Noboru Kunihiro

University of Tsukuba/ Professor

Last updated 2023/08/14

Employment:

  • May. 2019 - present: Professor, University of Tsukuba, Japan
  • Mar. 2008 - Apr. 2019: Associate Professor, University of Tokyo, Japan
  • Apr. 2006 - Feb. 2008: Associate Professor, University of Electro-Communications, Japan
  • Jul.2002 - Mar.2006: Assistant Professor, University of Electro-Communications, Japan
  • Apr.1996 - Jun.2002: Researcher, NTT Laboratories, Japan

Education:

  • Jan. 2001: Ph.D. from University of Tokyo
  • Apr.1994 - Mar.1996: The University of Tokyo, Japan
    • Master of Engineering (M.E. in Mathematical Engineering)
  • Apr.1990- Mar.1994: The University of Tokyo, Japan
    • Bachelor of Engineering (B. E. in Mathematical Engineering)

Dissertation

  • Title: Security and Efficiency Analyses of Public Key Cryptosystems
    • Ph.D. from The University of Tokyo

Selected Publications:

See the full list of international publications and see also DBLP.

(Selected) Reviewed Journal Papers (TCS, DCC, …)

  • Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures, by Reo Eriguchi, Noboru Kunihiro and Koji Nuida, Designs, Codes and Cryptography, Published online at 10 January 2023. [DOI]

  • Efficient Noise Generation Protocols for Differentially Private Multiparty Computation, by Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, IEEE Transactions on Dependable and Secure Computing, Dec. 2022. [DOI]

  • Efficient Construction of a Control Modular Adder on a Carry-Lookahead Adder Using Relative-phase Toffoli Gates, by Kento Oonishi, Tomoki Tanaka, Shumpei Uno, Takahiko Satoh, Rodney Van Meter, and Noboru Kunihiro, IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-18, 2022. (Available online 19 December, 2021.) [DOI]

  • Cryptanalysis of the RSA variant based on cubic Pell equation, by Mengce Zheng, Noboru Kunihiro and Yuanzhi Yao, Theoretical Computer Science, Volume 889, pp. 135-144, 2021. (Available online 5 August 2021.) [DOI]

  • Strong Security of Linear Ramp Secret Sharing Schemes with General Access Structures, by Reo Eriguchi and Noboru Kunihiro, Information Processing Letters, Vol. 164, Article 106018, December 2020. [DOI]

  • Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents, by Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro, Theoretical Computer Science, Volume 841, pp. 62-83, 2020. [DOI]

  • Generic hardness of inversion on ring and its relation to self-bilinear map, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro, Theoretical Computer Science, Volume 820, pp. 60-84, 2020. [DOI]

  • Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes, by Noboru Kunihiro and Atsushi Takayasu, Discrete Applied Mathematics, Volume 277, pp. 198-220, 2020. [DOI]

  • Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee’s Bound, by Atsushi Takayasu and Noboru Kunihiro, Theoretical Computer Science, Vol. 761, pp. 51-77, 2019. [DOI]

  • Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro, Algorithmica, 79 (4), pp. 1286-1317, 2017. [DOI]

IACR Conferences

  • Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli, by T. Yamakawa, S. Yamada, G. Hanaoka, and N. Kunihiro, in Proc. of CRYPTO2016, LNCS 9815, pp. 3-32, 2016. [Link]
  • How to Generalize RSA Cryptanalyses, by A. Takayasu and N. Kunihiro, in Proc. of PKC2016, LNCS9615, pp. 67-97, 2016. [Link]
  • RSA meets DPA: Recovering RSA Secret Keys from Noisy, by N. Kunihiro and J. Honda, in Proc. of CHES2014, LNCS 8731, pp. 261-278, 2014. [Link]
  • Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications, by Takashi Yamakawa; Shota Yamada; Goichiro Hanaoka; Noboru Kunihiro, in Proc. of CRYPTO2014 (2) LNCS 8617, pp. 90-107, 2014. [Link]
  • A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption, by Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro, in Proc. of PKC2014, LNCS 8383, pp. 275-292, 2014. [Link]
  • Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors, by Noboru Kunihiro, Naoyuki Shinohara and Tetsuya Izu, in Proc. of PKC2013, LNCS 7778, pp. 180-197, 2013. [Link]
  • Space Efficient Signature Schemes from the RSA Assumption, by Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro, in Proc. of PKC2012, LNCS7178, pp. 260-277, 2012. [Link]
  • Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication, by Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Goichiro Hanaoka and Jacob C.N. Schuldt and Noboru Kunihiro, in Proc. of PKC2012, LNCS7178, pp. 349-364, 2012. [Link]
  • Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption, by Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka and Noboru Kunihiro, in Proc. of PKC2011, LNCS6571, pp. 71-89, 2011. [Link]
  • New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD5, by Lei Wang and Kazuo Ohta and Noboru Kunihiro, in Proc. of Eurocrypt2008, LNCS4965, pp. 237-253, 2008. [Link]
  • Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi’s RSA, by Noboru Kunihiro and Kaoru Kurosawa, in Proc. of PKC2007, LNCS4450, pp. 412-425, April 16-20, Beijing, China. [Link]
  • New Message Difference for MD4, by Y. Sasaki, L. Wang, K. Ohta and N. Kunihiro, in Proc. of FSE 2007, LNCS4593, pp. 329-348, March 26-28, 2007, Luxembourg. [Link]
  • Improved Collision Search for SHA-0, by Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro and Kazuo Ohta, in Proc. of Asiacrypt2006, LNCS 4284, pp. 21-36, December 3-7, 2006, Shanghai, China. [Link]
  • Modulus Search for Elliptic Curve Cryptosystems, by Koyama K., Tsuruoka Y. and Kunihiro, N., in Advances in Cryptology - Asiacrypt'99, LNCS 1716, pp. 1-7 (1999). [Link]
  • Equivalence of Counting the Number of Points on Elliptic Curve over the ring $Z_n$ and Factoring $n$, by Noboru Kunihiro and Kenji Koyama, In Proceeding of Advances in Cryptology - EUROCRYPT'98, LNCS 1403, pp. 47-58 (1998). [Link]

Other (Selected) Conferences (ACNS, ACISP, AsiaCCS, CT-RSA, SAC, SCN, FC, ITC)

  • HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences, by Kenta Tani and Noboru Kunihiro, in Proc. of Applied Cryptography and Network Security 2023 (ACNS2023), LNCS 13905,pp. 59-88, 2023. [DOI]

  • Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation, by Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro and Koji Nuida, in Proc. of Financial Cryptography and Data Security 2021 (FC2021), 2021. [pdf]

  • Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method, by Kento Oonishi, Noboru Kunihiro, in Proc. of ACISP2020, pp. 642-652, 2020. [Link]

  • d-Multiplicative Secret Sharing for Multipartite Adversary Structures, by Reo Eriguchi and Noboru Kunihiro, in Proc. of 1st Conference on Information-Theoretic Cryptography (ITC 2020), pp. 2:1-2:16, vol. 163, 2020. [Link]

  • A Deterministic Algorithm for Computing Divisors in an Interval, by Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang and Lei Hu, in Proc. of ACISP2018, LNCS 10946, pp. 3-12, 2018. [Link]

  • Bounds in Various Generalized Settings of the Discrete Logarithm Problem, by Jason Ying and Noboru Kunihiro, in Proc. of ACNS2017, LNCS 10355, pp. 498-517, 2017. [Link]

  • Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference, by Mengce Zheng, Noboru Kunihiro and Honggang Hu, in Proc. of ACISP2017, LNCS 10342, pp. 324-342, 2017. [Link]

  • Mis-operation Resistant Searchable Homomorphic Encryption, by Keita Emura, Takuya Hayashi, Noboru Kunihiro and Jun Sakuma, in Proc. of ASIA CCS'17, pp. 215–229, 2017. [Link]

  • Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise, by Noboru Kunihiro and Yuki Takayasu, in Proc. of CT-RSA2017, LNCS 10159, pp. 328–343, 2017. [Link]

  • A Tool Kit for Partial Key Exposure Attacks on RSA, by A. Takayasu and N. Kunihiro, in Proc. of CT-RSA2017, LNCS 10159, pp. 58–73, 2017. [Link]

  • Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs, by A. Takayasu and N. Kunihiro, in Proc. of ACISP2016, LNCS 9723, pp. 243–257, 2016. [Link]

  • Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information, by T. Yamakawa, G. Hanaoka and N. Kunihiro, in Proc. of ACISP2016, LNCS 9723, pp. 269–284, 2016. [Link]

  • Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem, by T. Vannet and N. Kunihiro, in Proc. of SAC2015, LNCS 9566, pp. 227–240, 2015. [Link]

  • Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents, by A. Takayasu and N. Kunihiro, in Proc. of ACNS2015, LNCS 9092, 2015. [Link]

  • Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues, by Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka and Noboru Kunihiro, in Proc. of SCN2014, LNCS 8642, pp. 558-577, 2014. [Link]

  • Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee’s Bound, by A. Takayasu and N. Kunihiro, in Proc. of SAC2014, LNCS 8781, pp. 345-362, 2014. [Link]

  • Cryptanalysis of RSA with Multiple Small Secret Exponents, by A. Takayasu and N. Kunihiro, in Proc. of ACISP2014, LNCS 8544, pp. 176-191, 2014. [Link]

  • Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ACISP2013, LNCS 7959, pp. 118-135, 2013. [Link]

  • Optimal Bounds for Multi-Prime Phi-Hiding Assumption, by Kaori Tosu, Noboru Kunihiro, in Proc. of ACISP2012, LNCS7372, pp. 1-14, 2012. [Link]

  • Faster Algorithm for Solving Hard knapsacks for Moderate Message Length, by Yuji Nagashima, Noboru Kunihiro, in Proc. of ACISP2012, LNCS7372, pp. 43-56, 2012. [Link]

  • Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More, by Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro, in Proc. of CT-RSA2012, 7178, pp. 260-277, 2012. [Link]

  • Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption, by Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao in Proc. of CT-RSA2012, 7178, pp. 349-364, 2012. [Link]

  • A Unified Framework for Small Secret Exponent Attack on RSA, by Noboru Kunihiro, Naoyuki Shinohara and Tetsuya Izu, in Proc. of SAC2011, LNCS7118, pp. 260-277, 2011. [Link]

  • Solving Generalized Small Inverse Problems, by N. Kunihiro in Proc. of ACISP2010, LNCS6168, pp. 248-263, 2010. [Link]

  • Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack, by Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro, in Proc. of CT-RSA2008, LNCS4964, pp. 1-18, 2008. [Link]

  • Small Secret Key Attack on a variant of RSA (due to Takagi), by Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa, in Proc. of CT-RSA2008, LNCS4964, pp. 387-406, 2008. [Link]

  • Password Recovery Attack on Authentication Protocol MD4(Password||Challenge), by Lei Wang and Kazuo Ohta and Noboru Kunihiro, in Proc. of ASIACCS2008, pp. 3-9, 2008. [Link]

  • A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search, by Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta, in Proc. of ASIACCS2008, pp. 10-20, 2008. [Link]

  • A New Strategy for Finding a Differential Path of SHA-1, by Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta, in Proc. of ACISP 2007, LNCS4586, pp. 45-58, July, 2007. [Link]

  • Provable Secure Electronic Cash based on Blind Multisignature schemes, by Y. Hanatani, Y. Komano, K. Ohta and N. Kunihiro, in Financial Cryptography'06, LNCS 4107, pp. 236-250, Feb.27-March 2, 2006. [Link]


Advising

Graduated PhD Students (11)

  • Kento Oonishi (Mitsubishi), Ken Naganuma, (Hitachi), Shuichi Katsumata (AIST), Jason Ying, Atsushi Takayasu (NICT), Takashi Yamakawa (NTT), Thomas Vannet (Huawei), Shota Yamada (AIST), Masayuki Yoshino (Hitachi), Yutaka Kawai (Mitsubishi), Yasuhiro Takahashi (NTT)

Current PhD Students (0)


Professional Activities

Program Chair

  • IWSEC2010 Program co-Chair (2010.11)

Program Committee:

  • ISITA2004 Technical Program Committee (2004.10)
  • 3rd International IEEE Security in Storage Workshop Program Committee (2005.12)
  • TQC2006 Program Committee (2006.02)
  • ISITA2006 Technical Program Committee (2006.10)
  • IWSEC2006 Program Committee (2006.10)
  • MCIS International Progaram Committee(2006.11)
  • TQC2007 Program Committee (2007.01)
  • IWSEC2007 Program Committee (2007.10)
  • IWSEC2008 Program Committee (2008.11)
  • ISITA2008 Technical Program Committee (2008.12)
  • IWSEC2009 Program Committee (2009.10)
  • ProvSec2010 Program Committee (2010.10)
  • ProvSec2011 Program Committee (2011.10)
  • IWSEC2011 Program Committee (2011.11)
  • ISITA2012 Technical Program Committee (2012.10)
  • IWSEC2012 Program Committee (2012.11)
  • PKC2013 Program Committee (2013.02)
  • IWSEC2013 Program Committee (2013.11)
  • IWSEC2014 Program Committee (2014.08)
  • ISITA2014 Technical Program Committee (2014.10)
  • IWSEC2015 Program Committee (2015.08)
  • ACISP2016 Program Committee (2016.07)
  • ISITA2016 Technical Program Committee (2016.10)
  • IWSEC2017 Program Committee (2017.08)
  • ACISP2017 Program Committee (2017.07)
  • ISC2017 Program Committee (2017.11)
  • ISPEC2017 Program Committee (2017.12)

Contact:

e-mail: kunihiro (at) cs.tsukuba.ac.jp