Symposium on Security Infrastructure for Big Data and Applications to Medical and Living Safety Fields
本シンポジウムではビッグデータの利活用を行う医学，生活安全分野とビッグデータの利活用に不可欠なセキュリティ分野の専門家による最先端の研究発表を通じて， ビッグデータに関わる異なる分野間の活発な融合を行い, セキュアかつフェアなビッグデータ流通プラットフォームの確立と発展を目指します. セキュリティ分野では最もホットな話題である耐量子暗号や高機能暗号の最新の成果とともに， CREST 喜連川プロジェクト「ビッグデータ統合利活用のための次世代基盤技術の創出・体系化」 の研究も紹介します. またプライバシを保護したビッグデータ流通システムのプロトタイプの 展示も行い, ビッグデータ利活用のさらなるビジネス展開を試みます.
2017年3月16日(木) - 2017年3月17日(金)こちらから事前登録をお願いいたします．
レストラン La Scena
Opening Remarks: Atsuko Miayji (Professor, Osaka University and Japan Advanced Institute of Science and Technology)Session 1: Secure and Efficient IoT Cryptosystems and Applications
|13:10-14:10||Ingrid Verbauwhede||Energy efficiency and security for cryptographic algorithms implementations|
|14:10-14:40||Atsuko Miyaji||Security infrastructure for utilization of big data|
|15:00-15:30||Takashi Kawamura||Development of a Life-Long Personal Health Record System based on University Health Services|
|15:30-16:00||Yoshifumi Nishida||A New System for Sharing and Informing Serious Incidents among Multiple Facilities|
|16:20-17:20||Hoeteck Wee||Cryptography, Encryption and Big Data|
|17:20-17:50||Seiko Arita||Data-mining-oriented homomorphic encryption|
|10:00-11:00||Kuo-Hui Yeh||Walk as Who I Am: Transparent Authentication Scheme with Adaptive Plantar Bio-features|
|11:00-11:30||Jun Sakuma||Privacy-preserving statistical analysis with genetic and clinical data|
Remarks from Research Supervisor: Masaru Kitsuregawa (Director General, National Institute of Informatics / Professor, The University of Tokyo)Session 5: Applications in Medical and Business Fields
|14:10-14:40||Shinsaku Kiyomoto||Privacy Risk Analysis and Anonymisation in a Business Context|
|14:40-15:10||Katsuya Tanaka||Clinical Data Utilization based on Secure Information Infrastructure in Medical Fields|
|15:40-16:10||Chen-Mou Cheng||An overview of post-quantum cryptography|
|16:10-17:10||Serge Vaudenay||The Complexity of Solving the Learning Parity with Noise Problem|
Closing Remarks: Shojiro Nishio (President of Osaka University)
|Title:||The Complexity of Solving the Learning Parity with Noise Problem|
(Joint work with Sonia Bogos)
|Abstract:||Learning Parity with Noise (LPN) is one of the most famous post-quantum problems. It is used in symmetric identification protocols and in public-key cryptosystems. In this presentation, we review the main solving techniques and how to optimize them by a meta-solving algorithm. We deduce complexity estimates for the LPN problems with several parameters.|
Serge Vaudenay entered at the Ecole Normale Superieure in Paris in 1989 with a major in mathematics. He received his PhD in computer sciences from University of Paris 7 - Denis Diderot in 1995. He subsequently became a research fellow at CNRS (National Center for Scientific Research in France). In 1999, he was appointed as a Professor at the EPFL, where he created the Security and Cryptography Laboratory.
He works on cryptography and the security of digital information. Most of his work relates to security analysis and provable security of cryptographic algorithms and protocols, specially in symmetric cryptography, post-quantum public-key cryptography, RFID protocols and distance bounding. He wrote an Essay on cryptography (in French, published by PPUR) and a textbook on cryptography (published by Springer). He was program chair of several research conferences and workshops: ACNS'14, INDOCRYPT'13, AFRICACRYPT'12, SAC'11, AFRICACRYPT'08, EUROCRYPT'06, MYCRYPT'05, PKC'05, SAC'01, and FSE'98. In 2007-12, he was an elected director of the IACR (International Association for Cryptologic Research).
(ENS & Columbia Univ.)
|Title:||Cryptography, Encryption and Big Data|
|Abstract:||We live in an era of "Big Data", wherein a deluge of data is being generated, collected, and stored all around us. In order to protect this data, we need to encrypt it. This raises a fundamentally new challenge in cryptography: Can we encrypt data while enabling fine-grained access control and selective computation, as is necessary to protect big, complex data? In this talk, I will present my work on functional encryption which addresses this challenge.|
|Biography:||Hoeteck Wee joined ENS as a CNRS researcher in 2013, after teaching in the US for several years. He obtained his PhD from UC Berkeley and his BSc from MIT. He is the recipient of a NSF CAREER Award, a Humboldt Research Fellowship, a Google Faculty Research Award, an ERC Starting Grant, and the best paper award at Eurocrypt 2016.|
|Title:||Energy efficiency and security for cryptographic algorithms implementations|
Energy and power efficiency is an extremely important optimization goal when implementing applications on any digital platform. This is important for light-weight InternetOfThings devices as well as high end servers and cloud computing. The first one requires a long battery life, the second one needs to reduce the cost of cooling (and the electricity bill).
The energy and power optimization also holds for the implementation of cryptographic algorithms. Our goal is to build devices that can perform the mathematically demanding cryptographic operations in an efficient way. At the same time, we request that the implementations are also secure against a wide range of physical attacks, including side-channel attacks. Unfortunately countermeasures to side-channel attacks impose an extra cost.
This presentation will focus on the implementation aspects of cryptographic operations and how to balance the computation requirements with the resource constraints. These concepts will be illustrated with the design of several cryptographic co-processors, secret key and public key.
Dr. Ingrid Verbauwhede is a Professor in the research group COSIC of the Electrical Engineering Department of the KU Leuven in Belgium. At COSIC, she leads the embedded systems and hardware group. She is also adjunct professor at the EE department at UCLA, Los Angeles, CA. She joined COSIC in 2003 and UCLA in 1998. Before joining UCLA she worked at UC Berkeley as a post-doctoral researcher and visiting lecturer, and later at TCSI and Atmel Lab in Berkeley, CA. She is a Member of IACR and a fellow of IEEE. She was elected as member of the Royal Flemish Academy of Belgium for Science and the Arts in 2011. She is a recipient of an ERC Advanced Grant in 2016. She will receive the IEEE 2017 Computer Society Technical Achievement Award.
She is a pioneer in the field of efficient and secure implementations of cryptographic algorithms in embedded context on ASIC, FPGA and embedded SW. She is the author and co-author of more than 300 publications at conferences, journals, book chapters and books. She graduated 27 PhD students between 2004 and 2015, which have positions in academia and in industry, all over the world.
She has been the general chair in 2012 and the program chair in 2007 of the IACR CHES (Cryptographic Hardware and Embedded Systems) workshop, which is the flagship venue for secure hardware design. She has been member of the program committee of a large number of conferences, including DAC, DATE, ISSCC, Usenix, SIPS, ISCAS, ISLPED, and more.
She has participated in several EU funded hardware and embedded systems security projects. Currently her research group participates in the H2020 projects HECTOR and ECRYPT-CSA. Her list of publications and patents is available at www.esat.kuleuven.be/cosic
(National Dunghwa Univ.)
|Title:||Walk as Who I Am: Transparent Authentication Scheme with Adaptive Plantar Bio-features|
|Abstract:||With the comprehensive evolution of information communication technologies on mobile sensing objects, versatile ubiquitous networks embedded with specific-purpose sensors and intelligent wearable devices have promptly been identified, developed and deployed. Since the advantages of data retrieval of modern intelligent objects, i.e. contactlessness and efficiency, the academic have investigated the design of transparent authentication on multi-modal sensor networks. In this talk, we will give an overview of the convergence of technologies in the transparent authentication domain. Next, we will focus on the issue of the transparent authentication with wearable intelligent devices and will introduce a new transparent authentication scheme with a wearable plantar bio-feature extractor. In the scheme, machine learning techniques are adopted to extract user's plantar bio-features as authentication tokens and the real-time entity verification can thus be transparently performed in the back-ground without the user's notices.|
|Biography:||Kuo-Hui Yeh received the B.S. degree in mathematics from Fu Jen Catholic University, New Taipei City, Taiwan, in 2000, and the M.S. and Ph.D. degrees in information management from the National Taiwan University of Science and Technology, Taipei, Taiwan, in 2005 and 2010, respectively. He is currently an Associate Professor with the Department of Information Management, National Dong Hwa University, Hualien, Taiwan. He had been elevated as an IEEE Senior Member in 2016. His research interests include IoT Security, Android Security and Privacy, NFC/RFID Security, Digital Signature, Network Security, and Big Data and Cloud Computing. So far, prof. Yeh has authored over 75 articles in international journals and conference proceedings.|
|Title:||Privacy-preserving statistical analysis with genetic and clinical data|
|Abstract:||In the talk, we present two topics: (1) privacy-preserving genetic testing for preventive medicine, and (2) how to release the results of statistical analysis securely. For the first problem, we consider privacy protection of genetic testing for common diseases that take as input clinical and genetic information. This problem requires integration of sensitive information collected from different institutions (hospitals and genetic testing agency) and statistical analysis across the distributed databases. We present a solution for this problem based on homomorphic encryption. For the second problem, we consider efficient statistical analysis on ciphertexts of FHE. We construct CODA, a framework for outsourcing of secure computation, which contains protocols for various types of descriptive statistics and predictive statistics. We demonstrate CODA with application to a large-scale data analysis.|
|Title:||Data-mining-oriented homomorphic encryption|
|Abstract:||One of the important challenges for cryptographers in current Big Data era is to enable data mining (or machine learning) on encrypted data. In this talk, I will present our work on homomorphic encryption schemes that aims for such mining (or learning) on encrypted data. In order that, first, we need to handle arithmetic circuits on encrypted multi-bits integers, beyond boolean circuits on encrypted bits. Our subring homomorphic encryption scheme realizes efficient computation in higher parallelism of arithmetic circuits on encrypted multi-bits integers. Second, mining algorithms require computing fixed/floating point numbers. I will present our FX/FL scheme that enables computation of encrypted fixed/floating point numbers.|
(Osaka Univ., JAIST)
|Title:||Security infrastructure for utilization of big data|
(KDDI Research Inc.)
|Title:||Privacy Risk Analysis and Anonymisation in a Business Context|
|Abstract:||In this talk, we look anonimyzation (de-identification) regulations in Japan and theoretical definitions of anonymity. Furthermore, usecases of anonymized datasets in a typical business situation are analyzed and we re-consider adversary models for anonymized datasets. We discuss how to harmonize privacy risks in real situations and academic definitions for anonymity in order to fill the gap between real situations and theoretical definitions as well.|
|Title:||Clinical Data Utilization based on Secure Information Infrastructure in Medical Fields|
|Abstract:||With the enforcement of the revised Personal Information Protection Act planned for May this year, the environment surrounding medical information will also change. We introduce the efforts of CREST project on issues in the medical information field for clinical data utilization, such as promotion of public cloud, reduction of privacy violation risk, and large scale integration of clinical information under compliance with the Act and guidelines.|
|Title:||A New System for Sharing and Informing Serious Incidents among Multiple Facilities|
|Title:||An overview on post-quantum cryptography|
|Abstract:||Popular public-key primitives like RSA and elliptic curve cryptography (ECC) will be broken instantly once thousand-qubit quantum computers become a reality. It is unclear when quantum computers will become widely available, but we can choose post-quantum cryptography, a branch of public-key cryptography that is believed to be secure against quantum computers. In this talk, I will give a high-level overview of the four main branches of post-quantum cryptography, namely, code-based encryption, hash-based signatures, multivariate cryptography, and lattice-based cryptography. I will then talk about NIST's effort in standardizing post-quantum cryptography.|
|Title:||Development of a Life-Long Personal Health Record System based on University Health Services|
|Title:||Clinical Information Exchange using Secure Cloud Storage based on ORAM technology|
(KDDI Research Inc.)
|Title:||Privacy Risk Analysis Tool|
|Demonstrator:||Yoshifumi Nishida and Koji Kitamura|
|Title:||A New System for Sharing and Informing Serious Incidents among Multiple Facilities|
|Title:||Secure System for Utilization of Distributed Data|