Exploring Mathematical and Practical Principles of Secure Computation and Secret Sharing
Reference No. | 20210004 |
---|---|
Type/Category | Grant for General Research-Workshop(Ⅰ) |
Title of Research Project | Exploring Mathematical and Practical Principles of Secure Computation and Secret Sharing |
Principal Investigator | Hiroaki ANADA(Department of Information Security, Faculty of Information Systems, University of Nagasaki・Professor) |
Research Period |
November 8,2021. ~
November 10,2021. |
Keyword(s) of Research Fields | mathematical modeling, cryptography, secure computation, secret sharing, information security |
Abstract for Research Report |
As operation of the ultra-high speed and ultra-low delay fifth generation communication service begins in countries of the world, the expectation to a cryptographic technology increases in our society. For example, there is demand to treat data while guaranteeing that there is no leak for privacy information in the analysis handling customer information over the organization and statistical processing of medical data and genome information. To meet the expectation, secure computation in cryptology is being developed in companies aiming practical application of commercial level. As another example, secret sharing that can in theory attain confidentiality and reliability of cloud storage is being developed for obtaining more availability and efficiency. However, these developments are at an intermediate point of the spiral intertwined with research activity. For the techniques of secure computation and secret sharing to be took in and to be used actually, mathematical investigation, rigorous security proofs and recapturing usage performance are indispensable. Especially, the following directions are important from the point of view of mathematics: (1) classifying mathematical approaches such as abstract algebra, information theory, coding theory, combinatorics and game theory; (2) mitigating assumptions of security, that is, semi-honest adversaries versus active adversaries, computational security versus information-theoretic security, etc.; (3) improving efficiency, that is, decreasing computational amount, communication cost, the number of rounds and complexity of randomness. The purpose of the current workshop is to gather researchers in industry and academia both from Japan and abroad in order to share their experience on mathematical approaches and practical implementations of secure computation and secret sharing for securing distributed data processing and data storage. Moreover, the participants will discuss the actual problems which the industry is facing when implementing the above mentioned cryptographic technologies, and they will discuss the appropriate solutions. The workshop will include invited lectures and tutorials on recent results of secure computation and secret sharing. As their outputs, we are planning to publish the lecture notes of our workshop containing short abstracts and slides of all the talks. |
Organizing Committee Members (Workshop) Participants (Short-term Joint Usage) |
Koji NUIDA(Institute of Mathematics for Industry, Kyushu University・Professor) Yasuhiko IKEMATSU(Institute of Mathematics for Industry, Kyushu University・Assistant Professor) Satsuya OHATA(Digital Garage, Inc.・Senior Researcher ) Hiroaki ANADA(Department of Information Security, University of Nagasaki・Professor) Yuntao WANG(Japan Advanced Institute of Science and Technology・Assistant Professor) |