Updated on 2025/04/06

Information

 

写真a

 
IKEMATSU YASUHIKO
 
Organization
Institute of Mathematics for Industry Laboratory of Mathematical Design for Advanced Cryptography Associate Professor
School of Sciences Department of Mathematics(Concurrent)
Graduate School of Mathematics Department of Mathematics(Concurrent)
Joint Graduate School of Mathematics for Innovation (Concurrent)
School of Engineering Department of Electrical Engineering and Computer Science(Concurrent)
Title
Associate Professor
Contact information
メールアドレス
Profile
量子計算機でも解読困難とされる耐量子計算機暗号の開発について研究しています。特に、そのようなものの中で、多変数二次連立方程式の求解困難性に基いて構成される多変数多項式暗号に興味があります。有力な耐量子計算機暗号の候補とされていますが、公開鍵サイズが大きいことや、グレブナー基底を用いた解析が不十分であるなどの問題があり、それらの解決を目指し、研究を行なっています。
External link

Research Areas

  • Informatics / Information security

Degree

  • Doctor of Mathematical Science

Research History

  • The University of Tokyo 大学院情報理工学系研究科 Academic Researcher 

    2018.4 - 2018.12

Education

  • Kyushu University   理学部   数学科

    2004.4 - 2008.3

      More details

    Country:Japan

Research Interests・Research Keywords

  • Research theme: Cryptography, Multivariate Public Key Cryptosystem

    Keyword: Cryptography, Multivariate Public Key Cryptosystem

    Research period: 2016.4

Awards

  • APKC 2024 Best Paper Award

    2024.7   the 11th ACM Workshop on ASIA Public-Key Cryptography   Revisiting the security analysis of SNOVA

    Yasuhiko Ikematsu, Rika Akiyama

     More details

    Award type:Award from international society, conference, symposium, etc. 

  • 2023年WISA2023 Best Paper Award

    2023.8   WISA2023   A security analysis on MQ-Sign

  • 2023年IWSEC2023 Best Student Paper Award

    2023.8   IWSEC2023   A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack

  • 辻井重男セキュリティ論文賞 特別賞

    2022.10   日本セキュリティ・マネジメント学会   A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV

  • 2019年度 Journal of Information Processing Outstanding Paper Award

    2020.4   情報処理学会   Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

  • Journal of Information Processing, Specially Selected Paper

    2019.10   情報処理学会   Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

  • IWSEC2018 BEST PAPER AWARD

    2018.9   電子情報通信学会  

▼display all

Papers

  • Recent Progress in the Security Evaluation of Multivariate Public-Key Cryptography Invited Reviewed International journal

    Yasuhiko Ikematsu, @Shuhei Nakamura, @Tsuyoshi Takagi

    IET Information Security   2022.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Repository Public URL: https://hdl.handle.net/2324/7178624

  • Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System" Reviewed International journal

    Yasuhiko Ikematsu, @Shuhei Nakamura

    Proceedings of the Seventh International Conference on Mathematics and Computing   1412   9 - 21   2022.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV Reviewed International journal

    @Hiroki Furue, Yasuhiko Ikematsu, @Yutaro Kiyomura, @Tsuyoshi Takagi

    Lecture Notes in Computer Science   13093   187 - 217   2021.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Repository Public URL: https://hdl.handle.net/2324/7178625

  • Hybrid meet-in-the-middle-attacks for the isogeny path-finding problem Reviewed International journal

    Yasuhiko Ikematsu, Ryoya Fukasaku, @Momonari Kudo, Masaya Yasuda, @Katsuyuki Takashima, @Kazuhiro Yokoyama

    Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography   2020.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Local theta lift for p-adic unitary dual pairs U(2)×U(1) and U(2)×U(3) Reviewed International journal

    Yasuhiko Ikematsu

    Kyoto Journal of Mathematics   Vol. 59 ( No. 4 )   1075 - 1110   2019.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Repository Public URL: https://hdl.handle.net/2324/7178623

  • Efficient decryption algorithms for extension field cancellation type encryption schemes International journal

    Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi

    23rd Australasian Conference on Information Security and Privacy, ACISP 2018 Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings   487 - 501   2018.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-93638-3_28

  • HFERP - A new multivariate encryption scheme International journal

    Yasuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates

    9th International Conference on Post-Quantum Cryptography, PQCrypto 2018 Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings   396 - 416   2018.4

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-79063-3_19

  • An efficient key generation of ZHFE public key cryptosystem Reviewed International journal

    Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E101A ( 1 )   29 - 38   2018.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E101.A.29

  • Revisiting the Efficient Key Generation of ZHFE Reviewed International journal

    Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi

    Proceedings of the International Conference on Codes, Cryptology, and Information Security   195 - 212   2017.3

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

  • Parameterizing Time-Memory Trade-off for Flexible Implementation of CRYSTALS-Dilithium Reviewed International journal

    Yasushi Takahashi, Naohisa Nishida, Yuji Unagami, Saburo Toyonaga, Naoto Yanai, Yasuhiko Ikematsu, Koji Nuida, Masaya Yasuda

    Proceedings of SECITC 2024, Lecture Notes in Computer Science (LNCS)   15595   2025.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

  • A New Cryptanalysis Against UOV-Based Variants MAYO, QR-UOV and VOX

    FURUE Hiroki, IKEMATSU Yasuhiko

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E108.A ( 3 )   174 - 182   2025.3   ISSN:09168508 eISSN:17451337

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Multivariate public-key cryptography (MPKC) is considered as one of the main candidates for post-quantum cryptography (PQC). In MPKC, the MinRank attacks, which try to solve the MinRank problem obtained from a public key, are important since a lot of multivariate schemes are broken by these attacks. Among them, the rectangular MinRank attack was recently proposed for the Rainbow scheme by Beullens, and it tries to solve a new kind of MinRank problem obtained by transforming the public key of Rainbow. Due to this attack, it is known that the security level of Rainbow was reduced. Rainbow is a multi-layered variant of the UOV scheme, and UOV is considered having a resistance to all MinRank attacks since its public key consists of full rank matrices. Recently, there have been submitted three new variants of the UOV scheme having a small public key, MAYO, QR-UOV and VOX in the NIST PQC standardization of additional digital signature schemes. In this paper, we show that the rectangular MinRank attack is applicable to MAYO, QR-UOV and VOX. Moreover, we estimate the complexity of the attack. In particular, we report that all the parameter sets of VOX submitted to NIST PQC standardization are broken in at most 2^55 gate operations.

    DOI: 10.1587/transfun.2024cip0003

    Scopus

    CiNii Research

  • A survey on small public key signature schemes derived from UOV signature scheme Reviewed International journal

    Yasuhiko Ikematsu

    Mathematical Foundations for Post-Quantum Cryptography, Mathematics for Industry   2025.1

     More details

    Authorship:Lead author, Last author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer  

    Multivariate public key cryptosystems (MPKC) are constructed based on the computational difficulty of solving quadratic equations (MQ problem), and are being studied as promising candidates for post-quantum cryptography (PQC). UOV is a multivariate signature scheme and is a very fast scheme with a small signature size, however, its main drawback lies in its large public key. Recently, some variants of UOV have been proposed in order to reduce the public key size, and have been submitted to the additional NIST PQC standardization which started in 2022. It will be important for the future progress of the additional NIST PQC standardization to understand these variants. In this paper, we provide an overview of UOV and variants MAYO, QR-UOV submitted to the additional NIST PQC standardization.

  • Hilbert series for systems of UOV polynomials Reviewed International journal

    Yasuhiko Ikematsu, @Tsunekazu Saito

    IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Cryptography and Information Security)   Vol.E107-A ( No. 3 )   275 - 282   2024.3

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)  

    Multivariate public key cryptosystems (MPKC) are constructed based on the problem of solving multivariate quadratic equations (MQ problem). Among various multivariate schemes, UOV is an important signature scheme since it is underlying some signature schemes such as MAYO, QR-UOV, and Rainbow which was a finalist of NIST PQC standardization project. To analyze the security of a multivariate scheme, it is necessary to analyze the first fall degree or solving degree for the system of polynomial equations used in specific attacks. It is known that the first fall degree or solving degree often relates to the Hilbert series of the ideal generated by the system. In this paper, we study the Hilbert series of the UOV scheme, and more specifically, we study the Hilbert series of ideals generated by quadratic polynomials used in the central map of UOV. In particular, we derive a prediction formula of the Hilbert series by using some experimental results. Moreover, we apply it to the analysis of the reconciliation attack for MAYO.

    DOI: https://doi.org/10.1587/transfun.2023CIP0019

  • Revisiting the security analysis of SNOVA

    Yasuhiko Ikematsu,@Rika Akiyama

    2024 Symposium on Cryptography and Information Security (SCIS2024)   2024.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • UOV多項式系に対するRectangular MinRank攻撃の計算量評価についての考察

    池松 泰彦, @古江 弘樹

    2024 Symposium on Cryptography and Information Security (SCIS2024)   2024.1

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • More Efficient Software Implementation of QR-UOV

    @Fumitaka Hoshino, @Hiroki Furue, Yasuhiko Ikematsu, @Tsuyoshi Takagi, @Kan Yasuda, @Toshiyuki Miyazawa, @Akira Nagai, @Rika Akiyama, @Koha Kinjo

    2024 Symposium on Cryptography and Information Security (SCIS2024)   2024.1

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • Further Security Analysis for Multivariate Polynomial Signature Scheme QR-UOV

    @Hiroki Furue, Yasuhiko Ikematsu, @Fumitaka Hoshino, @Tsuyoshi Takagi, @Kan Yasuda, @Toshiyuki Miyazawa, @Akira Nagai, @Rika Akiyama, @Koha Kinjo

    2024 Symposium on Cryptography and Information Security (SCIS2024)   2024.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • ハイブリッドStreaming法によるCRYSTALS-Dilithiumのリソース最適化

    @高橋 康, @西田 直央, @海上 勇二, @豊永 三朗, 池松 泰彦, 縫田 光司, @安田 雅哉

    2024 Symposium on Cryptography and Information Security (SCIS2024)   2024.1

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • A security analysis on MQ-Sign Reviewed International journal

    Yasuhiko Ikematsu, @Hyungrok Jo, @Takanori Yasuda

    Proceedings of the 24th World Conference on Information Security Applications (WISA 2023)   LNCS 14402   40 - 51   2024.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Repository Public URL: https://hdl.handle.net/2324/7178618

  • A survey on small public key signature schemes derived from UOV signature scheme Reviewed

    Ikematsu Yasuhiko

    Mathematical Foundations for Post-Quantum Cryptography, Mathematics for Industry, Springer   -   2024

     More details

  • A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack Reviewed International journal

    @Hiroki Furue, Yasuhiko Ikematsu

    Proceedings of IWSEC 2023   LNCS 14128   101 - 116   2023.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Repository Public URL: https://hdl.handle.net/2324/7178622

  • 韓国PQC標準化計画(KpqC)で提案されたMQ-Signの安全性解析

    池松 泰彦, @趙 亨騄, @安田 貴徳

    電子情報通信学会技術研究報告   Vol.123 ( No.129 )   113 - 118   2023.7

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • A New Analysis of the Kipnis-Shamir Method Solving the MinRank Problem Reviewed International journal

    @Shuhei Nakamura, Yasuhiko Ikematsu, @Yacheng Wang

    IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Cryptography and Information Security)   203 - 211   2023.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • 不定方程式暗号のソフトウェア実装における高速化について

    #真島 侑斗, 池松 泰彦, @秋山 浩一郎, 縫田 光司

    2023 Symposium on Cryptography and Information Security (SCIS2023)   2023.1

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • Efficient Software Implementation of Signature Scheme QR-UOV

    @Fumitaka Hoshino, @Hiroki Furue, Yasuhiko Ikematsu, @Tsunekazu Saito, @Yutaro Kiyomura, @Tsuyoshi Takagi

    2023 Symposium on Cryptography and Information Security (SCIS2023)   2023.1

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • Secure Parameters for Multivariate Polynomial Signature Scheme QR-UOV

    @古江 弘樹, 池松 泰彦, @星野 文学, @清村 優太郎, @齋藤 恆和, @高木 剛

    2023 Symposium on Cryptography and Information Security (SCIS2023)   2023.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • A MinRank attack against variants of UOV signature scheme

    Hiroki Furue, Yasuhiko Ikematsu

    2023 Symposium on Cryptography and Information Security (SCIS2023)   2023.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask Reviewed International journal

    @Yuntao Wang, Yasuhiko Ikematsu, @Takanori Yasuda

    ProvSec 2022   2022.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 近似イデアルGCD問題に基づく不定方程式暗号のC言語による実装とKaratsuba法による高速化について

    #真島 侑斗, 池松 泰彦, @秋山 浩一郎

    Computer Security Symposium 2022 (CSS2022)   2022.10

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • 同種写像暗号CSIDHのHesse曲線による構成

    @小濱 大輝,#野本 慶一郎, 池松 泰彦, 縫田 光司, 小林 真一

    Computer Security Symposium 2022 (CSS2022)   2022.10

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • UOV多項式系に対するHilbert級数について

    池松 泰彦, @清村 優太郎, @齋藤 恆和

    Computer Security Symposium 2022 (CSS2022)   2022.10

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability Reviewed International journal

    @Bagus Santoso, @Shuhei Nakamura, Yasuhiko Ikematsu, @Takanori Yasuda

    ISITA2022   2022.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Recent progress in the security evaluation of multivariate public‐key cryptography

    Ikematsu Yasuhiko, Nakamura Shuhei, Takagi Tsuyoshi

    IET Information Security   17 ( 2 )   210 - 226   2022.9   ISSN:17518709 eISSN:17518717

     More details

    Language:English   Publisher:Institution of Engineering and Technology (IET)  

    Multivariate public-key cryptography (MPKC) is considered a leading candidate for post-quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field. In this paper, we survey some recent progress in the security analysis of MPKC. Among various existing multivariate schemes, the most important one is the Rainbow signature scheme proposed by Ding et al. in 2005, which was later selected as a finalist in the third round of the PQC standardization project by the National Institute of Standards and Technology. Under the circumstances, some recent research studies in MPKC have focussed on the security analysis of the Rainbow scheme. In this paper, the authors first explain efficient algorithms for solving the MQ problem and the research methodology for estimating their complexity in MPKC. Then, the authors survey some recent results related to the security analysis of the Rainbow scheme. In particular, the authors provide a detailed description of the complexity analysis for solving the bi-graded polynomial systems studied independently by Nakamura et al. and Smith-Tone et al., and then expound the rectangular MinRank attack against Rainbow proposed by Beullens.

    CiNii Research

  • Introduction to algebraic approaches for solving isogeny path-finding problems (Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties)

    FUKASAKU Ryoya, IKEMATSU Yasuhiko, KUDO Momonari, YASUDA Masaya, YOKOYAMA Kazuhiro

    RIMS Kokyuroku Bessatsu   B90   169 - 184   2022.6   ISSN:18816193

     More details

    Language:English   Publisher:Research Institute for Mathematical Sciences, Kyoto University  

    The isogeny path-finding is a computational problem that finds an isogeny connecting two given isogenous elliptic curves. The hardness of the isogeny path-finding problem supports the fundamental security of isogeny-based cryptosystems. In this paper, we introduce an algebraic approach for solving the isogeny path-finding problem. The basic idea is to reduce the isogeny problem to a system of algebraic equations using modular polynomials, and to solve the system by Gröbner basis computation. We report running time of the algebraic approach for solving the isogeny path-finding problem of 3-power isogeny degrees on supersingular elliptic curves. This is a brief summary of [16] with implementation codes.

    CiNii Research

  • Introduction to algebraic approaches for solving isogeny path-finding problems Invited Reviewed International journal

    @Ryoya Fukasaku, Yasuhiko Ikematsu, @Momonari Kudo, @Masaya Yasuda, @Kazuhiro Yokoyama

    RIMS Kokyuroku Bessatsu (Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties)   2022.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A study on randomness used in signature generation of UOV Reviewed International journal

    Yasuhiko Ikematsu

    Proceedings of the Seventh International Conference on Mathematics and Computing   1412   39 - 50   2022.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A study of the Kipnis-Shamir approach against the Rainbow signature scheme

    Yasuhiko Ikematsu, @Shuhei Nakamura

    2022 Symposium on Cryptography and Information Security (SCIS2022)   2022.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • 近似イデアルGCD問題に基づく不定方程式暗号のバリエーションについて

    @秋山 浩一郎, 池松 泰彦

    2022 Symposium on Cryptography and Information Security (SCIS2022)   2022.1

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • New Post-Quantum Digital Signature Scheme based on MinRank Problem

    @Bagus Santoso, Yasuhiko Ikematsu, @Shuhei Nakamura, @Takanori Yasuda

    2022 Symposium on Cryptography and Information Security (SCIS2022)   2022.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • New complexity estimation on the Rainbow-Band-Separation attack Reviewed International journal

    @Shuhei Nakamura, Yasuhiko Ikematsu, @Yacheng Wang, @Tsuyoshi Takagi

    Theoretical Computer Science   896   1 - 18   2021.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials Reviewed International journal

    Yasuhiko Ikematsu, @Shuhei Nakamura, @Bagus Santoso, @Takanori Yasuda

    Lecture Notes in Computer Science   13007   235 - 250   2021.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Repository Public URL: https://hdl.handle.net/2324/7174454

  • MinRank Based Three-Pass Identification Scheme with Half Cheating Probability

    @Bagus Santoso, Yasuhiko Ikematsu, @Shuhei Nakamura , @Takanori Yasuda

    Computer Security Symposium 2021 (CSS2021)   2021.10

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • A Trace Map Attack Against Special Ring-LWE Samples Reviewed International journal

    Yasuhiko Ikematsu, @Satoshi Nakamura, @Masaya Yasuda

    Lecture Notes in Computer Science   12835   3 - 22   2021.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 耐量子計算機暗号におけるグレブナー基底攻撃の計算量評価について

    池松 泰彦, 深作 亮也, @中村 周平, @坂田 康亮, @工藤 桃也, @王 亜成, @高島 克幸

    数式処理 Bulletin of JSSAC (2021)   Vol.27 ( No.2 )   33 - 36   2021.8

     More details

    Language:Japanese   Publishing type:Research paper (bulletin of university, research institution)  

  • Dynamic Self-dual DeepBKZ Lattice Reduction with Free Dimensions Reviewed International journal

    #Satoshi Nakamura, Yasuhiko Ikematsu, Masaya Yasuda

    Proceedings of the Sixth International Conference on Mathematics and Computing   377 - 391   2020.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: https://doi.org/10.1007/978-981-15-8061-1

  • Algebraic approaches for solving isogeny problems of prime power degrees Reviewed International journal

    #Yasushi Takahashi, @Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, @Kazuhiro Yokoyama

    Journal of Mathematical Cryptology   15 ( 1 )   31 - 44   2020.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Solving the Search-LWE Problem by Lattice Reduction over Projected Bases Reviewed International journal

    #Satoshi Nakamura, #Nariaki Tateiwa, @Koha Kinjo, Yasuhiko Ikematsu, Masaya Yasuda, Katsuki Fujisawa

    Proceedings of the Sixth International Conference on Mathematics and Computing   29 - 42   2020.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: https://doi.org/10.1007/978-981-15-8061-1_3

  • Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack Reviewed International journal

    @Yuntao Wang, Yasuhiko Ikematsu, @Koichi Akiyama, @Tsuyoshi Takagi

    Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography   2020.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Revisiting the Minrank Problem on Multivariate Cryptography Reviewed International journal

    @Yacheng Wang, Yasuhiko Ikematsu, @Shuhei Nakamura, @Tsuyoshi Takagi

    21st World Conference on Information Security Applications   2020.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Structual Attack on Bloch-Anti-Circulant UOV at SAC 2019 Reviewed International journal

    Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi

    Proceedings of the International Conference on Post-Quantum Cryptography (PQCrypto 2020)   323 - 339   2020.4

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC Reviewed International journal

    Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi

    IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Discrete Mathematics and Its Applications)   Volume E102.A ( Issue 9 )   1028 - 1036   2019.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 Reviewed International journal

    Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi

    Journal of Information Processing   Vol. 27   517 - 524   2019.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme Invited Reviewed International journal

    Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi

    Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018   389 - 393   2018.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 Reviewed International journal

    Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi

    Proceedings of the 13th International Workshop on Security (IWSEC 2018)   3 - 18   2018.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

▼display all

Books

Presentations

  • Revisiting the security analysis of SNOVA International conference

    Yasuhiko Ikematsu

    The 11th ACM ASIA Public-Key Cryptography Workshop (APKC2024)  2024.7 

     More details

    Event date: 2024.7

    Language:English   Presentation type:Oral presentation (general)  

    Venue:Singapore  

  • New security analysis for UOV-based signature candidates with small public key size Invited International conference

    Yasuhiko Ikematsu

    5th NIST PQC Standardization conference  2024.4  National Institute of Standards and Technology (NIST)

     More details

    Event date: 2024.4

    Language:English   Presentation type:Oral presentation (invited, special)  

    Venue:Rockville, Maryland  

  • UOV署名方式に付随するHilbert級数について

    池松泰彦

    IMI暗号学セミナー  2022.7 

     More details

    Event date: 2023.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:九州大学   Country:Japan  

  • 多変数多項式暗号の最近の進展について Invited

    池松 泰彦

    金沢暗号理論勉強会  2021.6 

     More details

    Event date: 2021.6

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • 耐量子計算機暗号におけるグレブナー基底攻撃の計算量評価について

    池松 泰彦

    日本数式処理学会第29回大会  2020.11 

     More details

    Event date: 2021.5

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • Hybrid meet-in-the-middle attacks for the isogeny path-finding problem International conference

    Yasuhiko Ikematsu

    The 7th ACM ASIA Public-Key Cryptography Workshop (APKC 2020)  2020.10 

     More details

    Event date: 2020.10

    Language:English   Presentation type:Symposium, workshop panel (public)  

    Venue:オンライン   Country:Japan  

  • 多変数連立二次方程式の求解困難性を利用した暗号の構成について Invited

    池松 泰彦

    シンポジウム 暗号数理の現状と未来  2019.11 

     More details

    Event date: 2020.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:金沢   Country:Japan  

  • Local theta lift for U(2)×U(3)

    池松 泰彦

    RIMS研究集会 保型形式・保型的L関数とその周辺  2016.2 

     More details

    Event date: 2020.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:京都   Country:Japan  

  • The description of local theta lift for U(2)×U(3) Invited International conference

    Yasuhiko Ikematsu

    The 16th Korea-Japan Workshop on Algebra and Combinatorics  2018.2 

     More details

    Event date: 2020.4

    Language:English   Presentation type:Oral presentation (general)  

    Venue:韓国   Country:Korea, Republic of  

  • The multivariate encryption scheme HFERP Invited

    池松 泰彦

    量子情報社会に向けた数理的アプローチ  2018.9 

     More details

    Event date: 2020.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:福岡   Country:Japan  

  • Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 International conference

    Yasuhiko Ikematsu

    13th International Workshop on Security, IWSEC 2018  2018.9 

     More details

    Event date: 2018.9

    Language:English  

    Venue:Sendai   Country:Japan  

  • Revisiting the efficient key generation of ZHFE International conference

    Yasuhiko Ikematsu

    2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017  2017.4 

     More details

    Event date: 2017.4

    Language:English  

    Venue:Rabat   Country:Morocco  

  • 多変数署名方式とその安全性解析について Invited

    池松泰彦

    第7回情報数理セミナー  2024.8 

     More details

    Event date: 2024.8

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:日本大学  

  • UOV署名方式とその改良

    池松泰彦

    耐量⼦署名⽅式の設計と安全性の数理  2024.7  九州大学マス・フォア・インダストリ研究所

     More details

    Event date: 2024.7

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:九州大学  

  • Revisiting the security analysis of SNOVA

    池松泰彦

    2024 Symposium on Cryptography and Information Security (SCIS2024)  2024.1 

     More details

    Event date: 2024.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:長崎   Country:Japan  

  • UOV多項式系に対するRectangular MinRank攻撃の計算量評価についての考察

    池松泰彦

    2024 Symposium on Cryptography and Information Security (SCIS2024)  2024.1 

     More details

    Event date: 2024.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:長崎   Country:Japan  

  • 多変数多項式暗号の最近の研究について Invited

    池松泰彦

    耐量子計算機暗号の最新動向  2024.1 

     More details

    Event date: 2024.1

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    Venue:中央大学   Country:Japan  

  • NIST耐量子計算機暗号標準化プロジェクト提案方式: QR-UOV

    @古江 弘樹, 池松 泰彦, @星野 文学, @高木 剛, @安田 幹, @宮澤 俊之, @永井 彰, @秋山 梨佳, @金城 皓羽

    Computer Security Symposium 2023 (CSS2023)  2023.11 

     More details

    Event date: 2023.10 - 2023.11

    Language:Japanese  

    Venue:福岡   Country:Japan  

  • 署名方式Rainbowに対する鍵復元攻撃の解説 Invited

    池松泰彦

    Small-workshop on Communications between Academia and Industry for Security (SCAIS 2023)  2023.1 

     More details

    Event date: 2023.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:小倉   Country:Japan  

  • 多変数多項式暗号2:安全性解析

    池松泰彦

    耐量子計算機暗号と量子情報の数理  2022.8 

     More details

    Event date: 2023.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:九州大学   Country:Japan  

  • UOV多項式系に対するHilbert級数について

    池松泰彦

    Computer Security Symposium 2022 (CSS2022)  2022.10 

     More details

    Event date: 2023.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:熊本   Country:Japan  

  • 多変数多項式暗号の世界 Invited

    池松泰彦

    情報数学セミナー  2022.11 

     More details

    Event date: 2023.4

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:東京大学   Country:Japan  

  • Revisiting the security analysis against 2F method

    池松 泰彦, @Duong Dung, @安田 貴徳

    第19回日本応用数理学会研究部会連合発表会「数理的技法による情報セキュリティ」(FAIS)  2023.3 

     More details

    Event date: 2023.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:岡山理科大学   Country:Japan  

  • Rainbow署名方式に付随するMinRank問題について

    池松 泰彦

    日本応用数理学会第18回研究部会連合発表会  2022.3 

     More details

    Event date: 2022.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • A study of the Kipnis-Shamir approach against the Rainbow signature scheme

    池松 泰彦

    Symposium on Cryptography and Information Security (SCIS2022)  2022.1 

     More details

    Event date: 2022.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • An Indeterminate Equation Scheme having Homomorphic Property

    池松 泰彦

    秘密計算・秘密分散の数理と実用の探求  2021.11 

     More details

    Event date: 2021.11

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • 多変数多項式暗号の構成と安全性解析の研究

    池松 泰彦

    CREST「現代の数理科学と連携するモデリング手法の構築」 成果報告公開シンポジウム  2021.9 

     More details

    Event date: 2021.9

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • Security Analysis on an ElGamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials International conference

    Yasuhiko Ikematsu

    Inscrypt2021  2021.8 

     More details

    Event date: 2021.8

    Language:English   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • A study on randomness used in signature generation of UOV International conference

    Yasuhiko Ikematsu

    The 7th International Conference on Mathematics and Computing (ICMC2021)  2021.3 

     More details

    Event date: 2021.5

    Language:English   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • 近似イデアルGCD問題に基づく不定方程式暗号に対するイデアル分解攻撃の考察

    池松 泰彦

    Symposium on Cryptography and Information Security (SCIS2021)  2021.1 

     More details

    Event date: 2021.5

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • Security analysis on an El-Gamal-like multivariate encryption scheme based on a generalization of IP2S problem

    池松 泰彦

    Symposium on Cryptography and Information Security (SCIS2021)  2021.1 

     More details

    Event date: 2021.5

    Language:English   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • A Vulnerability on an Efficient Signature Generation Using Precomputation for UOV

    池松 泰彦

    コンピュータセキュリティシンポジウム2020 (CSS2020)  2020.10 

     More details

    Event date: 2020.10

    Language:Japanese   Presentation type:Symposium, workshop panel (public)  

    Venue:オンライン   Country:Japan  

  • Hybrid meet-in-the-middle-attacks for the isogeny path-finding problem International conference

    Yasuhiko Ikematsu

    The 12th Workshop among Asia Information Security Labs (WAIS2020)  2020.2 

     More details

    Event date: 2020.4

    Language:English   Presentation type:Oral presentation (general)  

    Venue:東京   Country:Japan  

  • Revisiting the Efficient Key Generation of ZHFE International conference

    Yasuhiko Ikematsu

    The Ninth Workshop among Asia Information Security Labs (WAIS2017)  2017.1 

     More details

    Event date: 2020.4

    Language:English   Presentation type:Oral presentation (general)  

    Venue:佐賀   Country:Japan  

  • A Multivariate Encryption Scheme HFEPR International conference

    Yasuhiko Ikematsu

    The 11th Workshop among Asia Information Security Labs (WAIS2019)  2019.2 

     More details

    Event date: 2020.4

    Language:English   Presentation type:Oral presentation (general)  

    Venue:韓国   Country:Korea, Republic of  

  • Public Key Cryptosystems using Multivariate Polynomials

    Yasuhiko Ikematsu

    IMI Crypto Seminar  2019.8 

     More details

    Event date: 2020.4

    Language:English   Presentation type:Oral presentation (general)  

    Venue:福岡   Country:Japan  

  • An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme International conference

    Yasuhiko Ikematsu

    15th International Symposium on Information Theory and Its Applications, ISITA 2018  2018.10 

     More details

    Event date: 2018.10

    Language:English  

    Venue:Singapore   Country:Singapore  

▼display all

MISC

  • New security analysis for UOV-based signature candidates with small public key size

    Yasuhiko Ikematsu, @Hiroki Furue, @Rika Akiyama

    5th NIST PQC Standardization Conference   2024.3

     More details

    Language:English   Publishing type:Internal/External technical report, pre-print, etc.  

  • 多変数多項式暗号の最近の研究について

    池松 泰彦

    電子情報通信学会誌, Vol.106, No.11   2023.11

     More details

    Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (scientific journal)  

  • 多変数多項式暗号の世界

    池松 泰彦, @安田 貴徳

    数理科学, 2023年7月号, No.721, サイエンス社   2023.7

     More details

    Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (scientific journal)  

Works

  • QR-UOV (Round 2 Additional Signature)

    Hiroki Furue, Yasuhiko Ikematsu, Fumitaka Hoshino, Tsuyoshi Takagi, Haruhisa Kosuge, Kimihiro Yamakoshi, Rika Akiyama, Satoshi Nakamura, Shingo Orihara, Koha Kinjo

    2025.2

     More details

    NTT, 東京大, 長崎県立大と共同開発した署名方式QR-UOVが、米国政府機関NISTのPQC標準化コンペの第2ラウンドに進出した。今回第2ラウンド進出に合わせて安全性証明および処理性能を向上させる実装技術を含む新たな技術仕様書を公開した。また以下のプレスリリースも参照。https://www.kyushu-u.ac.jp/f/60337/25_0120_03.pdf

    Other Link: https://csrc.nist.gov/Projects/pqc-dig-sig/round-2-additional-signatures

  • QR-UOV

    Hiroki Furue, Yasuhiko Ikematsu, Fumitaka Hoshino, Tsuyoshi Takagi, Kan Yasuda, Toshiyuki Miyazawa, Tsunekazu Saito, Akira Nagai

    2023.7

     More details

    Kyushu University, the University of Tokyo, University of Nagasaki and NTT developed a new multivariate signature scheme called QR-UOV. We submitted this signature scheme to Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process of National Institute of Standards and Technology (NIST).

    Other Link: http://info.isl.ntt.co.jp/crypt/qruov/

Professional Memberships

  • 日本数学会

  • 日本応用数理学会

  • 電子情報通信学会

  • 情報処理学会

  • 数式処理学会

Committee Memberships

  • 電子情報通信学会 『Special Section on Cryptography and Information Security』 編集委員会   編集委員   Domestic

    2024.10 - 2026.3   

      More details

    Committee type:Academic society

  • 電子情報通信学会 和文論文誌A編集委員会   和文論文誌編集委員   Domestic

    2024.6 - 2028.6   

      More details

    Committee type:Academic society

  • 電子情報通信学会 英文論文誌A編集委員会   英文論文誌編集委員   Domestic

    2024.6 - 2028.6   

      More details

    Committee type:Academic society

  • 電子情報通信学会 『Special Section on Cryptography and Information Security』 編集委員会   編集委員   Domestic

    2023.9 - 2025.3   

      More details

    Committee type:Academic society

  • 電子情報通信学会, 情報セキュリティ研究会, 専門委員会   専門委員   Domestic

    2020.6 - Present   

Academic Activities

  • 座長

    Role(s): Panel moderator, session chair, etc.

    2025年暗号と情報セキュリティシンポジウム(SCIS2025)  2025.1

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    Role(s): Planning, management, etc.

    第15回 暗号及び情報セキュリティと数学の相関ワークショップ(CRISMATH 2024)  2024.12

     More details

    Type:Academic society, research group, etc. 

  • 組織委員

    Role(s): Planning, management, etc.

    記号計算の高速化と産業課題解決への応用2  2024.11

     More details

    Type:Academic society, research group, etc. 

  • 組織委員

    Role(s): Planning, management, etc.

    情報・計算・暗号の融合による新しい数理基盤の創出  2024.9

     More details

    Type:Academic society, research group, etc. 

  • Program Committee International contribution

    IWSEC2024  ( Kyoto Japan ) 2024.9

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    Role(s): Planning, management, etc.

    エクスパンダーグラフの新しい構成手法の確立とその応用3  2024.9

     More details

    Type:Academic society, research group, etc. 

  • Study Group Workshop 2024 モデレーター

    九州大学マス・フォア・インダストリ研究所、大学院数理学研究院・大学院数理学府・理学部数学科  2024.7

     More details

    Type:Academic society, research group, etc. 

  • 組織委員

    Role(s): Planning, management, etc.

    耐量子計算機暗号の社会実装に向けた数理基盤の研究  2024.7

     More details

    Type:Academic society, research group, etc. 

  • Technical Program Committee International contribution

    QCNC2024  ( Kanazawa Japan ) 2024.7

     More details

    Type:Competition, symposium, etc. 

  • Screening of academic papers

    Role(s): Peer review

    2024.4 - 2025.3

     More details

    Type:Peer review 

    Number of peer-reviewed articles in foreign language journals:4

    Proceedings of International Conference Number of peer-reviewed papers:3

    Proceedings of domestic conference Number of peer-reviewed papers:2

  • 組織委員

    IMI共同利用若手研究・短期共同研究「記号計算の高速化と産業課題解決への応用」  ( Japan ) 2023.11

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用一般研究・研究集会(I)「現代暗号に対する安全性解析・攻撃の数理」  ( Japan ) 2023.9

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用若手研究・短期共同研究「エクスパンダーグラフの新しい構成手法の確立とその応用2」  ( Japan ) 2023.9

     More details

    Type:Competition, symposium, etc. 

  • Screening of academic papers

    Role(s): Peer review

    2023

     More details

    Type:Peer review 

    Number of peer-reviewed articles in foreign language journals:2

    Proceedings of International Conference Number of peer-reviewed papers:3

    Proceedings of domestic conference Number of peer-reviewed papers:1

  • 組織委員

    IMI共同利用一般研究・研究集会(II)「高度化する暗号技術と数学的技法の進展」  ( Japan ) 2022.11

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用若手研究・短期共同研究「限量子消去の効率的なアルゴリズムの構築と産業課題解決への応用」  ( Japan ) 2022.10 - 2022.11

     More details

    Type:Competition, symposium, etc. 

  • 組織委員 International contribution

    IWSEC2022  ( Japan ) 2022.8 - 2022.9

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用若手研究・短期共同研究「エクスパンダーグラフの新しい構成手法の確立とその応用」  ( Japan ) 2022.8

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用プロジェクト研究・短期共同研究「セキュアな量子情報活用に向けた次世代暗号の数理」  ( Japan ) 2022.8

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用一般研究・短期共同研究「数式処理研究と産学連携の新たな発展」  ( Japan ) 2022.2

     More details

    Type:Competition, symposium, etc. 

  • Screening of academic papers

    Role(s): Peer review

    2022

     More details

    Type:Peer review 

    Number of peer-reviewed articles in foreign language journals:1

    Proceedings of International Conference Number of peer-reviewed papers:3

  • 組織委員

    IMI共同利用若手研究・短期共同研究「格子暗号の実用化に向けた研究」  ( Japan ) 2021.11

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用一般研究・研究集会(I)「秘密計算・秘密分散の数理と実用の探求」  ( Japan ) 2021.11

     More details

    Type:Competition, symposium, etc. 

  • プログラム編成委員

    2021年度電子情報通信学会ソサイエティ大会  ( Japan ) 2021.9

     More details

    Type:Competition, symposium, etc. 

  • 組織委員 International contribution

    IWSEC2021  ( Japan ) 2021.9

     More details

    Type:Competition, symposium, etc. 

  • 組織委員

    IMI共同利用若手研究・短期共同研究「ラマヌジャン・グラフの整数論による耐量子計算機暗号へのアプローチ」  ( Japan ) 2021.8 - 2021.9

     More details

    Type:Competition, symposium, etc. 

  • プログラム編成委員

    2020年度電子情報通信学会総合大会  ( online Japan ) 2021.3

     More details

    Type:Competition, symposium, etc. 

  • Screening of academic papers

    Role(s): Peer review

    2021

     More details

    Type:Peer review 

    Proceedings of International Conference Number of peer-reviewed papers:1

  • 組織委員 International contribution

    IWSEC2020  ( online Japan ) 2020.9

     More details

    Type:Competition, symposium, etc. 

  • Screening of academic papers

    Role(s): Peer review

    2020

     More details

    Type:Peer review 

    Proceedings of International Conference Number of peer-reviewed papers:2

  • 組織委員 International contribution

    International Symposium on Mathematics, Quantum Theory and Cryptography (MQC 2019)  ( Japan ) 2019.9

     More details

    Type:Competition, symposium, etc. 

  • International Symposium on Mathematics, Quantum Theory, and Cryptography, Proceedings of MQC 2019 International contribution

    2019.4 - 2020.4

     More details

    Type:Academic society, research group, etc. 

  • Screening of academic papers

    Role(s): Peer review

    2019

     More details

    Type:Peer review 

    Number of peer-reviewed articles in foreign language journals:1

    Proceedings of International Conference Number of peer-reviewed papers:3

▼display all

Research Projects

  • 耐量子計算機暗号方式のパラメータ解析に真に有効な古典・量子アルゴリズムの開発

    Grant number:24K02939  2024.4 - 2028.3

    Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    高安 敦, 池松 泰彦

      More details

    Grant type:Scientific research funding

    量子アルゴリズムに対しても安全な耐量子計算機暗号の研究は実用・理論の両面から注目されている研究課題である。本研究では、代表的な耐量子計算機暗号である格子暗号・符号暗号・多変数多項式暗号・同種写像暗号の実用化に向けたパラメータ解析を行うものであり、本研究の遂行は耐量子計算機暗号実用化に向けた重要な課題である。研究は大きく分けて3つのステップからなり、耐量子計算機暗号方式の多項式時間攻撃の開発、耐量子計算機暗号方式のパラメータ設定のための攻撃アルゴリズムの開発、物理的攻撃などを考慮した耐量子計算機暗号方式の安全性解析である。

    CiNii Research

  • グレブナー基底理論を用いた耐量子計算機暗号の安全性解析と開発

    Grant number:22K17889  2022.4 - 2025.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Early-Career Scientists

      More details

    Authorship:Principal investigator  Grant type:Scientific research funding

  • CREST ポスト量子社会が求める高機能暗号の数理基盤創出と展開

    2021.10

  • 多変数連立方程式の求解困難性を基にした耐量子暗号の安全性評価

    Grant number:19K20266  2019 - 2023

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Early-Career Scientists

      More details

    Authorship:Principal investigator  Grant type:Scientific research funding

  • CREST暗号数理:次世代暗号に向けたセキュリティ危殆化回避数理モデリング

    2016.7 - 2022.3

Educational Activities

  • 理学部数学科、数理学府、工学部で数学の講義を行なっている。また、理学部数学科、数理学府ではセミナーを通して暗号理論の専門的な人材の育成を行なっている。

Class subject

  • 複素関数論(電情C)

    2023.4 - 2023.9   First semester

  • 複素関数論(電情CM)

    2023.4 - 2023.9   First semester

  • 数学概論Ⅱ・演習

    2022.4 - 2022.9   First semester

  • 抽象代数学の基礎

    2021.10 - 2022.3   Second semester

  • 情報数学特論4

    2021.10 - 2022.3   Second semester

  • 数学概論Ⅱ・演習

    2021.4 - 2021.9   First semester

  • 代数学Ⅱ・演習

    2020.10 - 2021.3   Second semester

  • 数学概論Ⅲ・演習

    2020.10 - 2021.3   Second semester

  • 数学概論Ⅱ・演習

    2020.4 - 2020.9   First semester

  • プログラミング演習(P)

    2024.6 - 2024.8   Summer quarter

  • 複素関数論(電情C)

    2024.4 - 2024.9   First semester

  • 複素関数論(電情CM)

    2024.4 - 2024.9   First semester

▼display all

FD Participation

  • 2024.7   Role:Participation   Title:教員会議

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2024.2   Role:Participation   Title:数理学府FD

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2022.4   Role:Participation   Title:数理学府FD

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2021.3   Role:Participation   Title:数理学府FD

    Organizer:[Undergraduate school/graduate school/graduate faculty]

Visiting, concurrent, or part-time lecturers at other universities, institutions, etc.

  • 2019  福岡工業大学・工学部・生命環境化学科  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:2019年度 金曜3、4限「統計数学」

  • 2017  福岡工業大学・ 工学部・生命環境化学科  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:2017年度後期 火曜1、5限「応用数学」

Outline of Social Contribution and International Cooperation activities

  • I conduct joint work with companies on cryptography. I am a committee member of several international conferences.

Social Activities

  • 暗号技術-インターネットの安全を守る数学問題-

    Role(s):Lecturer

    九州大学理学部   九州大学オープンキャンパス  2024.8

Media Coverage

  • 「日本発」量子コンピュータ時代の安全な暗号 Newspaper, magazine

    科学新聞  科学新聞  2025.1

     More details

    Author:Other 

    NTT, 東大, 長県大と共同開発した署名方式QR-UOVが米国政府機関NISTのPQC標準化コンペの第2ラウンドに進出したことに関する記事