Symposium on Security Infrastructure for Big Data and Applications to Medical and Living Safety Fields

Click here for Japanese page. *Online registration page is here.

Abstract

Nowadays, enormous big data are collected and expected to utilize the analysis results for applications in various fields including medical research, living safety, and more, in the information society.

In this symposium, we aim at establishing and developing a secure and fair platform for big-data collection, analysis, and utilization by interdisciplinary integration among various fields related to big data through cutting-edge research presentations of experts in the fields of medical research and living safety, which utilize big data, and of information security, which is indispensable for utilization of big data. We present the state-of-the-art results of the most active research topics, post-quantum cryptography, functional cryptography, and more, as well as research of the CREST project "Advanced Core Technologies for Big Data Integration" directed by Prof. Kitsuregawa. We also demonstrate prototype systems for privacy-preserving big data collection, analysis, and utilization towards further business development of big data utilization.

The utilization of big data is highly expected to open the door for creation of the next-generation industry. We hope all to consider attending this symposium.

Date

March 16-17, 2017

*Online registration page is now open. Registration page is here.
(If you will attend the banquet on March 17, please register by March 3 March 9.

Venue

Memorial Hall E1-115 (E1 bldg. 1F, Graduate School of Engineering), Suita Campus, Osaka University
See access map and campus map

Banquet

La Scena 
15F GSECommon east, Suita Campus, Osaka University

Program

March 16
*Demonstrations are available around the entrance of the hall. (12:00am-5:50pm)
12:00-13:00Registration

Opening Remarks: Atsuko Miyaji (Professor, Osaka University and Japan Advanced Institute of Science and Technology)

Session 1: Secure and Efficient IoT Cryptosystems and Applications

13:10-14:10Ingrid VerbauwhedeEnergy efficiency and security for cryptographic algorithms implementations
14:10-14:40Atsuko MiyajiSecurity infrastructure for utilization of big data
14:40-15:00Break
Session 2: Connections to Medical and Living Safety Researches
15:00-15:30Takashi KawamuraDevelopment of a Life-Long Personal Health Record System based on University Health Services
15:30-16:00Yoshifumi NishidaA New System for Sharing and Informing Serious Incidents among Multiple Facilities
16:00-16:20Break
Session 3: Functional Cryptography
16:20-17:20Hoeteck WeeCryptography, Encryption and Big Data
17:20-17:50Seiko AritaData-mining-oriented homomorphic encryption
March 17
*Demonstrations are available around the entrance of the hall. (9:30am-5:20pm)
9:30-10:00Registration
Session 4: Secure Systems for Bio-Data
10:00-11:00Kuo-Hui YehWalk as Who I Am: Transparent Authentication Scheme with Adaptive Plantar Bio-features
11:00-11:30Jun SakumaPrivacy-preserving statistical analysis with genetic and clinical data
11:30-14:00Break
Remarks from Research Supervisor: Masaru Kitsuregawa (Director General, National Institute of Informatics / Professor, The University of Tokyo) Session 5: Applications in Medical and Business Fields
14:10-14:40Shinsaku KiyomotoPrivacy Risk Analysis and Anonymisation in a Business Context
14:40-15:10Katsuya TanakaClinical Data Utilization based on Secure Information Infrastructure in Medical Fields
15:10-15:40Break
Session 6: Post-Quantum Cryptography
15:40-16:10Chen-Mou ChengAn overview of post-quantum cryptography
16:10-17:10Serge VaudenayThe Complexity of Solving the Learning Parity with Noise Problem

Closing Remarks: Shojiro Nishio (President of Osaka University)

18:00-20:00Banquet

Invited Speakers

Speaker:Serge Vaudenay
(EPFL)
Title:The Complexity of Solving the Learning Parity with Noise Problem
(Joint work with Sonia Bogos)
Abstract: Learning Parity with Noise (LPN) is one of the most famous post-quantum problems. It is used in symmetric identification protocols and in public-key cryptosystems. In this presentation, we review the main solving techniques and how to optimize them by a meta-solving algorithm. We deduce complexity estimates for the LPN problems with several parameters.
Biography:

Serge Vaudenay entered at the Ecole Normale Superieure in Paris in 1989 with a major in mathematics. He received his PhD in computer sciences from University of Paris 7 - Denis Diderot in 1995. He subsequently became a research fellow at CNRS (National Center for Scientific Research in France). In 1999, he was appointed as a Professor at the EPFL, where he created the Security and Cryptography Laboratory.

He works on cryptography and the security of digital information. Most of his work relates to security analysis and provable security of cryptographic algorithms and protocols, specially in symmetric cryptography, post-quantum public-key cryptography, RFID protocols and distance bounding. He wrote an Essay on cryptography (in French, published by PPUR) and a textbook on cryptography (published by Springer). He was program chair of several research conferences and workshops: ACNS'14, INDOCRYPT'13, AFRICACRYPT'12, SAC'11, AFRICACRYPT'08, EUROCRYPT'06, MYCRYPT'05, PKC'05, SAC'01, and FSE'98. In 2007-12, he was an elected director of the IACR (International Association for Cryptologic Research).

Speaker:Ingrid Verbauwhede
(KU Leuven)
Title:Energy efficiency and security for cryptographic algorithms implementations
Abstract:

Energy and power efficiency is an extremely important optimization goal when implementing applications on any digital platform. This is important for light-weight InternetOfThings devices as well as high end servers and cloud computing. The first one requires a long battery life, the second one needs to reduce the cost of cooling (and the electricity bill).

The energy and power optimization also holds for the implementation of cryptographic algorithms. Our goal is to build devices that can perform the mathematically demanding cryptographic operations in an efficient way. At the same time, we request that the implementations are also secure against a wide range of physical attacks, including side-channel attacks. Unfortunately countermeasures to side-channel attacks impose an extra cost.

This presentation will focus on the implementation aspects of cryptographic operations and how to balance the computation requirements with the resource constraints. These concepts will be illustrated with the design of several cryptographic co-processors, secret key and public key.

Biography:

Dr. Ingrid Verbauwhede is a Professor in the research group COSIC of the Electrical Engineering Department of the KU Leuven in Belgium. At COSIC, she leads the embedded systems and hardware group. She is also adjunct professor at the EE department at UCLA, Los Angeles, CA. She joined COSIC in 2003 and UCLA in 1998. Before joining UCLA she worked at UC Berkeley as a post-doctoral researcher and visiting lecturer, and later at TCSI and Atmel Lab in Berkeley, CA. She is a Member of IACR and a fellow of IEEE. She was elected as member of the Royal Flemish Academy of Belgium for Science and the Arts in 2011. She is a recipient of an ERC Advanced Grant in 2016. She will receive the IEEE 2017 Computer Society Technical Achievement Award.

She is a pioneer in the field of efficient and secure implementations of cryptographic algorithms in embedded context on ASIC, FPGA and embedded SW. She is the author and co-author of more than 300 publications at conferences, journals, book chapters and books. She graduated 27 PhD students between 2004 and 2015, which have positions in academia and in industry, all over the world.

She has been the general chair in 2012 and the program chair in 2007 of the IACR CHES (Cryptographic Hardware and Embedded Systems) workshop, which is the flagship venue for secure hardware design. She has been member of the program committee of a large number of conferences, including DAC, DATE, ISSCC, Usenix, SIPS, ISCAS, ISLPED, and more.

She has participated in several EU funded hardware and embedded systems security projects. Currently her research group participates in the H2020 projects HECTOR and ECRYPT-CSA. Her list of publications and patents is available at www.esat.kuleuven.be/cosic

Speaker:Hoeteck Wee
(ENS & Columbia Univ.)
Title:Cryptography, Encryption and Big Data
Abstract: We live in an era of "Big Data", wherein a deluge of data is being generated, collected, and stored all around us. In order to protect this data, we need to encrypt it. This raises a fundamentally new challenge in cryptography: Can we encrypt data while enabling fine-grained access control and selective computation, as is necessary to protect big, complex data? In this talk, I will present my work on functional encryption which addresses this challenge.
Biography: Hoeteck Wee joined ENS as a CNRS researcher in 2013, after teaching in the US for several years. He obtained his PhD from UC Berkeley and his BSc from MIT. He is the recipient of a NSF CAREER Award, a Humboldt Research Fellowship, a Google Faculty Research Award, an ERC Starting Grant, and the best paper award at Eurocrypt 2016.
Speaker:Kuo-Hui Yeh
(National Dunghwa Univ.)
Title:Walk as Who I Am: Transparent Authentication Scheme with Adaptive Plantar Bio-features
Abstract: With the comprehensive evolution of information communication technologies on mobile sensing objects, versatile ubiquitous networks embedded with specific-purpose sensors and intelligent wearable devices have promptly been identified, developed and deployed. Since the advantages of data retrieval of modern intelligent objects, i.e. contactlessness and efficiency, the academic have investigated the design of transparent authentication on multi-modal sensor networks. In this talk, we will give an overview of the convergence of technologies in the transparent authentication domain. Next, we will focus on the issue of the transparent authentication with wearable intelligent devices and will introduce a new transparent authentication scheme with a wearable plantar bio-feature extractor. In the scheme, machine learning techniques are adopted to extract user's plantar bio-features as authentication tokens and the real-time entity verification can thus be transparently performed in the back-ground without the user's notices.
Biography: Kuo-Hui Yeh received the B.S. degree in mathematics from Fu Jen Catholic University, New Taipei City, Taiwan, in 2000, and the M.S. and Ph.D. degrees in information management from the National Taiwan University of Science and Technology, Taipei, Taiwan, in 2005 and 2010, respectively. He is currently an Associate Professor with the Department of Information Management, National Dong Hwa University, Hualien, Taiwan. He had been elevated as an IEEE Senior Member in 2016. His research interests include IoT Security, Android Security and Privacy, NFC/RFID Security, Digital Signature, Network Security, and Big Data and Cloud Computing. So far, prof. Yeh has authored over 75 articles in international journals and conference proceedings.

Speakers

Speaker:Jun Sakuma
(Univ. Tsukuba)
Title:Privacy-preserving statistical analysis with genetic and clinical data
Abstract: In the talk, we present two topics: (1) privacy-preserving genetic testing for preventive medicine, and (2) how to release the results of statistical analysis securely. For the first problem, we consider privacy protection of genetic testing for common diseases that take as input clinical and genetic information. This problem requires integration of sensitive information collected from different institutions (hospitals and genetic testing agency) and statistical analysis across the distributed databases. We present a solution for this problem based on homomorphic encryption. For the second problem, we consider efficient statistical analysis on ciphertexts of FHE. We construct CODA, a framework for outsourcing of secure computation, which contains protocols for various types of descriptive statistics and predictive statistics. We demonstrate CODA with application to a large-scale data analysis.
Speaker:Seiko Arita
(IISEC)
Title:Data-mining-oriented homomorphic encryption
Abstract: One of the important challenges for cryptographers in current Big Data era is to enable data mining (or machine learning) on encrypted data. In this talk, I will present our work on homomorphic encryption schemes that aims for such mining (or learning) on encrypted data. In order that, first, we need to handle arithmetic circuits on encrypted multi-bits integers, beyond boolean circuits on encrypted bits. Our subring homomorphic encryption scheme realizes efficient computation in higher parallelism of arithmetic circuits on encrypted multi-bits integers. Second, mining algorithms require computing fixed/floating point numbers. I will present our FX/FL scheme that enables computation of encrypted fixed/floating point numbers.
Speaker:Atsuko Miyaji
(Osaka Univ., JAIST)
Title:Security infrastructure for utilization of big data
Speaker:Shinsaku Kiyomoto
(KDDI Research Inc.)
Title:Privacy Risk Analysis and Anonymisation in a Business Context
Abstract: In this talk, we look anonimyzation (de-identification) regulations in Japan and theoretical definitions of anonymity. Furthermore, usecases of anonymized datasets in a typical business situation are analyzed and we re-consider adversary models for anonymized datasets. We discuss how to harmonize privacy risks in real situations and academic definitions for anonymity in order to fill the gap between real situations and theoretical definitions as well.
Speaker:Katsuya Tanaka
(Univ. Tokyo)
Title:Clinical Data Utilization based on Secure Information Infrastructure in Medical Fields
Abstract: With the enforcement of the revised Personal Information Protection Act planned for May this year, the environment surrounding medical information will also change. We introduce the efforts of CREST project on issues in the medical information field for clinical data utilization, such as promotion of public cloud, reduction of privacy violation risk, and large scale integration of clinical information under compliance with the Act and guidelines.
Speaker:Yoshifumi Nishida
(AIST)
Title:A New System for Sharing and Informing Serious Incidents among Multiple Facilities
Speaker:Chen-Mou Cheng
(Osaka Univ.)
Title:An overview on post-quantum cryptography
Abstract: Popular public-key primitives like RSA and elliptic curve cryptography (ECC) will be broken instantly once thousand-qubit quantum computers become a reality. It is unclear when quantum computers will become widely available, but we can choose post-quantum cryptography, a branch of public-key cryptography that is believed to be secure against quantum computers. In this talk, I will give a high-level overview of the four main branches of post-quantum cryptography, namely, code-based encryption, hash-based signatures, multivariate cryptography, and lattice-based cryptography. I will then talk about NIST's effort in standardizing post-quantum cryptography.
Speaker:Takashi Kawamura
(Kyoto Univ.)
Title:Development of a Life-Long Personal Health Record System based on University Health Services

Demonstration

Demonstrator:Katsuya Tanaka
(Univ. Tokyo)
Title: Clinical Information Exchange using Secure Cloud Storage based on ORAM technology
Demonstrator:Tomoaki Mimoto
(KDDI Research Inc.)
Title:Privacy Risk Analysis Tool
Demonstrator:Yoshifumi Nishida and Koji Kitamura
(AIST)
Title:A New System for Sharing and Informing Serious Incidents among Multiple Facilities
Demonstrator:Satoru Tanaka
(Osaka Univ.)
Title:Secure System for Utilization of Distributed Data

写真Cherry blossoms at Osaka University