Matsuura Laboratory Previous Members (from 2008)

3/2016

Position Name Link
Doctor CourseSatsuya Ohata 
Master CourseKenjiro Nakata 
Master CourseShiori Shinoda 
Visiting studentTobias Fuchs 

Satsuya Ohata

  • Doctor Course
Interest
  • Cryptography
Publications
  • Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura. On Rigorous Security of Password Recovery Protocols, 2015[detail]
  • Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption, Lecture Notes in Computer Science (Topics in Cryptology: CT-RSA2015), Vol.9048, pp.410-428, 2015[detail]
  • Satsuya Ohata. On the Key Re-splittability of Threshold Public Key Encryption, 2014
  • Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. More Constructions of Re-splittable Threshold Public Key Encryption, Lecture Notes in Computer Science (Advances in Information and Computer Security, The 9th International Workshop on Security: IWSEC2014), Vol.8639, pp.109-118, 2014[detail]

Kenjiro Nakata

  • Master Course
Interest
  • Anonymous Communication

Shiori Shinoda

  • Master Course
Interest
  • Security Management

Tobias Fuchs

  • Visiting student
Interest
  • Physical Unclonable Function, Anonymous Communication

3/2015

Position Name Link
Doctor CourseBongkot Jenjarrussakul 
Master CourseFeng Fei 
Master CourseToshinori Usui 
Research StudentKeisuke Katayama 

Bongkot Jenjarrussakul

  • Doctor Course
Interest
  • Security Management
Publications
  • Bongkot Jenjarrussakul, Kanta Matsuura. Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels , 13th Workshop on the Economics of Information Security (WEIS2014), pp.on web, 2014[detail]
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks , 11th Workshop on the Economics of Information Security (WEIS2012), pp.on web, 2012[detail]
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Impact on Information Security from the Great East Japan Earthquake on March 11, 2011, Eighth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2012[detail]
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Empirical Study on Interdependency of Information Security Between Industrial Sectors and Regions, Seventh Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2011[detail]

Feng Fei

  • Master Course
Interest
  • Anonymous Communication

Toshinori Usui

  • Master Course
Interest
  • Anti-malware, Anomaly Detection

Keisuke Katayama

  • Research Student
Interest
  • Biometrics

3/2014

Position Name Link
Doctor CourseTakao Murakami 
Master CourseKenichi Yokote 
Master CourseTeppei Takagi 

Takao Murakami

  • Doctor Course
Interest
  • Biometrics
Publications
  • Kenta Takahashi, Takao Murakami. A Measure of Information Gained through Biometric Systems, Elsevier Image and Vision Computing, Vol.32, No.12, pp.1194-1203, 2014[detail]
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification, IEICE Transactions on Information and Systems, Vol.E97-D, No.3, pp.510-523, 2014[detail]
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. Toward Optimal Fusion Algorithms with Security against Wolves and Lambs in Biometrics, IEEE Transactions on Information Forensics and Security (IEEE TIFS), Vol.9, No.2, pp.259-271, 2014[detail]
  • Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii. Probabilistic Enhancement of Approximate Indexing in Metric Spaces, Elsevier Information Systems, Vol.38, No.7, pp.1007-1018, 2013[detail]
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. Towards Optimal Countermeasures against Wolves and Lambs in Biometrics, Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), 2012[detail]
  • Takao Murakami, Kenta Takahashi. Fast and Accurate Biometric Identification Using Score Level Indexing and Fusion, Proceedings of IEEE/IAPR International Joint Conference on Biometrics (IJCB 2011), CD-ROM, 2011[detail]
  • Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii. Versatile Probability-based Indexing for Approximate Similarity Search, Proceedings of 4th International Conference on SImilarity Search and APplications (SISAP 2011), pp.51-58, 2011[detail]

Kenichi Yokote

  • Master Course
Interest
  • Network Security, Software Security

Teppei Takagi

  • Master Course
Interest
  • Network Security, Machine Learning

12/2013

Position Name Link
Visiting studentAndreas Gutmann 

Andreas Gutmann

  • Visiting student
Interest
  • Asymmetric Cryptography, Provable Security

3/2012

Position Name Link
Master CourseKen Ichikawa 

Ken Ichikawa

  • Master Course
Interest
  • Network Security, Software Security
Publications
  • Ken Ichikawa, Kanta Matsuura. Preventing execution of JIT shellcode by isolating running process, Annual Computer Security Applications Conference 2011, 2011

3/2011

Position Name Link
Doctor CourseTakahiro Matsuda 
Master CourseDaiki Chiba 

Takahiro Matsuda

  • Doctor Course
Interest
  • Cryptography, Provable Security, Computer Security
Publications
  • Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii. Probabilistic Enhancement of Approximate Indexing in Metric Spaces, Elsevier Information Systems, [detail]
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2012, 15th International Conference on Practice and Theory in Public Key Cryptography: PKC 2012), Vol.7293, pp.576-594, 2012[detail]
  • Takahiro Matsuda, Kanta Matsuura. On Black-Box Separations among Injective One-Way Functions, Lecture Notes in Computer Science (Theory of Cryptography, 8th Theory of Cryptography Conference: TCC 2011), Vol.6597, pp.597-614, 2011
  • Takahiro Matsuda, Kanta Matsuura. Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2011, 14th International Conference on Practice and Theory in Public Key Cryptography: PKC 2011), Vol.6571, pp.246-264, 2011[detail]
  • Takahiro Matsuda, Yasumasa Nakai, Kanta Matsuura. Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability, Lecture Notes in Computer Science (Pairing-Based Cryptography, 4th International Conference on Pairing-Based Cryptography: Pairing 2010), Vol.6487, pp.225-245, 2010[detail]
  • Takahiro Matsuda, Kanta Matsuura, Jacob C. N. Schuldt. Efficient Constructions of Signcryption Schemes and Signcryption Composability, Lecture Notes in Computer Science (Progress in Cryptology, 10th International Conference on Cryptology in India: INDOCRYPT 2009), Vol.5922, pp.321-342, 2009[detail]
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations, Lecture Notes in Computer Science (Topics in Cryptology: CT-RSA2009), Vol.5473, pp.16-31, 2009[detail]
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption, Lecture Notes in Computer Science (The 11th International Conference on Information Security and Cryptology: ICISC2008), Vol.5461, pp.1-19, 2008[detail]
  • Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions, IEICE Transactions on Information and Systems, Vol.E91-D, No.5, pp.1466-1476, 2008[detail]
  • Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function, Lecture Notes in Computer Science (Provable Security-First International Conference: ProvSec 2007), Vol.4784, pp.68-84, 2007[detail]
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A Practical Provider Authentication System for Bidirectional Broadcast Service, Lecture Notes in Computer Science (11th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems:KES 2007), Vol.4694, pp.967-974, 2007[detail]

Daiki Chiba

  • Master Course
Interest
  • Network Security, Cryptography
Publications
  • Daiki Chiba, Takahiro Matsuda, Jacob C.N. Schuldt, Kanta Matsuura. Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting, Lecture Notes in Computer Science (9th International Conference on Applied Cryptography and Network Security: ACNS 2011), Vol.6715, pp.220-237, 2011

11/2010

Position Name Link
Project ResearcherTakashi Kitagawa 

Takashi Kitagawa

  • Project Researcher
Interest
  • Information Security

9/2010

Position Name Link
Doctor CourseJacob Schuldt 
Master CourseYi SHI 

Jacob Schuldt

  • Doctor Course
Interest
  • Cryptography, Provable Security
Publications
  • Jacob C.N. Schuldt, Kanta Matsuura. On-line Non-transferable Signatures Revisited, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2011, 14th International Conference on Practice and Theory in Public Key Cryptography: PKC 2011), Vol.6571, pp.369-386, 2011[detail]
  • Jacob Schuldt, Kanta Matsuura. Efficient Convertible Undeniable Signatures with Delegatable Verification, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.94-A, No.1, pp.71-83, 2011
  • Jacob C. N. Schuldt, Kanta Matsuura. An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification, Lecture Notes in Computer Science (6th International Conference on Information Security Practice and Experience: ISPEC2010), Vol.6047, pp.276-293, 2010
  • Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson. Proxy Signatures Secure Against Proxy Key Exposure, Lecture Notes in Computer Science (11th International Workshop on Practice and Theory in Public Key Cryptography : PKC'08), Vol.4939, pp.141-161, 2008[detail]
  • James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt. Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards, Lecture Notes in Computer Science (12th Australasian Conference on Information Security and Provacy: ACISP 2007), Vol.4586, pp.274-292, 2007[detail]

Yi SHI

  • Master Course
Interest
  • Anonymous Communication, Network Security
Publications
  • Yi Shi, Kanta Matsuura. Fingerprinting Attack on the Tor Anonymity System, Lecture Notes in Computer Science (11th International Conference on Information and Communications Security: ICICS 2009), Vol.5927, pp.425-438, 2009[detail]

6/2010

Position Name Link
Visiting StudentShaojing Fu 

Shaojing Fu

  • Visiting Student
Interest
  • Coding, Public Key Cryptography
Publications
  • Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu. Construction of highly nonlinear resilient S-boxes with given degree , Designs, Codes and Cryptography, Vol.64, No.3, pp.241-253, 2012[detail]
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Construction of Even- variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, SCIENCE CHINA Information Sciences, Vol.56, No.3, pp.1-9, 2013[detail]
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Blanced 2p-variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, Applied mathematical Letters, Vol.24, No.12, pp.2093-2096, 2011[detail]
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu.. Construction of Odd- variable Resilient Boolean Functions with Optimal Degree, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.VE94-A, pp.265-267, 2011[detail]
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Enumeration of Balanced Symmetric Functions over GF(p), Information Processing Letters, Vol.110, pp.544-548, 2010
  • Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu. Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, Lecture Notes in Computer Science (The 8th International Conference on Cryptology and Network Security: CANS 2009), Vol.5888, pp.402-412, 2009

3/2010

Position Name Link
Doctor CoursePeng YANG 
Master Course 2Yasumasa Nakai 
SecretaryNaoko Hashizume 

Peng YANG

  • Doctor Course
Interest
  • Information security, encryption schemes with high functionalities, security notinos.
Publications
  • Peng Yang, Kanta Matsuura. An Introduction of A Users’ Guideline to Japan Cryptographic Module Validation Program, ASIACCS 2010 (5th ACM Symposium on Information, Computer and Communications Security), 2010
  • Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai. Generic Construction of Stateful Identity Based Encryption, Lecture Notes in Computer Science (Information Security, 12th International Conference: ISC2009), Vol.5735, pp.338-346, 2009
  • Peng Yang, Kanta Matsuura. A Forward Secure Identity Based Encryption Scheme with Master Key Update, Proceedings of 2008 International Symposium on Information Theory and its Applications (ISITA2008), CD-ROM, 2008[detail]
  • Peng Yang, Kanta Matsuura. Stateful Public Key Encryption: How to Remove Gap Assumptions and Maintaining Tight Reductions, Proceedings of 2008 International Symposium on Information Theory and its Applications (ISITA2008), CD-ROM, 2008[detail]
  • Takashi Kitagawa, Peng Yang, Goichro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai. Generic Transforms to Acquire CCA-Security for Identity Based Encryptions: The Cases of FOpkc and REACT, Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006), Vol.4058, pp.348-359, 2006[detail]
  • Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang. Relations among Notions of Security for Identity Based Encryption Schemes, Lecture Notes in Computer Science (LATIN 2006: Theoretical Informatics: 7th Latin American Symposium), Vol.3887, pp.130-141, 2006[detail]
  • Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai. Applying Fujisaki-Okamoto to Identity-Based Encryption, Lecture Notes in Computer Science (Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium: AAECC-16), Vol.3857, pp.183-192, 2006[detail]
  • Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai. A Simple Approach to Evaluate Fujisaki-Okamoto Conversion in Identity Based Encryption, Proceedings of the 2006 International Symposium on Information Theory and Its Applications (ISITA'06), pp.507-512, 2006[detail]

Yasumasa Nakai

  • Master Course 2
Interest
  • Cryptography, Computer Security
Publications
  • Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, Kanta Matsuura. A Generic Construction of Timed-Release Encryption with Pre-open Capability, Lecture Notes in Computer Science (Advances in Information and Computer Security, The 4th International Workshop on Security: IWSEC2009), Vol.5824, pp.53-70, 2009[detail]

Naoko Hashizume

  • Secretary
Interest

3/2009

Position Name Link
Master CourseYu WatanabeLink

Yu Watanabe

  • Master Course
Interest
  • Computer Security, Parallel and Distributed Computing

3/2008

Position Name Link
Master CourseWataru Kitada 
Master CourseVadim Jefte Zendejas Samano 
Master CoursePhan Thi Lan Anh 

Wataru Kitada

  • Master Course
Interest
  • Cryptology
Publications
  • Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Unconditionally Secure Chaffing-and-Winnowing for Multiple Use, Lecture Notes in Computer Science (International Conference on Information Theoretic Security: ICITS 2007), Vol.4883, pp.133-145, 2007[detail]

Vadim Jefte Zendejas Samano

  • Master Course
Interest
  • Mail Security
Publications
  • Vadim Jefte Zendejas Samano, Takuro Hosoi, Kanta Matsuura. Time Categorization in a Social-Network-Analysis Spam Filter, Workshop on Information Security Applications (WISA2008), CD-ROM, 2008[detail]

Phan Thi Lan Anh

  • Master Course
Interest
  • Cryptography
Publications
  • Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Construcrtions and Formal Security Proofs, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E90-A, No.9, pp.1814-1829, 2007[detail]
  • Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Reducing the Spread of Damage of Key Exposure in Key Insulated Encryption, Lecture Notes in Computer Science (First International Conference on Cryptology in Vietnam: VietCrypt 2006), Vol.4341, pp.366-384, 2006[detail]

Matsuura Laboratory, Department of Informatics and Electronics, Institute of Industrial Science, The University of Tokyo4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan