サイト  講義  プレプリント  論文  学位論文    講演  特許 

有田正剛 (Seiko/Seigo Arita) のホームページ


[picture at ProveSec 2010]

横浜にある情報セキュリティ大学院大学情報セキュリティ研究科有田研究室で、 暗号理論をはじめとする情報セキュリティの教育・研究に携わっています。

京都大学大学院理学研究科数学専攻修了、中央大学大学院理工学研究科情報工学専攻修了。博士(工学)。 日本電気株式会社インターネットシステム研究所主任研究員を経て、2004年4月より情報セキュリティ大学院大学教授です。

主な研究対象領域は:

です。理論、実装(ソフトウェア、FPGA)ともに重視しています。

連絡先

〒221-0835
横浜市神奈川区鶴屋町2-14-1
情報セキュリティ大学院大学
情報セキュリティ研究科

room: 509
email: arita at iisec dot ac dot jp

サイト

講義

プレプリント

論文

  • Hiroaki Anada, Seiko Arita, Short CCA-Secure Attribute-Based Encryption, Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, pp. 261-273, 2018. (pdf)
  • Seiko Arita, Sari Handa, Subring Homomorphic Encryption, ICISC 2017, Seoul, Korea, Nov. 2017. (pdf)
  • Seiko Arita, Shunji Kozaki, A homomorphic signature scheme for quadratic polynomials, In Proc. IEEE BITS 2017, Hong Kong, China, May. 2017. (pdf)
  • Hiroaki Anada, Seiko Arita, Anonymous Authentication Scheme with Decentralized Multi-authorities, In Proc. IEEE BITS 2017, Hong Kong, China, May. 2017. (pdf)
  • Hiroaki Anada, Seiko Arita, Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption, In Proc. IEEE BITS 2017, Hong Kong, China, May. 2017. (pdf)
  • Seiko Arita, Shota Nakasato, Fully Homomorphic Encryption for Classification in Machine Learning, In Proc. IEEE BITS 2017, Hong Kong, China, May. 2017. (pdf)
  • Seiko Arita, Shota Nakasato, Fully Homomorphic Encryption For Point Numbers, In Proc. Inscrypt 2016, LNCS 10143, pp. 253-270, Beijing, Chaina, Nov. 2017. (pdf)
  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Attribute-Based Two-Tier Signatures: Definition and Construction, In Proc. ICISC 2015, Seoul, Korea, Nov. 2015. (pdf)
  • Ji-Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee-Huay Heng, Raphael Phan, Generic Construction for Attribute-Based Identification Schemes Secure against Reset Attacks, International Journal of Cryptology Research, No. 5, Vol. 1, pp.28-44, 2015.
  • Ji-Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee-Huay Heng and Raphael Phan, Survey and New Idea for Attribute-Based Identification Scheme Secure against Reset Attacks, Cryptology 2014, June 2014. (pdf)
  • Seiko Arita, Sari Handa, Two Applications of Multilinear Maps: Group Key Exchange and Witness Encryption, ASIAPKC 2014, pp.13-22, June 2014. (pdf)
  • Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Attribute-Based Signatures without Pairings via the Fiat-Shamir Paradigm, ASIAPKC 2014, pp.49-58,June 2014. (pdf)
  • Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi, Attribute-Based Identification: Definitions and Efficient Constructions, IEICE TRANS., Vol.E97-A,No.5,pp.1086-1102,May. 2014. (pdf)
  • Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi, Attribute-Based Identification: Definitions and Efficient Constructions, ACISP 2013, LNCS 7959, pp. 168-186, 2013. (pdf)
  • Seiko Arita, Flexible Attribute-Based Encryption, ICICS 2012, LNCS 7618, pp. 471-478, 2012. (pdf)
  • Seiko Arita, A constant-round resettably-sound resettable zero-knowledge argument in the BPK model, IEICE TRANS., Vol.E95-A, No.8, pp.1390-1401, Aug. 2012. (pdf)
  • Hiroaki Anada, Seiko Arita, Identification Schemes from Key Encapsulation Mechanisms, IEICE TRANS., Vol.E95-A, No.7, pp.1136-1155, Jul. 2012. (pdf)
  • Hiroaki Anada, Seiko Arita, Identification Schemes from Key Encapsulation Mechanisms, AFRICACRYPT 2011, LNCS 6737, pp. 59-76, 2011. (pdf)
  • Seiko Arita, An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme, IEICE TRANS., Vol. E94-A, No.1, pp. 367-382 , Jan. 2011. (pdf)
  • Hiroaki Anada, Seiko Arita, Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks, ProvSec 2010, LNCS 6402, pp. 18-34, 2010. (pdf)
  • Seiko Arita, Koji Tsurudome, Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions, ACNS 2009, LNCS 5536, pp. 186-200, 2009. (pdf)
  • Seiko Arita, Akihiko Sakuma, A Group-Key Agreement Protocol Secure against The Malleability Attacks, ISITA 2008, M-TI-4-4, Auckland, New Zealand, 2008. (pdf)
  • Seiko Arita, Natsumi Kawashima, An Identification Scheme with Tight Reduction, IEICE TRANS., Vol. E90-A, No. 9, pp. 1949-1955, 2007. (pdf)
  • Seiko Arita, A Straight-line Extractable Non-Malleable Commitment Scheme, IEICE TRANS., Vol. E90-A, No. 7, pp.1384-1394, 2007. (pdf)
  • Seigo Arita,Kazuto Matsuo,Koh-ichi Nagao,Mahoro Shimura, A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields, IEICE TRANS., Vol. E89-A, No. 5, pp.1246-1254, 2006. (pdf)
  • Seigo Arita, An Addition Algorithm in Jacobian of C34 Curve, IEICE TRANS. FOUND., VOL.E88-A, NO.6, pp. 1589-1598, 2005. (pdf)
  • Seigo Arita, Shinji Miura, Tsutomu Sekiguchi, An addition algorithm on the Jacobian varieties of curves, J. Ramanujan Math. Soc. 19, No.4 (2004) 235-251. (pdf)
  • Seigo Arita, An Addition Algorithm in Jacobian of C34 Curve, ACISP 2003, LNCS 2727, pp.93--105, Wollongong, Australia, 2003. (pdf)
  • S. Arita, An Addition Algorithm in Jacobian of Cab Curves, Discrete Applied Mathematics, Volume 130, Issue 1, pp. 13-31, 2003. (pdf)
  • Kazuto Matsuo, Seigo Arita, Jinhui Chao, A Survey on Algebraic Curve Cryptosystems, Trans. of the Japan Society for Industrial and Applied Mathematics 13 (2003), no. 2, 231-243. in Japanese. (pdf)
  • Seigo Arita, Construction of Secure Cab Curves Using Modular Curves, IEICE TRANS. FOUND., VOL.E84-A,NO.11, pp.2930-2938, 2001. (pdf)
  • Seigo Arita, Weil descent of elliptic curves over finite fields of characteristic three, ASIACRYPT 2000, LNCS 1976, pp.248--258, Kyoto, 2000. (pdf)
  • Seigo Arita, Gaudry's variant against Cab curves, IEICE TRANS. FOUND., VOL.E83-A,NO.9, pp.1809-1814, 2000. (pdf)
  • Seigo Arita, Algorithms for computations in Jacobian group of Cab curve and their application to discrete-log-based public key cryptosystems, IEICE TRANS. FOUND., VOL.J82-A, NO.8, pp.1291--1299, 1999. in Japanese. (pdf)
  • Seigo Arita, Algorithms for computations in Jacobian group of Cab curve and their application to discrete-log-based public key cryptosystems, Conference on The Mathematics of Public Key Cryptography, pp.165--175, Toronto, 1999. (pdf)
  • 学位論文

    講演

    特許