Result of Reserch


    The 2005 fiscal year

    • Treatise --- 3 affairs

      1. A. Waseda, M. Soshi, and A. Miyaji."Quantum coin flipping protocol using n-dimensional quantum states", IPSJ Trans., vol. 46, No.8(2005), 1903-1911.

      2. A. Miyaji and K. Umeda."Efficient Group Signature Scheme based on a Modified Nyberg-Rueppel Signature", IPSJ Trans., vol. 46, No.8(2005), 2107-2119.

      3. A. Miyaji and Y. Sakabe and M. Soshi."Java Obfuscation -- Approaches to Construct Tamper-Resistant Object-Oriented Programs", IPSJ Trans., vol. 46, No.8(2005), 2107-2119.

      return to menu

    • International conference(Review) --- 3 affairs

      1. A. Waseda, M. Soshi, and A. Miyaji. "n-state quantum coin flipping protocol", AInternational Conference on Information Technology - ITCC2005, Volume II, pp.776-777, 2005

      2. A. Miyaji and Y. Takano. "On the Success Probability of chi^2-attack on RC6", Proceedings of ACISP 2005, Lecture Notes in Computer Science, 3089(2005), Springer-Verlag, 310-325.

      3. H. Mamiya and A. Miyaji. "Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae", ACNS 2005, to appear.

      return to menu

    • Description paper, Invitation lecture --- 1 affairs

      1. A.Miyaji."Privacy Rights in the Digital Age Technological,-How to Protect Privacy Right by the technology of Information Security-", International Forum on Privacy Rights in the Digital Age,Korean National Commission for UNESCO, September 2005.

      return to menu

    • Domestic Conferences --- 5 affairs

      1. A. Miyaji, "On public-key Broadcast Encryption", CSEC2005-29(2005-05), 31-38.

      2. A. Waseda, M. Soshi, and A. Miyaji, "Consideration for the quantum multi-secret sharing using MSP", IEICE Japan Tech. Rep., ISEC2005-119 (2005-12), 53-60.

      3. A. Miyaji, T. KIYOMIYA, "Improved address-bit DPA Countermeasure on BRIP", IEICE Japan Tech. Rep., ISEC2005-118 (2005-12), 47-52.

      4. A.Miyaji,"ID-Based encryption scheme with a hierarchical structure and its application", Symposium on Cryptography and Information Security, SCIS2006-3A1-4, Jan,2006.

      5. T.Hinoue, A.Miyaji,"On the approach to reduce the work complexity of chi-square attack on RC6", Symposium on Cryptography and Information Security, SCIS2006-3A1-4, Jan,2006.

      return to menu

    • Reward --- 0 affairs

      return to menu



    The 2004 fiscal year

    • Treatise --- 3 affairs

      1. Yuko TAMURA ,Toru SIOTSUKI and Atsuko MIYAJI, "Efficient Proxy-bidding System ", IEICE Trans., Vol. J87-A, No.6(2004), 835-842

      2. T. Terada, M. Soshi and A. Miyaji, "Toward Modeling of a Pushback Mechanism ", IPSJ Trans, Vol.45, No.8(2004), 1948-1953

      3. Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji. "On anonymity metrics for practical anonymous communication protocols.", IPSJ Journal,Vol. 45, No. 8, August 2004.

      return to menu

    • International conference(Review) --- 4 affairs

      1. Takashi Matsunaka, Atsuko Miyaji, and Yuuki Takano, "Success probability in $\chi^2$-attacks", Applied Cryptography and Network Security - ACNS 2004, Lecture Notes in Computer Science 3089, pp.310-325, Springer-Verlag, June 2004.

      2. Atsuko Miyaji and Kozue Umeda, "A Fully-Functional group signature scheme over only known-order group", Applied Cryptography and Network Security - ACNS 2004, Lecture Notes in Computer Science, 3089, pp.164-179, Springer-Verlag, June 2004.

      3. H. Mamiya, H. Morimoto A. Miyaji, "Efficient Countermeasures against RPA, DPA, and SPA", CHES 2004, Lecture Notes in Computer Science, 3156(2004), Springer-Verlag, 343-356.

      4. T. Terada, M.Soshi and A. Miyaji, "A New Pushback Mechanism Resistant to DDoS Attacks", 2004 International Symposium on Information Theory and its Applications - Proceedings of ISITA2004, Wed1-6-4.

      return to menu

    • Description paper, Invitation lecture --- 1 affairs

      1. A. Miyaji, "Application of bilinear map to public-key encryption", 1420(2005), 117-127

      return to menu

    • Domestic Conferences --- 6 affairs

      1. Atsushi WASEDA, Masakazu SOSHI, and Atsuko MIYAJI, "A proposal of quantum coin tossing using n-states", IEICE Japan Tech. Rep. , ISEC2004-10 (2004-05), 65-68.

      2. Fumiaki KANAZAWA, Atsuko MIYAJI, "ID-based Broadcast encryption", Symposium on Cryptography and Information Security, SCIS2005-3F1-1, Jan, 2005.

      3. Yuuki Takano, Atsuko Miyaji, "On a $\chi^2$-attack applicable to 16-round RC6", Symposium on Cryptography and Information Security, SCIS2005-4D2-3, Jan, 2005.

      4. Hideyo MAMIYA, Atsuko MIYAJI, "SPA-resistant method by using Fixed-Hamming-Weight Representation", IEICE Japan Tech. Rep. , IT2004-59, ISEC2004-115, WBS2004-174 (2005-03), 55-60. (in Japanese).

      5. Ken SASAKI, Atsushi WASEDA, Masakazu SOSHI, and Atsuko MIYAJI, "Consideration for Quantum Secret Sharing", IEICE Japan Tech. Rep. , IT2004-71, ISEC2004-127, WBS2004-186 (2005-03), 7-11 (in Japanese).


      6. Masayuki MORI, Atsushi WASEDA, Masakazu SOSHI, and Atsuko MIYAJI, "A Study on Mobile Agent Security", 2005-CSEC-28, pp.123-128, March, 2005. (in Japanese).

      return to menu

    • Reward --- 3 affairs

      1. Fumiaki KANAZAWA --- 2004. The Best Student Award (IEICE Hokuriku branch)

      2. Yuuki Takano --- 2004. Yamashita Award(IPS)

      3. Hideyo MAMIYA --- 2004. The Best Student Award (JAIST)

      return to menu



    The 2001 fiscal year

    • Treatise --- 2 affairs

      1. N. Isogai, A. Miyaji, and M. Nonaka, "Statistical Analysis of chi^2-Attacks", IEICE Trans., Fundamentals. vol. E86-A, No.5(2003), 1190-1197.

      2. Masakazu Soshi, Mamoru Maekawa, and Eiji Okamoto. "The dynamic-typed access matrix model and decidability of the safety problem", IEICE Trans., Fundamentals. Vol.E87-A, No.1, 190-203, January 2004.

      return to menu

    • International conference(Review) --- 6 affairs

      1. Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, "Intrusion-Resilient Public-Key Encryption", RSA Conference 2003, Lecture Notes in Computer Science, 2612(2003), 19-32

      2. Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji, "Evaluation of anonymity of practical anonymous communication networks.", The Eighth Australasian Conference on Information Security and Privacy - ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pp.13-26, Springer-Verlag, July 2003.

      3. Norihisa Isogai, Takashi Matsunaka, and Atsuko Miyaji, "Optimized $\chi^2$-Attack against RC6", Applied Cryptography and Network Security - ACNS 2003, Lecture Notes in Computer Science 2846, pp.16-32, Springer-Verlag, Oct. 2003.

      4. Yuko Tamura and Atsuko Miyaji, "Anonymity-enhanced Pseudonym System", Applied Cryptography and Network Security - ACNS 2003, Lecture Notes in Computer Science 2846 pp.33-47, Springer-Verlag, Oct. 2003.

      5. Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji. "Java obfuscation with a theoretical basis for building secure mobile agents", Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS'03), vol. 2828 of LNCS, pp.89-103. Springer-Verlag, October 2003.

      6. Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung , "Generic construction of Intrusion-Resilient Public-Key Encryption", Topics in Cryptology - CT-RSA 2004, Lecture Notes in Computer Science, 2964(2004), Springer-Verlag, 81-98.

      return to menu

    • Description paper, Invitation lecture --- 3 affairs

      1. Atsuko MIYAJI, Great paper in 20th century : R.L.Rivest, A. Shamir, and L.Adelman: A method for obtaining digital signatures and public-key cryptosystems,情報処理学会報, 44巻6号 (2003), 650.

      2. Atsuko MIYAJI, (Invitation lecture)「Topic on Elliptic Curve Cryptosystems」, IEICE Japan Tech. Rep. IT2003-4(2003-3), 17-22.

      3. Atsuko MIYAJI, 解説:楕円曲線暗号の原理と国際規格について, 情報処理学会/情報規格調査会,情報技術標準-Newsletter- 61(2004),16-17.

      return to menu

    • Domestic Conferences --- 12 affairs

      1. Takashi MATSUNAKA, Atsuko MIYAJI, and Norihisa ISOGAI, "Statistical Analysis of chi square Attack on RC6", IEICE Japan Tech. Rep. , ISEC2003-2(2003-05), 7-11.

      2. Sayaka FUKUDA, Masakazu SOSHI, and Atsuko MIYAJI, "A Consideration for the Bias of Quantum Coin Flipping", IEICE Japan Tech. Rep. , ISEC2003-4(2003-05), 21-24.

      3. Kozue UMEDA and Atsuko MIYAJI, "A privacy-enhanced efficient group signature scheme", IEICE Japan Tech. Rep. , ISEC2003-30(2003-07), 1-8.

      4. Yuko TAMURA and Atsuko MIYAJI, "Efficient Proxy-bidding System", IEICE Japan Tech. Rep. , ISEC2003-54(2003-09), 29-34.

      5. Atsushi WASEDA, Masakazu SOSHI, and Atsuko MIYAJI, "A proposal of a signature system based on the knapsack problem", IEICE Japan Tech. Rep. , ISEC2003-58(2003-09), 49-51.

      6. Yuko Tamura and Atsuko Miyaji, ``Anonymous Multiple Credential System'',IEICE Japan Tech. Rep. , ISEC2003-69(2003-11), 23-28.

      7. Takeaki Terada and Masakazu Soshi,Atsuko Miyaji, ``Model of PushbackProtocols and the Evalation'',IEICE Japan Tech. Rep. , ISEC2003-70(2003-11), 29-32.

      8. Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji and Moti Yung, ``Intrusion-Resilient Public-Key Encryption'',IEICE Japan Tech. Rep. , ISEC2003-72(2003-11), 41-48.

      9. Hiroaki Morimoto and Atsuko Miyaji, ``Efficient exponentiation on Hyperelliptic Curves with Genus two'',IEICE Japan Tech. Rep. , ISEC2003-78(2003-11), 7-14.

      10. Hideyo Mamiya and Atsuko Miyaji, "Optimization of Hyperelliptic Curve Cryptography secure against SPA and DPA", Symposium on Cryptography and Information Security, SCIS2004-3A1-4, Jan, 2004.

      11. Takashi Matsunaka and Atsuko Miyaji "A new principle on chi-square attack against RC6", Symposium on Cryptography and Information Security, SCIS2004-4A1-2, Jan, 2004.

      12. Hiroaki Morimoto, Hideyo Mamiya and Atsuko Miyaji, ``Elliptic Curve Cryptosystems secure against ZPA '',IEICE Japan Tech. Rep. , ISEC2003-103(2004-3), 43-48.

      return to menu

    • Reward --- 3 affairs

      1. Atsuko Miyaji --- 2003. The Contribution for Standardization Award (ITSCJ, IPSJ)

      2. Takashi Matsunaka --- 2003. The Best Student Award (IEICE Hokuriku branch)

      3. Hiroaki Morimoto --- 2003. The Best Student Award (JAIST)

      return to menu



    The 2002 fiscal year

    • Treatise --- 5 affairs

      1. K. Kawauchi, H. Minato, A. Miyaji, M. Tada, "Provably secure multi-signature scheme with signers' intentions", IPSJ Trans., vol. 43, No.8(2002), 2425-2434.

      2. Kazumasa Omote, Atsuko Miyaji, "A Second-price Sealed-bid Auction with Public Verifiability", IPSJ Trans., vol. 43, No.8(2002), 2405-2413.

      3. Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji, "Software obfuscation on a theoretical basis and its implementation", IEICE Trans., Fundamentals, vol. E86-A, No. 1(2003), 176-186.

      4. A.Miyaji and M. Nonaka, "Cryptanalysis of the reduced-round RC6 without whitening", IEICE Trans., Fundamentals. vol. E86-A, No.1(2003), 19-30.

      5. Kazumasa OMOTE and Atsuko MIYAJI, "A Practical English Auction with Simple Revocation", IEICE Trans., Fundamentals. vol. E85-A, No.5(2002), 1054-1061.

      return to menu

    • International conference(Review) --- 6 affairs

      1. Hiroyuki Nishikawa, Atsuko Miyaji, Masakazu Soshi, and Toshio Omote, "A secure and flexible digital contents building system", In 2002 International Symposium on Information Theory and Applications (ISITA 2002), October 2002.

      2. Masakazu Soshi and Atsuko Miyaji, "Labeled certificate: Flexible trust management of public key infrastructures", In 2002 International Symposium on Information Theory and Applications (ISITA 2002), October 2002.

      3. Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji, "Software tamper resistance based on the difficulty of interprocedural analysis", In The Third International Workshop on Information Security Applications (WISA 2002), pp. 437-452, August 2002.

      4. A. Miyaji and M. Nonaka, "Cryptanalysis of the reduced-round RC6", International Conference on Information and Communications Security, ICICS 2002, Lecture Notes in Computer Science, 2513(2002), pp. 480-494, Springer-Verlag."

      5. Kozue Umeda and Atsuko Miyaji, "A Group Signature with Revocation", 2002 International Symposium on Information Theory and Applications - Proceedings of ISITA2002, S6-6-2, pp751-754.

      6. Yuko Tamura and Atsuko Miyaji, "A Signature Scheme with a Guarantee", 2002 International Symposium on Information Theory and Applications - Proceedings of ISITA2002, S6-6-5, pp763-756.

      return to menu

    • Domestic Conferences --- 9 affairs

      1. 刑部裕介, 双紙正和, 宮地充子, ``オブジェクト指向言語の難読化の提案'', IEICE Japan Tech. Rep. , ISEC2002-6(2002-05), 33-38.

      2. 双紙正和, 宮地充子, "柔軟で効率のよい公開鍵基盤方式の研究", マルチメディア,分散,協調とモバイル (DICOMO 2002) シンポジウム論文集, Vol. 2002, No. 9 in 情報処理学会シンポジウム, pp. 105-108, July 2002.

      3. Norihisa Isogai and Atsuko Miyaji, "The Security of RC6 against chi square attack," IEICE Japan Tech. Rep., ISEC 2002-100 (2002-12), pp27-34.

      4. 高橋直之, 宮地充子, "効率的な種数2の超楕円曲線暗号に関する考察", IEICE Japan Tech. Rep., ISEC2002-102(2002-12), pp39-44.

      5. Yuko Tamura and Atsuko Miyaji, "Anonymity-enhanced Pseudonym System", Symposium on Cryptography and Information Security, SCIS2003-3C-3, Jan, 2003.

      6. Kozue Umeda and Atsuko Miyaji, "A Group Signature Scheme based on Nyberg-Rueppel Signatures", Symposium on Cryptography and Information Security, SCIS2003-5C-1, Jan, 2003.

      7. 福田明香, 双紙正和, 宮地充子, "量子コイン投げにおけるバイアス低 減の考察", Symposium on Cryptography and Information Security, SCIS2003-15D-3, Jan, 2003.

      8. 高橋直之,森元寛明,宮地充子.“効率的な種数2の超楕円曲線暗号に関する考察2”, IEICE Japan Tech. Rep., ISEC2002-145(2003-3), pp59-64.

      9. 平井太郎,宮地充子.“任意の埋め込み拡大次数を持つ楕円曲線構成法に関する考察”, IEICE Japan Tech. Rep., ISEC2002-144(2003-3), pp53-58.

      return to menu

    • Reward --- 2 affair

      1. Norihisa Isogai --- 2002. The Best Student Award (JAIST)

      2. Atsuko Miyaji --- Sakai Special Researcher Award (IPSJ)

      return to menu



    The 2001 fiscal year

    • Treatise --- 5 affairs

      1. A. Miyaji, M. Nakabayashi and S. Takano "New explicit conditions of elliptic curve traces for FR-reductions", IEICE Trans., Fundamentails vol. E84-A, No.5(2001), 1234-1243.

      2. K. Omote, and A. Miyaji, "An anonymous sealed-bid auction with a feature of entertainment", IPSJ Trans., vol. 42, No.8(2001), 2049-2056.

      3. T. Okamoto, M. Tada and A. Miyaji, "Proposal of Efficient Signature Schemes based on Factoring", IPSJ Trans., vol. 42, No.8(2001), 2123-2133(in Japanese).

      4. S. Mitomi and A. Miyaji, "A general model of multisignature schemes with message flexibility, order flexibility, and order verifiability", IEICE Trans., Fundamentals. vol. E84-A, No.10(2001), 2488-2499.

      5. A. Miyaji, M. Nonaka, and Y. Takii, "Improved Correlation Attack on RC5", IEICE Trans., Fundamentals. vol. E85-A, No.1(2002), 44-57.

      return to menu

    • International conference(Review) --- 8 affairs

      1. S. Kitazawa, M. Soshi, and A. Miyaji, "A Modeling for Anonymous Communication Protocols", Sixth International Workshop on Enterprise Security, 10th IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, 2001, pp177-182.

      2. K. Omote and A. Miyaji, "A practical English auction with one-time registration", Information security and privacy-Proceedings of ACISP 2001, Lecture Notes in Computer Science 2119, Springer-Verlag, pp221-235.

      3. Ayako Maeda, Atsuko Miyaji and Mitsuru Tada, "Efficient and unconditionally secure verifiable threshold changeable scheme", Information security and privacy-Proceedings of ACISP 2001, Lecture Notes in Computer Science 2119, Springer-Verlag, pp403-416.

      4. Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji and Mitsuru Tada, "A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks", The 4th International Conference on Information Security and Cryptology-Proceedings of ICISC 2001, Lecture Notes in Computer Science 2288, Springer-Verlag, pp328-340.

      5. T.Okamoto, M.Tada and A.Miyaji, ``Efficient ``on the fly'' signature schemes based on integer factoring'', Proceedings of Indocrypt'01, Lecture Notes in Computer Science 2247, Springer-Verlag, 2001, pp275-286.

      6. Atsuko Miyaji, Masao Nonaka, and Yoshinori Takii, "Known Plaintext Correlation Attack Against RC5", RSA Conference 2002, Lecture Notes in Computer Science 2271(2002), Springer-Verlag, pp131-148.

      7. K. Omote, A. Miyaji, "A Second-price Sealed-bid Auction with the Discriminant of the p-th Root", Financial Cryptography-Proceedings of FC 2002, Lecture Notes in Computer Science, XXX(2002), Springer-Verlag, to appear.

      8. T. Okamoto, M. Tada, A. Miyaji, "A Fast Signature Scheme without on-line Multiplication", Financial Cryptography-Proceedings of FC 2002, Lecture Notes in Computer Science, XXX(2002), Springer-Verlag, to appear.

      return to menu

    • Description paper, Invitation lecture --- 1 affair

      1. A. Miyaji, S. Hangai, W. Wen, "Cryptography and Computer Security", Review of Radio Science 2000-2002, Edited by W. Ross Stone Oxford University Press, to appear.

      return to menu

    • Domestic Conferences --- 18 affairs

      1. Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji, ``高速な署名を実現する新しいパラダイムの提案'' , IEICE Japan Tech. Rep. , ISEC2001-18(2001-5), 59-66.

      2. Kei KAWAUCHI, Mitsuru TADA and Atsuko MIYAJI, "Study on multi-signature scheme with signers' intentions (in Japanese)" , IEICE Japan Tech. Rep. , ISEC2001-19(2001-7), 59-66.

      3. Masao Nonaka, Atsuko Miyaji, Yoshinori Takii, "A Study on Known Plaintext Attack against RC5 by using Correlations", IEICE Japan Tech. Rep., ISEC 2001-53(2001-9), 61-68.

      4. Y.Tamura and A.Miyaji, "A Signature Scheme with a Guarantee", IEICE Technical Rep., ISEC2001-70 (2001-11), 2001. 1-8.

      5. K. Omote and A. Miyaji, "An English Auction with Complete Unlinkability among Plural Auctions " , IEICE Technical Rep., ISEC2001-71 (2001-11), 2001. 9-22.

      6. Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji, "A Collusion Model with Shared/Unshared Keys and Consideration on Collusion Relation", IEICE Japan Tech. Rep. , ISEC2001-80(2001-11), 9-15.

      7. T.Okamoto, M.Tada and A.Miyaji, "Security Analysis of Signature Schemes Based on Fast on-line Computation," IEICE Technical Report, ISEC2001-21 (2001-11), 2001.

      8. Toshio OGISO,Masakazu SOSHI,Atsuko MIYAJI, "Software Tamper Resistance and evaluation", IEICE JAPAN Tech Rep., OFS2001-50(2001-11), 2001(in Japanese).

      9. K.Umeda and A. Miyaji, "Efficient Group Signature Scheme with Revocation", IEICE Japan Tech. Rep., ISEC2001-87(2001-12), 1-8.

      10. N. Isogai, A. Miyaji, M. Nonaka, "Cryptanalysis of RC5-64 with improved correlation attack," 2002 Symposium on Cryptography and Information Security, SCIS2002-10A1, Jan-Feb. 2002.

      11. M. Nonaka, A. Miyaji, "A note on the security of RC6 against correlation attack,", 2002 Symposium on Cryptography and Information Security, SCIS2002-10A5, Jan-Feb. 2002.

      12. T. Ogiso, Y. Sakabe, M. Soshi and A. Miyaji, "A New Approach of Software Obfuscation Based on the Difficulty of Interprocedural Analysis(in Japanese)", 2002 Symposium on Cryptography and Information Security, SCIS2002-6C1, Jan-Feb. 2002.
      13. H. Miyake, A. Miyaji, "Efficient Elliptic Curve Exponentiation with Lucas Chains", 2002 Symposium on Cryptography and Information Security, SCIS2002-8B-5, Jan-Feb. 2002.

      14. K. Omote and A. Miyaji, "A Second-price Sealed-bid Auction Scheme with a feature of Public Verifiability", 2002 Symposium on Cryptography and Information Security, SCIS2002, pp. 855-860, Jan-Feb. 2002.

      15. T. Terada, M. Tada, A. Miyaji, M. Soshi, "Visual Secret Sharing Scheme with Optional Access Structure at Efficient Number of Subpixels", 2002 Symposium on Cryptography and Information Security, SCIS2002-11A1, Jan-Feb. 2002.

      16. T. Okamoto, M. Tada, A. Miyaji, "A Proposal of an Identification Scheme Based on Variant RSA Problems", 2002 Symposium on Cryptography and Information Security, SCIS2002-6A-1, Jan-Feb. 2002.

      17. Hideyuki Miyake, Atsuko Miyaji, "Efficient Exponentiation on Elliptic Curve Cryptosystem", IEICE Japan Tech. Rep. , IT2001-86(2002-3), 69-74.(in japanese)

      18. Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji, "An Extension of Collusion Problem and its Application ti Protocol Analysis", IEICE Japan Tech. Rep. , IT2001-87(2002-3), 75-80.(in japanese)

      return to menu

    • Reward --- 3 affairs

      1. Kazumasa Omote --- The Best Student Award (CSS2001, IPSJ)

      2. Yoshinori Takii --- The Best Award (SCIS2001, IEICE)

      3. Masao Nonaka --- 2001. The Best Student Award (JAIST)

      return to menu



    The 2001 fiscal year

    • Treatise --- 3 affairs

      1. Y. Futa and A. Miyaji, "Efficient Construction of Elliptic Curves over Optimal Extension Field", IPSJ Trans., vol. 41, No.8(2000), 2092-2101.

      2. S. Kitazawa, S. Nagano, M. Soshi and A. Miyaji, "Anonymous Communication with Elementary Cyclic Routes", IPSJ Trans., vol. 41, No.8(2000), 2148-2160, (in Japanese).

      3. T. Yamada, A. Miyaji and M. Soshi "The Secure Renewal of Cryptosystems in the Open Network Architecture", IPSJ Trans., vol. 41, No.8(2000), 2102-2109, (in Japanese).

      return to menu

    • International conference(Review) --- 5 affairs

      1. S. Mitomi and A. Miyaji, ``A multisignature scheme with message flexibility, order flexibility and order verifiability'', Information security and privacy-Proceedings of ACISP 2000, Lecture Notes in Computer Science, 1841(2000), Springer-Verlag, p298-312.

      2. Masakazu Soshi "Safety analysis of the dynamic-typed access matrix model", Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, volume 1895 of LNCS, pp. 106-121. Springer-Verlag, October 2000.

      3. K. Omote and A. Miyaji, ``An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees'', Information Security Workshop-Proceedings of ISW 2000, LNCS 1975(2000),pp.108-120.

      4. A. Miyaji, M. Nakabayashi, and S. Takano, ``Characterization of elliptic curve traces under FR-reduction'', to appear in Springer-Verlag.

      5. A. Koide, M. Tada, and A. Miyaji, ``Linkable E-cash Scheme with User's Anonymity'' , International Symposium on Information Theory and Its Applications, Proceedings of ISITA2000, Vol. 2, pp.505-508.

      return to menu

    • Description paper, Invitation lecture --- 5 affairs

      1. A. Miyaji, "楕円曲線暗号", 数理科学(2000-9), サイエンス社, 27-33

      2. A. Miyaji, "楕円曲線暗号の原理と動向について", 電器関係学会北陸支部連 合大会講演論文集, 招待講演2, p4-5

      3. A. Miyaji, "楕円曲線暗号の動向", FAIT 第2回講演会, Dec. (2000).

      4. A. Miyaji, "現代暗号の成果と今後の研究動向", (富士通)先端技術講座「インターネットセキュリティ(第2回)」 , Mar. 3, 2001

      5. A. Miyaji, T. Harada, "楕円暗号の標準化状況", 情報処理学会全国大会", Mar. , 2001

      return to menu

    • Domestic Conferences --- 18 affairs

      1. S. Kitazawa, M. Soshi, A. Miyaji, "The Anonymous Communication Framework and its Evaluation", 2000-Computer Security(CSEC) group,May. 2000.

      2. S. Mitomi, A. Miyaji, and M. Tada ``On the weakness in an order-specified multisignature scheme'', IEICE Japan Tech. Rep., ISEC2000-20(2000-5), 79-86.

      3. S. Mitomi and A. Miyaji, ``Security of a multisignature scheme with flexibility and verifiability'', IEICE Japan Tech. Rep., ISEC2000-21(2000-5), 87-94.


      4. A. Miyaji and S. Takano, ``Some explicit conditions for FR-reduction'', 第3回「代数幾何・数論及び符号・暗号」研究集会報告書, 東京大学大学院 数理科学研究科(2000-5), p74-85.


      5. T. Okamoto, M. Tada and A. Miyaji, ``Efficient Signature Schemes Based on Factoring'', IEICE Japan Tech. Rep., ISEC2000-61(2000-09), 21-28.

      6. A. Miyaji, M. Nakabayashi and S. Takano ``New explicit conditions of elliptic curve traces for FR-reductions'', IEICE Japan Tech. Rep., ISEC2000-67(2000-09), 99-108.

      7. H. Nishikawa, A. Miyaji, M. Soshi, T. Omote, E. Okamoto, "簡易認証機能を持つ 追跡可能型ウィルス対策システム", 第19回技術発表会論文集, p143-152,情報処理振興事業協会, October 2000.

      8. N. Terauchi, A. Miyaji ``既存のブロック暗号を用いたより安全な暗号システム の構成法'', 電子情報通信学会技術研究報告, ISEC2000-86(2000-11), 53-59.

      9. K. Omote and A. Miyaji, ``A Practical Anonymous Electronic English Auction by Using Bulletin Board'', IEICE Japan Tech. Rep., ISEC2000-85(2000-11), 45-52.

      10. H.Minato, M.Tada and A.Miyaji, ``Multi-signature schemes with signers' intentions'' , IEICE Japan Tech. Rep. , ISEC2000-88(2000-11), 67-74.

      11. Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji, ''Modeling Anonymous Communication Protcols with Message Relaying'', The 2001 Symposium on Cryptography and Information Security ,SCIS2001-6C1 ,Jan. 2001.

      12. Y. Takii, A. Miayji, ''RC5における改良型Correlation Attack'', The 2001 Symposium on Cryptography and Information Security ,SCIS2001-7A1 ,Jan. 2001.

      13. R. Otomura, M. Soshi, A. Miayji, ''モバイルエージェントに適したデジタル署名方式の検討'', The 2001 Symposium on Cryptography and Information Security ,SCIS2001-14C4 ,Jan. 2001.

      14. Mitsuru Tada, ''A note on threshold changeable secrey shareing schemes'', The 2001 Symposium on Cryptography and Information Security ,SCIS2001-15A1 ,Jan. 2001.

      15. A. Maeda, M. Tada, A. Miyaji, ''情報理論的に安全で閾値変更可能な検証可秘密分散法'', The 2001 Symposium on Cryptography and Information Security ,SCIS2001-15A2 ,Jan. 2001.


      16. H. Nishikawa, A. Miyaji, M. Soshi, T. Omote, E. Okamoto, "簡易認証機能を持つ 追跡可能型ウィルス対策システムの構築", The 2001 Symposium on Cryptography and Information Security ,SCIS2001-9C2 ,Jan. 2001.

      17. K. Omote, A. Miyaji, ``A Pratical English Auction with One-time Registration'' , IEICE Japan Tech. Rep. , ISEC2000-136(2001-3), 57-62.

      18. Y. Tamura, A. Miyaji, ``Interactive Signature Scheme between Confirmer and Signer'' , IEICE Japan Tech. Rep. , ISEC2000-137(2001-3), 63-70.

      return to menu

    • Patent application --- 5 affairs

      From the left to ID number, Proposal Number, Application number,
      Application date, Title of invention

      1. AM-0000001, 20000580243, 2000-126692, 2000.3.23, Integrated Device
        - Related paper 99-IV-2
      2. AM-0000002, 20001300186, 2000-243434, 2000.7.6 , Elliptic Curve Generation Device
        - Related paper 00-IV-6, 00-II-4
      3. AM-0000003, 20001430190, 2000-259945, 2000.7.26, Multi-Signature Generation Device
        - Related paper 99-IV-12, 00-II-1, 00-IV-3
      4. AM-0000004, 20001450272, 2000-264656, 2000.7.27, Anonymous Digital Bid System
        - Related paper 99-IV-8, 00-II-3
      5. AM-0000005, 50100416389, 2001-84703, 2001.3.2, An Alternative Encryption System

      return to menu

    • Reward --- 4 affairs

      1. Takeshi Okamoto --- 2000. Yamashita Award(IPS)

      2. Hiroshi Minato --- 2000. The Best Student Award(IEICE Hokuriku branch)

      3. Shigeki Kitazawa --- 2000. The Best Student Award(JAIST)

      4. Yoshinori Takii --- 2000. The Best Student Award (JAIST)

      return to menu



    The 1999 fiscal year

    • Treatise --- 2 affairs

      1. K. Koyama,A. Miyaji,S. Uchiyama, 「楕円暗号の数理」,電子通信学会論文誌A, Vol.J82-A, No.8(1999), 1212-1222.
      2. M. Tada and H. Shizuya, "On the Sigma1b-definability of integer factoring", Transactions of IPSJ, vol.40, No.12, pp.4362-4369,1999.

      return to menu

    • International conference(Review) --- 2 affairs

      1. T. Okamoto, M. Tada and E. Okamoto, "Extended proxy signature for smart cards", Proceedings of ISW'99, LNCS 1729, pp.247-258, 1999.

      2. M. Burmester, Y. Desmedt, H. Doi, M. Mambo, E. Okamoto, M. Tada and Y. Yoshifuji, "A structured ElGamal-type multisignature scheme", Proceedings of PKC2000, LNCS 1751, pp.466-483,2000.

      return to menu

    • Description paper, Invitation lecture --- 2 affairs

      1. A. Miyaji, 「楕円曲線暗号」,離散可積分系の応用数理,京都大学数理解析研講究録 1098(1999), 138-146.

      2. A. Miyaji, 「楕円曲線暗号」, ビット別冊「情報セキュリティ」, 共立出版, pp.228-234,1999.

      return to menu

    • Domestic Conferences --- 16 affairs

      1. Y. Futa and A. Miyaji, ``Efficient Construction of elliptic curves over optimal extension field'', IEICE Japan Tech. Rep., ISEC99-26(1999-07), 1-8.

      2. A. Miyaji and H. Shizuya, ``Integration of DLP-based cryptosystems'', IEICE Japan Tech. Rep., bf ISEC99-48(1999-09), 73-80.

      3. T. Okamoto, M. Tada, A. Miyaji、``署名依頼者のメッセージ復元に基づく委任 署名'',情報処理学会コンピュータセキュリティシンポジウム CSS99, pp.19-24, 1999.

      4. S. Nagano, S. Kitazawa, M. Soshi, A. Miyaji、``環状経路を用いた匿名性と位 置情報プライバシの保護'',情報処理学会コンピュータセキュリティシン ポジウム CSS99, pp.37-42, 1999.

      5. A. Koide, K. Hirohashi, M. Tada, A. Miyaji, ``オフライン電子マネーに関す る一考察'',情報処理学会コンピュータセキュリティシンポジウム CSS99, pp.111-116,1999.

      6. H. Nishikawa, A. Miyaji, M. Soshi, E. Okamoto, ``インターネットにおける簡易 認証方式の検討'', The 2000 Symposium on Cryptography and Information Security, SCIS2000-D11, Jan. 2000.

      7. M. Soshi, "動的な型付きアクセス行列モデルにおける安全性問題の決定可 能性と表現力について", The 2000 Symposium on Cryptography and Information Security, SCIS2000-A34, Jan. 2000.

      8. K. Omote, A. Miyaji, "信頼しなくてよい1つのセンタを仮定した2分木を用 いた匿名オークションプロトコル", The 2000 Symposium on Cryptography and Information Security, SCIS2000-B48, Jan. 2000.

      9. Masaki Inamura, Masakazu Soshi and Atsuko Miyaji, "Realizing Adaptable Service Utilization for Mobile Environment", The 2000 Symposium on Cryptography and Information Security, SCIS2000-D17, Jan. 2000.

      10. S. Takano, A. Miyaji, "FR-帰着に弱い楕円曲線", The 2000 Symposium on Cryptography and Information Security, SCIS2000-B34, Jan. 2000.

      11. E. Tominaga, M. Tada, A. Miyaji, "電子投票の代数学的考察", The 2000 Symposium on Cryptography and Information Security, SCIS2000-B26, Jan. 2000.

      12. S. Mitomi, A. Miyaji, "メッセージ変更可能な多重署名", The 2000 Symposium on Cryptography and Information Security, SCIS2000-C27, Jan. 2000.

      13. Tatsuya Yamada, Atsuko Miyaji and Masakazu Soshi, "The Secure Renewal of Crypt Modules in the Open Network Architecture", The 2000 Symposium on Cryptography and Information Security, SCIS2000-C46, Jan. 2000.

      14. S. Kitazawa, M. Soshi, A. Miyaji, "匿名通信を記述するためのフレームワー クについて", 2000-Computer Security(CSEC) group, Mar. 2000.

      15. A. Koide, M. Tada, A. Miyaji, "関連づけ可能な匿名オフライン電子マネー ", 2000-Computer Security(CSEC) group. Mar. 2000.

      16. S. Kitazawa, M. Soshi, A. Miyaji, "匿名通信フレームワークとその評価", 2000-Computer Security(CSEC) group,May. 2000.

      return to menu

    • Reward --- 1 affair

      1. Shunzo Takano -- 1999. The Best Student Award(IEICE Hokuriku branch)

      return to menu