Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Junji Shikata
@article{DBLP:journals/ieiceta/YamashitaHWYS24, author = {Kyosuke Yamashita and Keisuke Hara and Yohei Watanabe and Naoto Yanai and Junji Shikata}, title = {Designated Verifier Signature with Claimability}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {107}, number = {3}, pages = {203--217}, year = {2024}, url = {https://doi.org/10.1587/transfun.2023cip0016}, doi = {10.1587/TRANSFUN.2023CIP0016}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/YamashitaHWYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MinematsuSWY23, author = {Kazuhiko Minematsu and Junji Shikata and Yohei Watanabe and Naoto Yanai}, title = {Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices}, journal = {{IEEE} Access}, volume = {11}, pages = {62955--62969}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3288337}, doi = {10.1109/ACCESS.2023.3288337}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MinematsuSWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kobayashi0MS23, author = {Hirokazu Kobayashi and Yohei Watanabe and Kazuhiko Minematsu and Junji Shikata}, title = {Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2523--2562}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01211-x}, doi = {10.1007/S10623-023-01211-X}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kobayashi0MS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/MatsumineOS23, author = {Toshiki Matsumine and Hideki Ochiai and Junji Shikata}, title = {A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret Key Generation From Wireless Channels}, journal = {{IEEE} Commun. Lett.}, volume = {27}, number = {12}, pages = {3166--3170}, year = {2023}, url = {https://doi.org/10.1109/LCOMM.2023.3323957}, doi = {10.1109/LCOMM.2023.3323957}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/MatsumineOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/WatanabeSS23, author = {Yohei Watanabe and Takenobu Seito and Junji Shikata}, title = {Multi-Designated Receiver Authentication Codes: Models and Constructions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {394--405}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022tap0015}, doi = {10.1587/TRANSFUN.2022TAP0015}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/WatanabeSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/NakaoYSTHTFTMSITITY23, author = {Koji Nakao and Katsunari Yoshioka and Takayuki Sasaki and Rui Tanabe and Xuping Huang and Takeshi Takahashi and Akira Fujita and Jun'ichi Takeuchi and Noboru Murata and Junji Shikata and Kazuki Iwamoto and Kazuki Takada and Yuki Ishida and Masaru Takeuchi and Naoto Yanai}, title = {Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {106}, number = {9}, pages = {1302--1315}, year = {2023}, url = {https://doi.org/10.1587/transinf.2022ici0001}, doi = {10.1587/TRANSINF.2022ICI0001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicetd/NakaoYSTHTFTMSITITY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CarnierLFS23, author = {Rodrigo Matos Carnier and Yue Li and Yasutaka Fujimoto and Junji Shikata}, title = {Exact Markov Chain of Random Propagation of Malware With Network-Level Mitigation}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {12}, pages = {10933--10947}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3240421}, doi = {10.1109/JIOT.2023.3240421}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CarnierLFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/YamashitaH0YS23, author = {Kyosuke Yamashita and Keisuke Hara and Yohei Watanabe and Naoto Yanai and Junji Shikata}, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Designated Verifier Signature with Claimability}, booktitle = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {21--32}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866.3593071}, doi = {10.1145/3591866.3593071}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/YamashitaH0YS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AonoS23, author = {Yoshinori Aono and Junji Shikata}, editor = {Jing Deng and Vladimir Kolesnikov and Alexander A. Schwarzmann}, title = {Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from {LWE}}, booktitle = {Cryptology and Network Security - 22nd International Conference, {CANS} 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14342}, pages = {28--50}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7563-1\_2}, doi = {10.1007/978-981-99-7563-1\_2}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AonoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/LiuWS23, author = {Yexuan Liu and Yohei Watanabe and Junji Shikata}, title = {Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency}, booktitle = {57th Annual Conference on Information Sciences and Systems, {CISS} 2023, Baltimore, MD, USA, March 22-24, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CISS56502.2023.10089760}, doi = {10.1109/CISS56502.2023.10089760}, timestamp = {Sat, 22 Apr 2023 16:25:53 +0200}, biburl = {https://dblp.org/rec/conf/ciss/LiuWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AdomnicaiMS23, author = {Alexandre Adomnicai and Kazuhiko Minematsu and Junji Shikata}, editor = {Mike Rosulek}, title = {Authenticated Encryption for Very Short Inputs}, booktitle = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13871}, pages = {553--572}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30872-7\_21}, doi = {10.1007/978-3-031-30872-7\_21}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AdomnicaiMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WatanabeYS23, author = {Yohei Watanabe and Naoto Yanai and Junji Shikata}, editor = {Weizhi Meng and Zheng Yan and Vincenzo Piuri}, title = {IoT-REX: {A} Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures}, booktitle = {Information Security Practice and Experience - 18th International Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14341}, pages = {105--122}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7032-2\_7}, doi = {10.1007/978-981-99-7032-2\_7}, timestamp = {Wed, 15 Nov 2023 10:18:14 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WatanabeYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChikuHS23, author = {Sohto Chiku and Keisuke Hara and Junji Shikata}, editor = {Weizhi Meng and Zheng Yan and Vincenzo Piuri}, title = {Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities}, booktitle = {Information Security Practice and Experience - 18th International Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14341}, pages = {299--314}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7032-2\_18}, doi = {10.1007/978-981-99-7032-2\_18}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ChikuHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/HiroseS23, author = {Shoichi Hirose and Junji Shikata}, title = {Group-Testing Aggregate Entity Authentication}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France, April 23-28, 2023}, pages = {227--231}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ITW55543.2023.10160240}, doi = {10.1109/ITW55543.2023.10160240}, timestamp = {Wed, 05 Jul 2023 16:00:01 +0200}, biburl = {https://dblp.org/rec/conf/itw/HiroseS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/ChenJSS23, author = {Jiawei Chen and Hyungrok Jo and Shingo Sato and Junji Shikata}, editor = {Thomas Johansson and Daniel Smith{-}Tone}, title = {A Tightly Secure Identity-Based Signature Scheme from Isogenies}, booktitle = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14154}, pages = {141--163}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40003-2\_6}, doi = {10.1007/978-3-031-40003-2\_6}, timestamp = {Mon, 14 Aug 2023 16:42:49 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/ChenJSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChikuHS23, author = {Sohto Chiku and Keisuke Hara and Junji Shikata}, editor = {Mingwu Zhang and Man Ho Au and Yudi Zhang}, title = {Identity-Based Matchmaking Encryption Secure Against Key Generation Center}, booktitle = {Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14217}, pages = {251--273}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45513-1\_14}, doi = {10.1007/978-3-031-45513-1\_14}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ChikuHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rws/HamaHOS23, author = {Yuto Hama and Kazuaki Hanazawa and Hideki Ochiai and Junji Shikata}, title = {Performance Analysis for Coded Wireless Steganography System with {OFDM} Signaling}, booktitle = {{IEEE} Radio and Wireless Symposium, {RWS} 2023, Las Vegas, NV, USA, January 22-25, 2023}, pages = {7--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RWS55624.2023.10046336}, doi = {10.1109/RWS55624.2023.10046336}, timestamp = {Wed, 01 Mar 2023 21:14:40 +0100}, biburl = {https://dblp.org/rec/conf/rws/HamaHOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JoS23, author = {Hyungrok Jo and Junji Shikata}, editor = {Howon Kim and Jonghee M. Youn}, title = {Bloomier Filters on 3-Hypergraphs}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {16--26}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_2}, doi = {10.1007/978-981-99-8024-6\_2}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/wisa/JoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2023, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1}, doi = {10.1007/978-3-031-41326-1}, isbn = {978-3-031-41325-4}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoS23, author = {Yoshinori Aono and Junji Shikata}, title = {Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from {DLP} or {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2023}, url = {https://eprint.iacr.org/2023/351}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiMS23, author = {Alexandre Adomnicai and Kazuhiko Minematsu and Junji Shikata}, title = {Authenticated Encryption for Very Short Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2023}, url = {https://eprint.iacr.org/2023/361}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoSS23, author = {Hyungrok Jo and Shingo Sato and Junji Shikata}, title = {A Tightly Secure Identity-based Signature Scheme from Isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2023}, url = {https://eprint.iacr.org/2023/426}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoS23, author = {Shingo Sato and Junji Shikata}, title = {Compact Bounded-Collusion Identity-based Encryption via Group Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2023}, url = {https://eprint.iacr.org/2023/444}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SatoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TomitaS23, author = {Toi Tomita and Junji Shikata}, title = {Compact Signature Aggregation from Module-Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2023}, url = {https://eprint.iacr.org/2023/471}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TomitaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChikuHHS23, author = {Sohto Chiku and Keitaro Hashimoto and Keisuke Hara and Junji Shikata}, title = {Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1435}, year = {2023}, url = {https://eprint.iacr.org/2023/1435}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChikuHHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MatsumineOS22, author = {Toshiki Matsumine and Hideki Ochiai and Junji Shikata}, title = {Security Gap Improvement of {BICM} Systems Through Bit-Labeling Optimization for the Gaussian Wiretap Channel}, journal = {{IEEE} Access}, volume = {10}, pages = {47805--47813}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3172481}, doi = {10.1109/ACCESS.2022.3172481}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MatsumineOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SatoS22, author = {Shingo Sato and Junji Shikata}, editor = {Leonard Barolli and Farookh Hussain and Tomoya Enokido}, title = {Quantum-Secure Aggregate One-time Signatures with Detecting Functionality}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {450}, pages = {573--585}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99587-4\_49}, doi = {10.1007/978-3-030-99587-4\_49}, timestamp = {Thu, 31 Mar 2022 15:30:21 +0200}, biburl = {https://dblp.org/rec/conf/aina/SatoS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/SeitoSW22, author = {Takenobu Seito and Junji Shikata and Yohei Watanabe}, title = {Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security}, booktitle = {56th Annual Conference on Information Sciences and Systems, {CISS} 2022, Princeton, NJ, USA, March 9-11, 2022}, pages = {84--89}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CISS53076.2022.9751164}, doi = {10.1109/CISS53076.2022.9751164}, timestamp = {Fri, 22 Apr 2022 19:18:39 +0200}, biburl = {https://dblp.org/rec/conf/ciss/SeitoSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SatoSM22, author = {Shingo Sato and Junji Shikata and Tsutomu Matsumoto}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Group Testing Aggregate Signatures with Soundness}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {363--381}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_18}, doi = {10.1007/978-3-031-29371-9\_18}, timestamp = {Thu, 06 Apr 2023 10:01:46 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SatoSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SatoS22, author = {Shingo Sato and Junji Shikata}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Identity-based Interactive Aggregate Signatures from Lattices}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {408--432}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_20}, doi = {10.1007/978-3-031-29371-9\_20}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SatoS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2022-1, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2}, doi = {10.1007/978-3-030-97121-2}, isbn = {978-3-030-97120-5}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2022-2, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1}, doi = {10.1007/978-3-030-97131-1}, isbn = {978-3-030-97130-4}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-03781, author = {Yohei Watanabe and Naoto Yanai and Junji Shikata}, title = {IoT-REX: {A} Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures}, journal = {CoRR}, volume = {abs/2208.03781}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.03781}, doi = {10.48550/ARXIV.2208.03781}, eprinttype = {arXiv}, eprint = {2208.03781}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-03781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoS22, author = {Shingo Sato and Junji Shikata}, title = {Quantum-Secure Aggregate One-time Signatures with Detecting Functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2022}, url = {https://eprint.iacr.org/2022/272}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SatoS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoS22a, author = {Shingo Sato and Junji Shikata}, title = {{SO-CCA} Secure {PKE} in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2022}, url = {https://eprint.iacr.org/2022/617}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SatoS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/0001YS21, author = {Yohei Watanabe and Naoto Yanai and Junji Shikata}, editor = {Leonard Barolli and Isaac Woungang and Tomoya Enokido}, title = {Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {226}, pages = {679--690}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75075-6\_56}, doi = {10.1007/978-3-030-75075-6\_56}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/0001YS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EbinaMSW21, author = {Masahiro Ebina and Jumpei Mita and Junji Shikata and Yohei Watanabe}, editor = {Keita Emura and Yuntao Wang}, title = {Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {23--32}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458296}, doi = {10.1145/3457338.3458296}, timestamp = {Wed, 16 Jun 2021 07:21:06 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EbinaMSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KobayashiWS21, author = {Hirokazu Kobayashi and Yohei Watanabe and Junji Shikata}, editor = {Maura B. Paterson}, title = {Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication}, booktitle = {Cryptography and Coding - 18th {IMA} International Conference, {IMACC} 2021, Virtual Event, December 14-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13129}, pages = {105--128}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92641-0\_6}, doi = {10.1007/978-3-030-92641-0\_6}, timestamp = {Tue, 28 Dec 2021 15:25:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/KobayashiWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpmc/HamaOS21, author = {Yuto Hama and Hideki Ochiai and Junji Shikata}, title = {Performance Analysis of Wireless Steganography based on {OFDM} and DFT-s-OFDM Signals over Frequency-Selective Rayleigh Fading Channels}, booktitle = {24th International Symposium on Wireless Personal Multimedia Communications, {WPMC} 2021, Okayama, Japan, December 14-16, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WPMC52694.2021.9700466}, doi = {10.1109/WPMC52694.2021.9700466}, timestamp = {Mon, 14 Feb 2022 08:36:46 +0100}, biburl = {https://dblp.org/rec/conf/wpmc/HamaOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HiroseS20, author = {Shoichi Hirose and Junji Shikata}, title = {Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing}, journal = {{IEEE} Access}, volume = {8}, pages = {216116--216126}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3041638}, doi = {10.1109/ACCESS.2020.3041638}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HiroseS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/OgawaSSI20, author = {Yoshinori Ogawa and Shingo Sato and Junji Shikata and Hideki Imai}, title = {Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2020, Los Angeles, CA, USA, June 21-26, 2020}, pages = {868--873}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISIT44484.2020.9174346}, doi = {10.1109/ISIT44484.2020.9174346}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/OgawaSSI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/IdaS020, author = {Junichi Ida and Junji Shikata and Yohei Watanabe}, title = {On the Power of Interaction in Signcryption}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {348--352}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366140}, timestamp = {Mon, 22 Mar 2021 15:48:59 +0100}, biburl = {https://dblp.org/rec/conf/isita/IdaS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/YamaguchiOS20, author = {Ryohei Yamaguchi and Hideki Ochiai and Junji Shikata}, title = {A Physical-Layer Security Based on Wireless Steganography Through {OFDM} and DFT-Precoded {OFDM} Signals}, booktitle = {91st {IEEE} Vehicular Technology Conference, {VTC} Spring 2020, Antwerp, Belgium, May 25-28, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VTC2020-Spring48590.2020.9129376}, doi = {10.1109/VTC2020-SPRING48590.2020.9129376}, timestamp = {Wed, 15 Jul 2020 15:28:22 +0200}, biburl = {https://dblp.org/rec/conf/vtc/YamaguchiOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoS20, author = {Shingo Sato and Junji Shikata}, title = {Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2020}, url = {https://eprint.iacr.org/2020/1218}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SatoS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoSM20, author = {Shingo Sato and Junji Shikata and Tsutomu Matsumoto}, title = {Aggregate Signature with Detecting Functionality from Group Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1219}, year = {2020}, url = {https://eprint.iacr.org/2020/1219}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SatoSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShikataW19, author = {Junji Shikata and Yohei Watanabe}, title = {Identity-based encryption with hierarchical key-insulation in the standard model}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1005--1033}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0503-4}, doi = {10.1007/S10623-018-0503-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShikataW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SatoHS19, author = {Shingo Sato and Shoichi Hirose and Junji Shikata}, title = {Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality}, journal = {J. Internet Serv. Inf. Secur.}, volume = {9}, number = {1}, pages = {2--23}, year = {2019}, url = {https://doi.org/10.22667/JISIS.2019.02.28.002}, doi = {10.22667/JISIS.2019.02.28.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SatoHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SatoS19, author = {Shingo Sato and Junji Shikata}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido}, title = {Interactive Aggregate Message Authentication Scheme with Detecting Functionality}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications, {AINA} 2019, Matsue, Japan, March 27-29, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {926}, pages = {1316--1328}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15032-7\_110}, doi = {10.1007/978-3-030-15032-7\_110}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/SatoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/HiroseS19, author = {Shoichi Hirose and Junji Shikata}, title = {Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate {MAC} Scheme}, booktitle = {Seventh International Symposium on Computing and Networking Workshops, {CANDAR} 2019 Workshops, Nagasaki, Japan, November 26-29, 2019}, pages = {327--332}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CANDARW.2019.00064}, doi = {10.1109/CANDARW.2019.00064}, timestamp = {Tue, 04 Feb 2020 15:59:02 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/HiroseS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SatoS19, author = {Shingo Sato and Junji Shikata}, editor = {Martin Albrecht}, title = {Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {295--316}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_15}, doi = {10.1007/978-3-030-35199-1\_15}, timestamp = {Fri, 15 Dec 2023 20:21:14 +0100}, biburl = {https://dblp.org/rec/conf/ima/SatoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SatoS19a, author = {Shingo Sato and Junji Shikata}, editor = {Martin Albrecht}, title = {{SO-CCA} Secure {PKE} in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {317--341}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_16}, doi = {10.1007/978-3-030-35199-1\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/SatoS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SatoHS19, author = {Shingo Sato and Shoichi Hirose and Junji Shikata}, editor = {Joseph K. Liu and Xinyi Huang}, title = {Sequential Aggregate MACs with Detecting Functionality Revisited}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {387--407}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_23}, doi = {10.1007/978-3-030-36938-5\_23}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/SatoHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HiroseS19, author = {Shoichi Hirose and Junji Shikata}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {History-Free Sequential Aggregate {MAC} Revisited}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {77--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_5}, doi = {10.1007/978-3-030-31919-9\_5}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/HiroseS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WatanabeS18, author = {Yohei Watanabe and Junji Shikata}, title = {Timed-release computational secret sharing and threshold encryption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {17--54}, year = {2018}, url = {https://doi.org/10.1007/s10623-016-0324-2}, doi = {10.1007/S10623-016-0324-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WatanabeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/Prasitsupparote18, author = {Amonrat Prasitsupparote and Norio Konno and Junji Shikata}, title = {Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences}, journal = {Entropy}, volume = {20}, number = {10}, pages = {729}, year = {2018}, url = {https://doi.org/10.3390/e20100729}, doi = {10.3390/E20100729}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/Prasitsupparote18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/IwamotoOS18, author = {Mitsugu Iwamoto and Kazuo Ohta and Junji Shikata}, title = {Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {1}, pages = {654--685}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2744650}, doi = {10.1109/TIT.2017.2744650}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/IwamotoOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AonoNSS18, author = {Yoshinori Aono and Phong Q. Nguyen and Takenobu Seito and Junji Shikata}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Lower Bounds on Lattice Enumeration with Extreme Pruning}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {608--637}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_21}, doi = {10.1007/978-3-319-96881-0\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AonoNSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HiroseS18, author = {Shoichi Hirose and Junji Shikata}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Non-adaptive Group-Testing Aggregate {MAC} Scheme}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {357--372}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_22}, doi = {10.1007/978-3-319-99807-7\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/HiroseS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/SatoS18, author = {Shingo Sato and Junji Shikata}, editor = {Tanja Lange and Rainer Steinwandt}, title = {Lattice-Based Signcryption Without Random Oracles}, booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10786}, pages = {331--351}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-79063-3\_16}, doi = {10.1007/978-3-319-79063-3\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/SatoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SatoHS18, author = {Shingo Sato and Shoichi Hirose and Junji Shikata}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Generic Construction of Sequential Aggregate MACs from Any MACs}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {295--312}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_17}, doi = {10.1007/978-3-030-01446-9\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SatoHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SatoS18, author = {Shingo Sato and Junji Shikata}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Signcryption with Quantum Random Oracles}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {406--414}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_24}, doi = {10.1007/978-3-030-01446-9\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SatoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiroseS18, author = {Shoichi Hirose and Junji Shikata}, title = {Non-adaptive Group-Testing Aggregate {MAC} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2018}, url = {https://eprint.iacr.org/2018/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HiroseS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoNSS18, author = {Yoshinori Aono and Phong Q. Nguyen and Takenobu Seito and Junji Shikata}, title = {Lower Bounds on Lattice Enumeration with Extreme Pruning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2018}, url = {https://eprint.iacr.org/2018/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoNSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/IshidaSW17, author = {Yuu Ishida and Junji Shikata and Yohei Watanabe}, title = {CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {288--311}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007294}, doi = {10.1504/IJACT.2017.10007294}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/IshidaSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/Prasitsupparote17, author = {Amonrat Prasitsupparote and Norio Konno and Junji Shikata}, title = {Numerical analysis of Elias's and Peres's deterministic extractors}, booktitle = {51st Annual Conference on Information Sciences and Systems, {CISS} 2017, Baltimore, MD, USA, March 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISS.2017.7926129}, doi = {10.1109/CISS.2017.7926129}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/Prasitsupparote17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/Yoshizawa0S17, author = {Takahiro Yoshizawa and Yohei Watanabe and Junji Shikata}, title = {Unconditionally secure searchable encryption}, booktitle = {51st Annual Conference on Information Sciences and Systems, {CISS} 2017, Baltimore, MD, USA, March 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISS.2017.7926154}, doi = {10.1109/CISS.2017.7926154}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/Yoshizawa0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Shikata17, author = {Junji Shikata}, title = {Tighter bounds on entropy of secret keys in authentication codes}, booktitle = {2017 {IEEE} Information Theory Workshop, {ITW} 2017, Kaohsiung, Taiwan, November 6-10, 2017}, pages = {259--263}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ITW.2017.8278016}, doi = {10.1109/ITW.2017.8278016}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/Shikata17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2017, editor = {Junji Shikata}, title = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0}, doi = {10.1007/978-3-319-72089-0}, isbn = {978-3-319-72088-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/0001S16, author = {Yohei Watanabe and Junji Shikata}, title = {Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {6}, pages = {1097--1106}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1097}, doi = {10.1587/TRANSFUN.E99.A.1097}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/0001S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/0001S16, author = {Yohei Watanabe and Junji Shikata}, title = {Information-theoretically Secure Timed-release Secret Sharing Schemes}, journal = {J. Inf. Process.}, volume = {24}, number = {4}, pages = {680--689}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.680}, doi = {10.2197/IPSJJIP.24.680}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/0001S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/TomitaWS16, author = {Shinichiro Tomita and Yohei Watanabe and Junji Shikata}, title = {Sequential aggregate authentication codes with information theoretic security}, booktitle = {2016 Annual Conference on Information Science and Systems, {CISS} 2016, Princeton, NJ, USA, March 16-18, 2016}, pages = {192--197}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CISS.2016.7460500}, doi = {10.1109/CISS.2016.7460500}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/TomitaWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/0001HS16, author = {Yohei Watanabe and Goichiro Hanaoka and Junji Shikata}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {213--237}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_11}, doi = {10.1007/978-3-319-49175-2\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/0001HS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WatanabeS16, author = {Yohei Watanabe and Junji Shikata}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {255--279}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_10}, doi = {10.1007/978-3-662-49384-7\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WatanabeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeHS16, author = {Yohei Watanabe and Goichiro Hanaoka and Junji Shikata}, title = {Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2016}, url = {http://eprint.iacr.org/2016/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Shikata15, author = {Junji Shikata}, title = {Trends and Development of Information-Theoretic Cryptography}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {16--25}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.16}, doi = {10.1587/TRANSFUN.E98.A.16}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Shikata15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshidaWS15, author = {Yuu Ishida and Yohei Watanabe and Junji Shikata}, editor = {Ernest Foo and Douglas Stebila}, title = {Constructions of CCA-Secure Revocable Identity-Based Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {174--191}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_11}, doi = {10.1007/978-3-319-19962-7\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshidaWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SuYSM15, author = {Jiawei Su and Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, editor = {Soonhak Kwon and Aaram Yun}, title = {Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {278--293}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_18}, doi = {10.1007/978-3-319-30840-1\_18}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SuYSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GotoS15, author = {Shota Goto and Junji Shikata}, editor = {Jens Groth}, title = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {133--151}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_8}, doi = {10.1007/978-3-319-27239-9\_8}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/GotoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/IwamotoS15, author = {Mitsugu Iwamoto and Junji Shikata}, title = {Constructions of symmetric-key encryption with guessing secrecy}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {725--729}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282550}, doi = {10.1109/ISIT.2015.7282550}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/IwamotoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WatanabeS15, author = {Yohei Watanabe and Junji Shikata}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {489--502}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_27}, doi = {10.1007/978-3-319-26059-4\_27}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WatanabeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shikata15, author = {Junji Shikata}, title = {Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2015}, url = {http://eprint.iacr.org/2015/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shikata15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GotoS15, author = {Shota Goto and Junji Shikata}, title = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {950}, year = {2015}, url = {http://eprint.iacr.org/2015/950}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GotoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeS15, author = {Yohei Watanabe and Junji Shikata}, title = {Identity-based Hierarchical Key-insulated Encryption without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1254}, year = {2015}, url = {http://eprint.iacr.org/2015/1254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balkancryptsec/WatanabeS14, author = {Yohei Watanabe and Junji Shikata}, editor = {Berna {\"{O}}rs and Bart Preneel}, title = {Timed-Release Secret Sharing Schemes with Information Theoretic Security}, booktitle = {Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9024}, pages = {219--236}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21356-9\_15}, doi = {10.1007/978-3-319-21356-9\_15}, timestamp = {Tue, 16 Nov 2021 09:08:54 +0100}, biburl = {https://dblp.org/rec/conf/balkancryptsec/WatanabeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/IwamotoS14, author = {Mitsugu Iwamoto and Junji Shikata}, title = {Secret sharing schemes based on min-entropies}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {401--405}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6874863}, doi = {10.1109/ISIT.2014.6874863}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/IwamotoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WatanabeS14, author = {Yohei Watanabe and Junji Shikata}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Timed-Release Computational Secret Sharing Scheme and Its Applications}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {326--333}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_24}, doi = {10.1007/978-3-319-12475-9\_24}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WatanabeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WatanabeS14, author = {Yohei Watanabe and Junji Shikata}, title = {Timed-Release Secret Sharing Scheme with Information Theoretic Security}, journal = {CoRR}, volume = {abs/1401.5895}, year = {2014}, url = {http://arxiv.org/abs/1401.5895}, eprinttype = {arXiv}, eprint = {1401.5895}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WatanabeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IwamotoS14, author = {Mitsugu Iwamoto and Junji Shikata}, title = {Secret Sharing Schemes Based on Min-Entropies}, journal = {CoRR}, volume = {abs/1401.5896}, year = {2014}, url = {http://arxiv.org/abs/1401.5896}, eprinttype = {arXiv}, eprint = {1401.5896}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/IwamotoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IwamotoOS14, author = {Mitsugu Iwamoto and Kazuo Ohta and Junji Shikata}, title = {Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography}, journal = {CoRR}, volume = {abs/1410.1120}, year = {2014}, url = {http://arxiv.org/abs/1410.1120}, eprinttype = {arXiv}, eprint = {1410.1120}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/IwamotoOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KubaiSW13, author = {Asato Kubai and Junji Shikata and Yohei Watanabe}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {16--28}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_2}, doi = {10.1007/978-3-642-40588-4\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KubaiSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HajimeWS13, author = {Shogo Hajime and Yohei Watanabe and Junji Shikata}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Information-Theoretically Secure Entity Authentication in the Multi-user Setting}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {400--417}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_24}, doi = {10.1007/978-3-319-12160-4\_24}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HajimeWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/IwamotoS13, author = {Mitsugu Iwamoto and Junji Shikata}, editor = {Carles Padr{\'{o}}}, title = {Information Theoretic Security for Encryption Based on Conditional R{\'{e}}nyi Entropies}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {103--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_7}, doi = {10.1007/978-3-319-04268-8\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/IwamotoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/NakanoS13, author = {Rintaro Nakano and Junji Shikata}, editor = {Martijn Stam}, title = {Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {324--343}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_19}, doi = {10.1007/978-3-642-45239-0\_19}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/NakanoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Shikata13, author = {Junji Shikata}, title = {Formalization of information-theoretic security for key agreement, revisited}, booktitle = {Proceedings of the 2013 {IEEE} International Symposium on Information Theory, Istanbul, Turkey, July 7-12, 2013}, pages = {2720--2724}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISIT.2013.6620721}, doi = {10.1109/ISIT.2013.6620721}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/Shikata13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwamotoS13, author = {Mitsugu Iwamoto and Junji Shikata}, title = {Information Theoretic Security for Encryption Based on Conditional Renyi Entropies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2013}, url = {http://eprint.iacr.org/2013/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwamotoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WatanabeSS12, author = {Yohei Watanabe and Takenobu Seito and Junji Shikata}, editor = {Adam D. Smith}, title = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {167--186}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_10}, doi = {10.1007/978-3-642-32284-6\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/WatanabeSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/FujiiYSM12, author = {Takayoshi Fujii and Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, title = {An Efficient Dynamic Detection Method for Various x86 Shellcodes}, booktitle = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet, {SAINT} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {284--289}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SAINT.2012.52}, doi = {10.1109/SAINT.2012.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/FujiiYSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shikata12, author = {Junji Shikata}, title = {Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2012}, url = {http://eprint.iacr.org/2012/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shikata12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeSS12, author = {Yohei Watanabe and Takenobu Seito and Junji Shikata}, title = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2012}, url = {http://eprint.iacr.org/2012/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimOYISESMN11, author = {Hyung Chan Kim and Tatsunori Orii and Katsunari Yoshioka and Daisuke Inoue and Jungsuk Song and Masashi Eto and Junji Shikata and Tsutomu Matsumoto and Koji Nakao}, title = {An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {9}, pages = {1778--1791}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.1778}, doi = {10.1587/TRANSINF.E94.D.1778}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimOYISESMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ShikataY11, author = {Junji Shikata and Daisuke Yamanaka}, editor = {Liqun Chen}, title = {Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {112--131}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_8}, doi = {10.1007/978-3-642-25516-8\_8}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/ShikataY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ShibuyaS11, author = {Yuki Shibuya and Junji Shikata}, editor = {Liqun Chen}, title = {Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {210--229}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_13}, doi = {10.1007/978-3-642-25516-8\_13}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/ShibuyaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/SeitoS11, author = {Takenobu Seito and Junji Shikata}, title = {Information-theoretically secure key-insulated key-agreement}, booktitle = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil, October 16-20, 2011}, pages = {287--291}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ITW.2011.6089438}, doi = {10.1109/ITW.2011.6089438}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/SeitoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MuramatsuISO10, author = {Daigo Muramatsu and Manabu Inuma and Junji Shikata and Akira Otsuka}, title = {Enhanced Cancelable Biometrics for Online Signature Verification}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {6}, pages = {1254--1259}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1254}, doi = {10.1587/TRANSFUN.E93.A.1254}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MuramatsuISO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SeitoASM10, author = {Takenobu Seito and Tadashi Aikawa and Junji Shikata and Tsutomu Matsumoto}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {148--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_10}, doi = {10.1007/978-3-642-12678-9\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SeitoASM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SeitoHSM09, author = {Takenobu Seito and Yuki Hara and Junji Shikata and Tsutomu Matsumoto}, title = {Unconditionally Secure Group Signatures}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {2067--2085}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.2067}, doi = {10.1587/TRANSFUN.E92.A.2067}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SeitoHSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psec/HaraISM09, author = {Yuki Hara and Taiki Ishiwata and Junji Shikata and Tsutomu Matsumoto}, editor = {V{\'{e}}ronique Cortier and Claude Kirchner and Mitsuhiro Okada and Hideki Sakurada}, title = {Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment}, booktitle = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration}, series = {Lecture Notes in Computer Science}, volume = {5458}, pages = {116--137}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02002-5\_7}, doi = {10.1007/978-3-642-02002-5\_7}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/psec/HaraISM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/KorzhikISMG08, author = {Valery I. Korzhik and Hideki Imai and Junji Shikata and Guillermo Morales{-}Luna and Ekaterina Gerling}, title = {On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {3}, pages = {23--32}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69019-1\_2}, doi = {10.1007/978-3-540-69019-1\_2}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/KorzhikISMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ShikataM08, author = {Junji Shikata and Tsutomu Matsumoto}, title = {Unconditionally Secure Steganography Against Active Attacks}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2690--2705}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921884}, doi = {10.1109/TIT.2008.921884}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ShikataM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshiharaAHS07, author = {Takeru Ishihara and Hiroshi Aono and Sadayuki Hongo and Junji Shikata}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold {KEM}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {259--273}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_20}, doi = {10.1007/978-3-540-73458-1\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshiharaAHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HaraSSM07, author = {Yuki Hara and Takenobu Seito and Junji Shikata and Tsutomu Matsumoto}, editor = {Yvo Desmedt}, title = {Unconditionally Secure Blind Signatures}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {23--43}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_2}, doi = {10.1007/978-3-642-10230-1\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/HaraSSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Shikata07, author = {Junji Shikata}, editor = {Yvo Desmedt}, title = {Construction Methodology of Unconditionally Secure Signature Schemes}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {113--114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_9}, doi = {10.1007/978-3-642-10230-1\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Shikata07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HanaokaSHI06, author = {Goichiro Hanaoka and Junji Shikata and Yumiko Hanaoka and Hideki Imai}, title = {Unconditionally Secure Anonymous Encryption and Group Authentication}, journal = {Comput. J.}, volume = {49}, number = {3}, pages = {310--321}, year = {2006}, url = {https://doi.org/10.1093/comjnl/bxh149}, doi = {10.1093/COMJNL/BXH149}, timestamp = {Fri, 15 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HanaokaSHI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshiokaSM05, author = {Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, title = {On Collusion Security of Random Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {296--304}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_296\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshiokaSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HanaokaHSI05, author = {Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, editor = {Bimal K. Roy}, title = {Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {495--514}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_27}, doi = {10.1007/11593447\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HanaokaHSI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/MatsumotoS05, author = {Tsutomu Matsumoto and Junji Shikata}, title = {Authenticated encryption and steganography in unconditional security setting}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {1--6}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543946}, doi = {10.1109/ITWTPI.2005.1543946}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/MatsumotoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanaokaSZI04, author = {Goichiro Hanaoka and Junji Shikata and Yuliang Zheng and Hideki Imai}, title = {Efficient Unconditionally Secure Digital Signatures}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {120--130}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_120\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/HanaokaSZI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhangHSI04, author = {Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {360--374}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_26}, doi = {10.1007/978-3-540-24632-9\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhangHSI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaHSI04, author = {Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, title = {Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2004}, url = {http://eprint.iacr.org/2004/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaHSI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/KimSMI03, author = {Mira Kim and Junji Shikata and Hirofumi Muratani and Hideki Imai}, title = {Constructing \emph{c}-Secure {CRT} Codes Using Polynomials over Finite Fields}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {12}, pages = {3259--3266}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_12\_3259}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/KimSMI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YoshiokaSM03, author = {Katsunari Yoshioka and Junji Shikata and Tsutomu Matsumoto}, editor = {Colin Boyd and Wenbo Mao}, title = {Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {408--421}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_31}, doi = {10.1007/10958513\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/YoshiokaSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HanaokaSHI03, author = {Goichiro Hanaoka and Junji Shikata and Yumiko Hanaoka and Hideki Imai}, editor = {Colin Boyd and Wenbo Mao}, title = {The Role of Arbiters in Asymmetric Authentication Schemes}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {428--441}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_33}, doi = {10.1007/10958513\_33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/HanaokaSHI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WatanabeSI03, author = {Yodai Watanabe and Junji Shikata and Hideki Imai}, editor = {Yvo Desmedt}, title = {Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {71--84}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_6}, doi = {10.1007/3-540-36288-6\_6}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WatanabeSI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeS03, author = {Yodai Watanabe and Junji Shikata}, title = {Relation among simulator-based and comparison-based definitions of semantic security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2003}, url = {http://eprint.iacr.org/2003/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002HSI03, author = {Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, title = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2003}, url = {http://eprint.iacr.org/2003/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002HSI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OtsukaHSI02, author = {Akira Otsuka and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, title = {An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {1}, pages = {140--148}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_140}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OtsukaHSI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/HanaokaSZI02, author = {Goichiro Hanaoka and Junji Shikata and Yuliang Zheng and Hideki Imai}, title = {A Traitor Traceable Conference System with Dynamic Sender}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {1}, pages = {167--174}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_167}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/HanaokaSZI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HanaokaSHI02, author = {Goichiro Hanaoka and Junji Shikata and Yumiko Hanaoka and Hideki Imai}, editor = {Yuliang Zheng}, title = {Unconditionally Secure Anonymous Encryption and Group Authentication}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {81--99}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_5}, doi = {10.1007/3-540-36178-2\_5}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HanaokaSHI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShikataHZI02, author = {Junji Shikata and Goichiro Hanaoka and Yuliang Zheng and Hideki Imai}, editor = {Lars R. Knudsen}, title = {Security Notions for Unconditionally Secure Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {434--449}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_29}, doi = {10.1007/3-540-46035-7\_29}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShikataHZI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HanaokaHSI02, author = {Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {85--96}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_8}, doi = {10.1007/3-540-36159-6\_8}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/HanaokaHSI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YonezawaHSI02, author = {Shoko Yonezawa and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {Traceability Schemes for Signed Documents}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {257--271}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_20}, doi = {10.1007/3-540-45811-5\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/YonezawaHSI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/ImaiHSON02, author = {Hideki Imai and Goichiro Hanaoka and Junji Shikata and Akira Otsuka and Anderson C. A. Nascimento}, title = {Cryptography with information theoretic security}, booktitle = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW} 2002, 20-25 October 2002, Bangalore, India}, pages = {73}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ITW.2002.1115419}, doi = {10.1109/ITW.2002.1115419}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/ImaiHSON02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HanaokaSZI02, author = {Goichiro Hanaoka and Junji Shikata and Yuliang Zheng and Hideki Imai}, editor = {David Naccache and Pascal Paillier}, title = {Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {64--79}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_5}, doi = {10.1007/3-540-45664-3\_5}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HanaokaSZI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeSI02, author = {Yodai Watanabe and Junji Shikata and Hideki Imai}, title = {Equivalence between semantic security and indistinguishability against chosen ciphertext attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2002}, url = {http://eprint.iacr.org/2002/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeSI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HanaokaSZI00, author = {Goichiro Hanaoka and Junji Shikata and Yuliang Zheng and Hideki Imai}, editor = {Tatsuaki Okamoto}, title = {Unconditionally Secure Digital Signature Schemes Admitting Transferability}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {130--142}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_11}, doi = {10.1007/3-540-44448-3\_11}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HanaokaSZI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShikataZSI99, author = {Junji Shikata and Yuliang Zheng and Joe Suzuki and Hideki Imai}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Optimizing the Menezes-Okamoto-Vanstone {(MOV)} Algorithm for Non-supersingular Elliptic Curves}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {86--102}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_9}, doi = {10.1007/978-3-540-48000-6\_9}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShikataZSI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HarasawaSSI99, author = {Ryuichi Harasawa and Junji Shikata and Joe Suzuki and Hideki Imai}, editor = {Jacques Stern}, title = {Comparing the {MOV} and {FR} Reductions in Elliptic Curve Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {190--205}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_14}, doi = {10.1007/3-540-48910-X\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HarasawaSSI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.