Committee 
Date Time 
Place 
Paper Title / Authors 
Abstract 
Paper # 
IT 
20200904 11:35 
Online 
Online 
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT202023 
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] 
IT202023 pp.3136 
ISEC 
20200520 09:45 
Online 
Online 
Isogeny based ring signature from CSIDH Taisei Kiyama, Koutarou Suzuki (TUT) ISEC20201 
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a postquan tum cryptography using i... [more] 
ISEC20201 pp.16 
ISEC 
20200520 13:10 
Online 
Online 
[Invited Talk]
An Efficient F4style Based Algorithm to Solve MQ Problems (from IWSEC 2019) Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC20205 
We introduce “An Efficient F4style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] 
ISEC20205 p.25 
ISEC 
20200520 14:10 
Online 
Online 
[Invited Talk]
How to Construct CSIDH on Edwards Curves (from CTRSA 2020) Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC20208 
CSIDH is an isogenybased keyexchange protocol, that is one of the candidates for postquantum cryptography. It is base... [more] 
ISEC20208 p.31 
HWS, ICD [detail] 
20191101 14:15 
Osaka 
DNP Namba SS Bld. 
A Design of IsogenyBased Cryptographic Hardware Architecture Using Residue Number System Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS201960 ICD201921 
In this paper, we will propose an efficient hardware architecture of isogenybased cryptography. The proposed architectu... [more] 
HWS201960 ICD201921 pp.1924 
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJCSEC, IPSJSPT [detail] 
20190723 14:00 
Kochi 
Kochi University of Technology 
Generic EvenMansour Construction Based on Group Actions Hector Hougaard, ChenMou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC201937 SITE201931 BioX201929 HWS201932 ICSS201935 EMM201940 
The EvenMansour cipher over bitstrings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] 
ISEC201937 SITE201931 BioX201929 HWS201932 ICSS201935 EMM201940 pp.215220 
ISEC 
20180907 10:20 
Tokyo 
KikaiShinkoKaikan Bldg. 
On AND/OR Composition of the ZKBoo Protocols Hiroaki Anada (U. Nagasaki) ISEC201853 
The ZKBoo protocol, which was presented at USENIX Security '16, is a kind of sigmaprotocol. Since the presentation it i... [more] 
ISEC201853 pp.2324 
HWS, ISEC, SITE, ICSS, EMM, IPSJCSEC, IPSJSPT [detail] 
20180726 14:10 
Hokkaido 
Sapporo Convention Center 
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC201846 SITE201838 HWS201843 ICSS201849 EMM201845 
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] 
ISEC201846 SITE201838 HWS201843 ICSS201849 EMM201845 pp.363370 
ISEC 
20180516 16:00 
Tokyo 
Ookayama Campus, Tokyo Institute of Technology 
[Invited Talk]
Quantum Multicollision Finding Algorithm
 from ASIACRYPT 2017  Akinori Hosoyamada, Yu Sasaki, Keita Xagawa (NTT) ISEC201810 
We introduce the paper ``Quantum Multicollision Finding Algorithm'' by Akinori Hosoyamada, Yu Sasaki, Keita Xagawa, whic... [more] 
ISEC201810 p.59 
ICSS, IPSJSPT 
20180307 13:50 
Hokkaido 
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center 
An analysis of the GuoJohanssonStankovski attack against QCMDPC codes Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS201757 
In ASIACRYPT 2016, the GuoJohanssonStankovski (GJS) attack appears as a keyrecovery attack against codebased encryp... [more] 
ICSS201757 pp.3742 
ISEC 
20170904 14:55 
Tokyo 
KikaiShinkoKaikan Bldg. 
New Public Key Encryption Scheme based on Code and Multivariate Polynomials in Binary Field Tomoyuki Okubo, Bagus Santoso (UEC) ISEC201745 
In this paper, we try to combine the codebased public key encryption scheme, McEliece public key encryption scheme, and... [more] 
ISEC201745 pp.2933 
ISEC, WBS, IT 
20170310 12:10 
Tokyo 
TOKAI University 
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2016122 ISEC2016112 WBS201698 
Recent research has shown that signature schemes created using FiatShamir transformation might be insecure against quan... [more] 
IT2016122 ISEC2016112 WBS201698 pp.149154 
ISEC 
20160902 13:25 
Tokyo 
KikaiShinkoKaikan Bldg. 
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC201643 
Authors propose a homomorphic publickey encryption whose security is based on a LWElike problem related to indetermina... [more] 
ISEC201643 pp.2734 
IT, ISEC, WBS 
20160311 11:15 
Tokyo 
The University of ElectroCommunications 
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015134 ISEC201593 WBS2015117 
Multivariate public key cryptsystem (MPKC) is one candidate for postquantum cryptosystem. For the signature scheme Rain... [more] 
IT2015134 ISEC201593 WBS2015117 pp.205210 
ICSS, ISEC, SITE, EMM, IPSJCSEC, IPSJSPT [detail] 
20140704 10:40 
Hokkaido 
SanRefure Hakodate 
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC201433 SITE201428 ICSS201437 EMM201433 
Since its introduction in 1996, the cryptosystem NTRU has become a wellestablished candidate for the next generation pu... [more] 
ISEC201433 SITE201428 ICSS201437 EMM201433 pp.239246 
EMM, ISEC, SITE, ICSS, IPSJCSEC, IPSJSPT [detail] 
20120720 16:15 
Hokkaido 

Construction of the TsujiiShamirKasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC201239 SITE201235 ICSS201241 EMM201231 
A new multivariate publickey cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more] 
ISEC201239 SITE201235 ICSS201241 EMM201231 pp.213216 
ISEC 
20111214 16:50 
Tokyo 
KikaiShinkoKaikan Bldg. 
[Invited Talk]
PublicKey Identification Schemes based on Multivariate Quadratic Polynomials Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC201172 
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] 
ISEC201172 p.39 
ISEC, IPSJCSEC, SITE, ICSS [detail] 
20100702 09:00 
Aomori 
Hirosaki University 
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC201023 SITE201019 ICSS201029 
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] 
ISEC201023 SITE201019 ICSS201029 pp.107112 
ISEC, IPSJCSEC, SITE, ICSS [detail] 
20100702 09:25 
Aomori 
Hirosaki University 
Improvement of Rainbow MPKC Signature system Masahito Gotaishi (Chuo Univ.) ISEC201024 SITE201020 ICSS201030 
Rainbow signature system is making effective use of the advantage of
multivariate public key cryptosystem (MPKC) and o... [more] 
ISEC201024 SITE201020 ICSS201030 pp.113117 
ISEC 
20091216 16:10 
Tokyo 
KikaiShinkoKaikan Bldg. 
Improvement of the Internal Perturbation Modifier
 An example of Perturbed MatsumotoImai  Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC200978 
Internal Perturbation is among the modifiers of Multivariate Public Key Cryptosystems designed to reinforce the existing... [more] 
ISEC200978 pp.5155 