Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration on Definition Field for Efficient Ring-LWE Problem Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 |
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] |
IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 pp.158-165 |
ICSS |
2023-11-16 16:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Security Analysis of MP-LWE using Weighted Lattice Reduction Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57 |
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] |
ICSS2023-57 pp.42-48 |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 |
The Learning With Errors problem (LWE) is a mathematical problem that supports the security of lattice based cryptograph... [more] |
IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 pp.49-53 |
RCC, ISEC, IT, WBS |
2023-03-14 10:55 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU) IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73 |
[more] |
IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73 pp.54-60 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88 |
Currently, as a post-quantum computer cryptography, cryptography based on the difficulty of solving a mathematical probl... [more] |
IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88 pp.142-148 |
ICSS, IPSJ-SPT |
2023-03-13 17:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) ICSS2022-71 |
We have researched Learning with Errors(LWE) problem and Ring-LWE problem. Module-LWE problem is a version of RLWE probl... [more] |
ICSS2022-71 pp.139-144 |
IT, ISEC, RCC, WBS |
2022-03-10 14:15 |
Online |
Online |
Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 |
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] |
IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 pp.130-137 |
IT, ISEC, RCC, WBS |
2022-03-10 14:40 |
Online |
Online |
Crypto Analysis for Ring-LWE Problem on Subfield in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji (OU) IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 |
Since the proposal of the quantum computer, steady progress has been made toward its practical use. It has been reported... [more] |
IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 pp.138-144 |
WBS, IT, ISEC |
2021-03-04 11:20 |
Online |
Online |
An Attack on Search Ring-LWE Problem for Even Relative Degree Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ) IT2020-122 ISEC2020-52 WBS2020-41 |
The Ring-LWE problem is used to construct homomorphic encryption and has attracted much attention because of its quantum... [more] |
IT2020-122 ISEC2020-52 WBS2020-41 pp.66-72 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:50 |
Yamaguchi |
|
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 |
There are no known quantum algorithms, performed in polynomial time, for solving the section finding problem on algebrai... [more] |
ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 pp.185-191 |
ISEC |
2016-05-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Possibility of Recovering Short Generators over Ideal Lattices for Cyclotomic Fields Shinya Okumura, Masaya Yasuda, Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-6 |
Recently, next-generation high-performance cryptography, e.g. post-quantum cryptography, fully homomorphic encryption sc... [more] |
ISEC2016-6 pp.25-32 |