Tadanori Teruya

J-GLOBAL         Last updated: Nov 12, 2018 at 21:47
 
Avatar
Name
Tadanori Teruya
Nickname
tadanori.teruya
E-mail
tadanori.teruyaaist.go.jp
URL
https://orcid.org/0000-0003-4362-4887
Affiliation
National Institute of Advanced Industrial Science and Technology
Job title
Researcher
Degree
Ph.D. (engineering)(University of Tsukuba)
ORCID ID
0000-0003-4362-4887

Profile

ORCID: https://orcid.org/0000-0003-4362-4887
ResearcherID: https://www.researcherid.com/rid/O-1145-2016
DBLP: https://dblp.dagstuhl.de/pers/hd/t/Teruya:Tadanori

====

I'm a researcher.

My research interests include computer arithmetic, efficient software implementation, applications of cryptography, secure computation, formally verification of implementations, computer science, mathematics, so many things but they relate to the aspects of "real world" of cryptography.

Research Areas

 
 

Published Papers

 
Tadanori Teruya
The International Symposium on Information Theory and Its Applications (ISITA) 2018      Oct 2018   [Refereed]
To appear
Ryo Kato and Naohisa Nishida and Ryo Hirano and Tatsumi Oba and Yuji Unagami and Shota Yamada and Tadanori Teruya and Nuttapong Attrapadung and Takahiro Matsuda and Goichiro Hanaoka
The International Symposium on Information Theory and Its Applications (ISITA) 2018      Oct 2018   [Refereed]
To appear
Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, and Goichiro Hanaoka
The 23rd symposium in the European Symposium on Research in Computer Security (ESORICS) 2018      Sep 2018   [Refereed]
Tadanori Teruya
The 5th ACM ASIA Public-Key Cryptography Workshop (APKC 2018)      Jun 2018   [Refereed]
A demonstration is available at https://github.com/tell/note-on-subgroup-security .
Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari, Yusuke Sakai, Kana Shimizu, and Tadanori Teruya
The 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018)      Jun 2018   [Refereed]
A demonstration is available at https://herumi.github.io/she-wasm/she-demo.html .
Tadanori Teruya, Kenji Kashiwabara, and Goichiro Hanaoka
Lecture Notes in Computer Science, Proceedings of the 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018)      Mar 2018   [Refereed]
Tadanori Teruya, Yoshiki Aoki, and Jun Sakuma
Proceedings of International Symposium on Information Theory and Its Applications (ISITA) 2016   708-712   Oct 2016   [Refereed]
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama and Shigenori Uchiyama
Lecture Notes in Computer Science, Proceedings of 11th Advances in Information and Computer Security   9836 319-334   Sep 2016   [Refereed]
Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, and Shota Yamada
Lecture Notes in Computer Science, Proceedings of 14th International Conference on Applied Cryptography and Network Security   9696 249-266   Jun 2016   [Refereed]
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama
JSIAM Letters   8 9-12   Feb 2016   [Refereed]
Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto
IEEE Xplore, Proceedings of 5th International Conference on IT Convergence and Security 2015 in Kuala Lumpur, Malaysia   1-5   Aug 2015   [Refereed]
Tadanori Teruya, Koji Nuida, Kana Shimizu, and Goichiro Hanaoka
Lecture Notes in Computer Science, Proceedings of 10th International Workshop on Security   9241 242-261   Aug 2015   [Refereed]
Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H Sánchez-Ramírez, Tadanori Teruya, and Francisco Rodríguez-Henríquez
IEEE Transactions on Computers   64(5) 1429-1441   Jun 2015   [Refereed]
We presented not only the state-of-the-art implementation of CP-ABE, but also a pairing.
You can find the implementation of CP-ABE in http://sandia.cs.cinvestav.mx/Site.CPABE , and the implementation of pairing in https://github.com/herumi/ate-pai...
Yang Liu, Naoki Kanayama, Kazutaka Saito, Tadanori Teruya, Shigenori Uchiyama, and Eiji Okamoto
JSIAM Letter   6 69-72   Nov 2014   [Refereed]
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya, and Shigenori Uchiyama
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E97(1) 300-302   Jan 2014   [Refereed]
Tadanori Teruya, Kazutaka Saito, Naoki Kanayama, Yuto Kawahara, Tetsutaro Kobayashi, and Eiji Okamoto
Lecture Notes in Computer Science, Proceedings of 6th International Conference on Pairing-Based Cryptography (Pairing 2013)   8365 97-112   Nov 2013   [Refereed]
Tadanori Teruya and Jun Sakuma
Lecture Notes in Computer Science, Proceedings of 16th Information Security Conference (ISC)   7807 69-86   Nov 2013   [Refereed]
Naoki Kanayama, Tadanori Teruya, and Eiji Okamoto
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E94-A(6) 1285-1292   Jun 2011   [Refereed]
Jean-Luc Beuchat, Jorge Enrique González-Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, and Tadanori Teruya
Lecture Notes in Computer Science, Proceedings of 4th International Conference on Pairing-based Cryptography (Pairing)   6487 21-39   Dec 2010   [Refereed]
* Pre-print version is available at: http://eprint.iacr.org/2010/354

Awards & Honors

 
Nov 2018
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem, 辻井重男セキュリティ論文賞特別賞, 第3回「辻井重男セキュリティ論文賞」
Winner: Tadanori Teruya and Kenji Kashiwabara and Goichiro Hanaoka
 
http://www.jssm.net/wp/?page_id=3303
Oct 2018
秘匿依頼計算アプリ開発のための汎用ライブラリ, Award for Best Demonstration, Computer Security Symposium 2018
Winner: 森 遼太, 光成 滋生, 照屋 唯紀, 浅井 潔, 岡田 大弥, 北井 宏昌, 小松 みさき, 橋本 侑知, 林田 淳一郎, 花岡 悟一郎
 
Oct 2017
暗号プロトコル学習アプリ ~ズルはダメ!ゼッタイ!~, Award for Best Demonstration
Winner: 産業技術総合研究所 (照屋唯紀 and 岡田大弥 and 永井翔也 and 小松みさき and 橋本侑知 and 藤田亮 and 稲村勝樹 and 花岡悟一郎)
 
In Computer Security Symposium 2017.
Apr 2016
高機能暗号とデータベースの秘匿検索技術の開発, AIST President Award (Research), National Institute of Advanced Industrial Science and Technology
Winner: Goichiro Hanaoka, Kana Shimizu, Koji Nuida, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Michiaki Hamada, Koji Tsuda, Kiyoshi Asai
 
See for details: http://www.aist.go.jp/aist_j/aist_award/2015/apa.html
Oct 2014
範囲指定型問い合わせに対する効率的なデータベース秘匿検索プロトコル, Award for Best Demonstration (最優秀デモンストレーション賞)
Winner: 産業技術総合研究所 (照屋唯紀 and Nuttapong Attrapadung and 稲村勝樹 and 松田隆宏 and 中川紗菜美 and 縫田光司 and 花岡悟一郎 and 清水佳奈)
 
In Computer Security Symposium 2014.

Research Grants & Projects

 
Fast Lattice Basis Reduction suitable for Massive Parallelization
Japan Science and Technology Agency: ACT-I "Information and Future"
Project Year: Oct 2018 - Mar 2020    Investigator(s): Tadanori Teruya
Japan Society for the Promotion of Science: Grant-in-Aid for Early-Career Scientists
Project Year: Apr 2018 - Mar 2020    Investigator(s): Tadanori Teruya

Works

 
Kenji KASHIWABARA and Tadanori TERUYA   The Others   Mar 2017 - Mar 2017
We solved LWE problem instances whose dimensions and relative errors are (45, 0.020), (55, 0.010), (40, 0.025), (45, 0.015).
Kenji Kashiwabara and Tadanori Teruya   The Others   Oct 2018 - Oct 2018
SVP Challenge http://www.latticechallenge.org/svp-challenge/
Previous results: 150, 148, 146, 144, 142, 140, 138, 134 dimensions.
Kenji Kashiwabara and Tadanori Teruya   The Others   Sep 2015 - Sep 2015
Ideal Lattice Challenge http://www.latticechallenge.org/ideallattice-challenge/
Previous results: 128, 126, 120, 110 dimensions.
Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana Helena Sánchez, Tadanori Teruya, and Francisco Rodríguez-Henríquez   Software   Jun 2013
* https://github.com/herumi/xbyak.git
* https://github.com/herumi/ate-pairing.git
* https://bitbucket.org/herumi/lsss2
Tadanori TERUYA, Yoshiki AOKI, Shohei KOBAYASHI, and Jun SAKUMA   Software   Apr 2012 - Mar 2013
Jean-Luc Beuchat, Jorge Enrique González-Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, and Tadanori Teruya   Software   Jun 2010

Conference Activities & Talks

 
Tadanori Teruya
Mathematical approach for quantum information society   18 Sep 2018   
Abstract:
Development of efficient solvers of the (approximated) shortest vector problem over lattices is an important research area because the security of lattice-based schemes is based on the hardness of the shortest vector problem. Random samp...
Tadanori Teruya
Small-workshop on Communications between Academia and Industry for Security (SCAIS) 2016   18 Jan 2016   Suga Yuji (IIJ/Univ. of Tsukuba),Koji Nuida (AIST/JST PRESTO),Takuya Hayashi (NICT)
秘密を守るだけじゃない!これからの暗号技術
Tadanori Teruya
140th Risk Engineering Research Meeting   26 Oct 2015   Takashi Nishide
Tadanori Teruya
Cryptography Seminar in the Institute of Mathematics for Industry at Kyushu University   14 Sep 2015   Institute of Mathematics for Industry at Kyushu University
The human genome can identify an individual and determine the individual's biological characteristics. Furthermore, the genome is immutable, and an individual's genome has correlations to those of the individual's progeny. Hence, the genome has to...
Tadanori Teruya
Privacy-aware computational genomics 2015   8 Sep 2015   Kana Shimizu, Takahiro Matsuda (AIST, Japan), and Antti Honkela, (University of Helsinki, Finland)
This talk is based on a published paper in IWSEC 2015.

Academic & Professional Experience

 
Nov 2018
 - 
Today
Researcher, Cryptography Platform Research Team (CPRT) in Cyber Physical Security Research Center (CPSEC), National Institute of Advanced Industrial Science and Technology (AIST)
 
Apr 2016
 - 
Oct 2018
Rsearcher, Advanced Cryptosystems Research Group (CRYPTO), Information Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)
 
Apr 2015
 - 
Mar 2016
AIST Postdoctoral Researcher, Advanced Cryptosystems Research Group (CRYPTO), Information Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)
 
Apr 2014
 - 
Mar 2015
AIST Postdoctoral Researcher, Research Group for Innovative Cryptography, Research Institute for Secure Systems, National Institute of Advanced Industrial Science and Technology
 
Apr 2013
 - 
Mar 2014
AIST Postdoctoral Researcher, Innovative Security Research Group, Research Institute for Secure Systems, National Institute of Advanced Industrial Science and Technology
 

Education

 
Apr 2009
 - 
Mar 2012
Doctor's Program in Risk Engineering, Graduate School of System and Information Engineering, University of Tsukuba
 
Apr 2007
 - 
Mar 2009
Master's Program in Risk Engineering, Graduate School of System and Information Engineering, University of Tsukuba
 
Apr 2003
 - 
Mar 2007
College of Information Sciences, Third Cluster of Colleges, University of Tsukuba
 

Misc

 
森 遼太, 光成 滋生, 照屋 唯紀, 浅井 潔, 岡田 大弥, 北井 宏昌, 小松 みさき, 橋本 侑知, 林田 淳一郎, 花岡 悟一郎
コンピュータセキュリティシンポジウム 2018 (CSS 2018)      Oct 2018
Awarded 2 / 17 demonstrations.
Naohisa Nishida and Tatsumi Oba and Ryo Kato and Yuji Unagami and Shota Yamada and Nuttapong Attrapadung and Tadanori Teruya and Takahiro Matsuda and Goichiro Hanaoka
Computer Security Symposium 2017   2E2(1) 592-599   Oct 2017
Tadanori Teruya and Hiroya Okada and Shoya Nagai and Misaki Komatsu and Yuji Hashimoto and Ryo Fujita and Masaki Inamura and Goichiro Hanaoka
Demonstration Session in Computer Security Symposium 2017   DPS(05)    Oct 2017
Awarded 1 / 17 demonstrations.
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama
日本応用数理学会2016年研究部会連合発表会      Mar 2016
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama
2016 Symposium on Cryptography and Information Security   2016(3D3-4)    Jan 2016
Daisuke Fujimoto, Tadanori Teruya, Kazuo Sakiyama, Naofumi Homma, Makoto Ikeda, Makoto Nagata, Tsutomu Matsumoto
2016 Symposium on Cryptography and Information Security   2016(2C4-3)    Jan 2016
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama
11th Symposium on Algebra and Computation (AC2015)      Dec 2015
Tadanori Teruya, Goichiro Hanaoka, Sosuke Ashihara, Satsuya Ohata, Kazumasa Shinagawa, Takahiro Matsuda, Takao Murakami, SeongHan Shin, Nuttapong Attrapadung, Koji Nuida
Computer Security Symposium 2015   2015(DPS-10)    Oct 2015
Nuttapong Attrapadung, Shota Yamada, Tadanori Teruya, Goichiro Hanaoka, Tsutomu Matsumoto
Computer Security Symposium   2015(3) 731-738   Oct 2015
小貫啓史 and 照屋唯紀 and 金山直樹 and 内山成憲
日本応用数理学会年会2015      Sep 2015
Tadanori Teruya, Koji Nuida, Kana Shimizu, and Goichiro Hanaoka
Symposium on Cryptography and Information Security 2015   1E2(1)    Jan 2015
Kazuma Tanaka, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto
IEICE Technical Report, Information and Communication System Security (ICSS)   114(340) 31-36   Nov 2014
Tadanori Teruya and Nuttapong Attrapadung and Masaki Inamura and Matsuda Takahiro and Sanami Nakagawa and Koji Nuida and Goichiro Hanaoka and Kana Shimizu
Computer Security Symposium 2014 (CSS 2014), Dmonstration (Poster)   (DPS-02)    Oct 2014
Awarded 1 / 8 demonstrations.

To make our demonstration, we used a library https://github.com/aistcrypt/Lifted-ElGamal (currently, newer version of this library is in https://github.com/herumi/mcl)
Yang Liu and Naoki Kanayama and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama and Eiji Okamoto
Symposium on Cryptography and Information Security 2014   (2E1-5)    Jan 2014
Kazuma Tanaka and Kenta Ishii and Tadanori Teruya and Naoki Kanayama and Takashi Nishide and Eiji Okamoto
Symposium on Cryptography and Information Security 2014   (2E1-2)    Jan 2014
縫田光司 and 照屋唯紀 and 花岡悟一郎 and 清水佳奈 and 松田隆宏 and 矢内直人 and 中川紗奈美
Computer Security Symposium 2013 (CSS 2013), Demonstration (Poster) Session   (DPS-07)    Oct 2013
Awarded 1 / 9 demonstrations.

To make our demonstration, we used a library https://github.com/aistcrypt/Lifted-ElGamal (currently, newer version of this library is in https://github.com/herumi/mcl)
照屋唯紀 and 縫田光司 and 花岡悟一郎 and 清水佳奈 and 松田隆宏 and 矢内直人 and 中川紗奈美
Computer Security Symposium 2013 (CSS 2013), Demonstration (Poster) Session      Oct 2013
To make our demonstration, we used a library https://github.com/aistcrypt/Lifted-ElGamal (currently, newer version of this library is in https://github.com/herumi/mcl)
Shuang Wu and Tadanori Teruya and Junpei Kawamoto and Jun Sakuma and Hiroaki Kikuchi
The 27th Annual Conference of the Japanese Society for Artificial Intelligence, 2013   3L1-OS-06a(3)    Jun 2013
Tadanori Teruya, Junpei Kawamoto, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (3C1-3)    Jan 2013
Tadanori Teruya, Junpei Kawamoto, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (2E3-4)    Jan 2013
Junpei Kawamoto, Kazuto Fukuchi, Tadanori Teruya, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (2C2-4)    Jan 2013
Hiroki Harada, Tadanori Teruya, and Jun Sakuma
Symposium on Cryptography and Information Security 2013   (2C2-3)    Jan 2013
Naoki Kanayama and Yang Liu and Eiji Okamoto and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama
IECIE Technical Report, Information Security (ISEC)   112(211) 7-13   Sep 2012
Naoki Kanayama and Yang Liu and Eiji Okamoto and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama
IEICE Technical Report, Information Security (ISEC)   112(126) 201-206   Jul 2012
Ubiquitous Secure Multi-party Computation Framework: Fairy Ring
Yoshiki Aoki and Jun Sakuma and Tadanori Teruya
Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO)      Jul 2012
Tadanori Teruya and Naoki Kanayama and Eiji Okamoto
IEICE Technical Report, Information Security (ISEC)   112(39) 11-18   May 2012
Shigeo Mitsunari, Tadanori Teruya and Eiji Okamoto
The 29th Symposium on Cryptography and Information Security (SCIS 2012)      Jan 2012
Jean-Luc Beuchat, Jorge Enrique González-Díaz, 光成滋生, 岡本栄司, Francisco Rodríguez-Henríquez, and 照屋 唯紀
日本応用数理学会 2010年度 年会      Sep 2010
Jean-Luc Beuchat, Jorge Enrique González-Díaz, 光成滋生, 岡本栄司, Francisco Rodríguez-Henríquez, and 照屋 唯紀
Pairing Forum   第12回ミーティング    Jul 2010
Tadanori Teruya, Naoki Kanayama, and Eiji Okamoato
The 2009 Symposium on Cryptography and Information Security (SCIS 2009)   (3C4-2)    Jan 2009

Others

 
Mar 2012
PhD Thesis: Efficient Software Implementation of Pairing Based Cryptography
Teaching Fellow: 2011. Advanced Course in Authrntication Systems, 認証処理特論. 筑波大学 大学院 システム情報工学研究科 リスク工学専攻 開設.
Teaching Assistant: 2010. Advanced Course on Information Security, 情報セキュリティ特論. 筑波大学 大学院 システム情報工学研究科 コンピュータサイエンス専攻, 筑波大学 大学院 システム情報工学研究科 リスク工学専攻 開設.
Teaching Assistant: 2009, 2010. Advanced Course in Authrntication Systems, 認証処理特論. 筑波大学 大学院 システム情報工学研究科 リスク工学専攻 開設.
Teaching Assistant: 2009. Embedded Technology Campus OJT, 組み込み技術キャンパスOJT. 筑波大学 情報学群 情報科学類, 筑波大学 情報学群 情報メディア創成学類 開設.
Teaching Assistant: 2007. Information Security, 情報セキュリティ. 筑波大学 情報学群 情報科学類 開設.