Symposium on Security Infrastructure for Big Data and Applications to Medical and Living Safety Fields

Click here for English page. 事前登録ページはこちら

概要

今日、我々を取り巻く情報社会では,多種多様なビッグデータが収集され, その解析結果は医療,生活安全など様々な分野での利活用が期待されています.
本シンポジウムではビッグデータの利活用を行う医学,生活安全分野とビッグデータの利活用に不可欠なセキュリティ分野の専門家による最先端の研究発表を通じて, ビッグデータに関わる異なる分野間の活発な融合を行い, セキュアかつフェアなビッグデータ流通プラットフォームの確立と発展を目指します. セキュリティ分野では最もホットな話題である耐量子暗号や高機能暗号の最新の成果とともに, CREST 喜連川プロジェクト「ビッグデータ統合利活用のための次世代基盤技術の創出・体系化」 の研究も紹介します. またプライバシを保護したビッグデータ流通システムのプロトタイプの 展示も行い, ビッグデータ利活用のさらなるビジネス展開を試みます.
ビッグデータの利活用は新産業創造の鍵と言われています. ご興味のある方はぜひご参加頂ければ幸いでございます.

開催日程

2017年3月16日(木) - 2017年3月17日(金)

こちらから事前登録をお願いいたします.
(意見交換会参加希望の方は3月3日3月9日までに登録お願いいたします)

シンポジウム会場

大阪大学吹田キャンパス大学院工学研究科E1-115メモリアルホール

意見交換会(3/17夜)会場

レストラン La Scena 
大阪大学吹田キャンパス大学院工学研究科GSEコモン・イースト棟15階

プログラム

3月16日
※デモンストレーションは講演会場入口付近にて随時展示(12:00-17:50)
12:00-13:00登録

Opening Remarks: Atsuko Miayji (Professor, Osaka University and Japan Advanced Institute of Science and Technology)

Session 1: Secure and Efficient IoT Cryptosystems and Applications
13:10-14:10Ingrid VerbauwhedeEnergy efficiency and security for cryptographic algorithms implementations
14:10-14:40Atsuko MiyajiSecurity infrastructure for utilization of big data
14:40-15:00休憩
Session 2: Connections to Medical and Living Safety Researches
15:00-15:30Takashi KawamuraDevelopment of a Life-Long Personal Health Record System based on University Health Services
15:30-16:00Yoshifumi NishidaA New System for Sharing and Informing Serious Incidents among Multiple Facilities
16:00-16:20休憩
Session 3: Functional Cryptography
16:20-17:20Hoeteck WeeCryptography, Encryption and Big Data
17:20-17:50Seiko AritaData-mining-oriented homomorphic encryption
3月17日
※デモンストレーションは講演会場入口付近にて随時展示(9:30-17:20)
9:30-10:00登録
Session 4: Secure Systems for Bio-Data
10:00-11:00Kuo-Hui YehWalk as Who I Am: Transparent Authentication Scheme with Adaptive Plantar Bio-features
11:00-11:30Jun SakumaPrivacy-preserving statistical analysis with genetic and clinical data
11:30-14:00休憩

Remarks from Research Supervisor: Masaru Kitsuregawa (Director General, National Institute of Informatics / Professor, The University of Tokyo)

Session 5: Applications in Medical and Business Fields
14:10-14:40Shinsaku KiyomotoPrivacy Risk Analysis and Anonymisation in a Business Context
14:40-15:10Katsuya TanakaClinical Data Utilization based on Secure Information Infrastructure in Medical Fields
15:10-15:40休憩
Session 6: Post-Quantum Cryptography
15:40-16:10Chen-Mou ChengAn overview of post-quantum cryptography
16:10-17:10Serge VaudenayThe Complexity of Solving the Learning Parity with Noise Problem

Closing Remarks: Shojiro Nishio (President of Osaka University)

18:00-20:00意見交換会

海外招待講演者

Speaker:Serge Vaudenay
(EPFL)
Title:The Complexity of Solving the Learning Parity with Noise Problem
(Joint work with Sonia Bogos)
Abstract: Learning Parity with Noise (LPN) is one of the most famous post-quantum problems. It is used in symmetric identification protocols and in public-key cryptosystems. In this presentation, we review the main solving techniques and how to optimize them by a meta-solving algorithm. We deduce complexity estimates for the LPN problems with several parameters.
Biography:

Serge Vaudenay entered at the Ecole Normale Superieure in Paris in 1989 with a major in mathematics. He received his PhD in computer sciences from University of Paris 7 - Denis Diderot in 1995. He subsequently became a research fellow at CNRS (National Center for Scientific Research in France). In 1999, he was appointed as a Professor at the EPFL, where he created the Security and Cryptography Laboratory.

He works on cryptography and the security of digital information. Most of his work relates to security analysis and provable security of cryptographic algorithms and protocols, specially in symmetric cryptography, post-quantum public-key cryptography, RFID protocols and distance bounding. He wrote an Essay on cryptography (in French, published by PPUR) and a textbook on cryptography (published by Springer). He was program chair of several research conferences and workshops: ACNS'14, INDOCRYPT'13, AFRICACRYPT'12, SAC'11, AFRICACRYPT'08, EUROCRYPT'06, MYCRYPT'05, PKC'05, SAC'01, and FSE'98. In 2007-12, he was an elected director of the IACR (International Association for Cryptologic Research).

Speaker:Hoeteck Wee
(ENS & Columbia Univ.)
Title:Cryptography, Encryption and Big Data
Abstract: We live in an era of "Big Data", wherein a deluge of data is being generated, collected, and stored all around us. In order to protect this data, we need to encrypt it. This raises a fundamentally new challenge in cryptography: Can we encrypt data while enabling fine-grained access control and selective computation, as is necessary to protect big, complex data? In this talk, I will present my work on functional encryption which addresses this challenge.
Biography: Hoeteck Wee joined ENS as a CNRS researcher in 2013, after teaching in the US for several years. He obtained his PhD from UC Berkeley and his BSc from MIT. He is the recipient of a NSF CAREER Award, a Humboldt Research Fellowship, a Google Faculty Research Award, an ERC Starting Grant, and the best paper award at Eurocrypt 2016.
Speaker:Ingrid Verbauwhede
(KU Leuven)
Title:Energy efficiency and security for cryptographic algorithms implementations
Abstract:

Energy and power efficiency is an extremely important optimization goal when implementing applications on any digital platform. This is important for light-weight InternetOfThings devices as well as high end servers and cloud computing. The first one requires a long battery life, the second one needs to reduce the cost of cooling (and the electricity bill).

The energy and power optimization also holds for the implementation of cryptographic algorithms. Our goal is to build devices that can perform the mathematically demanding cryptographic operations in an efficient way. At the same time, we request that the implementations are also secure against a wide range of physical attacks, including side-channel attacks. Unfortunately countermeasures to side-channel attacks impose an extra cost.

This presentation will focus on the implementation aspects of cryptographic operations and how to balance the computation requirements with the resource constraints. These concepts will be illustrated with the design of several cryptographic co-processors, secret key and public key.

Biography:

Dr. Ingrid Verbauwhede is a Professor in the research group COSIC of the Electrical Engineering Department of the KU Leuven in Belgium. At COSIC, she leads the embedded systems and hardware group. She is also adjunct professor at the EE department at UCLA, Los Angeles, CA. She joined COSIC in 2003 and UCLA in 1998. Before joining UCLA she worked at UC Berkeley as a post-doctoral researcher and visiting lecturer, and later at TCSI and Atmel Lab in Berkeley, CA. She is a Member of IACR and a fellow of IEEE. She was elected as member of the Royal Flemish Academy of Belgium for Science and the Arts in 2011. She is a recipient of an ERC Advanced Grant in 2016. She will receive the IEEE 2017 Computer Society Technical Achievement Award.

She is a pioneer in the field of efficient and secure implementations of cryptographic algorithms in embedded context on ASIC, FPGA and embedded SW. She is the author and co-author of more than 300 publications at conferences, journals, book chapters and books. She graduated 27 PhD students between 2004 and 2015, which have positions in academia and in industry, all over the world.

She has been the general chair in 2012 and the program chair in 2007 of the IACR CHES (Cryptographic Hardware and Embedded Systems) workshop, which is the flagship venue for secure hardware design. She has been member of the program committee of a large number of conferences, including DAC, DATE, ISSCC, Usenix, SIPS, ISCAS, ISLPED, and more.

She has participated in several EU funded hardware and embedded systems security projects. Currently her research group participates in the H2020 projects HECTOR and ECRYPT-CSA. Her list of publications and patents is available at www.esat.kuleuven.be/cosic

Speaker:Kuo-Hui Yeh
(National Dunghwa Univ.)
Title:Walk as Who I Am: Transparent Authentication Scheme with Adaptive Plantar Bio-features
Abstract: With the comprehensive evolution of information communication technologies on mobile sensing objects, versatile ubiquitous networks embedded with specific-purpose sensors and intelligent wearable devices have promptly been identified, developed and deployed. Since the advantages of data retrieval of modern intelligent objects, i.e. contactlessness and efficiency, the academic have investigated the design of transparent authentication on multi-modal sensor networks. In this talk, we will give an overview of the convergence of technologies in the transparent authentication domain. Next, we will focus on the issue of the transparent authentication with wearable intelligent devices and will introduce a new transparent authentication scheme with a wearable plantar bio-feature extractor. In the scheme, machine learning techniques are adopted to extract user's plantar bio-features as authentication tokens and the real-time entity verification can thus be transparently performed in the back-ground without the user's notices.
Biography: Kuo-Hui Yeh received the B.S. degree in mathematics from Fu Jen Catholic University, New Taipei City, Taiwan, in 2000, and the M.S. and Ph.D. degrees in information management from the National Taiwan University of Science and Technology, Taipei, Taiwan, in 2005 and 2010, respectively. He is currently an Associate Professor with the Department of Information Management, National Dong Hwa University, Hualien, Taiwan. He had been elevated as an IEEE Senior Member in 2016. His research interests include IoT Security, Android Security and Privacy, NFC/RFID Security, Digital Signature, Network Security, and Big Data and Cloud Computing. So far, prof. Yeh has authored over 75 articles in international journals and conference proceedings.

講演者

Speaker:Jun Sakuma
(Univ. Tsukuba)
Title:Privacy-preserving statistical analysis with genetic and clinical data
Abstract: In the talk, we present two topics: (1) privacy-preserving genetic testing for preventive medicine, and (2) how to release the results of statistical analysis securely. For the first problem, we consider privacy protection of genetic testing for common diseases that take as input clinical and genetic information. This problem requires integration of sensitive information collected from different institutions (hospitals and genetic testing agency) and statistical analysis across the distributed databases. We present a solution for this problem based on homomorphic encryption. For the second problem, we consider efficient statistical analysis on ciphertexts of FHE. We construct CODA, a framework for outsourcing of secure computation, which contains protocols for various types of descriptive statistics and predictive statistics. We demonstrate CODA with application to a large-scale data analysis.
Speaker:Seiko Arita
(IISEC)
Title:Data-mining-oriented homomorphic encryption
Abstract: One of the important challenges for cryptographers in current Big Data era is to enable data mining (or machine learning) on encrypted data. In this talk, I will present our work on homomorphic encryption schemes that aims for such mining (or learning) on encrypted data. In order that, first, we need to handle arithmetic circuits on encrypted multi-bits integers, beyond boolean circuits on encrypted bits. Our subring homomorphic encryption scheme realizes efficient computation in higher parallelism of arithmetic circuits on encrypted multi-bits integers. Second, mining algorithms require computing fixed/floating point numbers. I will present our FX/FL scheme that enables computation of encrypted fixed/floating point numbers.
Speaker:Atsuko Miyaji
(Osaka Univ., JAIST)
Title:Security infrastructure for utilization of big data
Speaker:Shinsaku Kiyomoto
(KDDI Research Inc.)
Title:Privacy Risk Analysis and Anonymisation in a Business Context
Abstract: In this talk, we look anonimyzation (de-identification) regulations in Japan and theoretical definitions of anonymity. Furthermore, usecases of anonymized datasets in a typical business situation are analyzed and we re-consider adversary models for anonymized datasets. We discuss how to harmonize privacy risks in real situations and academic definitions for anonymity in order to fill the gap between real situations and theoretical definitions as well.
Speaker:Katsuya Tanaka
(Univ. Tokyo)
Title:Clinical Data Utilization based on Secure Information Infrastructure in Medical Fields
Abstract: With the enforcement of the revised Personal Information Protection Act planned for May this year, the environment surrounding medical information will also change. We introduce the efforts of CREST project on issues in the medical information field for clinical data utilization, such as promotion of public cloud, reduction of privacy violation risk, and large scale integration of clinical information under compliance with the Act and guidelines.
Speaker:Yoshifumi Nishida
(AIST)
Title:A New System for Sharing and Informing Serious Incidents among Multiple Facilities
Speaker:Chen-Mou Cheng
(Osaka Univ.)
Title:An overview on post-quantum cryptography
Abstract: Popular public-key primitives like RSA and elliptic curve cryptography (ECC) will be broken instantly once thousand-qubit quantum computers become a reality. It is unclear when quantum computers will become widely available, but we can choose post-quantum cryptography, a branch of public-key cryptography that is believed to be secure against quantum computers. In this talk, I will give a high-level overview of the four main branches of post-quantum cryptography, namely, code-based encryption, hash-based signatures, multivariate cryptography, and lattice-based cryptography. I will then talk about NIST's effort in standardizing post-quantum cryptography.
Speaker:Takashi Kawamura
(Kyoto Univ.)
Title:Development of a Life-Long Personal Health Record System based on University Health Services

デモンストレーション展示

Demonstrator:Katsuya Tanaka
(Univ. Tokyo)
Title: Clinical Information Exchange using Secure Cloud Storage based on ORAM technology
Demonstrator:Tomoaki Mimoto
(KDDI Research Inc.)
Title:Privacy Risk Analysis Tool
Demonstrator:Yoshifumi Nishida and Koji Kitamura
(AIST)
Title:A New System for Sharing and Informing Serious Incidents among Multiple Facilities
Demonstrator:Satoru Tanaka
(Osaka Univ.)
Title:Secure System for Utilization of Distributed Data

写真阪大の桜並木の様子