Papers
- Fuzzy Signature with Biometric-Independent Verification
Haruna Higo, Toshiyuki Isshiki, Saki Otsuki, and Kenji Yasunaga
BIOSIG 2023.
[DOI]
- Rational Broadcast Protocols against Timid Adversaries
Keigo Yamashita and Kenji Yasunaga
GameSec 2023.
[DOI]
[ePrint]
- Bit-Security Preserving Hardness Amplification
Shun Watanabe and Kenji Yasunaga
TCC 2024 (to appear).
[ePrint]
- Perfectly Secure Message Transmission Against Rational Adversaries
Maiki Fujita, Takeshi Koshiba, Kenji Yasunaga
IEEE Journal on Selected Areas in Information Theory, 2022. [DOI]
Full version of the work appeared at GameSec 2019
and GameSec 2018 (Outstanding Paper Award).
- Unified View for Notions of Bit Security
Shun Watanabe and Kenji Yasunaga
Asiacrypt 2023.
[DOI]
[ePrint]
- Bit Security as Computational Cost for Winning Games with High Probability
Shun Watanabe and Kenji Yasunaga
Asiacrypt 2021.
[DOI]
[ePrint]
- Improved Asymptotic Bounds for Codes Correcting Insertions and Deletions
Kenji Yasunaga
Designs, Codes and Cryptography, 2024.
[DOI]
[arXiv]
-
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
Information-Theoretic Cryptography (ITC) 2021.
[DOI]
[ePrint]
- Practical Card-Based Protocol for Three-Input Majority
Kenji Yasunaga
IEICE Trans. Fundamentals, 2020.
[DOI]
[ePrint]
- On the List Decodability of Insertions and Deletions
Tomohiro Hayashi and Kenji Yasunaga
IEEE Transactions on Information Theory, 2020.
[DOI]
[arXiv]
- Rational Proofs against Rational Verifiers
Keita Inasawa and Kenji Yasunaga
IEICE Trans. Fundamentals, 2017.
[DOI]
[PDF]
- Repeated Games for Generating Randomness in Encryption
Kenji Yasunaga and Kosuke Yuzawa.
IEICE Trans. Fundamentals, 2018.
[DOI]
[PDF]
- Game-Theoretic Security for Two-Party Protocols
Haruna Higo, Keisuke Tanaka, Akihiro Yamada, and Kenji Yasunaga.
Manuscript. [ePrint]
Part of the work appeared at ACISP 2012 and IWSEC 2013.
- Error-Correcting Codes against Chosen-Codeword Attacks
Kenji Yasunaga.
ICITS 2016.
[DOI]
[PDF]
- Error Correction by Structural Simplicity: Correcting Samplable Additive Errors
Kenji Yasunaga.
The Computer Journal, 2018.
[DOI]
[arXiv]
-
On the Limitations of Computational Fuzzy Extractors
Kenji Yasunaga and Kosuke Yuzawa.
IEICE Trans. Fundamentals, 2022.
[DOI]
[ePrint]
- Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model
Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, and Kenji Yasunaga.
IEICE Trans. Fundamentals, 2015.
[DOI]
[PDF]
- General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, and Kenji Yasunaga
The Computer Journal, 2017.
[DOI]
[ePrint]
- Game-Theoretic Security for Bit Commitment
Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
IWSEC 2013.
[PDF]
[DOI]
- List Decoding of Reed-Muller Codes Based on a Generalized Plotkin Construction
Kenji Yasunaga
IEICE Trans. Fundamentals, 2013.
[PDF]
- Public-Key Encryption with Lazy Parties
Kenji Yasunaga
IEICE Trans. Fundamentals, 2016.
[PDF]
[ePrint]
SCN 2012.
[PDF]
[DOI]
- A Game-Theoretic Perspective on Oblivious Transfer
Haruna Higo, Keisuke Tanaka, Akihiro Yamada, and Kenji Yasunaga
ACISP 2012.
[PDF]
[DOI]
- Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
Manh Ha Nguyen, Keisuke Tanaka, and Kenji Yasunaga
IEICE Trans. Fundamentals, 2013.
[PDF]
ACISP 2012.
[DOI]
- Randomness Leakage in the KEM/DEM Framework
Hitoshi Namiki, Keisuke Tanaka, and Kenji Yasunaga
IEICE Trans. Fundamentals, 2014.
[PDF]
ProvSec 2011.
[PDF]
[DOI]
- Weak Oblivious Transfer from Strong One-Way Functions
Keisuke Tanaka, Akihiro Yamada, and Kenji Yasunaga
ProvSec 2011.
[PDF]
[DOI]
- On Correctable Errors of Binary Linear Codes
Kenji Yasunaga and Toru Fujiwara
IEEE Transactions on Information Theory, June 2010.
[PDF]
[DOI]
- Monotone Error Structure and Local Weight
Distribution of Linear Codes
Kenji Yasunaga
Ph.D. Dissertation, Osaka University, January 2008.
[PDF] [PS]
- Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code
Kenji Yasunaga, Toru Fujiwara, and Tadao Kasami
IEICE Trans. Fundamentals, 2007.
- Determination of the Local Weight Distribution of Binary Linear Block Codes
Kenji Yasunaga and Toru Fujiwara
IEEE Transactions on Information Theory, October 2006.
[PDF]
[DOI]
解説論文・記事
-
暗号におけるゲーム理論
安永 憲司
コンピュータソフトウェア, 2017年.
[DOI]
-
符号理論の視点による擬似ランダム構造の統一的理解
安永 憲司
電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review, 2011年.
[DOI]
Talk Slides
- Rational Broadcast Protocols against Timid Adversaries
GameSec 2023, Avignon, France, October 2023.
[PDF]
- Quantifying the Security Levels of Cryptographic Primitives
TENCON 2022 (Invited Talk), Hong Kong/Online, November 2022.
[PDF]
- Perfectly Secure Message Transmission Against Independent Rational Adversaries
GameSec 2019, November 2019.
[PDF]
- On the List Decodability of Insertions and Deletions
Workshop on Error Correcting Codes 2018. (Updated version of ISIT 2018.)
[PDF]
- Error-Correcting Codes against Chosen-Codeword Attacks
ICITS 2016, August 2016.
[PDF]
- Correction of Samplable Additive Errors
ISIT 2014, July 2014.
[PDF]
- Public-Key Encryption with Lazy Parties
Cryptography Seminar at Kyushu University, Dec. 2012.
[PDF]
- A Game-Theoretic Perspective on Oblivious Transfer
Cryptography Seminar at Kyushu University, May 2012.
[PDF]
- Randomness Leakage in the KEM/DEM Framework
ProvSec 2011.
[PDF]
- Uncorrectable Errors of Weight Half the
Minimum Distance for Binary Linear Codes
ISIT 2008.
[PDF]
- The number of correctable errors of weight d/2+1
for the 1st-order Reed-Muller code
Poster presentation at Osaka University, 2008.
[PDF]
- Correctable Errors of Weight
Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes
AAECC-17, 2007.
[PDF]
- On Trial Set and Uncorrectable Errors for the First-Order Reed-Muller Codes
HISC 2007.
[PDF]
- Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code
HISC 2006.
[PDF]
- Relations between the Local Weight Distributions
of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode
ISIT 2005.
[PDF]
- The Local Weight Distributions of Transitive Invariant Codes and Their Punctured Codes
HISC 2005.
[PDF]
- An Algorithm for Computing the Local Weight Distribution
of Binary Linear Codes Closed under a Group of Permutations
ISITA 2004.
[PDF]
Talk Slides in Japanese
- 挿入や削除を訂正する符号のサイズの上界・下界
エクスパンダーグラフの新しい構成手法の確立とその応用2, 九州大学マス・フォア・インダストリ研究所, 2023年9月.
[PDF]
- 判定問題が128ビット安全であるとは?
SCIS 2023, 小倉, 2023年1月.
[PDF]
- 挿入・削除訂正符号のサイズの上下界式
第45回情報理論とその応用シンポジウム(ポスター), 登別,2022年12月.
[PDF]
- 明示的構成の計算量と値域回避問題
エクスパンダーグラフの構成手法の確立とその応用,九州大学マス・フォア・インダストリ研究所,2022年8月.
[PDF]
- すべての通信路が敵に支配されてもゲーム理論的には安全な通信ができる
LA シンポジウム, 2020年2月.
[PDF]
- エクスパンダーグラフと誤り訂正符号
実験計画法と符号および関連する組み合わせ構造,2019年11月.
[PDF]
- 暗号技術に対するゲーム理論的なアプローチ
第9回 暗号及び情報セキュリティと数学の相関ワークショップ (CRISMATH 2017),
2017年12月.
[PDF]
- ブロックチェーン・暗号通貨の数理
金沢大学暗号理論勉強会, 2017年6月.
[PDF]
- 訂正可能な削除割合の限界
第1回情報理論および符号理論とその応用ワークショップ, 2017年2月.
[PDF]
- 不完全な乱数と暗号
ELC 暗号理論秋学校,
河口湖セントビレッヂ, 2015年9月.
[PDF]
- 計算量制限通信路における誤り訂正
第3回誤り訂正符号のワークショップ, 2014年9月.
[PDF]
- ゲーム理論と暗号
ELC 暗号理論秋学校,
河口湖セントビレッヂ, 2014年9月.
[PDF]
- 計算量的ファジィ抽出器
暗号理論ワークショップ, 2014年3月.
[PDF]
- ブラックボックス構成とその限界
暗号理論秋学校,
河口湖セントビレッヂ, 2013年9月.
[PDF]
- Error Correction in Computationally Bounded Channels
第六回計算量理論若手の会ワークショップ, 米沢, 2013年9月.
[PDF]
- なまけもの暗号
第6回公開鍵暗号の安全な構成とその応用ワークショップ, 2013年3月.
[PDF]
- 効率的に計算可能な加法的誤りの訂正可能性
SITA 2012, 別府, 2012年12月.
[PDF]
- 合理的な秘密分散における不可能性とその回避方法
CSS 2012, 松江, 2012年10月.
[PDF]
- 暗号理論とゲーム理論
暗号理論秋学校,
河口湖セントビレッヂ, 2012年9月.
[PDF]
- 非同時通信路における合理的秘密分散
情報セキュリティ研究会, 2012年5月.
[PDF]
- Reed-Solomon 符号と擬似ランダム性
電子情報通信学会ソサイエティ大会, 2010年9月.
[PDF]
- List decoding for Reed-Muller codes and its application to polar codes
Private presentation, 2010年5月.
[PDF]
- 誤り訂正符号の訂正能力分析
コンピュテーション研究会, 2009年3月.
[PDF]
- 誤り訂正符号における誤りの単調性を利用した訂正能力分析
GCOE seminar, 2008年10月.
[PDF]
- ネットワーク符号化
Private presentation, 2008年5月.
[PDF]
- Expander 符号
Private presentation, 2008年4月.
[PDF]
- Monotone Error Structure and Local Weight Distribution of Linear Codes
公聴会, 2007年10月
[PDF]
- expander 符号に関する文献調査
Private presentation, 2005年12月
[PDF]