Information security (security, privacy, trust) :Kanta Matsuura

Cryptography

Let us secure data, and realize magical functionalities (Project example: Private Information Retrieval to allow a user to retrieve an item from a database server without revealing which item is retrieved).

Computer/Network Security

Let us secure the weakest links of IT systems with rigorous security evaluation (Project examples: Provably-secure password-reset protocols, Protection of AI from being cheated).

Security Economics

Let us secure services by using not only technologies but also economics/financial approaches (Project examples: Risk management of virtual currencies, and their trust infrastructures such as blockchain). We have started research networks such as BSafe.network and BASE alliance, and are ready for empirical studies.

User Authentication

Let us secure the authentication system with considering usability (Project example: Zero-trust authentication relying on semantic ability of humans).

Security & Privacy of Real Systems

Real systems provide interdisciplinary research topics. For example, the Tor anonymity system uses multiple encryption to enhance communication privacy. Its censorship resistance relies also on best practices such as dynamic selection of voluntary cooperators. The world experienced the use of Tor for democracy, as well as its malicious use for crimes. Therefore, its social/ethical issues are studied in academia. Our lab studies both defense (e.g. anti-censorship optimization) and offense (e.g. forward/backward tracing) to have mutual benefits in their qualities and impacts.

電気の回廊