Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Masayuki Yoshino is active.

Publication


Featured researches published by Masayuki Yoshino.


network-based information systems | 2011

Symmetric Searchable Encryption for Database Applications

Masayuki Yoshino; Ken Naganuma; Hisayoshi Satoh

This paper proposes an efficient symmetric searchable encryption to achieve indistinguishability of indexes and trapdoors. Previous symmetric searchable encryptions are either insecure because their trapdoor generation algorithms are not probabilistic or inefficient because of the heavy cost due to pairing-based computation. Our searchable encryption is the first that satisfies both requirements of efficiency and indistinguishablity (security). Furthermore, we introduce a limitation of the latest definition of indistinguishability for searchable encryption when each cell in the database is encrypted. We hereby define a new game for database usage and show that our scheme is provably secure in this new game.


international conference on selected areas in cryptography | 2006

Unbridle the bit-length of a crypto-coprocessor with montgomery multiplication

Masayuki Yoshino; Katsuyuki Okeya; Camille Vuillaume

We present a novel approach for computing 2n-bit Montgomery multiplications with n-bit hardware Montgomery multipliers. Smartcards are usually equipped with such hardware Montgomery multipliers; however, due to progresses in factoring algorithms, the recommended bit length of public-key schemes such as RSA is steadily increasing, making the hardware quickly obsolete. Thanks to our doublesize technique, one can re-use the existing hardware while keeping pace with the latest security requirements. Unlike the other double-size techniques which rely on classical n-bit modular multipliers, our idea is tailored to take advantage of n-bit Montgomery multipliers. Thus, our technique increases the perenniality of existing products without compromises in terms of security.


ieee international conference on cloud computing technology and science | 2013

Key Update Mechanism for Network Storage of Encrypted Data

Dai Watanabe; Masayuki Yoshino

Cryptography is now popularized and is widely used anywhere for many aims such as data confidentiality and integrity. The key of cryptography has a lifetime, thus a key update issue is well-known to be one of hard problems in practice. According to the National Institute of Standards and Technology SP 800-57, the lifetime of the cryptographic key and the lifetime of encrypted data are strictly limited. In other words, the encrypted data is required to be periodically re-encrypted. In this paper, we point out that this key update issue is now crucial in network storage and propose a key update mechanism efficiently reducing the communication and computation cost of re-encryption.


australasian conference on information security and privacy | 2007

Double-size bipartite modular multiplication

Masayuki Yoshino; Katsuyuki Okeya; Camille Vuillaume

This paper proposes new techniques of double-size bipartite multiplications with single-size bipartite modular multiplication units. Smartcards are usually equipped with crypto-coprocessors for accelerating the computation of modular multiplications, however, their operand size is limited. Security institutes such as NIST and standards such as EMV have recommended or forced to increase the bit-length of RSA cryptography over years. Therefore, techniques to compute double-size modular multiplications with single-size modular multiplication units has been studied this decade to extend the life expectancy of the low-end devices. We propose new double-size techniques based on multipliers implementing either classical or Montgomery modular multiplications, or even both simultaneously (bipartite modular multiplication), in which case one can potentially compute modular multiplications twice faster.


International Journal of Information Security | 2009

Bipartite modular multiplication with twice the bit-length of multipliers

Masayuki Yoshino; Katsuyuki Okeya; Camille Vuillaume

This paper presents a new technique to compute 2ℓ-bit bipartite multiplications with ℓ-bit bipartite multiplication units. Low-end devices such as smartcards are usually equipped with crypto-coprocessors for accelerating the heavy computation of modular multiplications; however, security standards such as NIST and EMV have declared extending the bit length of RSA cryptosystem to resist mathematical attacks, making the multiplier quickly outdated. Therefore, the double-size techniques have been studied this decade to extend the life expectancy of such multipliers. This paper proposes new double-size techniques based on the multipliers implementing either classical or Montgomery modular multiplications, or even both simultaneously (bipartite modular multiplication), in which case one can potentially compute modular multiplications twice faster. Furthermore, in order to get a more realistic estimation than the other works, this paper considers not only the cost of the multiplication, but also the cost of the other arithmetic instructions. In our estimation, the proposal provides comparable results for classical multiplier and Montgomery multiplier, and is the only available method for the bipartite multiplier.


smart card research and advanced application conference | 2008

A Black Hen Lays White Eggs

Masayuki Yoshino; Katsuyuki Okeya; Camille Vuillaume

This paper proposes novel algorithms for computing double-size modular multiplications with few modulus-dependent precomputations. Low-end devices such as smartcards are usually equipped with hardware Montgomery multipliers. However, due to progresses of mathematical attacks, security institutions such as NIST have steadily demanded longer bit-lengths for public-key cryptography, making the multipliers quickly obsolete. In an attempt to extend the lifespan of such multipliers, double-size techniques compute modular multiplications with twice the bit-length of the multipliers. Techniques are known for extending the bit-length of classical Euclidean multipliers, of Montgomery multipliers and the combination thereof, namely bipartite multipliers. However, unlike classical and bipartite multiplications, Montgomery multiplications involve modulus-dependent precomputations, which amount to a large part of an RSA encryption or signature verification. The proposed double-size technique simulates double-size multiplications based on single-size Montgomery multipliers, and yet precomputations are essentially free: in an 2048-bit RSA encryption or signature verification with public exponent e= 216+ 1, the proposal with a 1024-bit Montgomery multiplier is 1.4 times faster than the best previous technique.


international workshop on security | 2018

Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem

Sota Onozawa; Noboru Kunihiro; Masayuki Yoshino; Ken Naganuma

In ACM CCS 2015, Naveed et al. proposed attacks using plaintext auxiliary data for databases encrypted by ordered preserving encryption or more general property preserving encryptions. Their attacks are based on the Hungarian algorithm for solving the linear sum assignment problem (LSAP). In this work, we define a new assignment optimization problem with an additional condition of order structure and propose a search algorithm for finding its exact solution. We apply the new algorithm to attack an encrypted database in the same situation as Naveed et al. and found that our proposed method improves the success probability of the attacks compared with the attacks of Naveed et al.


international conference on model-driven engineering and software development | 2018

Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.

Tian Xia; Hironori Washizaki; Takehisa Kato; Haruhiko Kaiya; Shinpei Ogata; Eduardo B. Fernandez; Hideyuki Kanuka; Masayuki Yoshino; Dan Yamamoto; Takao Okubo; Nobukazu Yoshioka; Atsuo Hazeyama

Security and privacy are important in cloud services. Numerous security and privacy patterns as well as nonpattern-based knowledge such as practices and principles exist in cloud services. Selecting and combining the appropriate knowledge is difficult due to numerous options and the nature of the layered cloud stack. Herein we propose a metamodel called the Cloud Security and Privacy Metamodel (CSPM) to handle security and privacy in cloud service development and operations. CSPM can classify and support existing cloud security and privacy patterns and practices in a consistent and uniform manner. Moreover, we propose a security and privacy aware process to develop cloud system utilizing CSPM. Several case studies verify the effectiveness and usability of our approach. As a result, we confirmed effectiveness and usability of CSPM, as well as some possible future work.


signal-image technology and internet-based systems | 2013

How to Evaluate Contents Popularity over Oblivious Transfer

Ken Naganuma; Hisayoshi Sato; Masayuki Yoshino; Yoshinori Sato

We consider the question of how to evaluate popularity of digital contents or goods over a distribution service using Oblivious Transfer (OT) protocol. The popularity of served content is the most important marketing data for data mining and analysis, but the idea of oblivious transfer is too privacy-protecting because the service provider cannot obtain any information about a users queries. In this paper, our goal is to construct an OT protocol that 1) allows a user to purchase digital content from the service provider without the provider finding out what content the user is buying, 2) prevents the user find out about any information of other contents that s/he does not ask about, and 3) enables the provider to evaluate the popularity of each piece of content. In this paper, the popularity of each piece of content is defined as the number of users who retrieve it.


the cryptographers track at the rsa conference | 2009

Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients

Masayuki Yoshino; Katsuyuki Okeya; Camille Vuillaume

A technique for computing the quotient (

Collaboration


Dive into the Masayuki Yoshino's collaboration.

Researchain Logo
Decentralizing Knowledge