Yuntao WANG

Information

Name: Yuntao Wang  (王   贇弢, オウ   イントウ)

Doctorate: Ph.D. (Functional Mathematics, 機能数理学)

Affiliation: Graduate School of Informatics and Engineering,
  Department of Informatics, Information Security Engineering Program,
  The University of Electro-Communications

Address: Bldg. East-2, Room 513, 1-5-1 Chofugaoka, Chofu, Tokyo, 182-8585 Japan

Telephone: +81-42-443-5680

E-mail: y-wang (at) uec.ac.jp    (at)→@

Research Topics (My Google Scholar Profile and Researchmap)

I am interested in algorithmic number theory and post-quantum cryptography, especially improving lattice algorithms and solving some hard mathematical lattice problems underlying lattice-based cryptography, e.g., the Shortest Vector Problem (SVP), the Learning With Errors (LWE) problem, etc. Recently, I have also become interested in machine learning security, both in attack and defense. 

Education

Doctor:    Apr. 2016 – Sep. 2018  Graduate School of Mathematics, Kyushu University, Fukuoka, Japan      

− Major in Functional Mathematics                  

(Sep. 2017 – Sep. 2018  Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan.)

Master:    Apr. 2014 – Mar. 2016  Graduate School of Mathematics, Kyushu University,  Fukuoka, Japan

− Major in Mathematics.

Bachelor:  Sep. 2007 – Jul. 2011  Faculty of Mathematics and Information Science, Yunnan University, Kunming, Yunnan Province, China

Major in Information and Computing Science.


Work Experience

• Mar. 2024 – Now   Associate Professor, The University of Electro-Communications.  

   − Topic: Cryptography, PQC, Information Security, Algorithmic Number Theory.

• Mar. 2022 – Feb. 2024  Lecturer, Osaka University.  

   − Topic: PQC, Information Security, Algorithmic Number Theory, ML.

• Apr. 2020 – Feb. 2022   Assistant professor, JAIST.  

   − Topic: PQC, Information Security, Algorithmic Number Theory.

• Oct. 2019 – Mar. 2020   JSPS PD Researcher, FY2019 JSPS Postdoctoral Fellowship for Research in Japan (Standard). 

   − Topic: PQC

• Oct. 2018 – Sep. 2019  Project Researcher, Graduate School of Information Science and Technology, Department of Mathematical Informatics, 

                                           Mathematical Informatics 1st Laboratory, The University of Tokyo, Japan.

   Topic: PQC.

• Apr. 2017 – Sep. 2018  Research Fellowship for Young Scientists (DC2), Japan Society for the Promotion of Science (JSPS), Japan.

   Topic: Cryptanalysis on Lattice-based Cryptography using Large-scale Deciphering Experiments.

 • Oct. 2015 – Mar. 2017  Research Assistant in Leading PhD Program,  Graduate School of Mathematics, Kyushu University, Fukuoka, Japan.

   Topic: Cryptanalysis on Post-Quantum Cryptography.

• Oct. 2014 – Mar. 2015  Teaching Assistant in Graduate School of Mathematics, Kyushu University, Fukuoka, Japan.

   Topic: Programming on theoretic algorithmic number theory and RSA cryptography.

Sep. 2014 – Oct. 2014 Internship in National Institute of Information and Communications Technology(NICT), Tokyo, Japan.

   Topic: Security bit estimation for learning with errors.

Adjunct Instructor

• Oct. 2022 – Feb. 2024 Adjunct Instructor, JAIST.  

   − Lecture: Advanced Information Security Theory and Application (最新情報セキュリティ理論と応用).

List of books

[B1] Keita Emura and Yuntao Wang,

Proceedings of the 8th ACM on ASIA Public-Key Cryptography Workshop (APKC 2021),

ACM, 2021. ISBN: 978-1-4503-8401-8. Doi: 10.1145/3457338

List of journal papers

[J1] Hideaki Miyaji, Yuntao Wang, and Atsuko Miyaji,

“Lattice-based Commitment Scheme for Low Communication Costs,”
IEEE Access, 2024, to appear. 

[J2] Mingwu Zhang, Mingxuan Yang, Gang Shen, Zhe Xia, and Yuntao Wang,

“A Verifiable and Privacy-Preserving Cloud Mining Pool Selection Scheme in Blockchain of Things,”

Information Sciences, Vol. 623, pp. 293-310, Elsevier,  2023. Doi: 10.1016/j.ins.2022.11.169 

[J3] Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang, and Bo-Yin Yang,

“A physical study of the LLL algorithm,”

Journal of Number Theory, Vol. 244, pp. 339-368, Elsevier, 2023. Doi: 10.1016/j.jnt.2022.09.013

[J4] Mingwu Zhang, Shuo Huang, Gang Shen, and Yuntao Wang,

“PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption,”

Computer Standards & Interfaces, Vol. 84, pp. 103678, Elsevier, 2023. Doi: 10.1016/j.csi.2022.103678

[J5] Kazuki Yamamura, Yuntao Wang, and Eiichiro Fujisaki,  

“Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods,”

IET Information Security, Vol. 17, Issue 1,  pp. 35-45, Wiley, 2023. Doi: 10.1049/ise2.12083 

[J6] Atsuko Miyaji, Kaname Watanabe, Yuuki Takano, Kazuhisa Nakasho, Sho Nakamura, Yuntao Wang, and Hiroto Narimatsu,

A Privacy-Preserving Distributed Medical Data Integration Security System for Accuracy Assessment of Cancer Screening: Development Study of Novel Data Integration System,”

JMIR Medical Informatics, Vol. 10, No. 12, pp. e38922-e38922, JMIR Publications, 2022. Doi: 10.2196/38922

[J7] Mingwu Zhang, Boyao Zhu, Yumei Li, and Yuntao Wang,

“TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs,”

Symmetry, Vol. 14, No. 6:1123, pp. 1-17, MDPI, 2022. Doi: 10.3390/sym14061123

[J8] Xiaoling Yu, Yuntao Wang, Chungen Xu, and Tsuyoshi Takagi,

“Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem,”

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E105-A, No. 3, pp. 195-202, IEICE, 2022. Doi: 10.1587/transfun.2021CIP0021

[J9] Hideaki Miyaji, Yuntao Wang, Akinori Kawachi, and Atsuko Miyaji,

“A Commitment Scheme with Output Locality-3 Fit for the IoT Device,”

Security and Communication Networks, Vol. 2021, No. 2949513, pp. 1-10, Hindawi, 2021. Doi: 10.1155/2021/2949513

[J10] Yuntao Wang and Tsuyoshi Takagi,

“Studying lattice reduction algorithms improved by quick reordering technique,”

International Journal of Information Security, Vol. 20, No. 2, pp. 257-268, Springer, 2021. Doi: 10.1007/s10207-020-00501-y

[J11] Xiaoling Yu, Chungen Xu, Bennian Dou, and Yuntao Wang,

“Multi-user search on the encrypted database: lattice-based keywords searchable encryption scheme with time-controlled proxy re-encryption,”

Multimedia Tools and Applications, Vol. 80, No. 2, pp. 3193-3211, Springer, 2021. Doi: 10.1007/s11042-020-09753-1

[J12] Xiaoling Yu, Chungen Xu, Lei Xu, and Yuntao Wang,

“Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack,”

Computers, Materials & Continua, Vol. 64, No. 2, pp. 1107-1125, Tech Science Press, 2020. Doi:10.32604/cmc.2020.09680

[J13] Seungki Kim and Yuntao Wang,

A Stochastic Variant of the Abelian Sandpile Model,”

Journal of Statistical Physics, Vol. 178, No. 3, pp. 711-724, Springer, 2020. Doi: 10.1007/s10955-019-02453-7

[J14] Yuntao Wang, Yoshinori Aono, and Tsuyoshi Takagi,

Hardness Evaluation for Search LWE Problem Using Progressive BKZ simulator,”

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E101-A, No.12, pp. 2162-2170, IEICE, 2018. Doi: 10.1587/transfun.E101.A.2162

[J15] Yutaro Kiyomura, Noriyasu Iwamoto, Shun'ichi Yokoyama, Kenichiro Hayasaka, Yuntao Wang, Takanori Yasuda, Katsuyuki Takashima, and Tsuyoshi Takagi,

“Heuristic counting of Kachisa-Schaefer-Scott curves,”

JSIAM Letters, Vol.6, pp.73-76, JSIAM, 2014. Doi: 10.14495/jsiaml.6.73

List of conference papers (peer-reviewed)

[C1] Xiaoling Yu and Yuntao Wang,

Forward Secure Lattice-based Ring Signature Scheme in the Standard Model, 

The 25th International Conference on Information and Communications Security (ICICS 2023), Springer LNCS, Vol. 14252, pp. 146-158, 2023.
Doi: 10.1007/978-981-99-7356-9\_9

[C2] Kaiming Chen, Atsuko Miyaji, and Yuntao Wang,

Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH,

The 5th International Conference on Science of Cyber Security (SciSec 2023), Springer LNCS, Vol. 14299, pp. 157-177, 2023.
Doi: 10.1007/978-3-031-45933-7\_10

[C3] Leizhang Wang, Yuntao Wang, and Baocang Wang,

A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator,

The 18th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2023), ACM, pp. 664-677, 2023.

Doi: 10.1145/3579856.3595802

[C4] Yuntao Wang, Yasuhiko Ikematsu, and Takanori Yasuda,

“Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask,”

The 16th International Conference on Provable and Practical Security (ProvSec 2022), Springer LNCS, Vol. 13600, pp. 88-104, 2022. 

Doi: 10.1007/978-3-031-20917-8_7

[C5] Kazuki Yamamura, Yuntao Wang, and Eiichiro Fujisaki,

“Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods,”

The 24th Annual International Conference on Information Security and Cryptology (ICISC 2021), Springer LNCS, Vol. 13218, pp. 159-174, 2021.

Doi: 10.1007/978-3-031-08896-4_8

[C6] Hideaki Miyaji, Yuntao Wang, and Atsuko Miyaji,

“Message-restriction-free Commitment Scheme Based on Lattice Assumption,”

The 16th International Conference on Information Security Practice and Experience (ISPEC 2021), Springer LNCS, Vol. 13107, pp. 90-105, 2021.

Doi: 10.1007/978-3-030-93206-0_7

[C7] Satoshi Okada and Yuntao Wang,

“Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER,”

The 15th International Conference on Provable and Practical Security (ProvSec 2021), Springer LNCS, Vol. 13059, pp. 155-173, 2021.

Doi: 10.1007/978-3-030-90402-9_9

[C8] Hideaki Miyaji, Atsuko Miyaji, and Yuntao Wang,

“Homomorphic commitment scheme with low output locality,”

The Eighth International Symposium on Computing and Networking (CANDAR 2020), IEEE, pp. 167-173, 2020.

Doi: 10.1109/CANDAR51075.2020.00030

[C9] Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, and Tsuyoshi Takagi,

“Cryptanalysis of Giophantus (TM) schemes against hybrid attack,”

The 7th ACM Workshop on ASIA Public-Key Cryptography (APKC '20), ACM, pp. 28-35, 2020.

Doi: 10.1145/3384940.3388958

[C10] Satoshi Okada, Yuntao Wang, and Tsuyoshi Takagi,

“Improving key mismatch attack on NewHope with fewer queries,”

The 25th Australasian Conference on Information Security and Privacy (ACISP 2020), Springer LNCS, Vol. 12248, pp. 505-524, 2020.

Doi: 10.1007/978-3-030-55304-3_26

[C11] Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, and Yuntao Wang,

“One sample ring-LWE with rounding and its application to key exchange,”

The 17th International Conference on Applied Cryptography and Network Security (ACNS 2019), Springer LNCS 11464, pp. 323-343, 2019.

Doi: 10.1007/978-3-030-21568-2_16

[C12] Yuntao Wang and Tsuyoshi Takagi,

“Improving the BKZ reduction algorithm by quick reordering technique,”

The 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), Springer LNCS, Vol. 10946, pp. 787-795, 2018.

Doi: 10.1007/978-3-319-93638-3_47

[C13] Xiaoling Yu, Yuntao Wang, Chungen Xu, and Tsuyoshi Takagi,

“Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem,”

The 5th International Conference on Information Science and Control Engineering (ICISCE 2018), IEEE Computer Society, pp. 533-537, 2018.

Doi: 10.1109/ICISCE.2018.00117

[C14] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, and Tsuyoshi Takagi,

“Estimated cost for solving generalized learning with errors problem via embedding techniques,”

The 13th International Workshop on Security (IWSEC 2018), Springer LNCS, Vol. 11049, pp. 87-103, 2018.

Doi: 10.1007/978-3-319-97916-8_6

[C15] Yuntao Wang and Thomas Wunderer,

“Revisiting the sparsification technique in Kannan’s embedding attack on LWE,”

The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), Springer LNCS, Vol. 11125, pp.440-452, 2018.

Doi: 10.1007/978-3-319-99807-7_27

[C16] Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, and Yuntao Wang,

“The beauty and the beasts --the hard cases in LLL reduction,”

The 12th International Workshop on Security (IWSEC 2017), Springer LNCS, Vol. 10418, pp. 19-35, 2017.

Doi: 10.1007/978-3-319-64200-0_2

[C17] Yuntao Wang, Yoshinori Aono, and Tsuyoshi Takagi,

“An experimental study of Kannan's embedding technique for the search LWE problem,”

The 19th International Conference on Information and Communications Security (ICICS 2017), Springer LNCS, Vol. 10631, pp. 541-553, 2017.

Doi: 10.1007/978-3-319-89500-0_47

[C18] Yoshinori Aono, Yuntao Wang, Takuya Hayashi, and Tsuyoshi Takagi,

“Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator,”

The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2016), Springer LNCS, Vol. 9665, pp. 789-819, 2016.

Doi: 10.1007/978-3-662-49890-3_30

Remarkable Research Results

[Award 1] Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki, The 24th Annual International Conference on Information Security and Cryptology (ICISC 2021), “Best Paper Award”, Dec. 2021.  

[Award 2] Yuntao Wang, Jintai Ding, Xinwei Gao, Tsuyoshi Takagi,  “辻井重男セキュリティ論文賞 特別賞”, Jun. 2021.  

[Award 3] Yuntao Wang, Weiyao Wang, Atsushi Takayasu, Tsuyoshi Takagi,  “辻井重男セキュリティ論文賞 特別賞”, Jun. 2020. 

[Award 4] Yuntao Wang, “Academic Research Award to Outstanding PhD Graduate”, Kyushu University, Sep. 2018. 

[Award 5] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, “Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques”, The 13th International Workshop on Security (IWSEC 2018) , “Best Student Paper”, Sep. 2018.

[Award 6] Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi, Forum “Math-for-Industry” 2016 (FMfI 2016),     “Best Poster Award”, Nov. 2016.

[Award 7] Yuntao Wang, The 8th Workshop among Asia Information Security Labs (WAIS 2015), “Biggest Applause Award”, Jan. 2015. (24件中1件受賞)

[Award 8] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagi, Forum “Math-for-Industry” 2014 (FMfI 2014), “Excellent Poster Award”, Oct. 2014. (22件中5件受賞)

[Award 9] Yuntao Wang, Hui Zhang and Tsuyoshi Takagi, International Workshop on Security 2013 (IWSEC 2013), “Best Poster Award”, Nov. 2013. (20件中2件受賞)

Others:

[1] 2023.01  “(Approximate) Ideal Lattice Challenge” 750次元世界記録達成 https://www.latticechallenge.org/ideallattice-challenge/index.php

[2] 2022.12  “Ideal Lattice Challenge” 176次元世界記録達成 https://www.latticechallenge.org/ideallattice-challenge/index.php

[3] 2022.10  “LWE Challenge” 40次元(relative error 0.04)世界記録達成 https://www.latticechallenge.org/lwe_challenge/challenge.php

[4] 2022.10  “SVP Challenge” 170次元世界記録達成   https://www.latticechallenge.org/svp-challenge/

Workshops organizing experience

Conference/Community Committee

Mini-Symposium of "Code, Cryptography, AI" at JCCA2024(General Co-chairs), ISPEC2024(Program Committee), IWSEC2024(Program Committee), QCNC2024(Program Committee), SAC2024(Program Committee), ProvSec2024(Program Committee), MobiSec2023(Publicity Co-Chair), AIGC2023(Program Committee), KSE2023(Program Committee), SAC2023(Program Committee), ProvSec2023(Program Committee), ProvSec2023(Workshops Co-Chair), SocialSec2023(Publicity Co-Chair), NSS2023(Technical Program Committee), NSS2023(Publicity Co-Chair), IWSEC2023(Organizing Committee), NGAC2022(Special session in KSE2022, Program Committee), SAC2022(Program Committee), IWAM2022(Organizing Committee), IWSEC2022(Organizing Committee, Program Committee), SCIS2022(Organizing Committee), CSEC(Steering Committee, 2021.4-Now), SAC2021(Program Committee), APKC2021(Program Co-Chair), SAC2020(Program Committee), MQC2019(Organizing Committee) 

Editorial Committee

2023年6月~20253    情報処理学会 論文誌ジャーナル/JIP「サプライチェーンを安全にするサイバーセキュリティ技術 」 特集号 編集委員 

2022年7月~20243    情報処理学会 論文誌ジャーナル/JIP「サイバー空間を安全にするコンピュータセキュリティ技術」 特集号 編集委員 

2022年4月~2023年9月    Journal of Surveillance, Security and Safety(JSSS)「Post-Quantum Cryptography and AI Privacy (PQAP)」特集号 

                ゲストエディタ

2021年10~2022年2月    九州大学IMI研究所  レクチャーノート「Exploring Mathematical and Practical Principles of Secure Computation and Secret 

                Sharing」編集委員

                The editorial committee of lecture note of IMI Workshop of the Joint Usage Research Projects of “Exploring Mathematical and Practical 

                Principles of Secure Computation and Secret Sharing.

2021年6月~20233    情報処理学会  論文誌ジャーナル/JIP  「量子時代をみすえたコンピュータセキュリティ技術」  特集号 編集委員

 The editorial committee of Journal of Information Processing, Special issue of “Computer Security technologies for Quantum-Safe World”.

List of papers and talks (no peer-reviewed)


[S1] Yuntao Wang, Hui Zhang, and Tsuyoshi Takagi, “Improving BKZ Algorithm with Reordering Technique”, the 31th Symposium on Cryptography and Information Security (SCIS2014), Jan. 2014.

[S2] Yuntao Wang, Yoshinori Aono, Takuya Hayashi, and Tsuyoshi Takagi, “A New Progressive BKZ Algorithm”, SCIS2015,Jan. 2015.

[S3] Yuntao Wang, Yoshinori Aono, Takuya Hayashi, and Tsuyoshi Takagi, “A New Progressive BKZ Algorithm”, The 8th Workshop among Asia Information Security Labs (WAIS2015), Jan. 2015.

[S4] Jintai Ding, Saed Alsayigh, Yuntao Wang, and Tsuyoshi Takagi, “The Beauty and the Beasts --The Hard Cases in LLL     Reduction”, SCIS2016, Jan. 2016.

[S5] Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi, “Experimental Analysis of LWE Problem”, SCIS2017, Jan. 2017.

[S6] Yuntao Wang, “Using Embedding Technique on Solving Darmstadt LWE Challenges”, The 9th Workshop among Asia Information Security Labs (WAIS2017), Jan. 2017.

[S7] Jintai Ding, Tsuyoshi Takagi, Xinwei Gao, and Yuntao Wang, “Ding Key Exchange”, a proposal to NIST PQC  standardization project 1st round, Dec. 2017.

[S8] Jintai Ding, Tsuyoshi Takagi, Xinwei Gao, and Yuntao Wang, “Ding Key Exchange -- A Proposal to NIST PQC Competition”, SCIS2018, Jan. 2018.

[S9] Yuntao Wang, Xinwei Gao, Jintai Ding, and Tsuyoshi Takagi, “Security Evaluation for Ding Key Exchange”, SCIS2018, Jan. 2018.

[S10] Jintai Ding, Seungki Kim, Tsuyoshi Takagi, and Yuntao Wang, “Why 1.02? The root Hermite factor of LLL and stochastic sandpile models”, arXiv:1804.03285, Apr. 2018.

[S11] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, and Tsuyoshi Takagi, “A New Embedding Method for Generalized LWE”, 82CSEC発表会, Jul. 2018.

[S12] Yuntao Wang, “Sandpileモデルを用いるLLLアルゴリズムの評価”, CREST暗号数理「未解決問題ワークショップ」, Sep. 2018.

[S13] Yuntao Wang, invited talk on “Recent Progress in Lattice-based Cryptography”, Seminar on long-term security systems based on secret sharing and post-quantum cryptography, 「超長期セキュリティ確保に向けた秘密分散ネットワーク技術と耐量子暗号技術(Seminar on long-term security systems based on secret sharing and post-quantum cryptography), Advanced ICT Research Institute, NICT, Nov. 2018.

[S14] Yasuhiko Ikematsu, Yuntao Wang, Koichiro Akiyama, and Tsuyoshi Takagi, “Experimental Analysis for Linear Algebraic Attack on a Variant of Indeterminate Equation Public-Key Cryptosystems”, SCIS2019, Jan. 2019.

[S15] Koichiro Akiyama, Yasuhiko Ikematsu, Yuntao Wang, and Tsuyoshi Takagi, “不定方程式暗号のバリエーションに対する鍵復元攻撃に関する考察”, SCIS2019, Jan. 2019.

[S16] Akito Inoue, Yuntao Wang, Atsushi Takayasu, and Tsuyoshi Takagi, “少ないサンプル数のLWE問題に対するKannanの埋め込み法の挙動評価”, SCIS2019, Jan. 2019.

[S17] Yuntao Wang, “Recent Progress in Lattice-based Cryptography”, The 11th Workshop among Asian Information Security Labs (WAIS2019), Feb. 2019.

[S18] Yuntao Wang, invited lectures on “Lattice reduction algorithms, Key exchange protocol, and their implementations.”, Ewha Womans University, Jul. 2019.

[S19] Yuntao Wang, invited talk on “An introduction to a lattice-based key exchange protocol and its cryptanalysis.”, IMI Crypto Seminar, Kyushu University, Jul. 2019.

[S20] Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, and Tsuyoshi Takagi, “Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack”, SCIS2020, Jan. 2020.

[S21] Satoshi Okada, Yuntao Wang, and Tsuyoshi Takagi, “格子暗号NewHopeに対する鍵不一致攻撃の改良”, SCIS2020, Jan. 2020.

[S22] Koichiro Akiyama, Yuntao Wang, Yasuhiko Ikematsu, and Tsuyoshi Takagi, “一方向性を仮定した不定方程式暗号のバリエーションに関する考察”, SCIS2020, Jan. 2020.

[S23] Yuntao Wang, invited lecture on “Lattice Algorithms and Cryptography”, ANTS 2020 summer school on algorithmic number theory, University of Auckland, Jun. 2020. (online presentation because of COVID-19) 

[S24] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, and Tsuyoshi Takagi, “Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques”, JSSM 2020 34 1 pp. 43-44, Aug. 2020. DOI: https://doi.org/10.32230/jssmjournal.34.1_43

[S25] Wenbo Liu, Rui Wen, and Yuntao Wang, “Study Signature Embedding Method against Backdoor Attack on DNN Model”, SCIS2021, Jan. 2021.

[S26] Yuntao Wang, Yasuhiko Ikematsu, and Takanori Yasuda, “Public Key Cryptosystems Combining Lattice and Multivariate Polynomial”, SCIS2021, Jan. 2021.

[S27] Kazuki Yamamura, Yuntao Wang, and Eiichiro Fujisaki, “格子基底の順序変更によるENUMの計算量削減の考察”, SCIS2021, Jan. 2021.

[S28] Satoshi Okada and Yuntao Wang, “格子暗号CRYSTALS-KYBERSABERに対する鍵再利用攻撃の提案”, SCIS2021, Jan. 2021.

[S29] Sho Hasegawa, Yuntao Wang, and Eiichiro Fujisaki, “General Sieve Kernelの考察および改良”, 92CSEC発表会, Mar. 2021.

[S30] Shuto Yamanami, Yuntao Wang, and Eiichiro Fujisaki, “TLS への Bleichenbacher’s CAT 攻撃の考察および実装”, 92CSEC発表会, Mar. 2021.

[S31] Yuntao Wang, “格子暗号における数学的困難問題の解読”, 第4回金沢暗号理論勉強会, Jun. 2021.

[S32] Yuntao Wang, “Recent Progress in Post-Quantum Cryptography”, JCCA離散数学とその応用研究集会2021ミニシンポジウム 符号・暗号・人工知能, Aug. 2021.

[S33] Hideaki Miyaji, Yuntao Wang, and Atsuko Miyaji, “メッセージ長を拡張する耐量子コミットメント方式”, Information and Communication System Security (ICSS) 2021, ONLINE, Japan : 21-22, June 2021.

[S34] Wang Yuntao, Ding Jintai, Gao Xinwei, and Takagi Tsuyoshi, “One Sample Ring-LWE with Rounding and Its Application to Key Exchange”, JSSM 2021 35 2 pp. 44-46, Nov. 2021. DOI: https://doi.org/10.32230/jssmjournal.35.2_44

[S35] Yi Xu, Yuntao Wang, and Eiichiro Fujisaki, “A Practical Lattice-based Threshold Signature”, the 39th Symposium on Cryptography and Information Security (SCIS2022), Jan. 2022.

[S36] Keiichi Imai, Yuntao Wang, and Eiichiro Fujisaki, “Tuple Sieve Algorithmの並列化の提案”, the 39th Symposium on Cryptography and Information Security (SCIS2022), Jan. 2022.

[S37] Hideaki Miyaji, Yuntao Wang, and Atsuko Miyaji, “メッセージ長を拡張する耐量子コミットメント方式”, the 39th Symposium on Cryptography and Information Security (SCIS2022), Jan. 2022.

[S38] Yuntao Wang, “Recent Progress in Post-Quantum Cryptography”, invited talk in “Hubei University of Technology Intelligent Science and Technology Innovation Demonstration Base – Academic Report”, online, Sep. 2022.

[S39] Yuntao Wang, “Recent Trends in Post-Quantum Cryptography”, keynote talk in the Third International Conference on Emerging Information Security and Application (EISA 2022), Oct. 2022.

[S40] Atsuko Miyaji, Yuntao Wang, Kazuhisa Nakasho, KanameWatanabe, and Hiroto Narimatsu, “Privacy-preserving Distributed Medical Data Integration Security System” (プライバシを保護した分散医療データ統合システムを活用したがん検診) , 42回医療情報学連合大会(23回日本医療情報学会学術大会),公募シンポジウム 医療情報の安全な二次利用とセキュリティ基盤技術, Nov. 2022.

[S41] Shintaro Yamashita, Yuntao Wang, Rui Wen, and Atsuko Miyaji, “A Proposal of Embedding Signature Technique on Detecting Backdoor Attacks against DNN Models”, 人工知能学会合同研究会2022,第3回 安全性とセキュリティ研究会, Nov. 2022.

[S42] Yuntao Wang and Xiaoling Yu, “A Lattice-based Ring Signature Scheme Secure against Key Exposure”, the 40th Symposium on Cryptography and Information Security (SCIS2023), Jan. 2023.

[S43] Leizhang Wang, Yuntao Wang, and Baocang Wang, “Proposing a Trade-off SVP-solving Strategy by Improving pnj-BKZ Simulator”, the 40th Symposium on Cryptography and Information Security (SCIS2023), Jan. 2023.

[S44] Paul Kunal, Yuntao Wang, and Atsuko Miyaji, “Digital Watermarks in Text-to-Image Generation Models”, 100CSEC発表会, Mar. 2023.

[S45] Katsuhiro Sato, Yuntao Wang, and Atsuko Miyaji, “pqeベース暗号方式における安全性の証明”, 100CSEC発表会, Mar. 2023.

[S46] Kenta Okada, Yuntao Wang, and Atsuko Miyaji, “準同型暗号を用いたプライバシー保護連合学習”, 100CSEC発表会, Mar. 2023.

[S47] Katsuya Nakashima, Yuntao Wang, and Atsuko Miyaji, “グラムシュミットベクトルの順序変更によるProgressive BKZの考察”, IEICE, ISEC2023-65, pp.72-77, Nov. 2023.

[S48] Seishiro Terada, Yuntao Wang, and Atsuko Miyaji, “イデアル格子におけるTriple Sieveアルゴリズムの改良”, IEICE, ISEC2023-59, pp.33-40, Nov. 2023.

[S49] Atsuko Miyaji, Yuntao Wang, Kazuhisa Nakasho, KanameWatanabe, and Hiroto Narimatsu, “Toward Practical Application of Cancer Screening Study Using a Privacy-Preserving Distributed Data Integration System”(分散医療データ統合システムを用いたプライバシを保護したがん検診精度管理の実用化に向けて), 43回医療情報学連合大会(24回日本医療情報学会学術大会),公募シンポジウム 医療情報の安全な二次利用とセキュリティ基盤技術, Nov. 2023.

[S50] Yuntao Wang, “格子解読アルゴリズムの数理構造および解読記録について”, 第6回情報数理セミナー, Jan. 2024.

[S51] Katsuya Nakashima, Yuntao Wang, and Atsuko Miyaji, “格子基底ベクトルの並び替えによる ENUM のコスト削減”, 電子情報通信学会2024年総合大会, Mar. 2024.

[S52] Shintaro Yamashita, Yuntao Wang, and Atsuko Miyaji, “署名技術を用いた機械学習におけるバックドア攻撃の検知”, IEICE, ISEC2024-03, Mar. 2024

[S53] Seishiro Terada, Yuntao Wang, and Atsuko Miyaji, “イデアルの性質を用いたTriple Sieveアルゴリズムの計算量について”, IEICE, ISEC2024-03, Mar. 2024.

[S54] Katsuya Nakashima, Yuntao Wang, and Atsuko Miyaji, “格子基底ベクトルの並び替えによるBKZの考察”, IEICE, ISEC2024-03, Mar. 2024.

[S55] Ryoto Morizono, Yuntao Wang, Atsuko Miyaji, “格子ベース署名3方式の性能比較 Squirrels, Raccoon 128, HAWK 512 の性能比較 ”, IEICE, ISEC2024-03, Mar. 2024.

[S56] Akira Fujimoto, Yuntao Wang, and Atsuko Miyaji, “機械学習へのバックドア攻撃に対する防御手法の改良”, Information and Communication System Security 2024 (ICSS 2024), Mar. 2024.

List of posters


[P1] Yuntao Wang, Hui Zhang and Tsuyoshi Takagi, “Improving BKZ Algorithm with Reordering Technique”, International Workshop on Security 2013 (IWSEC2013), Oct. 2013.

[P2] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagi, “An Improved Reordering-BKZ Algorithm for High-dimensional Lattices”, International Workshop on Security 2014 (IWSEC2014), Aug. 2014.

[P3] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagii, “An Improved Reordering-BKZ Algorithm for High-dimensional Lattices”, Computer Security Symposium 2014 (CSS2014), Oct. 2014.

[P4] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagi, “An Improved Reordering-BKZ Algorithm for High-dimensional Lattices”, Forum "Math-for-Industry" 2014 (FMfI 2014), Oct. 2014.

[P5] Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, “Breaking Lattice Challenges by Progressive BKZ algorithm”, FMfI 2016, Nov. 2016.

[P6] Yuntao Wang, “Symmetric Structures Derive Hard Cases in Lattice Reduction World”, FMfI 2017, Oct. 2017. 

[P7] Yuntao Wang, Yoshinori Aono, Takuya Hayashi, Tsuyoshi Takagi, “Security Evaluation of Lattice-based Cryptography based on Progressive BKZ”, JST CREST・さきがけ 数学関係領域合同シンポジウム, Jan. 2018.  

[P8] Yuntao Wang, “Study the Quantitative Bound of Required Samples in Attacking GACD-based FHE Schemes”, The International Symposium on Information Theory and Its Applications (ISITA), Oct. 2018.  

[P9] Yuntao Wang, “Introduction to Post-Quantum Cryptography”, JSPS HOPE MEETINGS with Nobel Laureates, Mar. 2019.

Scholarships during school days

 • Jan. 2011    Outstanding Class Cadres Scholarship, Yunnan University.

  • Sep. 2014 – Mar. 2015  Super Global University Contribution Support, Japan Government Scholarship.

  • Oct. 2015 – Sep. 2018 Leading PhD Program Scholarship, Graduate School of Mathematics, Kyushu University.

  • Apr. 2017 – Sep. 2018  Research Fellowship for Young Scientists (DC2), Japan Society for the Promotion of Science (JSPS).

Access to our lab (E2-513):