Research outline and operation policy
Introduction
Miyaji Laboratory has an operation policy of producing the latest research results and excellent research and development scientists as a basic research institute dealing with information security technology. In our research, we provide theoretical research results and conduct research jointly with businesses with the aim of practical use. Furthermore, we contribute to the development of information security technology from producer-driven and consumer-driven directions. To nurture talent, we work on developing knowledge of security in general and also on developing problem-solving abilities and presentation skills.
Research outline and operation policy
Operation policy of the laboratory
Miyaji Laboratory has an operation policy of producing the latest research results and excellent research and development scientists as a basic research institute dealing with information security technology. In our research, we provide theoretical research results and conduct research jointly with businesses with the aim of practical use. Furthermore, we contribute to the development of information security technology from producer-driven and consumer-driven directions. To nurture talent, we work on developing knowledge of security in general and also on developing problem-solving abilities and presentation skills.Outline of our research
Each step forward in our modern electronic society brings a variety of application systems that seek to be realized. Electronic medical records, electronic residence certificates, digital broadcasts are all modes of an electronic society. To operate these securely, it is essential to have information security technology. From its inception, Miyaji Laboratory has pushed research on information security technology forward; in particular, we conduct research into the core areas of privacy, integrity, and authentication technology, as well as research into applications such as software security, e-commerce, measures against computer viruses, and security assessment criteria. Our three main research subjects are cryptographic infrastructure, security protocols, and security modeling. Our laboratory members are divided into three teams that work with each other while researching a broad range of cutting-edge topics.- Cryptographic infrastructure research
We research infrastructure cryptography theories widely used in security and assess security technologies that are already in practical use or that are at the stage of standardization.
Ex.) Theoretical security analysis of shared-key cryptography, public-key cryptography, and next-generation public-key cryptography (post-quantum cryptography), proposal of methods of withstanding practical security analysis using electricity consumption, among others, and the construction of effective encryption to combat it.
- Security protocols
We apply cryptographic infrastructure research and algorithms to resolve security issues during digitization of social systems, while aiming for unprecedented functional improvements and e-business breakthroughs because of protocols.
Ex.) Construction, among other things, of electronic auctioning, electronic tender, electronic contract systems, etc.
- Security modeling
We model software and network security gaps depending on actual use and assess the security and efficiency of the modeling using computational complexity theory, analytic theory, cryptography theory, etc.
Ex.) Research into tamper-resistant software, tracebacks of denial-of-service attacks, new methods for mobile agents, etc.
Growing talent
We work toward nurturing people with talent who are both creative and cooperative so that they can flourish in society after completing their course. Students search for research topics by themselves, discover issues to be solved, and propose solutions; almost daily you would observe discussion in the laboratory. We also place importance on reducing proposed methods to concrete practice in the form of an implementation, and the staff work as one to support students to become scientists with as much knowledge as technical skill.International exposure
We encourage students to be proactive toward presenting at international conferences so that they can conduct research with a global perspective. Presenting at international conferences gives students experience that they could not otherwise obtain, and we believe that it leads to increased confidence later in life. Further, the cross-border personal connections that students can gain through international exchange at these conferences will become an invaluable asset to the students when they enter the workforce after completing their studies.Hosting external seminars and workshops
We invite researchers who are active in industry and academia and hold external seminars to invigorate research activities. The aim is to inform students of hot topics and also to add to their store of knowledge. To deepen exchange with famous figures, we also hold social meetings centered on seminar presenters. Furthermore, to increase opportunities for contact with society, Miyaji Laboratory holds its own security workshops.Environment
We have prepared the environment and facilities necessary to conduct ideal research and develop talent. The computing environment goes without saying, but we have also sought to create an environment that relieves the stress caused by research. Since AY1999, we have been working to change the layout, entirely convert each student section into booths, and install a refreshment space and thinking corner. In addition to the workstations supplied by the university, the laboratory lends a notebook and 1.2 desktop PCs to each student. By regularly providing a selection of refreshment devices, newspapers (Nihon Keizai Shimbun, Nikkei Sangyo Shimbun, Nikkan Kogyo Shimbun, Asahi Shimbun), and magazines (Nikkei Business, Nikkei Electronics, Nikkei Communications, Bit, academic journals), we constantly strive to improve the emotional environment.We welcome your opinions, questions, and comments by email.