Design and Applications for Cryptographic Frameworks and Platforms

Towards achieving “Security/Privacy By Design” for information systems or platforms, it is mandatory to apply cryptographic techniques that fulfill the functionality and security requirements. In particular, to deal with complex security and privacy requirements, we often require multiple advanced cryptographic tools along with their combinations. In this research, we establish theories and practices for designing frameworks that combine various cryptographic primitives. We particularly focus on attribute-based encryption, functional encryption, secure multi-party computation, to name just a few, and aim at constructing frameworks with simple designs while achieving provable security.

Paper List

  • Nuttapong Attrapadung, Goichiro Hanaoaka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob Schuldt, Tadanori Teruya, Kazunari Tozawa. Oblivious Linear Group Actions and Applications. In ACM Conference on Computer and Communications Security (ACM CCS), 2021
  • Nuttapong Attrapadung, Junichi Tomida. Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions. In Advances in Cryptology - ASIACRYPT 2020 (3), pp. 405-436, 2020
  • Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura. Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials. In INDOCRYPT 2020: 763-785
  • Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Jason Paul Cruz, Naoto Yanai, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka. Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E103-A(12), pp.1367-1380, (2020)
  • Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka. Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E103-A(1), (2020)
  • Nuttapong Attrapadung. Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption. In Advances in Cryptology - EUROCRYPT 2019 (1), pp. 34-67, 2019.
  • Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka. MOBIUS: Model-Oblivious Binarized Neural Networks. In IEEE Access, Vol.7, pp.1-14, (2019).
  • Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt. A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 102-A(9): 1048-1060 (2019)
  • Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt. Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. In ACISP 2019: 343-361
  • Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa. Adaptively Single-Key Secure Constrained PRFs for NC1. In Public Key Cryptography (2) 2019: 223-253
  • Hiraku Morita, Nuttapong Attrapadung. Client-Aided Two-Party Secure Interval Test Protocol. In CANS 2019: 328-343
  • Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa. Constrained PRFs for NC1 in Traditional Groups. In CRYPTO (2) 2018: 543-574
  • Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada. Attribute-Based Encryption for Range Attributes. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 101-A(9): 1440-1455 (2018)
  • Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka. Generic Constructions for Fully Secure Revocable Attribute-Based Encryption. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 101-A(9): 1456-1472 (2018)
  • Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka. Practical Attribute-based Signature Schemes for Circuits from Bilinear Map. In IET Inf. Secur. 12(3): 184-193 (2018)
  • Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka. Attribute-Based Signatures for Unbounded Languages from Standard Assumptions. In ASIACRYPT (2) 2018: 493-522
  • Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka. Constant-Round Client-Aided Secure Comparison Protocol. In ESORICS (2) 2018: 395-415