Presentation 2017-12-21
[Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. This method attracts attention since it enables privacy-preserving data analysis on sensitive data. Although secure computation had not been used in practice due to its inefficiency, the efficiency of secure computation has been improved greatly, and recently several implementations are used in practice. In this talk, we provide brief introduction of secure computation, and several studies for improving efficiency. Especially, we try to explain why secure computation will be inefficient, why we require a tailor-maid algorithm for secure computation, and how to construct it.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) secure computation / secure multiparty computation / privacy-preserving data analysis / secret sharing / cryptography / data-obliviousness
Paper # ISEC2017-78,COMP2017-32
Date of Issue 2017-12-14 (ISEC, COMP)

Conference Information
Committee ISEC / COMP
Conference Date 2017/12/21(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Eikokuji Campus, Kochi University of Technology
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair Kazuto Ogawa(NHK) / Hiro Ito(Univ. of Electro-Comm.)
Vice Chair Atsushi Fujioka(Kanagawa Univ.) / Shiho Moriai(NICT) / Yushi Uno(Osaka Pref. Univ.)
Secretary Atsushi Fujioka(Tohoku Univ.) / Shiho Moriai(Tokai Univ.) / Yushi Uno(Seikei Univ.)
Assistant Keita Emura(NICT) / Yuichi Komano(TOSHIBA) / Yuuji Suga(IIJ)

Paper Information
Registration To Technical Committee on Information Security / Technical Committee on Theoretical Foundations of Computing
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) [Invited Talk] Foundations and practical studies of secure computation
Sub Title (in English)
Keyword(1) secure computation
Keyword(2) secure multiparty computation
Keyword(3) privacy-preserving data analysis
Keyword(4) secret sharing
Keyword(5) cryptography
Keyword(6) data-obliviousness
1st Author's Name Ryo Kikuchi
1st Author's Affiliation Nippon Telegraph and Telephone Corporation(NTT)
Date 2017-12-21
Paper # ISEC2017-78,COMP2017-32
Volume (vol) vol.117
Number (no) ISEC-369,COMP-370
Page pp.pp.41-41(ISEC), pp.41-41(COMP),
#Pages 1
Date of Issue 2017-12-14 (ISEC, COMP)