Koichiro Akiyama
Toshiba
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Koichiro Akiyama.
public key cryptography | 2009
Koichiro Akiyama; Yasuhiro Goto; Hideyuki Miyake
We construct a public-key cryptosystem based on an NP-complete problem in algebraic geometry. It is a problem of finding sections on fibered algebraic surfaces; in other words, we use a solution to a system of multivariate equations of high degrees. Our cryptosystem is a revised version of the algebraic surface cryptosystem (ASC) we constructed earlier (cf. [AG04, AG06]). We revise its encryption algorithm to avoid known attacks. Further, we show that the key size of our cryptosystem is one of the shortest among those of post-quantum public-key cryptosystems known at present.
international conference on selected areas in cryptography | 2017
Koichiro Akiyama; Yasuhiro Goto; Shinya Okumura; Tsuyoshi Takagi; Koji Nuida; Goichiro Hanaoka
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a problem arising from a multivariate non-linear indeterminate equation. The security of lattice cryptosystems, which are considered to be the most promising candidate for a post-quantum cryptosystem, is based on the shortest vector problem or the closest vector problem in the discrete linear solution spaces of simultaneous equations. However, several improved attacks for the underlying problems have recently been developed by using approximation methods, which result in requiring longer key sizes. As a scheme to avoid such attacks, we propose a public-key encryption scheme based on the “smallest” solution problem in the non-linear solution spaces of multivariate indeterminate equations that was developed from the algebraic surface cryptosystem. Since no efficient algorithm to find such a smallest solution is currently known, we introduce a new computational assumption under which proposed scheme is proven to be secure in the sense of IND-CPA. Then, we perform computational experiments based on known attack methods and evaluate that the key size of our scheme is able to be much shorter than those of previous lattice cryptosystems.
Archive | 2002
Toru Kambayashi; Koichiro Akiyama; Shuichi Tsujimoto; Kazuo Sumita; Hideki Hirakawa; Toshihiro Kabushiki Kaisha Toshiba Sugaya
Archive | 2002
Koichiro Akiyama; Toru Kambayashi; Shuichi Tsujimoto; Naoki Endoh
Archive | 2001
Koichiro Akiyama
Archive | 2003
Toru Kambayashi; Koichiro Akiyama; Yutaka Handa; Yoshihiro Ohmori
Archive | 2003
Takeshi Saito; Mikio Hashimoto; Toru Kambayashi; Koichiro Akiyama
Archive | 2000
Toru Kambayashi; Koichiro Akiyama; Yutaka Handa; Yoshihiro Ohmori
Archive | 1998
Koichiro Akiyama; Hideki Hirakawa; Masahiro Kajiura; Tatsu Kamibayashi; Juko Sugaya; Kazuo Sumita; Shuichi Tsujimoto; 達 上林; 一男 住田; 秀樹 平川; 正浩 梶浦; 浩一郎 秋山; 寿鴻 菅谷; 修一 辻本
Archive | 1999
Koichiro Akiyama; Kazuyuki Goto; Minako Hashimoto; Yoshihiro Omori; 善啓 大盛; 和之 後藤; 美奈子 橋本; 浩一郎 秋山