IIS Open House 2018

Japanese version is here.
Introduction
Welcome to the Matsuura Laboratory IIS Open House 2018 Web page.
In 2018, IIS Open House will be held on June 8 (Fri.), and June 9 (Sat.) at Komaba Research Campus, Institute of Industrial Science, the University of Tokyo.
In Matsuura Laboratory, we will present our researches related to information security and cryptography.

Date and Time
2018/6/8(Fri.) 10:00 - 17:00
2018/6/9(Sat.) 10:00 - 17:00
Research Topics
Cryptography
Generic Construction of Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
It is known that public-key encryption with keyword search (PEKS) can be constructed from attribute-based encryption (ABE), but the opposite is unproved. In this paper, we propose a generic construction of key-policy ABE from PEKS.
Continual Auxiliary Leakage Resilient Signatures
Leakage-resilient cryptography is practically desirable since it guarantees that even if the secret-keys are partially leaked, the security remains. We propose the first secure constructions of digital signature, identity-based signature, and attribute-based signature, resilient to the continual auxiliary leakage.
Machine Learning
Adversarial examples generation for black-box classifier with less number of queries
Deep learning has achieved high accuracy in many kind of tasks e.g. image recognition. At the same time, it is possible to cheat a classifier only by adding slight perturbations to an input data. This is called adversarial examples. In this research, we propose a method to generate adversarial examples for black-box classifier with less number of queries.
Distributed ledger
Security proof of POW-type blockchain
Blockchain is a distributed ledger technology, which has a potential to construct multiparty consensus protocols without a trusted third party. This technology is spreading to apply such as cryptocurrencies and others. Bitcoin adopts a blockchain with proof-of-work (POW). We introduce a security proof of such blockchain, and resulting implications.
Information Lifecycle Control Employing Blockchain and Secret Sharing
Many of our communication tools are not resilient to censorship: when a server becomes a target of censorship, it can be an application-level privacy threat to users. In this research, combining public blockchain and secret sharing, we propose an auto deleting application that is resilient to censorship.
Control system security
Improvement of Anomaly Detection Performance using Packet Flow Regularity in Industrial Control Network
Cyber attacks against Industrial Control Systems have increased. This research demonstrates the improvement of detection performance using packet flow regularity in industrial control networks. In particular, we propose the anomaly detection method with word2vec utilized in natural language processing.

IIS Open House 2018, Matsuura Lab.