Perceptron Using Ring-LWE Based Homomorphic Encryption
2nd International Workshop on Cross-disciplinary Data Exchange and Collaboration (CDEC), Workshop on IEEE International Conference on Data Mining (ICDM 2019), 2019.
Posters
A Practical Leakage-Resilient Scheme using Big-key Encryptions
14th International Workshop on Security (IWSEC 2019) Poster Session, 2019.
Bulletins
Research on Security Improvement for Homomorphic Encryption Towards privacy-preserving data mining for personal data
NICT NEWS, Vol.2019.2, No.474, pp.4-5, 2019.
Bulletins
Research and Standardization of Post-Quantum Cryptography Measures against quantum computer threats on cryptosystems
NICT NEWS, Vol.2019.2, No.474, pp.6-7, 2019.
Bulletins
Cryptographic Implementations −Achieving both efficiency and security−
NICT NEWS, Vol.2019.2, No.474, pp.13, 2019.
2018
Journal PapersPeer-Reviewed
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
IEEE Transactions on Vehicular Technology, Vol.67, No.2, pp.1582-1597, 2018.
Journal PapersPeer-Reviewed
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
IEEE Transactions on Information Forensics & Security, Vol.13, No.5, pp.1333-1345, 2018.
Journal PapersPeer-Reviewed
Efficient Homomorphic Encryption with Key Rotation and Security Update
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.101-A, No.1, pp.39-50, 2018.
International Conference PapersPeer-Reviewed
Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption
25th International Conference on Neural Information Processing (ICONIP 2018), Lecture Notes in Computer Science, Vol.11304, pp.349-358, 2018.
International Conference PapersPeer-Reviewed
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation
21st Information Security Conference (ISC 2018), Lecture Notes in Computer Science, Vol.11060, pp.442-460, 2018.
Posters
Privacy-Preserving Naive Bayes Classifier based on Homomorphic Encryption
13th International Workshop on Security (IWSEC 2018) Poster Session, 2018.
2017
Journal PapersPeer-Reviewed
Input and Output Privacy-Preserving Linear Regression
IEICE Transactions on Information and Systems, Vol.100-D, No.10, pp.2339-2347, 2017.
International Conference PapersPeer-Reviewed
Privacy Preserving Extreme Learning Machine using Additively Homomorphic Encryption
2017 IEEE Symposium Series on Computational Intelligence (SSCI 2017), 2017.
International Conference PapersPeer-Reviewed
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother
16th Workshop on Privacy in the Electronic Society (WPES 2017), pp.111-122, 2017.
International Conference PapersPeer-Reviewed
A Generic yet Efficient Method for Secure Inner Product
11th International Conference on Network and System Security (NSS 2017), Lecture Notes in Computer Science, Vol.10394, pp.217-232, 2017.
International Conference PapersPeer-Reviewed
Privacy-Preserving Deep Learning: Revisited and Enhanced
8th International Conference on Applications and Technologies in Information Security (ATIS 2017), Communications in Computer and Information Science, Vol.719, pp.100-110, 2017.
International Conference PapersPeer-Reviewed
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption
5th International Workshop on Security in Cloud Computing (SCC 2017), pp.35-42, 2017.
International Conference PapersPeer-Reviewed
Mis-operation Resistant Searchable Homomorphic Encryption
12th ACM Asia Conference on Computer and Communications Security (ASIACCS 2017), pp.215-229, 2017.
International Conference PapersPeer-Reviewed
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction
12th ACM Asia Conference on Computer and Communications Security (ASIACCS 2017), pp.777-788, 2017.
PostersPeer-Reviewed
Privacy-Preserving Machine Learning via Additively Homomorphic Encryption: the Case of Linear and Logistic Regressions
Private and Secure Machine Learning 2017 (PSML 2017), Workshop on 34th International Conference on Machine Learning (ICML 2017), 2017.
PostersPeer-Reviewed
Privacy-Preserving Deep Learning: Revisited and Enhanced
Private and Secure Machine Learning 2017 (PSML 2017), Workshop on 34th International Conference on Machine Learning (ICML 2017), 2017.
Invited Talks
Privacy-preserving Data Mining via Homomorphic Encryption
IMI Cryptography Seminar, 2017.
2016
Journal PapersPeer-Reviewed
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption
IEICE Transactions on Information and Systems, Vol.99-D, No.8, pp.2079-2089, 2016.
International Conference PapersPeer-Reviewed
Toward Securing Tire Pressure Monitoring Systems: A Case of PRESENT-based implementation
International Symposium on Information Theory and Its Applications (ISITA 2016), pp.403-407, 2016.
International Conference PapersPeer-Reviewed
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2016), Lecture Notes in Computer Science, Vol.9665, pp.789-819, 2016.
International Conference PapersPeer-Reviewed
A Light-weight Group Signature Scheme with Time-token Dependent Linking
4th International Workshop on Lightweight Cryptography for Security & Privacy (LightSec 2015), Lecture Notes in Computer Science, Vol.9542, pp.37-57, 2016.
PostersPeer-Reviewed
CODASPY'16 Poster / Scalable and Secure Logistic Regression via Homomorphic Encryption
6th ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2016), pp.142-144, 2016.
Bulletins
Recent Developments in Security Evaluation Technologies of Cryptosystems
Journal of the National Institute of Information and Communications Technology, Special Issue on Network Security, Vol.63, No.2, pp.189-195, 2016.
Bulletins
An Encrypted File Storage System with Hierarchical Levels of Sensitivity and its Applications
Journal of the National Institute of Information and Communications Technology, Special Issue on Network Security, Vol.63, No.2, pp.215-221, 2016.
Bulletins
Privacy Preserving Technologies for Personal Data
Journal of the National Institute of Information and Communications Technology, Special Issue on Network Security, Vol.63, No.2, pp.229-233, 2016.
2015
PostersPeer-Reviewed
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity
ACM Conference on Computer and Communications Security 2015 (ACM CCS 2015), pp.1684-1686, 2015.
2014
2013
Doctoral Thesis
Experiments on Discrete Logarithm Problems in GF(3^6n)
Kyushu University, 2013.
2012
Journal PapersPeer-Reviewed
Solving a 676-bit Discrete Logarithm Problem in GF(3^6n)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.95-A, No.1, pp.204-212, 2012.
International Conference PapersPeer-Reviewed
Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)
18th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2012), Lecture Notes in Computer Science, Vol.7658, pp.46-60, 2012.
International Conference PapersPeer-Reviewed
Key Length Estimation of Pairing-Based Cryptosystems using EtaT Pairing
8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science, Vol.7232, pp.228-244, 2012.
Invited Talks
Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)
IMI Cryptography Seminar, 2012.
Invited Talks
Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)
16th Workshop on Elliptic Curve Cryptography (ECC 2012), 2012.
Talks
Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)
Rump Session in CRYPTO 2012, 2012.
2011
2010
Organizing Activities
2019
Program Committee
IEEE Cyber Science and Technology Congress (CyberSciTech)
2018
Local Organizing Committee
International Workshop on Security (IWSEC)
2017
Local Organizing Committee
International Workshop on Security (IWSEC)
Program Committee
International Symposium on Computing and Networking (CANDAR)
Program Committee
International Workshop on Information and Communication Security (WICS)
2016
Local Organizing Committee
International Workshop on Security (IWSEC)
Program Committee
International Symposium on Computing and Networking (CANDAR)
Program Committee
International Workshop on Information and Communication Security (WICS)
2014
Local Organizing Committee
ACM Symposium on Information, Computer and Communications Security (ASIACCS)