Skip to main content

Showing 1–8 of 8 results for author: Banno, R

.
  1. arXiv:2405.16767  [pdf, other

    cs.CR cs.FL

    Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption

    Authors: Masaki Waga, Kotaro Matsuoka, Takashi Suwa, Naoki Matsumoto, Ryotaro Banno, Song Bian, Kohei Suenaga

    Abstract: When monitoring a cyber-physical system (CPS) from a remote server, kee** the monitored data secret is crucial, particularly when they contain sensitive information, e.g., biological or location data. Recently, Banno et al. (CAV'22) proposed a protocol for online LTL monitoring that keeps data concealed from the server using Fully Homomorphic Encryption (FHE). We build on this protocol to allow… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  2. arXiv:2206.03582  [pdf, other

    cs.CR cs.FL cs.LO

    Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption

    Authors: Ryotaro Banno, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga, Kohei Suenaga

    Abstract: In many Internet of Things (IoT) applications, data sensed by an IoT device are continuously sent to the server and monitored against a specification. Since the data often contain sensitive information, and the monitored specification is usually proprietary, both must be kept private from the other end. We propose a protocol to conduct oblivious online monitoring -- online monitoring conducted wit… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: This is the extended version of a paper to appear at CAV 2022

  3. arXiv:2106.04826  [pdf, other

    cs.PL cs.CR cs.SE

    Verification of a Merkle Patricia Tree Library Using F*

    Authors: Sota Sato, Ryotaro Banno, Jun Furuse, Kohei Suenaga, Atsushi Igarashi

    Abstract: A Merkle tree is a data structure for representing a key-value store as a tree. Each node of a Merkle tree is equipped with a hash value computed from those of their descendants. A Merkle tree is often used for representing a state of a blockchain system since it can be used for efficiently auditing the state in a trustless manner. Due to the safety-critical nature of blockchains, ensuring the cor… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    ACM Class: D.2.4; E.1

  4. arXiv:2010.09410  [pdf, other

    cs.CR

    Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE

    Authors: Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian

    Abstract: We present Virtual Secure Platform (VSP), the first comprehensive platform that implements a multi-opcode general-purpose sequential processor over Fully Homomorphic Encryption (FHE) for Secure Multi-Party Computation (SMPC). VSP protects both the data and functions on which the data are evaluated from the adversary in a secure computation offloading situation like cloud computing. We proposed a c… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Comments: Accepted in USENIX Security '21. This is a long version

  5. arXiv:2007.08066  [pdf, other

    cs.DC

    Trail: A Blockchain Architecture for Light Nodes

    Authors: Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo

    Abstract: In Bitcoin and Ethereum, nodes require large storage capacity to maintain all the blockchain data, such as transactions, UTXOs, and account states. As of May 2020, the storage size of the Bitcoin blockchain has expanded to 270 GB, and it will continue to increase. This storage requirement is a major hurdle to becoming a block proposer or validator. Although many studies have attempted to reduce th… ▽ More

    Submitted 15 July, 2020; originally announced July 2020.

    Comments: Proc. 25th IEEE Symposium on Computers and Communications (IEEE ISCC 2020)

  6. arXiv:1912.05208  [pdf, other

    cs.DC

    Identifying Impacts of Protocol and Internet Development on the Bitcoin Network

    Authors: Ryunosuke Nagayama, Kazuyuki Shudo, Ryohei Banno

    Abstract: Improving transaction throughput is an important challenge for Bitcoin. However, shortening the block generation interval or increasing the block size to improve throughput makes it sharing blocks within the network slower and increases the number of orphan blocks. Consequently, the security of the blockchain is sacrificed. To mitigate this, it is necessary to reduce the block propagation delay. B… ▽ More

    Submitted 3 June, 2020; v1 submitted 11 December, 2019; originally announced December 2019.

    Comments: Proc. 25th IEEE Symposium on Computers and Communications (IEEE ISCC 2020)

  7. arXiv:1903.01997  [pdf, other

    cs.LG stat.ML

    Implicit Regularization in Over-parameterized Neural Networks

    Authors: Masayoshi Kubo, Ryotaro Banno, Hidetaka Manabe, Masataka Minoji

    Abstract: Over-parameterized neural networks generalize well in practice without any explicit regularization. Although it has not been proven yet, empirical evidence suggests that implicit regularization plays a crucial role in deep learning and prevents the network from overfitting. In this work, we introduce the gradient gap deviation and the gradient deflection as statistical measures corresponding to th… ▽ More

    Submitted 5 March, 2019; originally announced March 2019.

  8. arXiv:1901.09777  [pdf, other

    cs.DC

    SimBlock: A Blockchain Network Simulator

    Authors: Yusuke Aoki, Kai Otsuki, Takeshi Kaneko, Ryohei Banno, Kazuyuki Shudo

    Abstract: Blockchain, which is a technology for distributedly managing ledger information over multiple nodes without a centralized system, has elicited increasing attention. Performing experiments on actual blockchains are difficult because a large number of nodes in wide areas are necessary. In this study, we developed a blockchain network simulator SimBlock for such experiments. Unlike the existing simul… ▽ More

    Submitted 19 March, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

    Comments: Proc. 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock 2019) (in conj. with INFOCOM 2019)