Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Public-Key Identification Scheme Based on a New NP-Hard Tensor Problem Akitaka Yokota, Bagus Santoso (UEC) IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72 |
No general quantum algorithm is known to efficiently solve computational problems based on
Multivariate Quadratic Poly... [more] |
IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72 pp.94-101 |
VLD, HWS, ICD |
2024-03-02 10:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design of General Hardware for Optimal Strategy in Isogeny-Based Post-Quantum Cryptography Kosei Nakamura, Makoto Ikeda (UT) VLD2023-137 HWS2023-97 ICD2023-126 |
The computation in isogeny-based post-quantum cryptography primarily consists of two operations: scalar multiplication o... [more] |
VLD2023-137 HWS2023-97 ICD2023-126 pp.198-203 |
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Certified Deletion for Mult-bit Message Using Pseudorandom Functions Duo XU (NU) |
With the aid of quantum communication, one can delete messages from receiver’s memory. This is what so called Certified ... [more] |
|
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Verification of identifiability of quantum states in quantum key delivery Shunya Tajima, Atsushi Okamoto, Akihisa Tomita (hokudai) |
In quantum key distribution, it is required that when creating the transmission state, the state is identical in all deg... [more] |
|
AP, SANE, SAT (Joint) |
2023-07-12 14:40 |
Hokkaido |
The Citizen Activity Center (Primary: On-site, Secondary: Online) |
Improvement of key generation efficiency of free-space optical physical layer cryptography using polar code Ryuto Terada (Nitech), Hiroyuki Endo (NICT), Kensuke Yamaura, Eiji Okamoto (Nitech), Mitsuo Kitamura (NICT), Ryosuke Shimizu (UEC), Morio Toyoshima, Mikio Hujiwara, Masahide Sasaki (NICT) SAT2023-12 |
Quantum key distribution is known as a secure key sharing technology against all physically possible attacks. However, t... [more] |
SAT2023-12 pp.13-18 |
QIT (2nd) |
2023-05-29 10:10 |
Kyoto |
Katsura Campus, Kyoto University |
A computational complexity assumption necessary for pseudorandom quantum states generators Yuki Shirakawa (Kyoto Univ.) |
Pseudorandom quantum states generators (PRSGs) are efficient quantum algorithms that output quantum states which are com... [more] |
|
QIT (2nd) |
2023-05-30 15:50 |
Kyoto |
Katsura Campus, Kyoto University |
General treatment of trusted receiver noise in continuous variable quantum key distribution Shinichiro Yamano (UT), Takaya Matsuura (RMIT University), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (UT) |
Continuous Variable (CV) quantum key distribution (QKD) is a promising candidate for practical implementations due to it... [more] |
|
COMP, IPSJ-AL |
2023-05-11 10:00 |
Hokkaido |
Hokkaido University |
A computational complexity assumption necessary for pseudorandom quantum states generators Yuki Shirakawa (Kyoto Univ.) COMP2023-2 |
Pseudorandom quantum states generators (PRSGs) are efficient quantum algorithms that output quantum states which are com... [more] |
COMP2023-2 pp.2-7 |
QIT (2nd) |
2022-12-09 10:15 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Finite-size security proof of binary-modulation continuous-variable quantum key distribution using only heterodyne measurement Shinichiro Yamano (Univ. of Tokyo), Takaya Matsuura (RMIT Univ.), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (Univ. of Tokyo) |
Continuous-variable quantum key distribution (CV QKD) has many practical advantages including compatibility with current... [more] |
|
QIT (2nd) |
2022-12-09 10:30 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Refined security proof of the binary-modulation continuous-variable quantum key distribution Takaya Matsuura (RMIT Univ.), Shinichiro Yamano (Univ. of Tokyo), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (Univ. of Tokyo) |
Continuous-variable (CV) quantum key distribution (QKD) has its distinct advantages in lower-cost
implementation and mu... [more] |
|
IT, ISEC, RCC, WBS |
2022-03-10 14:15 |
Online |
Online |
Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 |
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] |
IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 pp.130-137 |
QIT (2nd) |
2021-11-30 16:20 |
Online |
Online |
Certified Deletion for Public Key Encryption and Classical Communication Taiga Hiroka, Tomoyuki Morimae (Kyoto Univ.), Ryo Nishimaki, Takashi Yamakawa (NTT) |
Broadbent and Islam (TCC’20) proposed a quantum cryptographic primitive called quantum encryption with certified deletio... [more] |
|
QIT (2nd) |
2021-11-30 13:30 |
Online |
Online |
[Poster Presentation]
Attacks on Search Ring-LWE Problem by Trace Map on Finite Field Tomoka Takahashi, Sinya Okumura, Atsuko Miyaji (Osaka Univ.) |
The Ring-Learning with Error (Ring-LWE) has attracted a great deal of attention because it is quantum-resistant and can ... [more] |
|
NS |
2021-10-07 13:50 |
Online |
Online |
[Invited Talk]
Quantum Cryptography technologies for realizing the Quantum Key Distribution platform Keisuke Mera (Toshiba) NS2021-70 |
The outline of the technologies of Quantum cryptography for realizing the Quantum Key Distribution platform, the trends ... [more] |
NS2021-70 pp.14-15 |
IA, ICSS |
2021-06-21 13:30 |
Online |
Online |
secure isogeny-based cryptosystem CSIDH for side-channel attacks Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IA2021-2 ICSS2021-2 pp.8-13 |
QIT (2nd) |
2021-05-24 10:10 |
Online |
Online |
Quantum-Classical Hybrid Algorithm for LWE Problems Yasuhito Kawano (Chubu Univ.) |
This paper introduces a quantum-inspired algorithm, called interpolation, that reduces an LWE problem to another problem... [more] |
|
ICM |
2021-03-18 10:30 |
Online |
Online |
[Invited Talk]
Quantum Technology and Innovation Strategy Toshio Tonouchi (RIKEN) ICM2020-62 |
Quantum technology is an innovation technology, which is a key to the rapid and discontinuity development of economy and... [more] |
ICM2020-62 p.19 |
WBS, IT, ISEC |
2021-03-04 11:45 |
Online |
Online |
Security analysis for the isogeny-based cryptography CSIDH Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IT2020-123 ISEC2020-53 WBS2020-42 pp.73-80 |
SIP, IT, RCS |
2021-01-22 16:45 |
Online |
Online |
Revisiting the IND-CPA Security of LWE Encryption Scheme Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202 |
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more] |
IT2020-111 SIP2020-89 RCS2020-202 pp.271-276 |
QIT (2nd) |
2020-12-10 10:10 |
Online |
Online |
Security of continuous variable quantum key distribution with digital signal processing Takaya Matsuura, Kento Maeda, Toshihiko Sasaki, Masato Koashi (U-Tokyo) |
Continuous-variable (CV) quantum key distribution (QKD) uses homodyne/heterodyne measurement, which is technologically m... [more] |
|