ここから本文です
研究室
情報セキュリティ研究室

穴田 啓晃 (ANADA, Hiroaki)

履歴

所属

(公財)九州先端科学技術研究所 情報セキュリティ研究室
〒814-0001 福岡市早良区百道浜2丁目1番22号 福岡SRPセンタービル(ももちキューブ)7F
TEL:092-852-3460
FAX:092-852-3465
E-mail:anada (at) isit.or.jp



所属学会

IEEE, ACM, IEICE(ISEC), IPSJ(CSEC), IACR, JSIAM


略歴

  • 1992年 4月 早稲田大学理工学部数学科 入学
  • 1996年 3月 同 卒業
  • 1996年 4月 早稲田大学大学院理工学研究科数理科学専攻博士前期課程 入学
  • 1998年 3月 同 修了
  • 1998年 4月 日本電気㈱(NEC)入社
  • 1998年 5月 同 中央研究所へ配属
      • 誤り訂正符号化/復号方式の研究・開発
  • 2007年 7月 同 誘導光電事業部へ異動
      • 宇宙・防衛向け高信頼性装置の品質保証
  • 2013年10月 日本電気㈱(NEC)退職
  • 2013年11月 (公財)九州先端科学技術研究所 入所
  • 2016年1月 (公財)九州先端科学技術研究所 退職

学位

  • 博士(情報学)(2009-2012), 情報セキュリティ大学院大学
    題目:「同時発生的中間者攻撃に対し安全な効率的認証スキームの研究」
    (“A Study on Efficient Identification Schemes Secure against Concurrent Man-in-the-Middle Attacks”) (PDF)
    主査: 有田 正剛 教授
    外部審査員: 國廣 昇 教授,松尾 和人 教授,佐藤 直 教授
  • 修士(理学)(1996-1998), 早稲田大学大学院理工学研究科数理科学専攻
    題目:「2次体上の楕円Q-曲線のWeil制限で得られるアーベル曲面上のねじれゼロサイクル」
    (“Torsion Zero-Cycles on Abelian Surfaces Obtained by the Weil Restriction of Elliptic Q-Curves over Quadratic Fields (I)”) (PDF)
    主査: 橋本 喜一朗 教授

講演スライド

論文専門誌 及び 会議予稿論文集(査読有り)

  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
    “Attribute-Based Two-Tier Signatures: Definition and Construction”, In Proc. ICISC2015, Seoul, Korea, Nov. 2015.
  • Ji-Jian Chin, Hiroaki Anada, Syh-Yuan Tan:
    “Reset-Secure Identity-Based Identification Schemes Without Pairings”, In Proc. ProvSec2015, Kanazawa, Japan, Oct. 2015.
  • Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
    “Hybrid Encryption Scheme using Terminal Fingerprint and its Application to Attribute-based Encryption without Key Misuse”,
    In Proc. AsiaARES2015, Daejeon, Gwangju, Korea, Oct. 2015
  • Zhongqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
    “Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms”,
    In Proc. AINA2015, Korea, Mar. 2015
  • Ji-Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee-Huay Heng, Raphael Phan:
    “Generic Construction for Attribute-Based Identification Schemes Secure against Reset Attacks”, International Journal of Cryptology Research, No. 5, Vol. 1, pp.28-44, 2015.
  • Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai, Jian Weng:
    “Identity-Embedding Method for Decentralized Public-Key Infrastructure”,
    In Proc. 6th International Conference on Trustworthy Systems (InTrust 2014), Beijing, China, Dec. 2014
  • Ji-Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee-Huay Heng, Raphael Phan:
    “Survey and New Idea for Attribute-Based Identification Scheme Secure against Reset Attacks”,
    In Proc. 4th International Conference on Cryptology and Information Security (Cryptology 2014), Putrajaya, Malaysia, June 2014, pp. 39-47
  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
    “Attribute-Based Signatures without Pairings via the Fiat-Shamir Paradigm”,
    In Proc. of 2nd ACM ASIA Public-Key Cryptography Workshop (ASIAPKC 2014), Kyoto, Japan, June 2014, pp. 49-58
  • Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi:
    “Attribute-Based Identification: Definitions and Efficient Constructions”,
    the Institute of Electronics, Information and Communication Engineers (IEICE) Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No. 5, pp. 1086-1102, May 2014
  • Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi:
    “Attribute-Based Identification: Definitions and Efficient Constructions”,
    In Proc. of 18th Australasian Conference on Information Security and Privacy (ACISP 2013), Brisbane, Australia, July 2013, Lecture Notes in Computer Science, Vol. 7959, pp. 168-186, Springer
  • Hiroaki Anada, Seiko Arita:
    “Identification Schemes from Key Encapsulation Mechanisms”,
    the Institute of Electronics, Information and Communication Engineers (IEICE) Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No. 7, pp. 1136-1155, July 2012
  • Hiroaki Anada, Seiko Arita:
    “Identification Schemes from Key Encapsulation Mechanisms”,
    In Proc. of 4th International Conference on Cryptology in Africa (AFRICACRYPT2011), Dakar, Senegal, July 2011, Lecture Notes in Computer Science, Vol. 6737, pp. 59-76, Springer
  • Hiroaki Anada, Seiko Arita:
    “Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks”,
    In Proc. of 4th International Conference on Provable Security (ProvSec 2010), Melaka, Malaysia, Oct. 2010, Lecture Notes in Computer Science, Vol. 6402, pp. 18-34, Springer

会議予稿論文集(査読無し)及び 講演

  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
    “Attribute-Based Two-Tier Signatures”,
    IEICE Technical Report, ISEC2015-9 (July 2015)
  • Hiroaki Anada, Yuhei Kawakoya, Kuniyasu Suzaki:
    “A Report on International Conference NDSS2015”,
    IEICE Technical Report, ICSS2015-12 (June 2015)
  • Hiroaki Anada:
    “Attribute-Based Signatures”,
    Workshop on Cryptology Theory, Tokyo Institute of Technology (TIT), Ookayama, Japan, Feb. 2015
  • Hiroaki Anada, Kouichi Sakurai:
    “Activity on JSPS Bilateral Program”,
    Workshop on Cryptology Theory, Tokyo Institute of Technology (TIT), Ookayama, Japan, Feb. 2015
  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
    “Attribute-Based Signatures from Proof of Knowledge of Signatures”,
    In Proc. of 32st Symposium on Cryptography and Information Security (SCIS2015), Kokura, Japan, Jan. 2014, 2D3-2
  • Ji-Jian Chin, Syh-Yuan Tan, Hiroaki Anada:
    “A Commitment Scheme Based on Chebyshev Polynomials”,
    In Proc. of 32st Symposium on Cryptography and Information Security (SCIS2015), Kokura, Japan, Jan. 2014, 3D4-5
  • Hiroaki Anada, Ryo Kikuchi, Tatsuya Mori, Noboru Kunihiro:
    “A Report on International Conference ACMCCS2014”,
    In Proc. of 32st Symposium on Cryptography and Information Security (SCIS2015), Kokura, Japan, Jan. 2014, 4A1-4
  • Hiroaki Anada, Kouichi Sakurai:
    “Identity-Embedding Method for Decentralized PKI”,
    Keynote Lecture at Small-workshop on Communications between Academia and Industry for Security (SCAIS), Fukuoka, Japan, Jan. 2015
  • Hiroaki Anada, Kouichi Sakurai:
    “New cryptographic infrastructure and applications from Bitcoin”,
    Keynote Lecture at Small-workshop on Communications between Academia and Industry for Security (SCAIS), Fukuoka, Japan, Jan. 2015
  • Hiroaki Anada:
    “Identity-Embedding Method for Decentralized PKI”,
    Lecture at Department of Pure Mathematics, University of Calcutta, Kolkata, India, Nov. 2014
  • Hiroaki Anada:
    “Attribute-Based Identification: Definitions and Recent Progress”,
    Lecture at Cryptology Research Group, Indian Statistical Institute (ISI), Kolkata, India, Nov. 2014
  • Zhongqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
    “Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms”,
    In Proc. Computer Security Symposium 2014, Sapporo, Japan, Oct. 2014, 1C4-4
  • Jian Weng, Hiroaki Anada, Kouichi Sakurai:
    “Alleviating the Trust of the Proxy in Conditional Proxy Re-Encrypton”,
    In Proc. Computer Security Symposium 2014, Sapporo, Japan, Oct. 2014, 2E4-2
  • Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai:
    “Decentralized Identity Management Scheme and its Realization by RSA and Discrete-Log-Based Encryption”,
    In Proc. Computer Security Symposium 2014, Sapporo, Japan, Oct. 2014, 3E2-1
  • Hiroaki Anada, Masaya Sato, Toshihiro Yamauchi, Yoshiaki Hori, Shiho Moriai, Kouichi Sakurai:
    “A Report on International Conference ASIACCS2014”,
    In Proc. Computer Security Symposium 2014, Sapporo, Japan, Oct. 2014, 3E4-3
  • Motoki Kitahara, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
    “Embedding Information into RSA-modulus and Its Application to Digital Rights Management Systems”,
    In Proc. of 65th Workshop of Computer Security Group (CSEC65) of Information Processing Society of Japan (IPSJ), Oita, Japan, May 2014, IPSJ SIG Technical Report, Vol.2014-CSEC-65 No.3
  • Hiroaki Anada, Koichi Mouri, Akira Yamada:
    “A Report on International Conference NDSS2014”,
    In Proc. of 65th Workshop of Computer Security Group (CSEC65) of Information Processing Society of Japan (IPSJ), Oita, Japan, May 2014, IPSJ SIG Technical Report, Vol.2014-CSEC-65 No.29
  • Hiroaki Anada, Shin-ichi Matsumoto, Kouichi Sakurai:
    “A Short Review of the escar 2013 Conferences / escar Europe 2013”,
    Lecture at 1st Embedded Security in Cars Conference in Asia (escar Asia 2014), Tokyo, Japan, Apr. 2014
  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
    “Boolean Formula-Proof and Its Application to Attribute-Based Identifications and Signatures”,
    In Proc. of Hinokuni Information Symposium, Oita, Japan, Mar. 2014, 1B-2
  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
    “Attribute-Based Identification Schemes of Proofs of Knowledge”,
    In Proc. of 31st Symposium on Cryptography and Information Security (SCIS2014), Kagoshima, Japan, Jan. 2014, 3E3-3
  • Hiroaki Anada, Shin-ichi Matsumoto, Kouichi Sakurai:
    “Trend of Car-Information Security: a Report on International Conference “escar””,
    In Proc. of 31st Symposium on Cryptography and Information Security (SCIS2014), Kagoshima, Japan, Jan. 2014, 1B3-4
  • Hiroaki Anada:
    “Attribute-Based Identification: Definitions and Recent Developments”,
    Lecture at IMI Cryptography Seminar, Institute of Mathemetics for Industry (IMI), Kyushu University, Fukuoka, Japan, Jan. 2014
  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
    “Attribute-Based Identification: Definitions and Recent Developments”,
    In Proc. of the Seventh Workshop among Asian Information Security Labs (WAIS2014), Fudan University, Shanghai, China, Jan. 2014
  • Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi:
    “Attribute-Based Identification”,
    In Proc. of 30th Symposium on Cryptography and Information Security (SCIS2013), Kyoto, Japan, Jan. 2013, 1A1-5
  • Hiroaki Anada, Seiko Arita:
    “A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks”,
    IEICE Technical Report, ISEC2009-84 (Mar. 2010)
  • Hiroaki Anada, Tothihiko Okamura:
    “A Feasibility Study of Algebraic Attacks against Stream Ciphers”,
    In Proc. of 24th Symposium on Cryptography and Information Security (SCIS2007), Nagasaki, Japan, Jan. 2007, 2A2-1
  • Hiroaki Anada:
    “On LDPC Convolutional Codes”,
    Lecture at LDPC/Turbo-Codes Workshop, Tokyo Institute of Technology, Tokyo, Japan, Nov. 2004
  • Hiroaki Anada, Toshihiko Okamura:
    “On the Effect of Truncation of LDPC Convolutional Codes to Message-Passing Decoding”,
    In Proc. of 26th Symposium on Information Theory and Its Application (SITA2003), Hyogo, Japan, Dec. 2003

開催ワークショップ等

参加国際会議,研究交流等

資格,委員会委員等

  • 2015年~ 一般社団法人情報処理学会(IPSJ) 論文誌ジャーナル/JIP 編集委員会委員
  • 2012年 電子情報技術産業協会 信頼度予測委員会委員
  • 2009年 情報セキュリティアドミニストレータ
  • 2008年 統計士