Tadanori Teruya

J-GLOBAL         Last updated: Jul 24, 2017 at 17:37
 
Avatar
Name
Tadanori Teruya
Nickname
tadanori.teruya
E-mail
tadanori.teruyaaist.go.jp
URL
http://dblp.dagstuhl.de/pers/hd/t/Teruya:Tadanori
Affiliation
National Institute of Advanced Industrial Science and Technology
Job title
Researcher
Degree
Ph.D. (engineering)(University of Tsukuba)
ORCID ID
0000-0003-4362-4887

Profile

ORCID: http://orcid.org/0000-0003-4362-4887
ResearcherID: http://www.researcherid.com/rid/O-1145-2016

====

I'm a researcher.

My research interests include computer arithmetic, efficient software implementation, applications of cryptography, secure computation, formally verification of implementations, computer science, mathematics, so many things but they relate to the aspects of "real world" of cryptography.

Research Areas

 
 

Academic & Professional Experience

 
Apr 2016
 - 
Today
Rsearcher, Advanced Cryptosystems Rsearch Group (CRYPTO), Infomation Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)
 
Apr 2015
 - 
Mar 2016
AIST Postdoctoral Researcher, Advanced Cryptosystems Research Group (CRYPTO), Information Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)
 
Apr 2014
 - 
Mar 2015
AIST Postdoctoral Researcher, Research Group for Innovative Cryptography, Research Institute for Secure Systems, National Institute of Advanced Industrial Science and Technology
 
Apr 2013
 - 
Mar 2014
AIST Postdoctoral Researcher, Innovative Security Research Group, Research Institute for Secure Systems, National Institute of Advanced Industrial Science and Technology
 
Apr 2012
 - 
Mar 2013
(Postdoctoral) Researcher, Faculty of Engineering, Information and Systems, University of Tsukuba
 

Education

 
Apr 2009
 - 
Mar 2012
Doctor's Program in Risk Engineering, Graduate School of System and Information Engineering, University of Tsukuba
 
Apr 2007
 - 
Mar 2009
Master's Program in Risk Engineering, Graduate School of System and Information Engineering, University of Tsukuba
 
Apr 2003
 - 
Mar 2007
College of Information Sciences, Third Cluster of Colleges, University of Tsukuba
 

Published Papers

 
Tadanori Teruya, Yoshiki Aoki, and Jun Sakuma
Proceedings of International Symposium on Information Theory and Its Applications (ISITA) 2016      Oct 2016   [Refereed]
To appear
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama and Shigenori Uchiyama
Lecture Notes in Computer Science, Proceedings of 11th Advances in Information and Computer Security   9836 319-334   Sep 2016   [Refereed]
Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, and Shota Yamada
Lecture Notes in Computer Science, Proceedings of 14th International Conference on Applied Cryptography and Network Security   9696 249-266   Jun 2016   [Refereed]
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama
JSIAM Letters   8 9-12   Feb 2016   [Refereed]
Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto
IEEE Xplore, Proceedings of 5th International Conference on IT Convergence and Security 2015 in Kuala Lumpur, Malaysia   1-5   Aug 2015   [Refereed]
Tadanori Teruya, Koji Nuida, Kana Shimizu, and Goichiro Hanaoka
Lecture Notes in Computer Science, Proceedings of 10th International Workshop on Security   9241 242-261   Aug 2015   [Refereed]
Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H Sánchez-Ramírez, Tadanori Teruya, and Francisco Rodríguez-Henríquez
IEEE Transactions on Computers   64(5) 1429-1441   Jun 2015   [Refereed]
We presented not only the state-of-the-art implementation of CP-ABE, but also a pairing.
You can find the implementation of CP-ABE in http://sandia.cs.cinvestav.mx/Site.CPABE , and the implementation of pairing in https://github.com/herumi/ate-pai...
Yang Liu, Naoki Kanayama, Kazutaka Saito, Tadanori Teruya, Shigenori Uchiyama, and Eiji Okamoto
JSIAM Letter   6 69-72   Nov 2014   [Refereed]
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya, and Shigenori Uchiyama
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E97(1) 300-302   Jan 2014   [Refereed]
Tadanori Teruya, Kazutaka Saito, Naoki Kanayama, Yuto Kawahara, Tetsutaro Kobayashi, and Eiji Okamoto
Lecture Notes in Computer Science, Proceedings of 6th International Conference on Pairing-Based Cryptography (Pairing 2013)   8365 97-112   Nov 2013   [Refereed]
Tadanori Teruya and Jun Sakuma
Lecture Notes in Computer Science, Proceedings of 16th Information Security Conference (ISC)   7807 69-86   Nov 2013   [Refereed]
Naoki Kanayama, Tadanori Teruya, and Eiji Okamoto
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E94-A(6) 1285-1292   Jun 2011   [Refereed]
Jean-Luc Beuchat, Jorge Enrique González-Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, and Tadanori Teruya
Lecture Notes in Computer Science, Proceedings of 4th International Conference on Pairing-based Cryptography (Pairing)   6487 21-39   Dec 2010   [Refereed]
* Pre-print version is available at: http://eprint.iacr.org/2010/354

Conference Activities & Talks

 
Tadanori Teruya
Small-workshop on Communications between Academia and Industry for Security (SCAIS) 2016   18 Jan 2016   Suga Yuji (IIJ/Univ. of Tsukuba),Koji Nuida (AIST/JST PRESTO),Takuya Hayashi (NICT)
秘密を守るだけじゃない!これからの暗号技術
Tadanori Teruya
140th Risk Engineering Research Meeting   26 Oct 2015   Takashi Nishide
Tadanori Teruya
Cryptography Seminar in the Institute of Mathematics for Industry at Kyushu University   14 Sep 2015   Institute of Mathematics for Industry at Kyushu University
The human genome can identify an individual and determine the individual's biological characteristics. Furthermore, the genome is immutable, and an individual's genome has correlations to those of the individual's progeny. Hence, the genome has to...
Tadanori Teruya
Privacy-aware computational genomics 2015   8 Sep 2015   Kana Shimizu, Takahiro Matsuda (AIST, Japan), and Antti Honkela, (University of Helsinki, Finland)
This talk is based on a published paper in IWSEC 2015.

Awards & Honors

 
Apr 2016
高機能暗号とデータベースの秘匿検索技術の開発, AIST President Award (Research), National Institute of Advanced Industrial Science and Technology
Winner: Goichiro Hanaoka, Kana Shimizu, Koji Nuida, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Michiaki Hamada, Koji Tsuda, Kiyoshi Asai
 
See for details: http://www.aist.go.jp/aist_j/aist_award/2015/apa.html
Oct 2014
範囲指定型問い合わせに対する効率的なデータベース秘匿検索プロトコル, Award for Best Demonstration (最優秀デモンストレーション賞)
Winner: 産業技術総合研究所 (照屋唯紀 and Nuttapong Attrapadung and 稲村勝樹 and 松田隆宏 and 中川紗菜美 and 縫田光司 and 花岡悟一郎 and 清水佳奈)
 
Oct 2013
双方向の情報を秘匿可能な効率的化合物データベース検索プロトコル, Award for Best Demonstration (最優秀デモンストレーション賞)
Winner: 産業技術総合研究所 (縫田光司 and 照屋唯紀 and 花岡悟一郎 and 清水佳奈 and 松田隆宏 and 矢内直人 and 中川紗奈美)
 

Works

 
Kenji KASHIWABARA and Tadanori TERUYA   The Others   Mar 2017 - Mar 2017
We solved LWE problem instances whose dimensions and relative errors are (45, 0.020), (55, 0.010), (40, 0.025), (45, 0.015).
Kenji Kashiwabara and Tadanori Teruya   The Others   Jan 2017 - Jan 2017
SVP Challenge http://www.latticechallenge.org/svp-challenge/
Previous results: 148, 146, 144, 142, 140, 138, 134 dimensions.
Kenji Kashiwabara and Tadanori Teruya   The Others   Sep 2015 - Sep 2015
Ideal Lattice Challenge http://www.latticechallenge.org/ideallattice-challenge/
Previous results: 128, 126, 120, 110 dimensions.
Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana Helena Sánchez, Tadanori Teruya, and Francisco Rodríguez-Henríquez   Software   Jun 2013
* https://github.com/herumi/xbyak.git
* https://github.com/herumi/ate-pairing.git
* https://bitbucket.org/herumi/lsss2
Tadanori TERUYA, Yoshiki AOKI, Shohei KOBAYASHI, and Jun SAKUMA   Software   Apr 2012 - Mar 2013
Jean-Luc Beuchat, Jorge Enrique González-Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, and Tadanori Teruya   Software   Jun 2010

Misc

 
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama
日本応用数理学会2016年研究部会連合発表会      Mar 2016
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama
2016 Symposium on Cryptography and Information Security   2016(3D3-4)    Jan 2016
Daisuke Fujimoto, Tadanori Teruya, Kazuo Sakiyama, Naofumi Homma, Makoto Ikeda, Makoto Nagata, Tsutomu Matsumoto
2016 Symposium on Cryptography and Information Security   2016(2C4-3)    Jan 2016
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama
11th Symposium on Algebra and Computation (AC2015)      Dec 2015
Tadanori Teruya, Goichiro Hanaoka, Sosuke Ashihara, Satsuya Ohata, Kazumasa Shinagawa, Takahiro Matsuda, Takao Murakami, SeongHan Shin, Nuttapong Attrapadung, Koji Nuida
Computer Security Symposium 2015   2015(DPS-10)    Oct 2015
Nuttapong Attrapadung, Shota Yamada, Tadanori Teruya, Goichiro Hanaoka, Tsutomu Matsumoto
Computer Security Symposium   2015(3) 731-738   Oct 2015
小貫啓史 and 照屋唯紀 and 金山直樹 and 内山成憲
日本応用数理学会年会2015      Sep 2015
Tadanori Teruya, Koji Nuida, Kana Shimizu, and Goichiro Hanaoka
Symposium on Cryptography and Information Security 2015   1E2(1)    Jan 2015
Kazuma Tanaka, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto
IEICE Technical Report, Information and Communication System Security (ICSS)   114(340) 31-36   Nov 2014
Tadanori Teruya and Nuttapong Attrapadung and Masaki Inamura and Matsuda Takahiro and Sanami Nakagawa and Koji Nuida and Goichiro Hanaoka and Kana Shimizu
Computer Security Symposium 2014 (CSS 2014), Dmonstration (Poster)   (DPS-02)    Oct 2014
Yang Liu and Naoki Kanayama and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama and Eiji Okamoto
Symposium on Cryptography and Information Security 2014   (2E1-5)    Jan 2014
Kazuma Tanaka and Kenta Ishii and Tadanori Teruya and Naoki Kanayama and Takashi Nishide and Eiji Okamoto
Symposium on Cryptography and Information Security 2014   (2E1-2)    Jan 2014
縫田光司 and 照屋唯紀 and 花岡悟一郎 and 清水佳奈 and 松田隆宏 and 矢内直人 and 中川紗奈美
Computer Security Symposium 2013 (CSS 2013), Demonstration (Poster) Session   (DPS-07)    Oct 2013
照屋唯紀 and 縫田光司 and 花岡悟一郎 and 清水佳奈 and 松田隆宏 and 矢内直人 and 中川紗奈美
Computer Security Symposium 2013 (CSS 2013), Demonstration (Poster) Session      Oct 2013
Shuang Wu and Tadanori Teruya and Junpei Kawamoto and Jun Sakuma and Hiroaki Kikuchi
The 27th Annual Conference of the Japanese Society for Artificial Intelligence, 2013   3L1-OS-06a(3)    Jun 2013
Tadanori Teruya, Junpei Kawamoto, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (3C1-3)    Jan 2013
Tadanori Teruya, Junpei Kawamoto, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (2E3-4)    Jan 2013
Junpei Kawamoto, Kazuto Fukuchi, Tadanori Teruya, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (2C2-4)    Jan 2013
Hiroki Harada, Tadanori Teruya, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (2C2-3)    Jan 2013
Naoki Kanayama and Yang Liu and Eiji Okamoto and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama
IECIE Technical Report, Information Security (ISEC)   112(211) 7-13   Sep 2012
Naoki Kanayama and Yang Liu and Eiji Okamoto and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama
IEICE Technical Report, Information Security (ISEC)   112(126) 201-206   Jul 2012
Ubiquitous Secure Multi-party Computation Framework: Fairy Ring
Yoshiki Aoki and Jun Sakuma and Tadanori Teruya
Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO)      Jul 2012
Tadanori Teruya and Naoki Kanayama and Eiji Okamoto
IEICE Technical Report, Information Security (ISEC)   112(39) 11-18   May 2012
Shigeo Mitsunari, Tadanori Teruya and Eiji Okamoto
The 29th Symposium on Cryptography and Information Security (SCIS 2012)      Jan 2012
Jean-Luc Beuchat, Jorge Enrique González-Díaz, 光成滋生, 岡本栄司, Francisco Rodríguez-Henríquez, and 照屋 唯紀
日本応用数理学会 2010年度 年会      Sep 2010
Jean-Luc Beuchat, Jorge Enrique González-Díaz, 光成滋生, 岡本栄司, Francisco Rodríguez-Henríquez, and 照屋 唯紀
Pairing Forum   第12回ミーティング    Jul 2010
Tadanori Teruya, Naoki Kanayama, and Eiji Okamoato
The 2009 Symposium on Cryptography and Information Security (SCIS 2009)   (3C4-2)    Jan 2009

Others

 
Mar 2012
PhD Thesis: Efficient Software Implementation of Pairing Based Cryptography
Teaching Fellow: 2011. Advanced Course in Authrntication Systems, 認証処理特論. 筑波大学 大学院 システム情報工学研究科 リスク工学専攻 開設.
Teaching Assistant: 2010. Advanced Course on Information Security, 情報セキュリティ特論. 筑波大学 大学院 システム情報工学研究科 コンピュータサイエンス専攻, 筑波大学 大学院 システム情報工学研究科 リスク工学専攻 開設.
Teaching Assistant: 2009, 2010. Advanced Course in Authrntication Systems, 認証処理特論. 筑波大学 大学院 システム情報工学研究科 リスク工学専攻 開設.
Teaching Assistant: 2009. Embedded Technology Campus OJT, 組み込み技術キャンパスOJT. 筑波大学 情報学群 情報科学類, 筑波大学 情報学群 情報メディア創成学類 開設.
Teaching Assistant: 2007. Information Security, 情報セキュリティ. 筑波大学 情報学群 情報科学類 開設.