Yuntao WANG
Information:
Name: Yuntao Wang (王 贇弢, オウ イントウ)
Title: Dr. (Functional Mathematics, 機能数理学)
Affiliation: Graduate School of Engineering, Osaka University
Address: Bldg. E3, 9F-913, Osaka University, 2-1 Yamadaoka, Suita, Osaka, Japan 565-0871
Telephone: +81-6-6879-4314
E-mail: wang (at) comm.eng.osaka-u.ac.jp (at)→@
I am interested in algorithmic number theory and post-quantum cryptography, especially improving lattice algorithms and solving some hard mathematical lattice problems underlying lattice-based cryptography, i.e. the Shortest Vector Problem (SVP), the Learning With Errors (LWE) problem, etc. Recently, I have also focused on machine learning security, on the sides of both attack and defense.
Education:
• Bachelor: Sep. 2007 – Jul. 2011 Faculty of Mathematics and Information Science, Yunnan University, Kunming, Yunnan Province, China
− Major in Information and Computing Science.
• Master: Apr. 2014 – Mar. 2016 Graduate School of Mathematics, Kyushu University, Fukuoka, Japan
− Major in Mathematics.
• Doctor: Apr. 2016 – Sep. 2018 Graduate School of Mathematics, Kyushu University, Fukuoka, Japan
− Major in Functional Mathematics
(Sep. 2017 – Sep. 2018 Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan.)
Work Experience:
• Sep. 2014 – Oct. 2014 Internship in National Institute of Information and Communications Technology(NICT), Tokyo, Japan.
− Topic: Security bit estimation for learning with errors.
• Oct. 2014 – Mar. 2015 Teaching Assistant in Graduate School of Mathematics, Kyushu University, Fukuoka, Japan.
− Topic: Programming on theoretic algorithmic number theory and RSA cryptography.
• Oct. 2015 – Mar. 2017 Research Assistant in Leading PhD Program, Graduate School of Mathematics, Kyushu University, Fukuoka, Japan.
− Topic: Cryptanalysis on Post-Quantum Cryptography.
• Apr. 2017 – Sep. 2018 Research Fellowship for Young Scientists (DC2), Japan Society for the Promotion of Science (JSPS), Japan.
− Topic: Cryptanalysis on Lattice-based Cryptography using Large-scale Deciphering Experiments.
• Oct. 2018 – Sep. 2019 Project Researcher, Graduate School of Information Science and Technology, Department of Mathematical Informatics,
Mathematical Informatics 1st Laboratory, The University of Tokyo, Japan.
− Topic: PQC.
• Oct. 2019 – Mar. 2020 JSPS PD Researcher, FY2019 JSPS Postdoctoral Fellowship for Research in Japan (Standard).
− Topic: PQC
• Apr. 2020 – Feb. 2022 Assistant professor, JAIST.
− Topic: PQC, Information Security, Algorithmic Number Theory.
• Mar. 2022 – Now Associate Professor (Lecturer), Osaka University.
− Topic: PQC, Information Security, Algorithmic Number Theory, ML.
Adjunct Instructor:
• Oct. 2022 – Now Adjunct Instructor, JAIST.
− Lecture: Advanced Information Security Theory and Application (最新情報セキュリティ理論と応用).
List of journal papers:
[1] Mingwu Zhang, Mingxuan Yang, Gang Shen, Zhe Xia, and Yuntao Wang,
“A Verifiable and Privacy-Preserving Cloud Mining Pool Selection Scheme in Blockchain of Things,”
Information Sciences, Vol. 623, pp. 293-310, Elsevier, 2023. Doi: 10.1016/j.ins.2022.11.169
[2] Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang, and Bo-Yin Yang,
“A physical study of the LLL algorithm,”
Journal of Number Theory, Vol. 244, pp. 339-368, Elsevier, 2023. Doi: 10.1016/j.jnt.2022.09.013
[3] Mingwu Zhang, Shuo Huang, Gang Shen, and Yuntao Wang,
“PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption,”
Computer Standards & Interfaces, Vol. 84, pp. 103678, Elsevier, 2023. Doi: 10.1016/j.csi.2022.103678
[4] Kazuki Yamamura, Yuntao Wang, and Eiichiro Fujisaki,
“Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods,”
IET Information Security, Vol. 17, Issue 1, pp. 35-45, Wiley, 2023. Doi: 10.1049/ise2.12083
[5] Atsuko Miyaji, Kaname Watanabe, Yuuki Takano, Kazuhisa Nakasho, Sho Nakamura, Yuntao Wang, and Hiroto Narimatsu,
“A Privacy-Preserving Distributed Medical Data Integration Security System for Accuracy Assessment of Cancer Screening: Development Study of Novel Data Integration System,”
JMIR Medical Informatics, Vol. 10, No. 12, pp. e38922-e38922, JMIR Publications, 2022. Doi: 10.2196/38922
[6] Mingwu Zhang, Boyao Zhu, Yumei Li, and Yuntao Wang,
“TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs,”
Symmetry, Vol. 14, No. 6:1123, pp. 1-17, MDPI, 2022. Doi: 10.3390/sym14061123
[7] Xiaoling Yu, Yuntao Wang, Chungen Xu, and Tsuyoshi Takagi,
“Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem,”
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E105-A, No. 3, pp. 195-202, IEICE, 2022. Doi: 10.1587/transfun.2021CIP0021
[8] Hideaki Miyaji, Yuntao Wang, Akinori Kawachi, and Atsuko Miyaji,
“A Commitment Scheme with Output Locality-3 Fit for the IoT Device,”
Security and Communication Networks, Vol. 2021, No. 2949513, pp. 1-10, Hindawi, 2021. Doi: 10.1155/2021/2949513
[9] Yuntao Wang and Tsuyoshi Takagi,
“Studying lattice reduction algorithms improved by quick reordering technique,”
International Journal of Information Security, Vol. 20, No. 2, pp. 257-268, Springer, 2021. Doi: 10.1007/s10207-020-00501-y
[10] Xiaoling Yu, Chungen Xu, Bennian Dou, and Yuntao Wang,
“Multi-user search on the encrypted database: lattice-based keywords searchable encryption scheme with time-controlled proxy re-encryption,”
Multimedia Tools and Applications, Vol. 80, No. 2, pp. 3193-3211, Springer, 2021. Doi: 10.1007/s11042-020-09753-1
[11] Xiaoling Yu, Chungen Xu, Lei Xu, and Yuntao Wang,
“Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack,”
Computers, Materials & Continua, Vol. 64, No. 2, pp. 1107-1125, Tech Science Press, 2020. Doi:10.32604/cmc.2020.09680
[12] Seungki Kim and Yuntao Wang,
“A Stochastic Variant of the Abelian Sandpile Model,”
Journal of Statistical Physics, Vol. 178, No. 3, pp. 711-724, Springer, 2020. Doi: 10.1007/s10955-019-02453-7
[13] Yuntao Wang, Yoshinori Aono, and Tsuyoshi Takagi,
“Hardness Evaluation for Search LWE Problem Using Progressive BKZ simulator,”
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E101-A, No.12, pp. 2162-2170, IEICE, 2018. Doi: 10.1587/transfun.E101.A.2162
[14] Yutaro Kiyomura, Noriyasu Iwamoto, Shun'ichi Yokoyama, Kenichiro Hayasaka, Yuntao Wang, Takanori Yasuda, Katsuyuki Takashima, and Tsuyoshi Takagi,
“Heuristic counting of Kachisa-Schaefer-Scott curves,”
JSIAM Letters, Vol.6, pp.73-76, JSIAM, 2014. Doi: 10.14495/jsiaml.6.73
List of conference papers (peer-reviewed):
[1] Leizhang Wang, Yuntao Wang, and Baocang Wang,
“A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator,”
The 18th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2023), ACM, to appear.
[2] Yuntao Wang, Yasuhiko Ikematsu, and Takanori Yasuda,
“Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask,”
The 16th International Conference on Provable and Practical Security (ProvSec 2022), Springer LNCS, Vol. 13600, pp. 88-104, 2022.
[3] Kazuki Yamamura, Yuntao Wang, and Eiichiro Fujisaki,
“Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods,”
The 24th Annual International Conference on Information Security and Cryptology (ICISC 2021), Springer LNCS, Vol. 13218, pp. 159-174, 2021.
[4] Hideaki Miyaji, Yuntao Wang, and Atsuko Miyaji,
“Message-restriction-free Commitment Scheme Based on Lattice Assumption,”
The 16th International Conference on Information Security Practice and Experience (ISPEC 2021), Springer LNCS, Vol. 13107, pp. 90-105, 2021.
[5] Satoshi Okada and Yuntao Wang,
“Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER,”
The 15th International Conference on Provable and Practical Security (ProvSec 2021), Springer LNCS, Vol. 13059, pp. 155-173, 2021.
[6] Hideaki Miyaji, Atsuko Miyaji, and Yuntao Wang,
“Homomorphic commitment scheme with low output locality,”
The Eighth International Symposium on Computing and Networking (CANDAR 2020), IEEE, pp. 167-173, 2020.
[7] Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, and Tsuyoshi Takagi,
“Cryptanalysis of Giophantus (TM) schemes against hybrid attack,”
The 7th ACM Workshop on ASIA Public-Key Cryptography (APKC '20), ACM, pp. 28-35, 2020.
[8] Satoshi Okada, Yuntao Wang, and Tsuyoshi Takagi,
“Improving key mismatch attack on NewHope with fewer queries,”
The 25th Australasian Conference on Information Security and Privacy (ACISP 2020), Springer LNCS, Vol. 12248, pp. 505-524, 2020.
[9] Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, and Yuntao Wang,
“One sample ring-LWE with rounding and its application to key exchange,”
The 17th International Conference on Applied Cryptography and Network Security (ACNS 2019), Springer LNCS 11464, pp. 323-343, 2019.
[10] Yuntao Wang and Tsuyoshi Takagi,
“Improving the BKZ reduction algorithm by quick reordering technique,”
The 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), Springer LNCS, Vol. 10946, pp. 787-795, 2018.
[11] Xiaoling Yu, Yuntao Wang, Chungen Xu, and Tsuyoshi Takagi,
“Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem,”
The 5th International Conference on Information Science and Control Engineering (ICISCE 2018), IEEE Computer Society, pp. 533-537, 2018.
[12] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, and Tsuyoshi Takagi,
“Estimated cost for solving generalized learning with errors problem via embedding techniques,”
The 13th International Workshop on Security (IWSEC 2018), Springer LNCS, Vol. 11049, pp. 87-103, 2018.
[13] Yuntao Wang and Thomas Wunderer,
“Revisiting the sparsification technique in Kannan’s embedding attack on LWE,”
The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), Springer LNCS, Vol. 11125, pp.440-452, 2018.
[14] Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, and Yuntao Wang,
“The beauty and the beasts --the hard cases in LLL reduction,”
The 12th International Workshop on Security (IWSEC 2017), Springer LNCS, Vol. 10418, pp. 19-35, 2017.
[15] Yuntao Wang, Yoshinori Aono, and Tsuyoshi Takagi,
“An experimental study of Kannan's embedding technique for the search LWE problem,”
The 19th International Conference on Information and Communications Security (ICICS 2017), Springer LNCS, Vol. 10631, pp. 541-553, 2017.
[16] Yoshinori Aono, Yuntao Wang, Takuya Hayashi, and Tsuyoshi Takagi,
“Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator,”
The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2016), Springer LNCS, Vol. 9665, pp. 789-819, 2016.
Remarkable Research Results:
[Award 1] Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki, The 24th Annual International Conference on Information Security and Cryptology (ICISC 2021), “Best Paper Award”, Dec. 2021.
[Award 2] Yuntao Wang, Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, “辻井重男セキュリティ論文賞 特別賞”, Jun. 2021.
[Award 3] Yuntao Wang, Weiyao Wang, Atsushi Takayasu, Tsuyoshi Takagi, “辻井重男セキュリティ論文賞 特別賞”, Jun. 2020.
[Award 4] Yuntao Wang, “Academic Research Award to Outstanding PhD Graduate”, Kyushu University, Sep. 2018.
[Award 5] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, “Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques”, The 13th International Workshop on Security (IWSEC 2018) , “Best Student Paper”, Sep. 2018.
[Award 6] Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi, Forum “Math-for-Industry” 2016 (FMfI 2016), “Best Poster Award”, Nov. 2016.
[Award 7] Yuntao Wang, The 8th Workshop among Asia Information Security Labs (WAIS 2015), “Biggest Applause Award”, Jan. 2015. (24件中1件受賞)
[Award 8] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagi, Forum “Math-for-Industry” 2014 (FMfI 2014), “Excellent Poster Award”, Oct. 2014. (22件中5件受賞)
[Award 9] Yuntao Wang, Hui Zhang and Tsuyoshi Takagi, International Workshop on Security 2013 (IWSEC 2013), “Best Poster Award”, Nov. 2013. (20件中2件受賞)
Others:
[1] 2023.01 “(Approximate) Ideal Lattice Challenge” 750次元世界記録達成 https://www.latticechallenge.org/ideallattice-challenge/index.php
[2] 2022.12 “Ideal Lattice Challenge” 176次元世界記録達成 https://www.latticechallenge.org/ideallattice-challenge/index.php
[3] 2022.10 “LWE Challenge” 40次元(relative error 0.04)世界記録達成 https://www.latticechallenge.org/lwe_challenge/challenge.php
[4] 2022.10 “SVP Challenge” 170次元世界記録達成 https://www.latticechallenge.org/svp-challenge/
Workshops organizing experience:
コンピュータセキュリティ研究運営委員会(CSEC), 2021.04-Now, 運営委員.
国際会議The 17th International Conference on Provable and Practical Security (ProvSec 2023), 2023.10.20-10.22, Workshops Co-Chairs.
国際会議The 17th International Conference on Network and System Security (NSS 2023), 2023.08.14-08.16, Publicity Co-Chairs.
国際シンポジウムThe 9th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2023), 2023.08.14-08.16, Publicity Co-Chairs.
国際会議The 18th International Workshop on Security (IWSEC2023), 2023.8.29-8.31, 組織委員.
一般研究・研究集会(II)「高度化する暗号技術と数学的技法の進展」, 九州大学マス・フォア・インダストリ研究所 IMI, 2022.11.07-11.09, 組織委員, https://joint.imi.kyushu-u.ac.jp/post-6068.
国際会議The 17th International Workshop on Security (IWSEC2022), 2022.08.31-09.02, 組織委員, https://www.iwsec.org/2022/.
第39回 暗号と情報セキュリティシンポジウム(SCIS2022), グランキューブ大阪, 2022.1.18-1.21, プログラム実行委員, https://www.iwsec.org/scis/2022.
共同利用・ワークショップ「新世代暗号の設計・評価」, 九州大学マス・フォア・インダストリ研究所 IMI, 2021.11.16-11.17, 代表者, https://www.imi.kyushu-u.ac.jp/kyodo-riyo/research_chooses/view/20210002.
共同利用・研究集会「秘密計算・秘密分散の数理と実用の探求」, 九州大学マス・フォア・インダストリ研究所 IMI, 2021.11.8-11.10, 組織委員, https://www.imi.kyushu-u.ac.jp/kyodo-riyo/research_chooses/view/20210004.
国際シンポジウムInternational Symposium on Mathematics, Quantum Theory and Crypto (MQC 2019)」, 九州大学マス・フォア・インダストリ研究所 IMI, オーディトリアム(ウエスト1号館 D-413), 2019.9.25-9.27, 組織委員, https://www.mqc2019.org/.
CREST暗号数理ミニワークショップ「若手研究者講演」, 九州大学マス・フォア・インダストリ研究所 IMI, オーディトリアム(ウエスト1号館 D-413), 2019.3.8, 世話人, http://crypto.mist.i.u-tokyo.ac.jp/crest/index.html.
CREST暗号数理平成30年度第二回全体会議 チュートリアルワークショップ, 九州大学マス・フォア・インダストリ研究所 IMI, オーディトリアム(ウエスト1号館 D-413), 2018.12.11, 世話人, http://crypto.mist.i.u-tokyo.ac.jp/crest/index.html.
Conference/Community Committee:
AIGC2023(Program Committee), KSE2023(Program Committee), SAC2023(Program Committee), ProvSec2023(Program Committee), ProvSec2023(Workshops Co-Chair), SocialSec2023(Publicity Co-Chair), NSS2023(Technical Program Committee), NSS2023(Publicity Co-Chair), IWSEC2023(Organizing Committee), NGAC2022(Special session in KSE2022, Program Committee), SAC2022(Program Committee), IWAM2022(Organizing Committee), IWSEC2022(Organizing Committee, Program Committee), SCIS2022(Organizing Committee), CSEC(Steering Committee, 2021.4-Now), SAC2021(Program Committee), APKC2021(Program Co-Chair), SAC2020(Program Committee), MQC2019(Organizing Committee)
Editorial Committee:
2022年7月~2023年9月 情報処理学会 論文誌ジャーナル/JIP「サイバー空間を安全にするコンピュータセキュリティ技術」 特集号 編集委員
2022年4月~2023年9月 Journal of Surveillance, Security and Safety(JSSS)「Post-Quantum Cryptography and AI Privacy (PQAP)」特集号
ゲストエディタ
2021年10月~2022年2月 九州大学IMI研究所 レクチャーノート「Exploring Mathematical and Practical Principles of Secure Computation and Secret
Sharing」編集委員
The editorial committee of lecture note of IMI Workshop of the Joint Usage Research Projects of “Exploring Mathematical and Practical
Principles of Secure Computation and Secret Sharing”.
2021年6月~2022年9月 情報処理学会 論文誌ジャーナル/JIP 「量子時代をみすえたコンピュータセキュリティ技術」 特集号 編集委員
The editorial committee of Journal of Information Processing, Special issue of “Computer Security technologies for Quantum-Safe World”.
List of papers and talks (no peer-reviewed):
[S1] Yuntao Wang, Hui Zhang and Tsuyoshi Takagi, “Improving BKZ Algorithm with Reordering Technique”, the 31th Symposium on Cryptography and Information Security (SCIS2014), Jan. 2014.
[S2] Yuntao Wang, Yoshinori Aono, Takuya Hayashi, Tsuyoshi Takagi, “A New Progressive BKZ Algorithm”, SCIS2015,Jan. 2015.
[S3] Yuntao Wang, Yoshinori Aono, Takuya Hayashi, Tsuyoshi Takagi, “A New Progressive BKZ Algorithm”, The 8th Workshop among Asia Information Security Labs (WAIS2015), Jan. 2015.
[S4] Jintai Ding, Saed Alsayigh, Yuntao Wang, Tsuyoshi Takagi, “The Beauty and the Beasts --The Hard Cases in LLL Reduction”, SCIS2016, Jan. 2016.
[S5] Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi, “Experimental Analysis of LWE Problem”, SCIS2017, Jan. 2017.
[S6] Yuntao Wang, “Using Embedding Technique on Solving Darmstadt LWE Challenges”, The 9th Workshop among Asia Information Security Labs (WAIS2017), Jan. 2017.
[S7] Jintai Ding, Tsuyoshi Takagi, Xinwei Gao, Yuntao Wang, “Ding Key Exchange”, a proposal to NIST PQC standardization project 1st round, Dec. 2017.
[S8] Jintai Ding, Tsuyoshi Takagi, Xinwei Gao, Yuntao Wang, “Ding Key Exchange -- A Proposal to NIST PQC Competition”, SCIS2018, Jan. 2018.
[S9] Yuntao Wang, Xinwei Gao, Jintai Ding, Tsuyoshi Takagi, “Security Evaluation for Ding Key Exchange”, SCIS2018, Jan. 2018.
[S10] Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang, “Why 1.02? The root Hermite factor of LLL and stochastic sandpile models”, arXiv:1804.03285, Apr. 2018.
[S11] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, “A New Embedding Method for Generalized LWE”, 第82回CSEC発表会, Jul. 2018.
[S12] Yuntao Wang, “Sandpileモデルを用いるLLLアルゴリズムの評価”, CREST暗号数理「未解決問題ワークショップ」, Sep. 2018.
[S13] Yuntao Wang, invited talk on “Recent Progress in Lattice-based Cryptography”, Seminar on long-term security systems based on secret sharing and post-quantum cryptography, 「超長期セキュリティ確保に向けた秘密分散ネットワーク技術と耐量子暗号技術(Seminar on long-term security systems based on secret sharing and post-quantum cryptography)」, Advanced ICT Research Institute, NICT, Nov. 2018.
[S14] Yasuhiko Ikematsu, Yuntao Wang, Koichiro Akiyama, Tsuyoshi Takagi, “Experimental Analysis for Linear Algebraic Attack on a Variant of Indeterminate Equation Public-Key Cryptosystems”, SCIS2019, Jan. 2019.
[S15] Koichiro Akiyama, Yasuhiko Ikematsu, Yuntao Wang, Tsuyoshi Takagi, “不定方程式暗号のバリエーションに対する鍵復元攻撃に関する考察”, SCIS2019, Jan. 2019.
[S16] Akito Inoue, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, “少ないサンプル数のLWE問題に対するKannanの埋め込み法の挙動評価”, SCIS2019, Jan. 2019.
[S17] Yuntao Wang, “Recent Progress in Lattice-based Cryptography”, The 11th Workshop among Asian Information Security Labs (WAIS2019), Feb. 2019.
[S18] Yuntao Wang, invited lectures on “Lattice reduction algorithms, Key exchange protocol, and their implementations.”, Ewha Womans University, Jul. 2019.
[S19] Yuntao Wang, invited talk on “An introduction to a lattice-based key exchange protocol and its cryptanalysis.”, IMI Crypto Seminar, Kyushu University, Jul. 2019.
[S20] Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, “Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack”, SCIS2020, Jan. 2020.
[S21] Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi, “格子暗号NewHopeに対する鍵不一致攻撃の改良”, SCIS2020, Jan. 2020.
[S22] Koichiro Akiyama, Yuntao Wang, Yasuhiko Ikematsu, Tsuyoshi Takagi, “一方向性を仮定した不定方程式暗号のバリエーションに関する考察”, SCIS2020, Jan. 2020.
[S23] Yuntao Wang, invited lecture on “Lattice Algorithms and Cryptography”, ANTS 2020 summer school on algorithmic number theory, University of Auckland, Jun. 2020. (online presentation because of COVID-19)
[S24] Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, “Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques”, JSSM 2020 年 34 巻 1 号 pp. 43-44, Aug. 2020. DOI: https://doi.org/10.32230/jssmjournal.34.1_43
[S25] Wenbo Liu, Rui Wen, Yuntao Wang, “Study Signature Embedding Method against Backdoor Attack on DNN Model”, SCIS2021, Jan. 2021.
[S26] Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda, “Public Key Cryptosystems Combining Lattice and Multivariate Polynomial”, SCIS2021, Jan. 2021.
[S27] Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki, “格子基底の順序変更によるENUMの計算量削減の考察”, SCIS2021, Jan. 2021.
[S28] Satoshi Okada, Yuntao Wang, “格子暗号CRYSTALS-KYBERとSABERに対する鍵再利用攻撃の提案”, SCIS2021, Jan. 2021.
[S29] Sho Hasegawa, Yuntao Wang, Eiichiro Fujisaki, “General Sieve Kernelの考察および改良”, 第92回CSEC発表会, Mar. 2021.
[S30] Shuto Yamanami, Yuntao Wang, Eiichiro Fujisaki, “TLS への Bleichenbacher’s CAT 攻撃の考察および実装”, 第92回CSEC発表会, Mar. 2021.
[S31] Yuntao Wang, “格子暗号における数学的困難問題の解読”, 第4回金沢暗号理論勉強会, Jun. 2021.
[S32] Yuntao Wang, “Recent Progress in Post-Quantum Cryptography”, JCCA離散数学とその応用研究集会2021ミニシンポジウム 符号・暗号・人工知能, Aug. 2021.
[S33] Hideaki Miyaji, Yuntao Wang, and Atsuko Miyaji, “メッセージ長を拡張する耐量子コミットメント方式”, Information and Communication System Security (ICSS) 2021, ONLINE, Japan : 21-22, June 2021.
[S34] Wang Yuntao, Ding Jintai, Gao Xinwei, Takagi Tsuyoshi, “One Sample Ring-LWE with Rounding and Its Application to Key Exchange”, JSSM 2021年 35 巻 2 号 pp. 44-46, Nov. 2021. DOI: https://doi.org/10.32230/jssmjournal.35.2_44
[S35] Yi Xu, Yuntao Wang, Eiichiro Fujisaki, “A Practical Lattice-based Threshold Signature”, the 39th Symposium on Cryptography and Information Security (SCIS2022), Jan. 2022.
[S36] Keiichi Imai, Yuntao Wang, Eiichiro Fujisaki, “Tuple Sieve Algorithmの並列化の提案”, the 39th Symposium on Cryptography and Information Security (SCIS2022), Jan. 2022.
[S37] Hideaki Miyaji, Yuntao Wang, and Atsuko Miyaji, “メッセージ長を拡張する耐量子コミットメント方式”, the 39th Symposium on Cryptography and Information Security (SCIS2022), Jan. 2022.
[S38] Yuntao Wang, “Recent Progress in Post-Quantum Cryptography”, invited talk in “Hubei University of Technology Intelligent Science and Technology Innovation Demonstration Base – Academic Report”, online, Sep. 2022.
[S39] Yuntao Wang, “Recent Trends in Post-Quantum Cryptography”, keynote talk in the Third International Conference on Emerging Information Security and Application (EISA 2022), Oct. 2022.
[S40] Atsuko Miyaji, Yuntao Wang, Kazuhisa Nakasho, KanameWatanabe, and Hiroto Narimatsu, “Privacy-preserving Distributed Medical Data Integration Security System”, 第42回医療情報学連合大会(第23回日本医療情報学会学術大会),公募シンポジウム 医療情報の安全な二次利用とセキュリティ基盤技術, Nov. 2022.
[S41] Shintaro Yamashita, Yuntao Wang, Rui Wen, Atsuko Miyaji, “A Proposal of Embedding Signature Technique on Detecting Backdoor Attacks against DNN Models”, 人工知能学会合同研究会2022,第3回 安全性とセキュリティ研究会, Nov. 2022.
[S42] Yuntao Wang and Xiaoling Yu, “A Lattice-based Ring Signature Scheme Secure against Key Exposure”, the 40th Symposium on Cryptography and Information Security (SCIS2023), Jan. 2023.
[S43] Leizhang Wang, Yuntao Wang, and Baocang Wang, “Proposing a Trade-off SVP-solving Strategy by Improving pnj-BKZ Simulator”, the 40th Symposium on Cryptography and Information Security (SCIS2023), Jan. 2023.
List of posters:
[P1] Yuntao Wang, Hui Zhang and Tsuyoshi Takagi, “Improving BKZ Algorithm with Reordering Technique”, International Workshop on Security 2013 (IWSEC2013), Oct. 2013.
[P2] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagi, “An Improved Reordering-BKZ Algorithm for High-dimensional Lattices”, International Workshop on Security 2014 (IWSEC2014), Aug. 2014.
[P3] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagii, “An Improved Reordering-BKZ Algorithm for High-dimensional Lattices”, Computer Security Symposium 2014 (CSS2014), Oct. 2014.
[P4] Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng and Tsuyoshi Takagi, “An Improved Reordering-BKZ Algorithm for High-dimensional Lattices”, Forum "Math-for-Industry" 2014 (FMfI 2014), Oct. 2014.
[P5] Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, “Breaking Lattice Challenges by Progressive BKZ algorithm”, FMfI 2016, Nov. 2016.
[P6] Yuntao Wang, “Symmetric Structures Derive Hard Cases in Lattice Reduction World”, FMfI 2017, Oct. 2017.
[P7] Yuntao Wang, Yoshinori Aono, Takuya Hayashi, Tsuyoshi Takagi, “Security Evaluation of Lattice-based Cryptography based on Progressive BKZ”, JST CREST・さきがけ 数学関係領域合同シンポジウム, Jan. 2018.
[P8] Yuntao Wang, “Study the Quantitative Bound of Required Samples in Attacking GACD-based FHE Schemes”, The International Symposium on Information Theory and Its Applications (ISITA), Oct. 2018.
[P9] Yuntao Wang, “Introduction to Post-Quantum Cryptography”, JSPS HOPE MEETINGS with Nobel Laureates, Mar. 2019.
Scholarships during school days :
• Jan. 2011 Outstanding Class Cadres Scholarship, Yunnan University.
• Sep. 2014 – Mar. 2015 Super Global University Contribution Support, Japan Government Scholarship.
• Oct. 2015 – Sep. 2018 Leading PhD Program Scholarship, Graduate School of Mathematics, Kyushu University.
• Apr. 2017 – Sep. 2018 Research Fellowship for Young Scientists (DC2), Japan Society for the Promotion of Science (JSPS).