Masayuki TEZUKA

E-mail:m.tezuka(at)nsc.nagoya-cu.ac.jp
| Division | Mathematical and Material Science, Assistant Professor |
|---|---|
| Academic Degree | Ph.D. |
Contents of page
Research Field
Cryptography, Complexity Theory, Algorithm Theory
Keywords
Public-Key Cryptography, Provable Security, Advanced Cryptography, Post Quantum Cryptography
Current Research Topics
(1) Construction of Advanced Cryptography:
Advanced cryptography refers to cryptography that extends conventional cryptography with additional useful functionalities. An example is fully homomorphic encryption. Fully homomorphic encryption is a cryptographic technique that enables computations to be performed directly on encrypted data without decryption, making it possible to compute statistical data while preserving privacy. In our laboratory, we work on defining security models for advanced cryptography, constructing schemes, and proving their security.
(2) Construction of Post-Quantum Cryptography:
Post-quantum cryptography refers to cryptography that can run on classical computers and is difficult for quantum computers to break. In the future, quantum computers will be able to handle a large number of qubits. This will compromise the security of currently used cryptosystems such as RSA. Therefore, the development of post-quantum cryptography is essential. In our laboratory, we focus on constructing cryptographic schemes based on the hardness of problems related to lattices and error-correcting codes.
Advanced cryptography refers to cryptography that extends conventional cryptography with additional useful functionalities. An example is fully homomorphic encryption. Fully homomorphic encryption is a cryptographic technique that enables computations to be performed directly on encrypted data without decryption, making it possible to compute statistical data while preserving privacy. In our laboratory, we work on defining security models for advanced cryptography, constructing schemes, and proving their security.
(2) Construction of Post-Quantum Cryptography:
Post-quantum cryptography refers to cryptography that can run on classical computers and is difficult for quantum computers to break. In the future, quantum computers will be able to handle a large number of qubits. This will compromise the security of currently used cryptosystems such as RSA. Therefore, the development of post-quantum cryptography is essential. In our laboratory, we focus on constructing cryptographic schemes based on the hardness of problems related to lattices and error-correcting codes.
Selected Publications
Relationships Among FuncCPA and Its Related Notions. TCC 2025, Proceedings, Part II, volume 16269 of Lecture Notes in Computer Science, pages 97–122.
Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption. IWSEC 2025, Proceedings, volume 16208 of Lecture Notes in Computer Science, pages 67–87.
Public Key Encryption with Equality Test from Tag-Based Encryption. IWSEC 2025, Proceedings, volume 16208 of Lecture Notes in Computer Science, pages 24–44.
Logarithmic-Size Ring Signatures with Tight Security from the DL Assumption. ProvSec 2025, Proceedings, volume 16172 of Lecture Notes in Computer Science, pages 44–64.
Practical Quantum Public Key Encryption from One-way Functions. ACM APKC 2025, Proceedings, pages 44–53.
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange. SCN 2024, Proceedings, Part II, volume 14974 of Lecture Notes in Computer Science, pages 272–293.
Quantum Search-to-Decision Reduction for the LWE Problem. AFRICACRYPT 2023, Proceedings, volume 14064 of Lecture Notes in Computer Science, pages 395–413.
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature. ICISC 2022, Proceedings, volume 13849 of Lecture Notes in Computer Science, pages 317–336.
Forward Secure Message Franking. ICISC 2021, Proceedings, volume 13218 of Lecture Notes in Computer Science, pages 339–358.
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme. ACISP 2020, Proceedings, volume 12248 of Lecture Notes in Computer Science, pages 225–243.
Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption. IWSEC 2025, Proceedings, volume 16208 of Lecture Notes in Computer Science, pages 67–87.
Public Key Encryption with Equality Test from Tag-Based Encryption. IWSEC 2025, Proceedings, volume 16208 of Lecture Notes in Computer Science, pages 24–44.
Logarithmic-Size Ring Signatures with Tight Security from the DL Assumption. ProvSec 2025, Proceedings, volume 16172 of Lecture Notes in Computer Science, pages 44–64.
Practical Quantum Public Key Encryption from One-way Functions. ACM APKC 2025, Proceedings, pages 44–53.
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange. SCN 2024, Proceedings, Part II, volume 14974 of Lecture Notes in Computer Science, pages 272–293.
Quantum Search-to-Decision Reduction for the LWE Problem. AFRICACRYPT 2023, Proceedings, volume 14064 of Lecture Notes in Computer Science, pages 395–413.
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature. ICISC 2022, Proceedings, volume 13849 of Lecture Notes in Computer Science, pages 317–336.
Forward Secure Message Franking. ICISC 2021, Proceedings, volume 13218 of Lecture Notes in Computer Science, pages 339–358.
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme. ACISP 2020, Proceedings, volume 12248 of Lecture Notes in Computer Science, pages 225–243.
