Skip to main content


United States

Archived content

NOTE: this is an archived page and the content is likely to be out of date.

Cryptography and Privacy

Cryptography & Privacy

Security is challenging as every new technology invites more attacks.
Systematic knowledge and global consensus have far more impact than ad-hoc approaches. 

Security and privacy of data are of paramount importance in today's world because of the proliferation of information and communication technology, cloud, and big data analytics. At Fujitsu, our goal is to perform cutting-edge research in securing data and preserving user privacy, while at the same time enabling innovative and meaningful data-intensive applications.

Our Cryptography and privacy research projects include, but are not limited to:

  • Cybersecurity standardization–for big data systems
  • Relational encryption–biometric authentication and privacy-preserving genomic analysis
  • Cryptocurrency–cryptography research for blockchains, and the Hyperledger project
  • Big-data privacy–privacy modeling and application of cryptography to privacy

Apart from conducting fundamental research, we also serve in leadership roles at standards institutions such as the National Institute of Standards and Technology (NIST), the Linux Foundation, and the Cloud Security Alliance (CSA) to develop consensus frameworks for security and privacy.


  1. Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy and Yuyu Wang, “Shorter QA-NIZK and SPS with Tight Security'', AsiaCrypt 2019.
  2. Navid Alamati, Hart Montgomery, and Sikhar Patranabis,” Symmetric Primitives with Structured Secret'‘, Crypto 2019.
  3. Navid Alamati, Hart Montgomery, Sikhar Patranabis and Arnab Roy,” Minicrypt Primitives with Algebraic Structure and Applications'‘, EuroCrypt 2019.
  4. Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo and Arnab Roy, "Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications", AsiaCrypt 2018.
  5. Charanjit S. Jutla and Arnab Roy, "Smooth NIZK Arguments", TCC 2018.
  6. Avradip Mandal, John C. Mitchell, Hart Montgomery and Arnab Roy, "Data Oblivious Genome Variants Search on Intel SGX", Data Privacy Management (DPM) 2018.
  7. Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy and David Wu, "Function-Hiding Inner Product Encryption is Practical", SCN 2018 and ArticCrypt 2016.
  8. Charanjit S. Jutla, Miyako Ohkubo and Arnab Roy, "Improved (Almost) Tightly-Secure Structure-Preserving Signatures", PKC 2018. Invited to Journal of Cryptology as the top scoring paper
  9. Avradip Mandal, John C. Mitchell, Hart Montgomery and Arnab Roy, "Privacy for Targeted Advertising", IEEE CNS-SPA 2017.
  10. Charanjit S. Jutla and Arnab Roy, "Improved structure preserving signatures under standard bilinear assumptions", PKC 2017.
  11. Boneh, D., Kin, S., and Montgomery, H., “Private Puncturable PRFs From Standard Lattice Assumptions,” Eurocrypt 2017.
  12. Jha, A., Nandi, M., and Mandal, A., “On the Exact Security of Message Authentication using Pseudorandom Functions,” FSE 2017.
  13. Jutla, C. and Roy, A., “Improved Structure Preserving Signature under Standard Bilinear Assumptions,” PKC 2017.
  14. Jutla, C. and Roy, A., "Dual-System Simulation-Soundness with Applications to UC-PAKE and More," ASIACRYPT 2015.
  15. Mandal, A. and Roy, A., "Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More,” CRYPTO 2015.
  16. Hartloff, J., Mandal, A., and Roy, A., "Privacy Preserving Technique for Set-Based Biometric Authentication using Reed-Solomon Decoding," IEEE BIOSIG 2015.
  17. Jutla, C. and Roy, A., "Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces," CRYPTO 2014.
  18. Mashima, D. and Roy, A., “Privacy preserving disclosure of authenticated energy usage data,” IEEE SmartGridComm 2014.
  19. Jutla, C. and Roy, A., "Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces," ASIACRYPT 2013 [Best Paper Award] and Journal of Cryptology.
  20. Jutla, C. and Roy, A., “Relatively-Sound NIZKs and Password-based Key-Exchange,” PKC2012.