Kyushu University Academic Staff Educational and Research Activities Database
Researcher information (To researchers) Need Help? How to update
Kouichi Sakurai Last modified date:2018.06.21

Graduate School
Undergraduate School
Other Organization

Academic Degree
Country of degree conferring institution (Overseas)
Field of Specialization
Cryptography and Information Security
Total Priod of education and research career in the foreign country
Outline Activities
Kouichi Sakurai received the B.S. degree in mathematics from the Faculty of Science, Kyushu University in 1986. He received the M.S. degree in applied science in 1988, and the Doctorate in engineering in 1993 from the Faculty of Engineering, Kyushu University. He was engaged in research and development on cryptography and information security at the Computer and Information Systems Laboratory at Mitsubishi Electric Corporation from 1988 to 1994. From 1994, he worked for the Dept. of Computer Science of Kyushu University in the capacity of associate professor, and became a full professor there in 2002. He is concurrently working also with the Institute of Systems & Information Technologies and Nanotechnologies, as the chief of Information Security laboratory, for promoting research co-oporations among the industry, university and government under the theme "Enhancing IT-security in social systems". He has been successful in generating such co-operation between Japan, China and Korea for security technologies as the leader of a Cooperative International Research Project supported by the National Institute of Information and Communications Technology (NICT) during 2005-2006. Moreover, in March 2006, he established research co-oporations under a Memorandum of Understanding in the field of information security with Professor Bimal Kumar Roy, the first time Japan has partnered with The Cryptology Research Society of India (CRSI). Professor Sakurai has published more than 250 academic papers around cryptography and information security (See:
Research Interests
  • AI-security
    keyword : Artificial Intelligence, Adversarial Machine Learning
  • Cyber Security
    keyword : Network, AI
  • Design and Analysis of Cryptographic Algorithms
    keyword : common-key cryptosyetms, security evaluation
  • Network Security Economics
    keyword : Game Theory
  • Cryptography and Informatin Security
    keyword : Information Security, Cryptography, Internet Protocol, Mobile Technology, Web Application, Operating System
Current and Past Project
  • Based on the Memorandum of Understanding concluded between Japan Science and Technology Agency ("JST") and Department of Science and Technology (“DST”) of the Government of India on DEC.8.2006, JST and DST have initiated a programme for joint funding of Japanese -Indian cooperative research projects in the area of “Multidisciplinary Research Field, which combines Information and Communications Technology with Other Fields” (“Multidisciplinary ICT”). The funding will be mainly allocated to enhance bilateral research collaboration with a special emphasis on enhancing exchange visits or joint meetings of scientists of both countries. Successful projects will be funded for a period of three years. "Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science" as one of this joint-projects is led by Prof. SAKURAI of Japanese-side and Prof. ROY of Indian-side started from 2008 . Our project has gained research fund from Japan Science and Technology Agency and Department of Science and Technology of the Government of India.
Academic Activities
1. Tomohisa ISHIKAWA, Kouichi Sakurai, A proposal of event study methodology with Twitter sentimental analysis for risk management., Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017, Beppu, Japan, January 5-7, 2017. ACM 2017, , 2017.01, [URL].
2. Takanori SSUGA, Takashi NISHIDE, Kouichi Sakurai, Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. , Security and Communication Networks , DOI: 10.1002/sec.876, 9, (12), 1717-1725, 2016.08, [URL].
3. Chunlu Chen, Hiroaki ANADA, Junpei Kawamoto, Kouichi Sakurai, A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints, Journal of Internet Services and Information Security, Volume 6, 2016.05, Internet service has enabled digital contents to be shared faster and easier, but on the other side it raised an issue of illegal copy of the digital contents. Public key encryption schemes solve this issue partially. However, there is still a weak point that the secret key is not completely protected; that is, public key encryption schemes suffer from illegal copy of secret keys (the key-cloning problem). In this paper, first, we discuss the usability of terminal fingerprints for key-cloning protection. Next, we propose a hybrid encryption scheme using terminal fingerprints to protect the secret keys from the key-cloning. Based on an assumption that the terminal fingerprint is unchangeable and unextractable even by the user of the terminal, our hybrid encryption scheme can be effectively used as a method of the key-cloning protection. Then, we instantiate our hybrid encryption scheme as a combination of the attribute-based encryption scheme and the RSA encryption scheme; the attribute-based encryp- tion scheme functions as a mechanism for authentication of user’s attributes, and the RSA encryption scheme functions as a mechanism for authentication of a terminal device. Terminal fingerprint that is a feature of the device is used to generate a secret key of the RSA encryption..
4. Angsuman Das, Avisheck Adhikari, Kouichi Sakurai, PLAINTEXT CHECKABLE ENCRYPTION WITH DESIGNATED CHECKER, ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 10.3934/amc.2015.9.37, 9, 1, 37-53, 2015.02.
5. Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake,, Toshiaki Tanaka, Kouichi Sakurai, Fast Implementation of KCipher-2 for Software and Hardware, IEICE Trans., 97, D(1), 43-52, 2014.01.
6. Sushimita Ruj, Kouichi Sakurai, Secure and Privacy Preserving Hierarchical Wireless Sensor Networks using Hybrid Key Management Technique, 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 10.1109/GLOCOM.2013.6831104, 402-407, 2013.12.
7. Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:, K2: A Stream Cipher Algorithm using Dynamic Feedback Control., SECRYPT 2007, 204-213, 2007.07, 2005年からKDDI研究所と共同で設計開発した
高速ストリーム暗号 アルゴリズムであり、KDDI研と下名が共同で設計し、KDDI研によって商用化された高速ストリーム暗号アルゴリズムである。
1. Kouichi SAKURAI, Non-commutative approach enhance security of cryptosytems ?—    from Ong-Schnorr-Shamir via Sato-Araki towards Post Quantum Paradigm --, 4th International Conference on Mathematics and Computing, 2018.01.
2. Kouichi SAKURAI, Power and limitation of Adversarial Machine Learning an thdeir consequences, The Conference for ICT-Research in the Netherlands, 2018.03, [URL].
3. , [URL].
4. , [URL].
5. Kouichi Sakurai, Anti-forensic Aspects in Biometric Authentication Protocols:
Receipt-freeness, Coercion-Resistance, and Undeniability, UAE Cyber Security Workshop, 2016.04, [URL].
6. Kouichi Sakurai, New infrastructure and applications developed from a cryptocurrency BITCOIN and a platform ETHEREUM, ICoICT 2015 (The 3rd International Conference of Information and Communication Technology), 2015.05, [URL], Bitcoin is a peer-to-peer payment system and digital currency designed by the inventor named Satoshi Nakamoto. In this talk, we overview the current status of BITCOIN including problems from recent news. We also discuss a new cryptographic infrastructure inspired by BITCOIN, which is a kind of Decentralized Cryptographic system, whereas the traditional PKI is purely centralized. We further consider new applications with such decentralized cryptographic infrastructure including digital right management service. The state of the art with ETHEREUM, a platform for decentralized application which is inspired from BITCOIN, is also reported..
Membership in Academic Society
  • Japanese Society for Artificial Intelligence
  • Japan Society for Industrial and Applied Mathematic
  • Implementation and Evaluation of Host Independent Network Detection System on OpenFlow Controller
    1 Kyushu University
    2 Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
  • “Parallelization of QUAD Stream Cipher using Linear Recurring Sequences on Graphics Processing Units” Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda and Kouichi Sakurai
Other Educational Activities
  • 2017.11.