Professor
Assist.Prof.
Keywords
Cryptographic Protocol, Key Exchange, Functional Encryption, Elliptic Curve, Pairing, 2-party / Multi-party Computation
We are engaged in research and development on information security and cryptographic technologies that are required for secure communication and information processing on the Internet. Modern cryptographic technology is designed to be provably secure based on computational hard problems such as prime factorization problem and discrete logarithm problem, so theoretical analysis to prove its security is required. On the other hand, cryptographic technology is actually used in the Internet, so efficiency and practicality are also important. Based on these theoretical and practical viewpoints, we do research and development on information security, especially public key cryptography and cryptographic protocols, with the following research topics.
Cryptographic Protocol
We do research and development on cryptographic protocols, which realize advanced functions using cryptographic primitives, e.g., key exchange protocol TLS widely used in the Internet, and distributed ledger technology block chain used in Bitcoin etc. We design and implement secure and efficient cryptographic protocols.
Functional Encryption
We do research and development on functional encryption and other highly functional cryptographic primitives, e.g., ID-based encryption, and anonymous signature etc. We also study and implement efficient algorithms for elliptic curve and pairing, which is the basis of the functional encryption and highly functional cryptographic primitives.

Elliptic Curve
2-party / Multi-party Computation
We do research and development on 2-party / multi-party computation, which is the key technology to utilize sensitive information, e.g., personal information and medical information, effectively, while keeping privacy. 2-party / multi-party computation is a “universal” cryptographic protocol that can compute arbitrary function on inputs of the parties, without revealing the inputs.