• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Yasunaga Kenji  安永 憲司

ORCIDConnect your ORCID iD *help
… Alternative Names

YASUNAGA Kenji  安永 憲司

安永 憲司  ヤスナガ ケンジ

Less
Researcher Number 50510004
Other IDs
Affiliation (Current) 2025: 東京科学大学, 情報理工学院, 准教授
Affiliation (based on the past Project Information) *help 2021 – 2024: 東京工業大学, 情報理工学院, 准教授
2018 – 2021: 大阪大学, 情報科学研究科, 准教授
2018: 金沢大学, 電子情報通信学系, 助教
2012 – 2017: 金沢大学, 電子情報学系, 助教
2011: (財)九州先端科学技術研究所, その他部局等, 研究員 … More
2011: (財)九州先端科学技術研究所, 情報セキュリティ研究室, 研究員
2009: Tokyo Institute of Technology, 大学・院情報理工学研究科, 特任助教
2009: 東工大, 情報理工学(系)研究科
2008: Tokyo Institute of Technology, 大学院・情報理工学研究科, 特任助教 Less
Review Section/Research Field
Principal Investigator
Medium-sized Section 60:Information science, computer engineering, and related fields / Science and Engineering / Basic Section 60010:Theory of informatics-related / Fundamental theory of informatics / Communication/Network engineering
Except Principal Investigator
Theory of informatics / Fundamental theory of informatics / Medium-sized Section 60:Information science, computer engineering, and related fields / Broad Section J
Keywords
Principal Investigator
誤り訂正符号 / リスト復号 / 計算量 / 明示的構成 / ランダム線形符号 / GV限界 / 分布置き換え定理 / Renyi優位性 / ビットセキュリティ / 計算理論 … More / 情報理論 / 暗号理論 / セキュリティ定量化 / 挿入・削除誤り / 連接符号 / 挿入・削除訂正 / 計算量理論 / 符号理論 / 計算量制限通信路 / 暗号技術 / 計算構造 / 多項式時間計算可能 / 加法的誤り / 誤り訂正能力 / 加法的通信路 / 多項式時間計算 / 擬似乱数生成器 / 擬似ランダム / 擬似ランダム性 … More
Except Principal Investigator
暗号理論 / 計算量理論 / ゲーム理論 / プロトコル / 量子暗号 / 量子計算 / 量子計算量理論 / 量子アルゴリズム / 量子プロトコル / 暗号プロトコル / 安全性 / 不等式 / 情報理論 / 量子多体複雑性 / セキュア量子プロトコル / 分散型量子計算 / 計算複雑さ / インセンティブ / 暗号通貨 / ブロックチェーン / インセンティブ設計 / 暗号 / 計算の複雑さ / 量子情報理論 / 分散計算 / 分散アルゴリズム / 量子通信 / エンタングルメント / 量子情報 / 通信計算量 / 対話証明 / 質問計算料 / 通信複雑度 / 秘匿情報検索 / 量子対話証明 / マルチパーティー / ナッシュ均衡 / ビットコミットメント / 安全性証明 Less
  • Research Projects

    (13 results)
  • Research Products

    (92 results)
  • Co-Researchers

    (13 People)
  •  Foundations of Secure Distributed Quantum Computing on Medium-Scale Quantum Computers

    • Principal Investigator
      ルガル フランソワ
    • Project Period (FY)
      2024 – 2028
    • Research Category
      Grant-in-Aid for Scientific Research (S)
    • Review Section
      Broad Section J
    • Research Institution
      Nagoya University
  •  Foundations of Security Quantification by Integrating Information, Computation, and Cryptography TheoriesPrincipal Investigator

    • Principal Investigator
      安永 憲司
    • Project Period (FY)
      2023 – 2026
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Institute of Science Tokyo
  •  New theory for security analysis: from information inequality to computational inequality

    • Principal Investigator
      渡辺 峻
    • Project Period (FY)
      2023 – 2025
    • Research Category
      Grant-in-Aid for Challenging Research (Pioneering)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Tokyo University of Agriculture and Technology
  •  Complexity of Code Construction ProblemsPrincipal Investigator

    • Principal Investigator
      安永 憲司
    • Project Period (FY)
      2023 – 2025
    • Research Category
      Grant-in-Aid for Challenging Research (Exploratory)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Tokyo Institute of Technology
  •  Exploring the Limitations of Deletion CodesPrincipal Investigator

    • Principal Investigator
      Yasunaga Kenji
    • Project Period (FY)
      2018 – 2023
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60010:Theory of informatics-related
    • Research Institution
      Tokyo Institute of Technology
      Osaka University
  •  Constructions for Cryptographic Primitives with Incentives

    • Principal Investigator
      Tanaka Keisuke
    • Project Period (FY)
      2017 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Theory of informatics
    • Research Institution
      Tokyo Institute of Technology
  •  Interpolative Expansion of Quantum Protocol Theory

    • Principal Investigator
      Takeshi Koshiba
    • Project Period (FY)
      2016 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      Theory of informatics
    • Research Institution
      Waseda University
      Saitama University
  •  符号理論における計算限界の解明Principal Investigator

    • Principal Investigator
      安永 憲司
    • Project Period (FY)
      2015 – 2016
    • Research Category
      Grant-in-Aid for Scientific Research on Innovative Areas (Research in a proposed research area)
    • Review Section
      Science and Engineering
    • Research Institution
      Kanazawa University
  •  計算構造制限下での暗号技術の限界解明Principal Investigator

    • Principal Investigator
      安永 憲司
    • Project Period (FY)
      2013 – 2014
    • Research Category
      Grant-in-Aid for Scientific Research on Innovative Areas (Research in a proposed research area)
    • Review Section
      Science and Engineering
    • Research Institution
      Kanazawa University
  •  Deepening Theory of Quantum Protocols

    • Principal Investigator
      KOSHIBA Takeshi
    • Project Period (FY)
      2012 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Saitama University
  •  Game Theoretic Studies on Cryptographic Protocols

    • Principal Investigator
      TANAKA Keisuke
    • Project Period (FY)
      2011 – 2014
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Tokyo Institute of Technology
  •  Randomness and Structure in Error-Correcting CodesPrincipal Investigator

    • Principal Investigator
      YASUNAGA Kenji
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Kanazawa University
      (財)九州先端科学技術研究所
  •  Constructions of Error-Correcting Codes Based on PseudorandomnessPrincipal Investigator

    • Principal Investigator
      安永 憲司
    • Project Period (FY)
      2008 – 2009
    • Research Category
      Grant-in-Aid for Young Scientists (Start-up)
    • Research Field
      Communication/Network engineering
    • Research Institution
      Tokyo Institute of Technology

All 2024 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2009 Other

All Journal Article Presentation

  • [Journal Article] Improved bounds for codes correcting insertions and deletions2024

    • Author(s)
      Yasunaga Kenji
    • Journal Title

      Designs, Codes and Cryptography

      Volume: - Issue: 5 Pages: 1267-1278

    • DOI

      10.1007/s10623-023-01342-1

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K18460, KAKENHI-PROJECT-18K11159
  • [Journal Article] Unified View for Notions of Bit Security2023

    • Author(s)
      Watanabe Shun、Yasunaga Kenji
    • Journal Title

      ASIACRYPT2023 (Lecture Notes in Computer Science)

      Volume: 14443 Pages: 361-389

    • DOI

      10.1007/978-981-99-8736-8_12

    • ISBN
      9789819987351, 9789819987368
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K17455, KAKENHI-PROJECT-23K18460, KAKENHI-PROJECT-23H00468, KAKENHI-PROJECT-20H02144
  • [Journal Article] Rational Broadcast Protocols Against Timid Adversaries2023

    • Author(s)
      Yamashita Keigo、Yasunaga Kenji
    • Journal Title

      GameSec 2023

      Volume: - Pages: 277-293

    • DOI

      10.1007/978-3-031-50670-3_14

    • ISBN
      9783031506697, 9783031506703
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23H00468
  • [Journal Article] On the Limitations of Computational Fuzzy Extractors2023

    • Author(s)
      YASUNAGA Kenji、YUZAWA Kosuke
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E106.A Issue: 3 Pages: 350-354

    • DOI

      10.1587/transfun.2022CIL0001

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2023-03-01
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Journal Article] Fuzzy Signature with Biometric-Independent Verification2023

    • Author(s)
      Higo Haruna、Isshiki Toshiyuki、Otsuki Saki、Yasunaga Kenji
    • Journal Title

      2023 International Conference of the Biometrics Special Interest Group

      Volume: - Pages: 1-6

    • DOI

      10.1109/biosig58226.2023.10345774

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K11159, KAKENHI-PROJECT-23H00468
  • [Journal Article] Perfectly Secure Message Transmission Against Rational Adversaries2022

    • Author(s)
      Fujita Maiki、Koshiba Takeshi、Yasunaga Kenji
    • Journal Title

      IEEE Journal on Selected Areas in Information Theory

      Volume: 3 Issue: 2 Pages: 390-404

    • DOI

      10.1109/jsait.2022.3188923

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K11159, KAKENHI-PROJECT-21H04879
  • [Journal Article] Replacing Probability Distributions in Security Games via Hellinger Distance2021

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      Leibniz International Proceedings in Informatics (ITC 2021)

      Volume: 199

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-16H01705
  • [Journal Article] Bit Security as?Computational Cost for?Winning Games with?High Probability2021

    • Author(s)
      Watanabe Shun、Yasunaga Kenji
    • Journal Title

      Lecture Notes in Computer Science (ASIACRYPT 2021)

      Volume: 13092 Pages: 161-188

    • DOI

      10.1007/978-3-030-92078-4_6

    • ISBN
      9783030920777, 9783030920784
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H01705
  • [Journal Article] On the List Decodability of Insertions and Deletions2020

    • Author(s)
      Hayashi Tomohiro、Yasunaga Kenji
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 66 Issue: 9 Pages: 5335-5343

    • DOI

      10.1109/tit.2020.2981321

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11159, KAKENHI-PROJECT-16H01705
  • [Journal Article] Practical Card-Based Protocol for Three-Input Majority2020

    • Author(s)
      YASUNAGA Kenji
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E103.A Issue: 11 Pages: 1296-1298

    • DOI

      10.1587/transfun.2020EAL2025

    • NAID

      130007933523

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2020-11-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11159, KAKENHI-PROJECT-16H01705
  • [Journal Article] Error correction by structural simplicity: correcting samplable additive errors2019

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      The Computer Journal

      Volume: 62-9 Issue: 9 Pages: 1265-1276

    • DOI

      10.1093/comjnl/bxy100

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Journal Article] Perfectly secure message transmission against independent rational adversaries2019

    • Author(s)
      Kenji Yasunaga and Takeshi Koshiba
    • Journal Title

      Lecture Notes in Computer Science, Proc. of Decision and Game Theory for Security - 10th International Conference, GameSec 2019

      Volume: 11836 Pages: 563-582

    • DOI

      10.1007/978-3-030-32430-8_33

    • ISBN
      9783030324292, 9783030324308
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11159, KAKENHI-PROJECT-19K22849, KAKENHI-PROJECT-16H01705, KAKENHI-PROJECT-17H01695
  • [Journal Article] On the List Decodability of Insertions and Deletions2018

    • Author(s)
      Hayashi Tomohiro、Yasunaga Kenji
    • Journal Title

      Proc. of 2018 IEEE International Symposium on Information Theory, ISIT 2018

      Volume: 2018 Pages: 86-90

    • DOI

      10.1109/isit.2018.8437894

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Journal Article] Repeated Games for Generating Randomness in Encryption2018

    • Author(s)
      YASUNAGA Kenji、YUZAWA Kosuke
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E101.A Issue: 4 Pages: 697-703

    • DOI

      10.1587/transfun.E101.A.697

    • NAID

      130006601962

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11159, KAKENHI-PROJECT-16H01705
  • [Journal Article] Perfectly Secure Message Transmission Against Rational Timid Adversaries2018

    • Author(s)
      Fujita Maiki、Yasunaga Kenji、Koshiba Takeshi
    • Journal Title

      Lecture Notes in Computer Science, Proc. of Decision and Game Theory for Security - 9th International Conference, GameSec 2018

      Volume: 11199 Pages: 127-144

    • DOI

      10.1007/978-3-030-01554-1_8

    • ISBN
      9783030015534, 9783030015541
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11159, KAKENHI-PROJECT-16H01705
  • [Journal Article] Rational Proofs against Rational Verifiers2017

    • Author(s)
      K. Inasawa, K. Yasunaga
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E100.A Issue: 11 Pages: 2392-2397

    • DOI

      10.1587/transfun.E100.A.2392

    • NAID

      130006191407

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H01705, KAKENHI-PROJECT-17H01695
  • [Journal Article] General constructions of rational secret sharing with expected constant-round reconstruction2017

    • Author(s)
      Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, and Kenji Yasunaga
    • Journal Title

      The Computer Journal

      Volume: 印刷中 Pages: 711-728

    • DOI

      10.1093/comjnl/bxw094

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PUBLICLY-15H00851, KAKENHI-PLANNED-24106005, KAKENHI-PROJECT-24220003, KAKENHI-PROJECT-16H01705, KAKENHI-PROJECT-15K00009, KAKENHI-PROJECT-17H01695
  • [Journal Article] Error-correcting codes against chosen-codeword attacks2016

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science (ICITS 2016)

      Volume: 10015 Pages: 177-189

    • DOI

      10.1007/978-3-319-49175-2_9

    • ISBN
      9783319491745, 9783319491752
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PUBLICLY-15H00851, KAKENHI-PROJECT-16H01705
  • [Journal Article] Public-Key Encryption with Lazy Parties2016

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E99.A Issue: 2 Pages: 590-600

    • DOI

      10.1587/transfun.E99.A.590

    • NAID

      130005121513

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PUBLICLY-15H00851, KAKENHI-PROJECT-24240001
  • [Journal Article] Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model2015

    • Author(s)
      Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, Kenji Yasunaga
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E98.A Issue: 3 Pages: 853-862

    • DOI

      10.1587/transfun.E98.A.853

    • NAID

      130004770983

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500010, KAKENHI-PLANNED-24106009, KAKENHI-PROJECT-24240001, KAKENHI-PUBLICLY-25106509
  • [Journal Article] 暗号とゲーム理論 (解説論文)2014

    • Author(s)
      安永憲司
    • Journal Title

      数学セミナー

      Volume: 53(10) Pages: 25-29

    • Data Source
      KAKENHI-PROJECT-24240001
  • [Journal Article] Randomness Leakage in the KEM/DEM Framework2014

    • Author(s)
      Hitoshi Namiki, Keisuke Tanaka, and Kenji Yasunaga
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E97.A Issue: 1 Pages: 191-199

    • DOI

      10.1587/transfun.E97.A.191

    • NAID

      130003385344

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23700010, KAKENHI-PROJECT-24240001, KAKENHI-PUBLICLY-25106509
  • [Journal Article] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs2013

    • Author(s)
      Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E96.A Issue: 6 Pages: 1100-1111

    • DOI

      10.1587/transfun.E96.A.1100

    • NAID

      10031193795

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500010, KAKENHI-PROJECT-23700010, KAKENHI-PROJECT-24240001, KAKENHI-PUBLICLY-25106509
  • [Journal Article] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs2013

    • Author(s)
      Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: To appear

    • NAID

      10031193795

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Journal Article] List Decoding of Reed-Muller Codes Based on a Generalized Plotkin Construction2013

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E96.A Issue: 7 Pages: 1662-1666

    • DOI

      10.1587/transfun.E96.A.1662

    • NAID

      130003370698

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Journal Article] Game-theoretic security for bit commitment2013

    • Author(s)
      Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 8231 Pages: 303-318

    • DOI

      10.1007/978-3-642-41383-4_20

    • ISBN
      9783642413827, 9783642413834
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23700010, KAKENHI-PROJECT-24240001, KAKENHI-PUBLICLY-25106509
  • [Journal Article] A game-theoretic perspective on oblivious transfer2012

    • Author(s)
      Haruna Higo, Keisuke Tanaka, Akihiro Yamada, and Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science (ACISP2012)

      Volume: 7372 Pages: 29-42

    • DOI

      10.1007/978-3-642-31448-3_3

    • ISBN
      9783642314476, 9783642314483
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Journal Article] Public-key encryption with lazy parties2012

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science (SCN2012)

      Volume: 7485 Pages: 411-425

    • DOI

      10.1007/978-3-642-32928-9_23

    • NAID

      130005121513

    • ISBN
      9783642329272, 9783642329289
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Journal Article] Weak oblivious transfer from strong one-way functions. In Proceedings of the 5th International Conference on Provable Security (ProvSec 2011)2011

    • Author(s)
      Keisuke Tanaka, Akihiro Yamada, and Kenji Yasunaga
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag

      Volume: volume 6980 Pages: 34-51

    • DOI

      10.1007/978-3-642-24316-5_5

    • ISBN
      9783642243158, 9783642243165
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Journal Article] Correction of samplable additive errors

    • Author(s)
      Kenji Yasunaga
    • Journal Title

      In Proceedings of the 2014 IEEE International Symposium on Information Theory

      Volume: (to appear)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Unified View for Notions of Bit Security2024

    • Author(s)
      Watanabe Shun and Yasunaga Kenji
    • Organizer
      ASIACRYPT 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K18460
  • [Presentation] 挿入や削除を訂正する符号のサイズの上界・下界2023

    • Author(s)
      安永 憲司
    • Organizer
      エクスパンダーグラフの新しい構成手法の確立とその応用2
    • Data Source
      KAKENHI-PROJECT-23K18460
  • [Presentation] Fuzzy Signature with Biometric-Independent Verification2023

    • Author(s)
      Higo Haruna、Isshiki Toshiyuki、Otsuki Saki、Yasunaga Kenji
    • Organizer
      BIOSIG 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23H00468
  • [Presentation] Rational Broadcast Protocols Against Timid Adversaries2023

    • Author(s)
      Yamashita Keigo、Yasunaga Kenji
    • Organizer
      GameSec 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23H00468
  • [Presentation] Unified View for Notions of Bit Security2023

    • Author(s)
      Watanabe Shun、Yasunaga Kenji
    • Organizer
      ASIACRYPT 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23H00468
  • [Presentation] 挿入・削除訂正符号のサイズの上下界式2022

    • Author(s)
      安永 憲司
    • Organizer
      第45回情報理論とその応用シンポジウム
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] Quantifying the Security Levels of Cryptographic Primitives2022

    • Author(s)
      Kenji Yasunaga
    • Organizer
      2022 IEEE Region 10 Conference (TEN- CON 2022)
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] 明示的構成の計算量と値域回避問題2022

    • Author(s)
      安永 憲司
    • Organizer
      エクスパンダーグラフの構成手法の確立とその応用
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] Replacing Probability Distributions in Security Games via Hellinger Distance.2021

    • Author(s)
      Kenji Yasunaga
    • Organizer
      2nd Conference on Information-Theoretic Cryptography
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] Bit Security as Computational Cost for Winning Games with High Probability2021

    • Author(s)
      Shun Watanabe and Kenji Yasunaga
    • Organizer
      ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] 少ない順位付けを用いるランキング手法の評価:決定性と乱択2021

    • Author(s)
      草地翔斗, 安永憲司
    • Organizer
      日本オペレーションズ・リサーチ学会 2021年秋季研究発表会
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] 暗号学的ハッシュ関数を用いた挿入・削除訂正2021

    • Author(s)
      長谷場 保亮, 安永 憲司
    • Organizer
      第44回情報理論とその応用シンポジウム (SITA2021)
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] A Construction of Robustly Reusable Fuzzy Extractors over Blockchains2020

    • Author(s)
      Kodai Sato, Kenji Yasunaga, Toru Fujiwara,
    • Organizer
      ISITA2020
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] すべての通信路が敵に支配されてもゲーム理論的には安全な通信ができる2020

    • Author(s)
      安永 憲司, 小柴 健史
    • Organizer
      2020 年 暗号と情報セキュリティシンポジウム (SCIS2020)
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] すべての通信路が敵に支配されてもゲーム理論的には安全な通信ができる2020

    • Author(s)
      安永 憲司, 小柴 健史
    • Organizer
      LA シン ポジウム
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] Perfectly secure message transmission against independent rational adversaries2019

    • Author(s)
      Kenji Yasunaga and Takeshi Koshiba
    • Organizer
      10th Conference on Decision and Game Theory for Security (GameSec 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] On the List Decodability of Insertions and Deletions2018

    • Author(s)
      Tomohiro Hayashi, Kenji Yasunaga
    • Organizer
      2018 IEEE International Symposium on Information Theory, ISIT 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] On the List Decodability of Insertions and Deletions2018

    • Author(s)
      Tomohiro Hayashi, Kenji Yasunaga
    • Organizer
      2018 IEEE International Symposium on Information Theory, ISIT 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H01705
  • [Presentation] 挿入と削除に対するリスト復号2018

    • Author(s)
      安永 憲司,林 智弘
    • Organizer
      第7回 誤り訂正符号のワークショップ
    • Data Source
      KAKENHI-PROJECT-18K11159
  • [Presentation] 量子攻撃者に対する決定性暗号方式の安全性2017

    • Author(s)
      林 智弘, 安永 憲司, 満保 雅浩
    • Organizer
      2017年 暗号と情報セキュリティシンポジウム (SCIS2017)
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市)
    • Year and Date
      2017-01-24
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] 非許可型コンセンサスプロトコルの不可能性に関する考察2017

    • Author(s)
      稲澤 啓太, 越中谷 隼人, 安永 憲司, 満保 雅浩
    • Organizer
      2017年 暗号と情報セキュリティシンポジウム (SCIS2017)
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市)
    • Year and Date
      2017-01-24
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] 暗号技術に対するゲーム理論的なアプローチ2017

    • Author(s)
      安永憲司
    • Organizer
      第9回暗号及び情報セキュリティと数学の相関ワークショップ
    • Invited
    • Data Source
      KAKENHI-PROJECT-16H01705
  • [Presentation] 検証者の不正を防ぐ合理的な証明とその委託計算への応用2016

    • Author(s)
      稲澤 啓太, 安永 憲司, 満保 雅浩
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-21
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Presentation] サンプル可能な誤りの効率的な訂正可能性について2016

    • Author(s)
      安永 憲司
    • Organizer
      2015年度冬のLAシンポジウム
    • Place of Presentation
      京都大学,京都市
    • Year and Date
      2016-01-27
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Presentation] 繰り返しゲームを用いた乱数生成のインセンティブに関する考察2016

    • Author(s)
      湯澤 孝介, 安永 憲司, 満保 雅浩
    • Organizer
      2016年 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      熊本県熊本市 ANAクラウンプラザホテル熊本ニュースカイ
    • Year and Date
      2016-01-21
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] サンプルル可能な誤りの効率的な訂正可能性について2016

    • Author(s)
      安永 憲司
    • Organizer
      冬の LA シンポジウム
    • Place of Presentation
      京都大学数理解析研究所
    • Year and Date
      2016-01-27
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] 検証者の不正を防ぐ合理的な証明とその委託計算への応用.2016

    • Author(s)
      稲澤 啓太, 安永 憲司, 満保 雅浩.
    • Organizer
      2016 年 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      熊本県熊本市 ANAクラウンプラザホテル熊本ニュースカイ
    • Year and Date
      2016-01-21
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] 難読化技術を用いたサインディクリプション方式の構成2016

    • Author(s)
      越中谷 隼人, 安永 憲司, 満保 雅浩
    • Organizer
      2016 年 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      熊本県熊本市 ANAクラウンプラザホテル熊本ニュースカイ
    • Year and Date
      2016-01-20
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] 繰り返しゲームを用いた乱数生成のインセンティブに関する考察2016

    • Author(s)
      湯澤 孝介, 安永 憲司, 満保 雅浩
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-21
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Presentation] 難読化技術を用いたサインデクリプション方式の構成2016

    • Author(s)
      越中谷 隼人, 安永 憲司, 満保 雅浩
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS2016)
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ,熊本市
    • Year and Date
      2016-01-20
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Presentation] プロトコルの安全性とゲーク理論2015

    • Author(s)
      安永 憲司
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Place of Presentation
      東北大学,仙台市
    • Year and Date
      2015-09-09
    • Invited
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Presentation] プロトコルの安全性とゲーム理論2015

    • Author(s)
      安永 憲司
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Place of Presentation
      宮城県仙台市 東北大学川内北キャンパス
    • Year and Date
      2015-09-09
    • Invited
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] 合理的な検証者に対する合理的な証明2015

    • Author(s)
      稲澤 啓太, 安永 憲司, 満保 雅浩
    • Organizer
      2015年度夏のLAシンポジウム
    • Place of Presentation
      ゆのくに天祥,加賀市
    • Year and Date
      2015-07-15
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Presentation] 合理的な検証者に対する合理的な証明2015

    • Author(s)
      稲澤 啓太, 安永 憲司, 満保 雅浩
    • Organizer
      夏の LA シンポジウム
    • Place of Presentation
      石川県加賀市 ゆのくに天祥
    • Year and Date
      2015-07-15
    • Data Source
      KAKENHI-PUBLICLY-15H00851
  • [Presentation] A study on computational fuzzy extractors2014

    • Author(s)
      Kosuke Yuzawa, Kenji Yasunaga, Masahiro Mambo
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      鹿児島県鹿児島市
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] A study on computational fuzzy extractors2014

    • Author(s)
      Kosuke Yuzawa, Kenji Yasunaga, and Masahiro Mambo
    • Organizer
      the 31st Symposium on Cryptography and Information Security
    • Place of Presentation
      Kagoshima, Japan
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Correction of samplable additive errors2014

    • Author(s)
      Kenji Yasunaga
    • Organizer
      IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, USA
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Correction of samplable additive errors2014

    • Author(s)
      Kenji Yasunaga
    • Organizer
      IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, USA
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] A study on computational fuzzy extractors2014

    • Author(s)
      Kosuke Yuzawa, Kenji Yasunaga, and Masahiro Mambo
    • Organizer
      the 31st Symposium on Cryptography and Information Security
    • Place of Presentation
      Kagoshima, Japan
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] Correction of samplable additive errors2014

    • Author(s)
      Kenji Yasunaga
    • Organizer
      2014 IEEE International Symposium on Information Theory (ISIT 2014)
    • Place of Presentation
      Hawaii Convention Center, Honolulu, USA
    • Year and Date
      2014-07-01
    • Data Source
      KAKENHI-PROJECT-24240001
  • [Presentation] Game-theoretic security for bit commitment2013

    • Author(s)
      Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
    • Organizer
      The 8th International Workshop on Security
    • Place of Presentation
      Okinawa, Japan
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Game-theoretic security for bit commitment2013

    • Author(s)
      Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
    • Organizer
      8th International Workshop on Security
    • Place of Presentation
      Okinawa, Japan
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Preventing abuse of cookies stolen by XSS2013

    • Author(s)
      Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, and Heung Youl Youm
    • Organizer
      8th Asia Joint Conference on Information Security
    • Place of Presentation
      Seoul, Korea
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] Game-theoretic security for bit commitment2013

    • Author(s)
      Haruna Higo, Keisuke Tanaka, and Kenji Yasunaga
    • Organizer
      8th International Workshop on Security
    • Place of Presentation
      Okinawa, Japan
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] Preventing abuse of cookies stolen by XSS2013

    • Author(s)
      Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, and Heung Youl Youm
    • Organizer
      8th Asia Joint Conference on Information Security
    • Place of Presentation
      Seoul, Korea
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Error correction in computationally bounded channels2013

    • Author(s)
      Kenji Yasunaga
    • Organizer
      第六回計算量理論若手の会ワークショップ
    • Place of Presentation
      山形県米沢市
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Correctability of efficiently computable additive errors2012

    • Author(s)
      Kenji Yasunaga
    • Organizer
      第35回情報理論とその応用シンポジウム
    • Place of Presentation
      大分県速見郡日出町
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] A Game-Theoretic Perspective on Oblivious Transfer2012

    • Author(s)
      Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
    • Organizer
      17th Australasian Conference on Information Security and Privacy (ACISP 2012)
    • Place of Presentation
      Wollongong, Australia
    • Data Source
      KAKENHI-PROJECT-23500010
  • [Presentation] 効率的に計算可能な加法的誤りの訂正可能性2012

    • Author(s)
      安永 憲司
    • Organizer
      第 35 回 情報理論とその応用シンポジウム
    • Place of Presentation
      大分県別府市
    • Data Source
      KAKENHI-PROJECT-23700010
  • [Presentation] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs2012

    • Author(s)
      Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      17th Australasian Conference on Information Security and Privacy (ACISP 2012)
    • Place of Presentation
      Wollongong, Australia
    • Data Source
      KAKENHI-PROJECT-23500010
  • [Presentation] Weak Oblivious Transfer from Strong One-Way Functions2011

    • Author(s)
      Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
    • Organizer
      5th International Conference on Provable Security - ProvSec 2011
    • Place of Presentation
      Xi'an Tang Cheng Hotel (西安, 中国)
    • Data Source
      KAKENHI-PROJECT-23500010
  • [Presentation] Randomness Leakage in the KEM/DEM Framework2011

    • Author(s)
      Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      5th International Conference on Provable Security - ProvSec 2011
    • Place of Presentation
      Xi'an Tang Cheng Hotel (西安, 中国)
    • Data Source
      KAKENHI-PROJECT-23500010
  • [Presentation] Leakage-Resilient CCA2 Public-Key Encryption from 4-wise independent hash functions2011

    • Author(s)
      Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      2011 International Conference on Advanced Technologies for Communications - ATC 2011
    • Place of Presentation
      Da Nang University of Technology (Da Nang, ベトナム)
    • Data Source
      KAKENHI-PROJECT-23500010
  • [Presentation] List decoding for Reed-Muller codes and its application to polar codes2009

    • Author(s)
      安永憲司
    • Organizer
      第32回情報理論とその応用シンポジウム
    • Place of Presentation
      山口県山口市
    • Year and Date
      2009-12-02
    • Data Source
      KAKENHI-PROJECT-20860079
  • [Presentation] 計算量的なエントロピー安全性に関する考察

    • Author(s)
      池田光晴, 安永憲司, 満保雅浩.
    • Organizer
      第32回暗号と情報セキュリティシンポジウム
    • Place of Presentation
      北九州市
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] Game-Theoretic Security for Bit Commitment

    • Author(s)
      Haruna Higo, Keisuke Tanaka, Kenji Yasunaga
    • Organizer
      8th International Workshop on Security (IWSEC2013)
    • Place of Presentation
      Okinawaken Shichouson Jichikaikan, Okinawa, Japan
    • Data Source
      KAKENHI-PROJECT-23500010
  • [Presentation] Correction of samplable additive errors

    • Author(s)
      Kenji Yasunaga
    • Organizer
      2014 IEEE International Symposium on Information Theory (ISIT 2014)
    • Place of Presentation
      ハワイ ホノルル
    • Year and Date
      2014-06-29 – 2014-07-04
    • Data Source
      KAKENHI-PROJECT-23500010
  • [Presentation] 検証者が報酬を下げることができない合理的な証明

    • Author(s)
      稲澤 啓太, 安永 憲司, 満保 雅浩
    • Organizer
      第32回暗号と情報セキュリティシンポジウム
    • Place of Presentation
      北九州市
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] ユーザビリティ向上のための部分的パスワード共有による影響

    • Author(s)
      湯澤 孝介, 安永 憲司, 満保 雅浩
    • Organizer
      第32回暗号と情報セキュリティシンポジウム
    • Place of Presentation
      北九州市
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] エントロピープール付き擬似乱数生成器の性能分析

    • Author(s)
      西野 卓也, 安永 憲司, 満保 雅浩
    • Organizer
      第32回暗号と情報セキュリティシンポジウム
    • Place of Presentation
      北九州市
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] Correction of samplable additive errors,

    • Author(s)
      Kenji Yasunaga
    • Organizer
      IEEE International Symposium on Information Theory
    • Place of Presentation
      Honolulu, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • [Presentation] cookie 漏洩に起因する被害の低減手法の構築と考察

    • Author(s)
      高橋寛弥, 安永憲司, 満保雅浩
    • Organizer
      第32回暗号と情報セキュリティシンポジウム
    • Place of Presentation
      北九州市
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PUBLICLY-25106509
  • 1.  河内 亮周 (00397035)
    # of Collaborated Projects: 6 results
    # of Collaborated Products: 0 results
  • 2.  TANAKA Keisuke (20334518)
    # of Collaborated Projects: 5 results
    # of Collaborated Products: 8 results
  • 3.  KOSHIBA Takeshi (60400800)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 4.  ルガル フランソワ (50584299)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 5.  西村 治道 (70433323)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 6.  松本 啓史 (60272390)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 7.  小林 弘忠 (60413936)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 8.  岩本 貢 (50377016)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 9.  渡辺 峻 (70546910)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 2 results
  • 10.  堀山 貴史 (60314530)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 11.  桑原 知剛 (70757773)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 12.  齋藤 翔太 (60822145)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 13.  山下 恭佑 (90935743)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi