Experimental Evaluation for Risk Assessment of Privacy Preserving Synthetic Data, Koji Chida, Susumu Kakuta, Hiroyuki Itakura, Ichiro Ishihara, Kosuke Yoshioka, Hiroshi Takeuchi, Aug. 2024, The 21th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2024), International conference proceedings
$Pk$-Anonymization Meets Differential Privacy, Masaya Kobayashi, Atsushi Fujioka, Koji Chida, Akira Nagai, Kan Yasuda, Aug. 2024, 21st Annual International Conference on Privacy, Security, and Trust (PST2024), International conference proceedings
Photonic Cryptographic Circuits Consisting of Thermo-optic MZI Switch or Y-Branches, Junko Takahashi, Shota Kita, Akihiko Shinya, Kazumaro Aoki, Koji Chida, Fumitaka Hoshino, Apr. 2024, 2024 IEEE Silicon Photonics Conference (SiPhotonics), International conference proceedings
On Rényi Differential Privacy in Statistics-based Synthetic Data Generation, Takayuki Miura;Toshiki Shibahara;Masanobu Kii;Atsunori Ichikawa;Juko Yamamoto;Koji Chida, 15 Dec. 2023, Journal of Information Processing, 64, 12, 812, 820, Scientific journal
Extended k
m-Anonymity for Randomization Applied to Binary Data, Masaya Kobayashi;Atsushi Fujioka;Koji Chida, 21 Aug. 2023, 2023 20th Annual International Conference on Privacy, Security and Trust (PST), International conference proceedings
AMIC: “Anonymity against Membership Inference” Competition, Koji Chida, Hiromi Arai, Makoto Iguchi, Hidenobu Oguri, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Satoshi Hasegawa, Takuma Hatano, Koki Hamada, Ryo Furukawa, Akira Yamada, Chiemi Watanabe, 15 Sep. 2023, 64, 9, 1317, 1329, Scientific journal
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries, Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Daniel Genkin, Yehuda Lindell, Ariel Nof, 2023, Journal of Cryptology, 36, 15, Scientific journal
Communication-Efficient Inner Product Private Join and Compute with Cardinality, Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida, Jul. 2023, ACM ASIACCS 2023, International conference proceedings
Efficient Decision Tree Training with New Data Structure for Secure Multi-party Computation, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Koji Chida, 2023, Proceedings on Privacy Enhancing Technologies (PoPETs), Scientific journal
公的統計の実証分析における秘密計算とその部分計算過程を公開することの安全性の検討, 白川清美, 千田浩司, 田中哲士, 高橋慧, 菊池亮, Feb. 2018, 69, 2, 145, 159, Research institution
Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation, Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Jan. 2018, IEICE Transactions, 101-A, 1, 51, 63, Scientific journal
Computational SS and conversion protocols in both active and passive settings, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata, May 2017, IET Information Security, 11, 5, 287, 293, Scientific journal
Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing, Ryo Kikuchi, Dai Ikarashi, Koki Hamada, Koji Chida, Jan. 2015, IEICE Transactions, 98-A, 1, 223, 231, Scientific journal
Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation, Ryo Kikuchi, Koji Chida, Dai Ikarashi, Wakaha Ogata, Koki Hamada, Katsumi Takahashi, Jan. 2015, IEICE Transactions, 98-A, 1, 213, 222, Scientific journal
Implementation and evaluation of an efficient secure computation system using ʻRʼ for healthcare statistics, Koji Chida, Gembu Morohashi, Hitoshi Fuji, Fumihiko Magata, Akiko Fujimura, Koki Hamada, Dai Ikarashi, Ryuichi Yamamoto, Oct. 2014, Journal of the American Medical Informatics Association, 21-e2, 1, 326, 331, Scientific journal
加法準同型ElGamal暗号を用いたビット分解プロトコル, 千田浩司, 五十嵐大, 高橋克巳, Sep. 2013, 54, 9, 2137, 2145, Scientific journal
秘匿計算上の一括写像アルゴリズム, 濱田浩気, 五十嵐大, 千田浩司, Apr. 2013, 96, 4, 157, 165, Scientific journal
集合匿名化クラウドの課題と対策, 千田浩司, 五十嵐大, 高橋克己, 濱田浩気, 菊池亮, 冨士仁, Apr. 2013, 96, 4, 149, 156, Scientific journal
エラー検出可能な軽量3パーティ秘匿関数計算の提案と実装評価, 千田浩司, 五十嵐大, 濱田浩気, 高橋克巳, Sep. 2011, 52, 9, 2674, 2685, Scientific journal
秘匿回路計算の高効率化と機密情報の安全な活用について, 千田浩司, 五十嵐大, 柴田賢介, 山本太郎, 高橋克巳, Jun. 2011, 52, 6, 1993, 2008, Scientific journal
Multiparty Computation from El Gamal/Paillier Conversion, Koji Chida, Hiroaki Kikuchi, Keiichi Hirota, Gembu Morohashi, Jan. 2009, IEICE Transactions, 92-A, 1, 137, 146, Scientific journal
Secure Multiparty Computation for Comparator Networks, Gembu Morohashi, Koji Chida, Keiichi Hirota, Sep. 2008, IEICE Transactions, 91-A, 9, 2349, 2355, Scientific journal
Batch Processing for Proofs of Partial Knowledge and Its Applications, Koji Chida, Go Yamamoto, Jan. 2008, IEICE Transactions, 91-A, 1, 150, 159, Scientific journal
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications, Koji Chida, Go Yamamoto, Koutarou Suzuki, Shigenori Uchiyama, Noburou Taniguchi, Osamu Shionoiri, Atsushi Kanai, Jan. 2007, IEICE Transactions, 90-A, 1, 128, 138, Scientific journal
Conversion Schemes for Unlinkable Signatures That Include Revocable Unlinkability, Koji Chida, Jan. 2006, IEICE Transactions, 89-A, 1, 90, 98, Scientific journal
Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext, Koji Chida, Masayuki Abe, Jan. 2005, IEICE Transactions, 88-A, 1, 211, 221, Scientific journal
匿名性確保と不正者追跡の両立が可能な通信方式, 千田浩司, 小宮輝之, 林徹, Aug. 2004, 45, 8, 1873, 1880, Scientific journal
An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme, Koji Chida, Kunio Kobayashi, Hikaru Morita, Jan. 2004, IEICE Transactions, 87-A, 1, 173, 181, Scientific journal
A New Factoring Method of Integers N=pr ✕ q for Large r, Koji Chida, Shigenori Uchiyama, Taiichi Saito, May 2002, IEICE Transactions, 85-A, 5, 1050, 1053, Scientific journal
Jacobi signatureを用いたN=pr*q型の合成数に対する素因数分解アルゴリズム, 千田浩司, 内山成憲, 齊藤泰一, Apr. 2002, 12, 4, 235, 242, Scientific journal
High-Throughput Secure AES Computation, Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Benny Pinkas, Oct. 2018, 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC 2018), 13, 24, International conference proceedings
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries, Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof, Aug. 2018, 38th Annual International Cryptology Conference (CRYPTO 2018), LNCS 10993, 34, 64, International conference proceedings
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority, Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida, Jul. 2018, Information Security and Privacy, 23rd Australasian Conference (ACISP 2018), LNCS 10946, 64, 82, International conference proceedings
Privacy-Preserving Fisher's Exact Test for Genome-Wide Association Study, Koki Hamada, Satoshi Hasegawa, Kazuharu Misawa, Koji Chida, Soichi Ogishima, Masao Nagasaki, 2017, International Workshop on Genome Privacy and Security (GenoPri), International conference proceedings
Secure statistical computation system on encrypted data: An empirical study of secure regression analysis for official statistics, Satoshi Tanaka, Yutaka Abe, Satoshi Takahashi, Ryo Kikuchi, Atsushi Doi, Koji Chida, Kiyomi Shirakawa, 2017, UNECE Work session on Statistical Data Confidentiality, International conference proceedings
Evaluation of Secure Computation in a Distributed Healthcare Setting, Eizen Kimura, Koki Hamada, Ryo Kikuchi, Koji Chida, Kazuya Okamoto, Shirou Manabe, Tomohiro Kuroda, Yasushi Matsumura, Toshihiro Takeda, Naoki Mihara, Aug. 2016, 27th Medical Informatics Europe (MIE 2016), 152, 156, International conference proceedings
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation, Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Dec. 2015, Cryptology and Network Security, 14th International Conference (CANS 2015), LNCS 9476, 179, 196, International conference proceedings
k-Anonymous Microdata Release via Post Randomisation Method, Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi, Aug. 2015, 10th International Workshop on Security (IWSEC 2015), LNCS 9241, 225, 241, International conference proceedings
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation, Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Katsumi Takahashi, Jul. 2013, Information Security and Privacy, 18th Australasian Conference (ACISP 2013), LNCS 7959, 419, 434, International conference proceedings
Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms, Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi, Nov. 2012, Information Security and Cryptology, 15th International Conference (ICISC 2012), LNCS 7839, 202, 216, International conference proceedings
Tag-Based Secure Set-Intersection Protocol and Its Application to Privacy-Enhancing Biometrics, Koji Chida, Dai Ikarashi, Katsumi Takahashi, Nov. 2012, The 13th International Conference on Network-Based Information Systems (NBiS 2010), 535, 540, International conference proceedings
Privacy Preserving Computations without Public Key Cryptographic Operation, Koji Chida, Katsumi Takahashi, Nov. 2008, Third International Workshop on Security (IWSEC 2008), LNCS 5312, 184, 200, International conference proceedings
Secure Anonymous Communications with Practical Anonymity Revocation Scheme, Koji Chida, Osamu Shionoiri, Atsushi Kanai, Oct. 2007, Second International Workshop on Security (IWSEC 2007), LNCS 4752, 352, 364, International conference proceedings
Efficient Multiparty Computation for Comparator Networks, Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota, Apr. 2007, The Second International Conference on Availability, Reliability and Security (ARES 2007), 1183, 1189, International conference proceedings
Batch Processing of Interactive Proofs, Koji Chida, Go Yamamoto, Feb. 2007, The Cryptographers' Track at the RSA Conference 2007 (CT-RSA 2007), LNCS4377, 196, 207, International conference proceedings
DECIDE: a scheme for decentralized identity escrow, Noburou Taiguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai, Nov. 2005, 2005 Workshop on Digital Identity Management, 37, 45, International conference proceedings
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption, Go Yamamoto, Koji Chida, Anderson C.A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama, Aug. 2005, Information Security Applications, 6th International Workshop (WISA 2005), LNCS 3786, 328, 342, International conference proceedings
Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison, Koji Chida, Kunio Kobayashi, Hikaru Morita, Oct. 2001, Information Security, 4th International Conference (ISC 2001), LNCS 2200, 408, 419, International conference proceedings
プライバシ保護合成データの有用性とリスクアセスメントに関する実験評価, 千田 浩司; 角田 進; 板倉 寛如; 石原 一郎; 吉岡 甲将; 竹内 弘史, 14 Mar. 2024, Summary national conference
シャッフルモデルによる局所差分プライベート行結合データのプライバシ増幅に関する考察, 千田 浩司; 齋藤 翔太; 高木 理, 11 Mar. 2024, Summary national conference
ランダム化を用いた$k^m$-匿名化手法, 岩城 早汰; 小林 雅弥; 藤岡 淳; 千田 浩司; 永井 彰; 安田 幹, 08 Mar. 2024, Summary national conference
混合型データセットに対する$k^m$-匿名化手法, 金澤 理乃; 小林 雅弥; 藤岡 淳; 千田 浩司; 永井 彰; 安田 幹, 08 Mar. 2024, Summary national conference
$f$-Divergence Differential Privacy, Shota Saito; Koji Chida; Osamu Takaki, 16 Jan. 2024, Summary national conference
サンプリング時における差分プライバシと$k^m$-匿名性の関係, 小林 雅弥; 藤岡 淳; 千田 浩司; 永井 彰; 安田 幹, 16 Jan. 2024, Summary national conference
All光演算に向けたS-box光回路の動作検証, 高橋 順子; 北 翔太; 新家 昭彦; 青木 和麻呂; 千田 浩司; 星野 文学, 16 Jan. 2024, Summary national conference
PSI-Cardinalityによるセントラル差分プライベート等結合プロトコル, 千田 浩司; 紀伊 真昇; 三浦 尭之; 市川 敦謙; 山本 充子, 16 Jan. 2024, Summary national conference
iPWS Cup 2023参加を通じた匿名化の一検討, 千田 浩司; 岡嶋 佳歩, 16 Oct. 2023, Summary national conference
ベイジアンネットワークによる合成データ生成時のランダム性が持つ差分プライバシー性の評価, 三浦 尭之; 紀伊 真昇; 芝原 俊樹; 市川 敦謙; 山本 充子; 千田 浩司, 16 Oct. 2023, Summary national conference
ランダム化を用いた$k^m$-匿名性の拡張, 小林 雅弥; 藤岡 淳; 千田 浩司, 17 Jul. 2023, Summary national conference
健全な合成データ活用の促進に向けた取り組み, Koji Chida, Dec. 2023, 357, 12, 8, 13, Introduction scientific journal
On Rényi Differential Privacy in Statistics-Based Synthetic Data Generation, Takayuki Miura, Toshiki Shibahara, Masanobu Kii, Atsunori Ichikawa, Juko Yamamoto, Koji Chida, 31 Mar. 2023, arXiv, 2303, 17849
光暗号回路の提案とその動作検証, 高橋 順子; 北 翔太; 新家 昭彦; 青木 和麻呂; 千田 浩司; 星野 文学, 17 Jan. 2023, Summary national conference
光論理ゲートによるPRESENTの実装アルゴリズム, 青木 和麻呂; 高橋 順子; 千田 浩司; 星野 文学, 17 Jan. 2023, Summary national conference
確率的な反復処理を用いた2値行列データに対するk^m-匿名化手法, 小林 雅弥; 藤岡 淳; 佐々木 太良; 千田 浩司, 17 Jan. 2023, Summary national conference
組織横断的なパーソナルデータの結合に適したデータ連携手法の提案と評価, 野澤 一真; 長谷川 慶太; 紀伊 真昇; 市川 敦謙; 中川 智尋; 落合 桂一; 佐々木 一也; 千田 浩司; 寺田 雅之, 17 Oct. 2022, Summary national conference
TEEを用いたマリシャス安全な組織間データ連携手法の提案, 長谷川 慶太; 野澤 一真; 奥田 哲矢; 中川 智尋; 落合 桂一; 佐々木 一也; 千田 浩司; 寺田 雅之, 17 Oct. 2022, Summary national conference
シャッフルモデルにおける局所差分プライバシに基づく垂直分割データのプライバシ保護データ合成, 紀伊 真昇; 市川 敦謙; 三浦 尭之; 山本 充子; 千田 浩司, Summary national conference
合成データ生成のランダム性が持つRényi差分プライバシー性の評価, 三浦 尭之; 紀伊 真昇; 芝原 俊樹; 市川 敦謙; 山本 充子; 千田 浩司, 17 Oct. 2022, Summary national conference
プライバシー保護型合成データの実用動向と今後の展望, 千田浩司, 南和宏, 寺田雅之, 伊藤伸介, Aug. 2022, 73, 8, Introduction scientific journal
個人特定のリスクを低減させる匿名化技術, 千田浩司, May 2016, 61, 5, 307, 312, Introduction scientific journal
安全な情報処理を目指す秘密計算技術の研究動向と実用化に向けた取り組み, 千田浩司, Nov. 2013, 54, 11, 1130, 1134, Introduction scientific journal
データ合成技術評価委員会の立ち上げと取り組み, 千田 浩司, 情報処理学会 第86回全国大会 PWS Meetup 2024【企画セッション】, 16 Mar. 2024
データ合成技術評価委員会の活動について, 千田 浩司, 研究集会「大規模データの公開におけるプライバシー保護の理論と応用」, 07 Dec. 2023
データ合成の技術評価委員会について, 千田 浩司, PWS Meetup 2023, 17 Mar. 2023, 16 Mar. 2023, 17 Mar. 2023, Japanese, Japan, Domestic conference
プライバシ保護データ合成技術の実用化動向および関連研究, 千田浩司, 研究集会「大規模データの公開におけるプライバシー保護の理論と応用」, 08 Dec. 2022, 08 Dec. 2022, 09 Dec. 2022, Domestic conference
プライバシー保護型合成データの実用動向2022, 千田浩司, コンピュータセキュリティシンポジウム2022, 25 Oct. 2022, 24 Oct. 2022, 27 Oct. 2022, Domestic conference
プライバシー保護データ合成技術の実用化動向, 千田浩司, 2022年度 統計関連学会連合大会, 08 Sep. 2022, 04 Sep. 2022, 08 Sep. 2022, Japanese, Domestic conference
ビジネス分野における合成データの展開可能性, 千田浩司, コンピュータセキュリティシンポジウム2021, 28 Oct. 2021, 26 Oct. 2021, 29 Oct. 2021, Japanese, Domestic conference
データ活用セキュリティにおける基盤技術の展望, 千田浩司, Society 5.0システムソフトウエア 第2回, 29 Jun. 2020, 29 Jun. 2020, 29 Jun. 2020, Japanese, Domestic conference
秘密計算技術の各種アプローチと実用動向, 千田浩司, 2020年度 統計関連学会連合大会, 12 Sep. 2020, 08 Sep. 2020, 12 Sep. 2020, Japanese, Domestic conference
「第3回プライバシーワークショップ」開催報告, 千田浩司, 第37回医療情報学連合大会, 20 Nov. 2017, 23 Nov. 2017, Japanese, Domestic conference
公的統計のための秘密計算システムの実装:回帰分析による実用化のための実証分析, 千田浩司, 田中哲士, 菊池亮, 阿部穂日, 白川清美, 中央大学 経済研究所 公開研究会, 07 Jan. 2017, 07 Jan. 2017, 07 Jan. 2017, Japanese, Domestic conference
「第2回プライバシーワークショップ」開催報告, 千田浩司, 第36回医療情報学連合大会, 21 Nov. 2016, 24 Nov. 2016, Japanese, Domestic conference
パーソナルデータ利活用に関する制度見直しと保護技術, 千田浩司, 第19回先端的データベースとWeb技術動向研究会, Sep. 2016, Sep. 2016, Sep. 2016, Japanese, Domestic conference
パーソナルデータの行方, 千田浩司, 第35回医療情報学連合大会, 01 Nov. 2015, 04 Nov. 2015, Japanese, Domestic conference
秘密計算技術の実用化に向けた取り組み, 千田浩司, 第33回医療情報学連合大会, 21 Nov. 2013, 23 Nov. 2013, Japanese, Domestic conference
Tag-Based Secure Set-Intersection Protocol and Its Application to Privacy-Enhancing Biometrics, Koji Chida, Dai Ikarashi, Katsumi Takahashi, 13th International Conference on Network-Based Information Systems (NBiS2010), 14 Sep. 2010, 16 Sep. 2010, English, Takayama, Gifu, International conference
Efficient Multiparty Computation for Comparator Networks, Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota, 2nd International Conference on Availability, Reliability and Security (ARES2007), 10 Apr. 2007, 13 Apr. 2007, English, Vienna, Austria, International conference
Implementation and Application of Secure Circuit Evaluation Based on ElGamal Encryption, Koji Chida, Noburou Taniguchi, Go Yamamoto, Masato Okazaki, Osamu Shionoiri, Atsushi Kanai, Industrial Track, 4th International Conference on Applied Cryptography and Network Security (ACNS2006), 06 Jun. 2006, 09 Jun. 2006, English, Singapore, International conference