Nuttapong ATTRAPADUNG


Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation
Naohisa NISHIDA Tatsumi OBA Yuji UNAGAMI Jason PAUL CRUZ Naoto YANAI Tadanori TERUYA Nuttapong ATTRAPADUNG Takahiro MATSUDA Goichiro HANAOKA 
Publication:   
Publication Date: 2020/12/01
Vol. E103-A  No. 12  pp. 1367-1380
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
secure computationsecret sharingmachine learningbinarized neural networks
 Summary | Full Text:PDF

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications
Hiraku MORITA Nuttapong ATTRAPADUNG Tadanori TERUYA Satsuya OHATA Koji NUIDA Goichiro HANAOKA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 21-32
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
multi-party computationclient-server modelclient-aided methodless-than comparisonconstant roundsGMW secret sharing
 Summary | Full Text:PDF

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions
Nuttapong ATTRAPADUNG Goichiro HANAOKA Shinsaku KIYOMOTO Tomoaki MIMOTO Jacob C. N. SCHULDT 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9  pp. 1048-1060
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secure two-party computationsemi-honest modelcomparison protocolsconversionsshared inputs/outputsencrypted inputs/outputs
 Summary | Full Text:PDF

Attribute-Based Encryption for Range Attributes
Nuttapong ATTRAPADUNG Goichiro HANAOKA Kazuto OGAWA Go OHTAKE Hajime WATANABE Shota YAMADA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1440-1455
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
attribute-based encryptionrange attributegeneric construction
 Summary | Full Text:PDF

Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
Kotoko YAMADA Nuttapong ATTRAPADUNG Keita EMURA Goichiro HANAOKA Keisuke TANAKA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1456-1472
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
revocable attribute-based encryptionpair encodingidentity-based revocationdoubly spatial encryption
 Summary | Full Text:PDF

Private Similarity Searchable Encryption for Euclidean Distance
Yuji UNAGAMI Natsume MATSUZAKI Shota YAMADA Nuttapong ATTRAPADUNG Takahiro MATSUDA Goichiro HANAOKA 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2319-2326
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity in Computation, Communication and Storage Systems)
Category: Operating system and network Security
Keyword: 
searchable encryptioninner product encryptionthe weighted Euclidean distance
 Summary | Full Text:PDF

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
Nuttapong ATTRAPADUNG Goichiro HANAOKA Shota YAMADA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1882-1890
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Boneh-Boyen identity-based encryptiontight security reductionmulti-challenge security
 Summary | Full Text:PDF

Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII Go OHTAKE Goichiro HANAOKA Nuttapong ATTRAPADUNG Hajime WATANABE Kazuto OGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1328-1337
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital broadcastingcopyright protectionConditional Access System (CAS)broadcast encryption
 Summary | Full Text:PDF

Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 116-125
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
attribute based encryptionciphertext policykey policy
 Summary | Full Text:PDF

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
Takahiro MATSUDA Nuttapong ATTRAPADUNG Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1466-1476
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
digital signaturestrong unforgeabilitytarget collision resistant hash functionstandard model
 Summary | Full Text:PDF

Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong ATTRAPADUNG Jun FURUKAWA Takeshi GOMI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1803-1813
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
identity based encryptiontight security reduction
 Summary | Full Text:PDF

Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 187-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
broadcast encryptionrevocation scheme
 Summary | Full Text:PDF