Research Support Office Research Advancement Division. Tokyo University of Agriculture and Technology
TEL | +81-42-367-5944 |
---|---|
FAX | +81-42-367-5946 |
Home > Tenured Faculties > Watanabe Shun
Watanabe Shun
Affiliation | Institute of Engineering |
---|---|
Division | Division of Advanced Information Technology and Computer Science |
Research field | Information Theory |
Keyword(S) | Information Theoretic Security, Multi-terminal Information Theory, Quantum Information |
Url | https://sites.google.com/site/shunwatanabeshomepage/ |
Research experience | ・Apr. 2007-Mar. 2009: Research Fellow, JSPS (DC1) |
---|---|
Educational background | ・2005 B.E., Information Engineering at Tokyo Institute of Technology |
Awards | * The latest information is shown at the member's website. ・2009: Yasujiro Niwa Outstanding Paper Award (Tokyo Denki University) |
Selected papers and publications | * The latest information is shown at the member's website. |
In our group, we study problems in information theory. We are particularly interested in problems related to cryptography and security. The development of the internet makes security an indispensable technology these days. While the most widely used security technology, public key cryptography, is based on computational complexity, information theoretic cryptography is attracting attention as an alternative security technology since the security is guaranteed even if an adversary's computational power is improved vastly in the future. However, to realize a system having information theoretic security, some resource, such as correlated signals observed by legitimate parties, is needed. We are interested in characterizing the fundamental limit of the efficiency to convert such a resource into a desired task. Some of our research achievement will be described below:
(1) Non-asymptotic Impossibility bounds on secret key agreement and secure computing
When legitimate parties want to communicate confidentially, they need to share a secret key in advance, and the secret key agreement problem is one of the most fundamental problem in cryptography. On the other hand, in secure computing, untrusted parties seek to compute a function without disclosing the value of their data, and this problem is also a fundamental problem in cryptography. In the literature, impossibility bounds for these problems are mainly investigated for asymptotic regimes. In our study, by reducing statistical hypothesis testing to these problems, secret key agreement and secure computing, we derived non-asymptotic impossibility bounds for these problems.
(2) The optimal use of randomness in wiretap channel
Wiretap channel is a model for secure communication where the signal sent by the legitimate sender may be wiretapped by an adversary. Typically in coding schemes for wiretap channel, we use a stochastic encoding to prevent the adversary from gaining information about the message. In the literature, the random number to realize the stochastic encoding was not considered. In our research, we considered the random number as a precious resource for the wiretap channel system, and we completely clarified the optimal coding scheme under rate limited randomness.
Managing my own group as a PI in the early stage of my career is really wonderful opportunity, and I really appreciate it. The startup funding and the reduction of administration jobs are also helpful for me to launch the group. I will strive to get tenure, and I would like to contribute to the university as much as possible.
Many problems studied in information theory are also studied by researchers in computer science from slightly different perspective, and it is very interesting to learn their approach. In the future, I would like to broaden my research perspective by interact with people not only in information theory community but also in other communities.