BibTeX records: Junji Shikata

download as .bib file

@article{DBLP:journals/ieiceta/YamashitaHWYS24,
  author       = {Kyosuke Yamashita and
                  Keisuke Hara and
                  Yohei Watanabe and
                  Naoto Yanai and
                  Junji Shikata},
  title        = {Designated Verifier Signature with Claimability},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {107},
  number       = {3},
  pages        = {203--217},
  year         = {2024},
  url          = {https://doi.org/10.1587/transfun.2023cip0016},
  doi          = {10.1587/TRANSFUN.2023CIP0016},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/YamashitaHWYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MinematsuSWY23,
  author       = {Kazuhiko Minematsu and
                  Junji Shikata and
                  Yohei Watanabe and
                  Naoto Yanai},
  title        = {Anonymous Broadcast Authentication With One-to-Many Transmission to
                  Control IoT Devices},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {62955--62969},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3288337},
  doi          = {10.1109/ACCESS.2023.3288337},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MinematsuSWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kobayashi0MS23,
  author       = {Hirokazu Kobayashi and
                  Yohei Watanabe and
                  Kazuhiko Minematsu and
                  Junji Shikata},
  title        = {Tight lower bounds and optimal constructions of anonymous broadcast
                  encryption and authentication},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2523--2562},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01211-x},
  doi          = {10.1007/S10623-023-01211-X},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kobayashi0MS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/MatsumineOS23,
  author       = {Toshiki Matsumine and
                  Hideki Ochiai and
                  Junji Shikata},
  title        = {A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret
                  Key Generation From Wireless Channels},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {27},
  number       = {12},
  pages        = {3166--3170},
  year         = {2023},
  url          = {https://doi.org/10.1109/LCOMM.2023.3323957},
  doi          = {10.1109/LCOMM.2023.3323957},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/icl/MatsumineOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/WatanabeSS23,
  author       = {Yohei Watanabe and
                  Takenobu Seito and
                  Junji Shikata},
  title        = {Multi-Designated Receiver Authentication Codes: Models and Constructions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {394--405},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022tap0015},
  doi          = {10.1587/TRANSFUN.2022TAP0015},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/WatanabeSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/NakaoYSTHTFTMSITITY23,
  author       = {Koji Nakao and
                  Katsunari Yoshioka and
                  Takayuki Sasaki and
                  Rui Tanabe and
                  Xuping Huang and
                  Takeshi Takahashi and
                  Akira Fujita and
                  Jun'ichi Takeuchi and
                  Noboru Murata and
                  Junji Shikata and
                  Kazuki Iwamoto and
                  Kazuki Takada and
                  Yuki Ishida and
                  Masaru Takeuchi and
                  Naoto Yanai},
  title        = {Mitigate: Toward Comprehensive Research and Development for Analyzing
                  and Combating IoT Malware},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {106},
  number       = {9},
  pages        = {1302--1315},
  year         = {2023},
  url          = {https://doi.org/10.1587/transinf.2022ici0001},
  doi          = {10.1587/TRANSINF.2022ICI0001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicetd/NakaoYSTHTFTMSITITY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CarnierLFS23,
  author       = {Rodrigo Matos Carnier and
                  Yue Li and
                  Yasutaka Fujimoto and
                  Junji Shikata},
  title        = {Exact Markov Chain of Random Propagation of Malware With Network-Level
                  Mitigation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {12},
  pages        = {10933--10947},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3240421},
  doi          = {10.1109/JIOT.2023.3240421},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/CarnierLFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/YamashitaH0YS23,
  author       = {Kyosuke Yamashita and
                  Keisuke Hara and
                  Yohei Watanabe and
                  Naoto Yanai and
                  Junji Shikata},
  editor       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {Designated Verifier Signature with Claimability},
  booktitle    = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591866.3593071},
  doi          = {10.1145/3591866.3593071},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/YamashitaH0YS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AonoS23,
  author       = {Yoshinori Aono and
                  Junji Shikata},
  editor       = {Jing Deng and
                  Vladimir Kolesnikov and
                  Alexander A. Schwarzmann},
  title        = {Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts
                  from {LWE}},
  booktitle    = {Cryptology and Network Security - 22nd International Conference, {CANS}
                  2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14342},
  pages        = {28--50},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7563-1\_2},
  doi          = {10.1007/978-981-99-7563-1\_2},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AonoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/LiuWS23,
  author       = {Yexuan Liu and
                  Yohei Watanabe and
                  Junji Shikata},
  title        = {Forward and Backward Private Dynamic Searchable Encryption with Better
                  Space Efficiency},
  booktitle    = {57th Annual Conference on Information Sciences and Systems, {CISS}
                  2023, Baltimore, MD, USA, March 22-24, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CISS56502.2023.10089760},
  doi          = {10.1109/CISS56502.2023.10089760},
  timestamp    = {Sat, 22 Apr 2023 16:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/LiuWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AdomnicaiMS23,
  author       = {Alexandre Adomnicai and
                  Kazuhiko Minematsu and
                  Junji Shikata},
  editor       = {Mike Rosulek},
  title        = {Authenticated Encryption for Very Short Inputs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the
                  {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13871},
  pages        = {553--572},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30872-7\_21},
  doi          = {10.1007/978-3-031-30872-7\_21},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AdomnicaiMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WatanabeYS23,
  author       = {Yohei Watanabe and
                  Naoto Yanai and
                  Junji Shikata},
  editor       = {Weizhi Meng and
                  Zheng Yan and
                  Vincenzo Piuri},
  title        = {IoT-REX: {A} Secure Remote-Control System for IoT Devices from Centralized
                  Multi-designated Verifier Signatures},
  booktitle    = {Information Security Practice and Experience - 18th International
                  Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14341},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7032-2\_7},
  doi          = {10.1007/978-981-99-7032-2\_7},
  timestamp    = {Wed, 15 Nov 2023 10:18:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WatanabeYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChikuHS23,
  author       = {Sohto Chiku and
                  Keisuke Hara and
                  Junji Shikata},
  editor       = {Weizhi Meng and
                  Zheng Yan and
                  Vincenzo Piuri},
  title        = {Chosen Ciphertext Security for Blind Identity-Based Encryption with
                  Certified Identities},
  booktitle    = {Information Security Practice and Experience - 18th International
                  Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14341},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7032-2\_18},
  doi          = {10.1007/978-981-99-7032-2\_18},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ChikuHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/HiroseS23,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  title        = {Group-Testing Aggregate Entity Authentication},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France,
                  April 23-28, 2023},
  pages        = {227--231},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ITW55543.2023.10160240},
  doi          = {10.1109/ITW55543.2023.10160240},
  timestamp    = {Wed, 05 Jul 2023 16:00:01 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/HiroseS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/ChenJSS23,
  author       = {Jiawei Chen and
                  Hyungrok Jo and
                  Shingo Sato and
                  Junji Shikata},
  editor       = {Thomas Johansson and
                  Daniel Smith{-}Tone},
  title        = {A Tightly Secure Identity-Based Signature Scheme from Isogenies},
  booktitle    = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto
                  2023, College Park, MD, USA, August 16-18, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14154},
  pages        = {141--163},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-40003-2\_6},
  doi          = {10.1007/978-3-031-40003-2\_6},
  timestamp    = {Mon, 14 Aug 2023 16:42:49 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/ChenJSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChikuHS23,
  author       = {Sohto Chiku and
                  Keisuke Hara and
                  Junji Shikata},
  editor       = {Mingwu Zhang and
                  Man Ho Au and
                  Yudi Zhang},
  title        = {Identity-Based Matchmaking Encryption Secure Against Key Generation
                  Center},
  booktitle    = {Provable and Practical Security - 17th International Conference, ProvSec
                  2023, Wuhan, China, October 20-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14217},
  pages        = {251--273},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45513-1\_14},
  doi          = {10.1007/978-3-031-45513-1\_14},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ChikuHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rws/HamaHOS23,
  author       = {Yuto Hama and
                  Kazuaki Hanazawa and
                  Hideki Ochiai and
                  Junji Shikata},
  title        = {Performance Analysis for Coded Wireless Steganography System with
                  {OFDM} Signaling},
  booktitle    = {{IEEE} Radio and Wireless Symposium, {RWS} 2023, Las Vegas, NV, USA,
                  January 22-25, 2023},
  pages        = {7--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RWS55624.2023.10046336},
  doi          = {10.1109/RWS55624.2023.10046336},
  timestamp    = {Wed, 01 Mar 2023 21:14:40 +0100},
  biburl       = {https://dblp.org/rec/conf/rws/HamaHOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JoS23,
  author       = {Hyungrok Jo and
                  Junji Shikata},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Bloomier Filters on 3-Hypergraphs},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {16--26},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_2},
  doi          = {10.1007/978-981-99-8024-6\_2},
  timestamp    = {Thu, 18 Jan 2024 08:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/JoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2023,
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1},
  doi          = {10.1007/978-3-031-41326-1},
  isbn         = {978-3-031-41325-4},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoS23,
  author       = {Yoshinori Aono and
                  Junji Shikata},
  title        = {Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts
                  from {DLP} or {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/351},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiMS23,
  author       = {Alexandre Adomnicai and
                  Kazuhiko Minematsu and
                  Junji Shikata},
  title        = {Authenticated Encryption for Very Short Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/361},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoSS23,
  author       = {Hyungrok Jo and
                  Shingo Sato and
                  Junji Shikata},
  title        = {A Tightly Secure Identity-based Signature Scheme from Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/426},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoS23,
  author       = {Shingo Sato and
                  Junji Shikata},
  title        = {Compact Bounded-Collusion Identity-based Encryption via Group Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/444},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TomitaS23,
  author       = {Toi Tomita and
                  Junji Shikata},
  title        = {Compact Signature Aggregation from Module-Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/471},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TomitaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChikuHHS23,
  author       = {Sohto Chiku and
                  Keitaro Hashimoto and
                  Keisuke Hara and
                  Junji Shikata},
  title        = {Identity-Based Matchmaking Encryption, Revisited: Strong Security
                  and Practical Constructions from Standard Classical and Post-Quantum
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1435},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1435},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChikuHHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MatsumineOS22,
  author       = {Toshiki Matsumine and
                  Hideki Ochiai and
                  Junji Shikata},
  title        = {Security Gap Improvement of {BICM} Systems Through Bit-Labeling Optimization
                  for the Gaussian Wiretap Channel},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {47805--47813},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3172481},
  doi          = {10.1109/ACCESS.2022.3172481},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MatsumineOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SatoS22,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Leonard Barolli and
                  Farookh Hussain and
                  Tomoya Enokido},
  title        = {Quantum-Secure Aggregate One-time Signatures with Detecting Functionality},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 36th International Conference on Advanced Information Networking
                  and Applications (AINA-2022), Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {450},
  pages        = {573--585},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99587-4\_49},
  doi          = {10.1007/978-3-030-99587-4\_49},
  timestamp    = {Thu, 31 Mar 2022 15:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/SatoS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/SeitoSW22,
  author       = {Takenobu Seito and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Multi-Designated Receiver Authentication-Codes with Information-Theoretic
                  Security},
  booktitle    = {56th Annual Conference on Information Sciences and Systems, {CISS}
                  2022, Princeton, NJ, USA, March 9-11, 2022},
  pages        = {84--89},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CISS53076.2022.9751164},
  doi          = {10.1109/CISS53076.2022.9751164},
  timestamp    = {Fri, 22 Apr 2022 19:18:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/SeitoSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SatoSM22,
  author       = {Shingo Sato and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Group Testing Aggregate Signatures with Soundness},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {363--381},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_18},
  doi          = {10.1007/978-3-031-29371-9\_18},
  timestamp    = {Thu, 06 Apr 2023 10:01:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SatoSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SatoS22,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Identity-based Interactive Aggregate Signatures from Lattices},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {408--432},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_20},
  doi          = {10.1007/978-3-031-29371-9\_20},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SatoS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2022-1,
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2},
  doi          = {10.1007/978-3-030-97121-2},
  isbn         = {978-3-030-97120-5},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2022-2,
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1},
  doi          = {10.1007/978-3-030-97131-1},
  isbn         = {978-3-030-97130-4},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-03781,
  author       = {Yohei Watanabe and
                  Naoto Yanai and
                  Junji Shikata},
  title        = {IoT-REX: {A} Secure Remote-Control System for IoT Devices from Centralized
                  Multi-Designated Verifier Signatures},
  journal      = {CoRR},
  volume       = {abs/2208.03781},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.03781},
  doi          = {10.48550/ARXIV.2208.03781},
  eprinttype    = {arXiv},
  eprint       = {2208.03781},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-03781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoS22,
  author       = {Shingo Sato and
                  Junji Shikata},
  title        = {Quantum-Secure Aggregate One-time Signatures with Detecting Functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/272},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoS22a,
  author       = {Shingo Sato and
                  Junji Shikata},
  title        = {{SO-CCA} Secure {PKE} in the Quantum Random Oracle Model or the Quantum
                  Ideal Cipher Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/617},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/0001YS21,
  author       = {Yohei Watanabe and
                  Naoto Yanai and
                  Junji Shikata},
  editor       = {Leonard Barolli and
                  Isaac Woungang and
                  Tomoya Enokido},
  title        = {Anonymous Broadcast Authentication for Securely Remote-Controlling
                  IoT Devices},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 35th International Conference on Advanced Information Networking
                  and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021,
                  Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {226},
  pages        = {679--690},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75075-6\_56},
  doi          = {10.1007/978-3-030-75075-6\_56},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/0001YS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EbinaMSW21,
  author       = {Masahiro Ebina and
                  Jumpei Mita and
                  Junji Shikata and
                  Yohei Watanabe},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Efficient Threshold Public Key Encryption from the Computational Bilinear
                  Diffie-Hellman Assumption},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458296},
  doi          = {10.1145/3457338.3458296},
  timestamp    = {Wed, 16 Jun 2021 07:21:06 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EbinaMSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KobayashiWS21,
  author       = {Hirokazu Kobayashi and
                  Yohei Watanabe and
                  Junji Shikata},
  editor       = {Maura B. Paterson},
  title        = {Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption
                  and Authentication},
  booktitle    = {Cryptography and Coding - 18th {IMA} International Conference, {IMACC}
                  2021, Virtual Event, December 14-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13129},
  pages        = {105--128},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92641-0\_6},
  doi          = {10.1007/978-3-030-92641-0\_6},
  timestamp    = {Tue, 28 Dec 2021 15:25:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KobayashiWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpmc/HamaOS21,
  author       = {Yuto Hama and
                  Hideki Ochiai and
                  Junji Shikata},
  title        = {Performance Analysis of Wireless Steganography based on {OFDM} and
                  DFT-s-OFDM Signals over Frequency-Selective Rayleigh Fading Channels},
  booktitle    = {24th International Symposium on Wireless Personal Multimedia Communications,
                  {WPMC} 2021, Okayama, Japan, December 14-16, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WPMC52694.2021.9700466},
  doi          = {10.1109/WPMC52694.2021.9700466},
  timestamp    = {Mon, 14 Feb 2022 08:36:46 +0100},
  biburl       = {https://dblp.org/rec/conf/wpmc/HamaOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HiroseS20,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  title        = {Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {216116--216126},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3041638},
  doi          = {10.1109/ACCESS.2020.3041638},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HiroseS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/OgawaSSI20,
  author       = {Yoshinori Ogawa and
                  Shingo Sato and
                  Junji Shikata and
                  Hideki Imai},
  title        = {Aggregate Message Authentication Codes with Detecting Functionality
                  from Biorthogonal Codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2020,
                  Los Angeles, CA, USA, June 21-26, 2020},
  pages        = {868--873},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISIT44484.2020.9174346},
  doi          = {10.1109/ISIT44484.2020.9174346},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/OgawaSSI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/IdaS020,
  author       = {Junichi Ida and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {On the Power of Interaction in Signcryption},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {348--352},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366140},
  timestamp    = {Mon, 22 Mar 2021 15:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/IdaS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/YamaguchiOS20,
  author       = {Ryohei Yamaguchi and
                  Hideki Ochiai and
                  Junji Shikata},
  title        = {A Physical-Layer Security Based on Wireless Steganography Through
                  {OFDM} and DFT-Precoded {OFDM} Signals},
  booktitle    = {91st {IEEE} Vehicular Technology Conference, {VTC} Spring 2020, Antwerp,
                  Belgium, May 25-28, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VTC2020-Spring48590.2020.9129376},
  doi          = {10.1109/VTC2020-SPRING48590.2020.9129376},
  timestamp    = {Wed, 15 Jul 2020 15:28:22 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/YamaguchiOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoS20,
  author       = {Shingo Sato and
                  Junji Shikata},
  title        = {Interactive Aggregate Message Authentication Equipped with Detecting
                  Functionality from Adaptive Group Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1218},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1218},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoSM20,
  author       = {Shingo Sato and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  title        = {Aggregate Signature with Detecting Functionality from Group Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1219},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1219},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShikataW19,
  author       = {Junji Shikata and
                  Yohei Watanabe},
  title        = {Identity-based encryption with hierarchical key-insulation in the
                  standard model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1005--1033},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0503-4},
  doi          = {10.1007/S10623-018-0503-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShikataW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SatoHS19,
  author       = {Shingo Sato and
                  Shoichi Hirose and
                  Junji Shikata},
  title        = {Sequential Aggregate MACs from Any MACs: Aggregation and Detecting
                  Functionality},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {2--23},
  year         = {2019},
  url          = {https://doi.org/10.22667/JISIS.2019.02.28.002},
  doi          = {10.22667/JISIS.2019.02.28.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SatoHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SatoS19,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido},
  title        = {Interactive Aggregate Message Authentication Scheme with Detecting
                  Functionality},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 33rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2019, Matsue, Japan, March 27-29, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {926},
  pages        = {1316--1328},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15032-7\_110},
  doi          = {10.1007/978-3-030-15032-7\_110},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/SatoS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/HiroseS19,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  title        = {Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate
                  {MAC} Scheme},
  booktitle    = {Seventh International Symposium on Computing and Networking Workshops,
                  {CANDAR} 2019 Workshops, Nagasaki, Japan, November 26-29, 2019},
  pages        = {327--332},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CANDARW.2019.00064},
  doi          = {10.1109/CANDARW.2019.00064},
  timestamp    = {Tue, 04 Feb 2020 15:59:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/HiroseS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SatoS19,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Martin Albrecht},
  title        = {Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {295--316},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_15},
  doi          = {10.1007/978-3-030-35199-1\_15},
  timestamp    = {Fri, 15 Dec 2023 20:21:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SatoS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SatoS19a,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Martin Albrecht},
  title        = {{SO-CCA} Secure {PKE} in the Quantum Random Oracle Model or the Quantum
                  Ideal Cipher Model},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {317--341},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_16},
  doi          = {10.1007/978-3-030-35199-1\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/SatoS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SatoHS19,
  author       = {Shingo Sato and
                  Shoichi Hirose and
                  Junji Shikata},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Sequential Aggregate MACs with Detecting Functionality Revisited},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {387--407},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_23},
  doi          = {10.1007/978-3-030-36938-5\_23},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/SatoHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HiroseS19,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {History-Free Sequential Aggregate {MAC} Revisited},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_5},
  doi          = {10.1007/978-3-030-31919-9\_5},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HiroseS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WatanabeS18,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  title        = {Timed-release computational secret sharing and threshold encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {17--54},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-016-0324-2},
  doi          = {10.1007/S10623-016-0324-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WatanabeS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/Prasitsupparote18,
  author       = {Amonrat Prasitsupparote and
                  Norio Konno and
                  Junji Shikata},
  title        = {Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors
                  with Finite Input Sequences},
  journal      = {Entropy},
  volume       = {20},
  number       = {10},
  pages        = {729},
  year         = {2018},
  url          = {https://doi.org/10.3390/e20100729},
  doi          = {10.3390/E20100729},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/Prasitsupparote18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/IwamotoOS18,
  author       = {Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Junji Shikata},
  title        = {Security Formalizations and Their Relationships for Encryption and
                  Key Agreement in Information-Theoretic Cryptography},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {1},
  pages        = {654--685},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2744650},
  doi          = {10.1109/TIT.2017.2744650},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/IwamotoOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AonoNSS18,
  author       = {Yoshinori Aono and
                  Phong Q. Nguyen and
                  Takenobu Seito and
                  Junji Shikata},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Lower Bounds on Lattice Enumeration with Extreme Pruning},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {608--637},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_21},
  doi          = {10.1007/978-3-319-96881-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AonoNSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HiroseS18,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Non-adaptive Group-Testing Aggregate {MAC} Scheme},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {357--372},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_22},
  doi          = {10.1007/978-3-319-99807-7\_22},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/HiroseS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/SatoS18,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Tanja Lange and
                  Rainer Steinwandt},
  title        = {Lattice-Based Signcryption Without Random Oracles},
  booktitle    = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
                  2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10786},
  pages        = {331--351},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-79063-3\_16},
  doi          = {10.1007/978-3-319-79063-3\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/SatoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SatoHS18,
  author       = {Shingo Sato and
                  Shoichi Hirose and
                  Junji Shikata},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Generic Construction of Sequential Aggregate MACs from Any MACs},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_17},
  doi          = {10.1007/978-3-030-01446-9\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SatoHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SatoS18,
  author       = {Shingo Sato and
                  Junji Shikata},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Signcryption with Quantum Random Oracles},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {406--414},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_24},
  doi          = {10.1007/978-3-030-01446-9\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SatoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiroseS18,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  title        = {Non-adaptive Group-Testing Aggregate {MAC} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HiroseS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoNSS18,
  author       = {Yoshinori Aono and
                  Phong Q. Nguyen and
                  Takenobu Seito and
                  Junji Shikata},
  title        = {Lower Bounds on Lattice Enumeration with Extreme Pruning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoNSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/IshidaSW17,
  author       = {Yuu Ishida and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {CCA-secure revocable identity-based encryption schemes with decryption
                  key exposure resistance},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {288--311},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007294},
  doi          = {10.1504/IJACT.2017.10007294},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/IshidaSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/Prasitsupparote17,
  author       = {Amonrat Prasitsupparote and
                  Norio Konno and
                  Junji Shikata},
  title        = {Numerical analysis of Elias's and Peres's deterministic extractors},
  booktitle    = {51st Annual Conference on Information Sciences and Systems, {CISS}
                  2017, Baltimore, MD, USA, March 22-24, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISS.2017.7926129},
  doi          = {10.1109/CISS.2017.7926129},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/Prasitsupparote17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/Yoshizawa0S17,
  author       = {Takahiro Yoshizawa and
                  Yohei Watanabe and
                  Junji Shikata},
  title        = {Unconditionally secure searchable encryption},
  booktitle    = {51st Annual Conference on Information Sciences and Systems, {CISS}
                  2017, Baltimore, MD, USA, March 22-24, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISS.2017.7926154},
  doi          = {10.1109/CISS.2017.7926154},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/Yoshizawa0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/Shikata17,
  author       = {Junji Shikata},
  title        = {Tighter bounds on entropy of secret keys in authentication codes},
  booktitle    = {2017 {IEEE} Information Theory Workshop, {ITW} 2017, Kaohsiung, Taiwan,
                  November 6-10, 2017},
  pages        = {259--263},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ITW.2017.8278016},
  doi          = {10.1109/ITW.2017.8278016},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/Shikata17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2017,
  editor       = {Junji Shikata},
  title        = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0},
  doi          = {10.1007/978-3-319-72089-0},
  isbn         = {978-3-319-72088-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/0001S16,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  title        = {Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs
                  between Communication and Storage},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {6},
  pages        = {1097--1106},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1097},
  doi          = {10.1587/TRANSFUN.E99.A.1097},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/0001S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/0001S16,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  title        = {Information-theoretically Secure Timed-release Secret Sharing Schemes},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {4},
  pages        = {680--689},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.680},
  doi          = {10.2197/IPSJJIP.24.680},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/0001S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/TomitaWS16,
  author       = {Shinichiro Tomita and
                  Yohei Watanabe and
                  Junji Shikata},
  title        = {Sequential aggregate authentication codes with information theoretic
                  security},
  booktitle    = {2016 Annual Conference on Information Science and Systems, {CISS}
                  2016, Princeton, NJ, USA, March 16-18, 2016},
  pages        = {192--197},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISS.2016.7460500},
  doi          = {10.1109/CISS.2016.7460500},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/TomitaWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/0001HS16,
  author       = {Yohei Watanabe and
                  Goichiro Hanaoka and
                  Junji Shikata},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction,
                  and Robustness},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {213--237},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_11},
  doi          = {10.1007/978-3-319-49175-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/0001HS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WatanabeS16,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Identity-Based Hierarchical Key-Insulated Encryption Without Random
                  Oracles},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {255--279},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_10},
  doi          = {10.1007/978-3-662-49384-7\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WatanabeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeHS16,
  author       = {Yohei Watanabe and
                  Goichiro Hanaoka and
                  Junji Shikata},
  title        = {Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction,
                  and Robustness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Shikata15,
  author       = {Junji Shikata},
  title        = {Trends and Development of Information-Theoretic Cryptography},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {16--25},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.16},
  doi          = {10.1587/TRANSFUN.E98.A.16},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Shikata15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshidaWS15,
  author       = {Yuu Ishida and
                  Yohei Watanabe and
                  Junji Shikata},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constructions of CCA-Secure Revocable Identity-Based Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_11},
  doi          = {10.1007/978-3-319-19962-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshidaWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SuYSM15,
  author       = {Jiawei Su and
                  Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic
                  Measures and Novelty Detection},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {278--293},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_18},
  doi          = {10.1007/978-3-319-30840-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SuYSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GotoS15,
  author       = {Shota Goto and
                  Junji Shikata},
  editor       = {Jens Groth},
  title        = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic
                  Security, and Its Application to Oblivious Transfer},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {133--151},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_8},
  doi          = {10.1007/978-3-319-27239-9\_8},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GotoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/IwamotoS15,
  author       = {Mitsugu Iwamoto and
                  Junji Shikata},
  title        = {Constructions of symmetric-key encryption with guessing secrecy},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {725--729},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282550},
  doi          = {10.1109/ISIT.2015.7282550},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/IwamotoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WatanabeS15,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Constructions of Unconditionally Secure Broadcast Encryption from
                  Key Predistribution Systems with Trade-Offs Between Communication
                  and Storage},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {489--502},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_27},
  doi          = {10.1007/978-3-319-26059-4\_27},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WatanabeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shikata15,
  author       = {Junji Shikata},
  title        = {Design and Analysis of Information-Theoretically Secure Authentication
                  Codes with Non-Uniformly Random Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shikata15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GotoS15,
  author       = {Shota Goto and
                  Junji Shikata},
  title        = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic
                  Security, and Its Application to Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {950},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/950},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GotoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeS15,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  title        = {Identity-based Hierarchical Key-insulated Encryption without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1254},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balkancryptsec/WatanabeS14,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  editor       = {Berna {\"{O}}rs and
                  Bart Preneel},
  title        = {Timed-Release Secret Sharing Schemes with Information Theoretic Security},
  booktitle    = {Cryptography and Information Security in the Balkans - First International
                  Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17,
                  2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9024},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21356-9\_15},
  doi          = {10.1007/978-3-319-21356-9\_15},
  timestamp    = {Tue, 16 Nov 2021 09:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/WatanabeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/IwamotoS14,
  author       = {Mitsugu Iwamoto and
                  Junji Shikata},
  title        = {Secret sharing schemes based on min-entropies},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {401--405},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6874863},
  doi          = {10.1109/ISIT.2014.6874863},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/IwamotoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WatanabeS14,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Timed-Release Computational Secret Sharing Scheme and Its Applications},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {326--333},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_24},
  doi          = {10.1007/978-3-319-12475-9\_24},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WatanabeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WatanabeS14,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  title        = {Timed-Release Secret Sharing Scheme with Information Theoretic Security},
  journal      = {CoRR},
  volume       = {abs/1401.5895},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.5895},
  eprinttype    = {arXiv},
  eprint       = {1401.5895},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WatanabeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IwamotoS14,
  author       = {Mitsugu Iwamoto and
                  Junji Shikata},
  title        = {Secret Sharing Schemes Based on Min-Entropies},
  journal      = {CoRR},
  volume       = {abs/1401.5896},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.5896},
  eprinttype    = {arXiv},
  eprint       = {1401.5896},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/IwamotoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IwamotoOS14,
  author       = {Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Junji Shikata},
  title        = {Security Formalizations and Their Relationships for Encryption and
                  Key Agreement in Information-Theoretic Cryptography},
  journal      = {CoRR},
  volume       = {abs/1410.1120},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.1120},
  eprinttype    = {arXiv},
  eprint       = {1410.1120},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/IwamotoOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KubaiSW13,
  author       = {Asato Kubai and
                  Junji Shikata and
                  Yohei Watanabe},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Information-Theoretically Secure Aggregate Authentication Code: Model,
                  Bounds, and Constructions},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_2},
  doi          = {10.1007/978-3-642-40588-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KubaiSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HajimeWS13,
  author       = {Shogo Hajime and
                  Yohei Watanabe and
                  Junji Shikata},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Information-Theoretically Secure Entity Authentication in the Multi-user
                  Setting},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {400--417},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_24},
  doi          = {10.1007/978-3-319-12160-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HajimeWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/IwamotoS13,
  author       = {Mitsugu Iwamoto and
                  Junji Shikata},
  editor       = {Carles Padr{\'{o}}},
  title        = {Information Theoretic Security for Encryption Based on Conditional
                  R{\'{e}}nyi Entropies},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {103--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_7},
  doi          = {10.1007/978-3-319-04268-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/IwamotoS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/NakanoS13,
  author       = {Rintaro Nakano and
                  Junji Shikata},
  editor       = {Martijn Stam},
  title        = {Constructions of Signcryption in the Multi-user Setting from Identity-Based
                  Encryption},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {324--343},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_19},
  doi          = {10.1007/978-3-642-45239-0\_19},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/NakanoS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Shikata13,
  author       = {Junji Shikata},
  title        = {Formalization of information-theoretic security for key agreement,
                  revisited},
  booktitle    = {Proceedings of the 2013 {IEEE} International Symposium on Information
                  Theory, Istanbul, Turkey, July 7-12, 2013},
  pages        = {2720--2724},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISIT.2013.6620721},
  doi          = {10.1109/ISIT.2013.6620721},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Shikata13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwamotoS13,
  author       = {Mitsugu Iwamoto and
                  Junji Shikata},
  title        = {Information Theoretic Security for Encryption Based on Conditional
                  Renyi Entropies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwamotoS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WatanabeSS12,
  author       = {Yohei Watanabe and
                  Takenobu Seito and
                  Junji Shikata},
  editor       = {Adam D. Smith},
  title        = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption,
                  and Authentication Codes},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {167--186},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_10},
  doi          = {10.1007/978-3-642-32284-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/WatanabeSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/FujiiYSM12,
  author       = {Takayoshi Fujii and
                  Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  title        = {An Efficient Dynamic Detection Method for Various x86 Shellcodes},
  booktitle    = {12th {IEEE/IPSJ} International Symposium on Applications and the Internet,
                  {SAINT} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {284--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SAINT.2012.52},
  doi          = {10.1109/SAINT.2012.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/FujiiYSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shikata12,
  author       = {Junji Shikata},
  title        = {Formalization of Information-Theoretic Security for Encryption and
                  Key Agreement, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shikata12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeSS12,
  author       = {Yohei Watanabe and
                  Takenobu Seito and
                  Junji Shikata},
  title        = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption,
                  and Authentication Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimOYISESMN11,
  author       = {Hyung Chan Kim and
                  Tatsunori Orii and
                  Katsunari Yoshioka and
                  Daisuke Inoue and
                  Jungsuk Song and
                  Masashi Eto and
                  Junji Shikata and
                  Tsutomu Matsumoto and
                  Koji Nakao},
  title        = {An Empirical Evaluation of an Unpacking Method Implemented with Dynamic
                  Binary Instrumentation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {9},
  pages        = {1778--1791},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.1778},
  doi          = {10.1587/TRANSINF.E94.D.1778},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimOYISESMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ShikataY11,
  author       = {Junji Shikata and
                  Daisuke Yamanaka},
  editor       = {Liqun Chen},
  title        = {Bit Commitment in the Bounded Storage Model: Tight Bound and Simple
                  Optimal Construction},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {112--131},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_8},
  doi          = {10.1007/978-3-642-25516-8\_8},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/ShikataY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ShibuyaS11,
  author       = {Yuki Shibuya and
                  Junji Shikata},
  editor       = {Liqun Chen},
  title        = {Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism
                  with Authenticity},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {210--229},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_13},
  doi          = {10.1007/978-3-642-25516-8\_13},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/ShibuyaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/SeitoS11,
  author       = {Takenobu Seito and
                  Junji Shikata},
  title        = {Information-theoretically secure key-insulated key-agreement},
  booktitle    = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil,
                  October 16-20, 2011},
  pages        = {287--291},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ITW.2011.6089438},
  doi          = {10.1109/ITW.2011.6089438},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/SeitoS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MuramatsuISO10,
  author       = {Daigo Muramatsu and
                  Manabu Inuma and
                  Junji Shikata and
                  Akira Otsuka},
  title        = {Enhanced Cancelable Biometrics for Online Signature Verification},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1254--1259},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1254},
  doi          = {10.1587/TRANSFUN.E93.A.1254},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MuramatsuISO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SeitoASM10,
  author       = {Takenobu Seito and
                  Tadashi Aikawa and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Information-Theoretically Secure Key-Insulated Multireceiver Authentication
                  Codes},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {148--165},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_10},
  doi          = {10.1007/978-3-642-12678-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SeitoASM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SeitoHSM09,
  author       = {Takenobu Seito and
                  Yuki Hara and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  title        = {Unconditionally Secure Group Signatures},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {2067--2085},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.2067},
  doi          = {10.1587/TRANSFUN.E92.A.2067},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SeitoHSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psec/HaraISM09,
  author       = {Yuki Hara and
                  Taiki Ishiwata and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {V{\'{e}}ronique Cortier and
                  Claude Kirchner and
                  Mitsuhiro Okada and
                  Hideki Sakurada},
  title        = {Unconditionally Secure Blind Authentication Codes: The Model, Constructions,
                  and Links to Commitment},
  booktitle    = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese
                  Collaboration},
  series       = {Lecture Notes in Computer Science},
  volume       = {5458},
  pages        = {116--137},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02002-5\_7},
  doi          = {10.1007/978-3-642-02002-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/psec/HaraISM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/KorzhikISMG08,
  author       = {Valery I. Korzhik and
                  Hideki Imai and
                  Junji Shikata and
                  Guillermo Morales{-}Luna and
                  Ekaterina Gerling},
  title        = {On the Use of Bhattacharyya Distance as a Measure of the Detectability
                  of Steganographic Systems},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {3},
  pages        = {23--32},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69019-1\_2},
  doi          = {10.1007/978-3-540-69019-1\_2},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/KorzhikISMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ShikataM08,
  author       = {Junji Shikata and
                  Tsutomu Matsumoto},
  title        = {Unconditionally Secure Steganography Against Active Attacks},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2690--2705},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921884},
  doi          = {10.1109/TIT.2008.921884},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ShikataM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshiharaAHS07,
  author       = {Takeru Ishihara and
                  Hiroshi Aono and
                  Sadayuki Hongo and
                  Junji Shikata},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Construction of Threshold (Hybrid) Encryption in the Random Oracle
                  Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure
                  Threshold {KEM}},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_20},
  doi          = {10.1007/978-3-540-73458-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshiharaAHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HaraSSM07,
  author       = {Yuki Hara and
                  Takenobu Seito and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Yvo Desmedt},
  title        = {Unconditionally Secure Blind Signatures},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_2},
  doi          = {10.1007/978-3-642-10230-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HaraSSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Shikata07,
  author       = {Junji Shikata},
  editor       = {Yvo Desmedt},
  title        = {Construction Methodology of Unconditionally Secure Signature Schemes},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {113--114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_9},
  doi          = {10.1007/978-3-642-10230-1\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Shikata07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HanaokaSHI06,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yumiko Hanaoka and
                  Hideki Imai},
  title        = {Unconditionally Secure Anonymous Encryption and Group Authentication},
  journal      = {Comput. J.},
  volume       = {49},
  number       = {3},
  pages        = {310--321},
  year         = {2006},
  url          = {https://doi.org/10.1093/comjnl/bxh149},
  doi          = {10.1093/COMJNL/BXH149},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HanaokaSHI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshiokaSM05,
  author       = {Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  title        = {On Collusion Security of Random Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {296--304},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_296\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshiokaSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HanaokaHSI05,
  author       = {Yumiko Hanaoka and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Bimal K. Roy},
  title        = {Identity-Based Hierarchical Strongly Key-Insulated Encryption and
                  Its Application},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {495--514},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_27},
  doi          = {10.1007/11593447\_27},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HanaokaHSI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/MatsumotoS05,
  author       = {Tsutomu Matsumoto and
                  Junji Shikata},
  title        = {Authenticated encryption and steganography in unconditional security
                  setting},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543946},
  doi          = {10.1109/ITWTPI.2005.1543946},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/MatsumotoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanaokaSZI04,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yuliang Zheng and
                  Hideki Imai},
  title        = {Efficient Unconditionally Secure Digital Signatures},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {120--130},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_120\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanaokaSZI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhangHSI04,
  author       = {Rui Zhang and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {360--374},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_26},
  doi          = {10.1007/978-3-540-24632-9\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhangHSI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaHSI04,
  author       = {Yumiko Hanaoka and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  title        = {Identity-Based Hierarchical Strongly Key-Insulated Encryption and
                  Its Application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaHSI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/KimSMI03,
  author       = {Mira Kim and
                  Junji Shikata and
                  Hirofumi Muratani and
                  Hideki Imai},
  title        = {Constructing \emph{c}-Secure {CRT} Codes Using Polynomials over Finite
                  Fields},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {12},
  pages        = {3259--3266},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_12\_3259},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/KimSMI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YoshiokaSM03,
  author       = {Katsunari Yoshioka and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Systematic Treatment of Collusion Secure Codes: Security Definitions
                  and Their Relations},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {408--421},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_31},
  doi          = {10.1007/10958513\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YoshiokaSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HanaokaSHI03,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yumiko Hanaoka and
                  Hideki Imai},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {The Role of Arbiters in Asymmetric Authentication Schemes},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {428--441},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_33},
  doi          = {10.1007/10958513\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HanaokaSHI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WatanabeSI03,
  author       = {Yodai Watanabe and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Yvo Desmedt},
  title        = {Equivalence between Semantic Security and Indistinguishability against
                  Chosen Ciphertext Attacks},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {71--84},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_6},
  doi          = {10.1007/3-540-36288-6\_6},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WatanabeSI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeS03,
  author       = {Yodai Watanabe and
                  Junji Shikata},
  title        = {Relation among simulator-based and comparison-based definitions of
                  semantic security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002HSI03,
  author       = {Rui Zhang and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  title        = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002HSI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OtsukaHSI02,
  author       = {Akira Otsuka and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  title        = {An Unconditionally Secure Electronic Cash Scheme with Computational
                  Untraceability},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {85-A},
  number       = {1},
  pages        = {140--148},
  year         = {2002},
  url          = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_140},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OtsukaHSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/HanaokaSZI02,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yuliang Zheng and
                  Hideki Imai},
  title        = {A Traitor Traceable Conference System with Dynamic Sender},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {85-A},
  number       = {1},
  pages        = {167--174},
  year         = {2002},
  url          = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_167},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/HanaokaSZI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HanaokaSHI02,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yumiko Hanaoka and
                  Hideki Imai},
  editor       = {Yuliang Zheng},
  title        = {Unconditionally Secure Anonymous Encryption and Group Authentication},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {81--99},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_5},
  doi          = {10.1007/3-540-36178-2\_5},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HanaokaSHI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShikataHZI02,
  author       = {Junji Shikata and
                  Goichiro Hanaoka and
                  Yuliang Zheng and
                  Hideki Imai},
  editor       = {Lars R. Knudsen},
  title        = {Security Notions for Unconditionally Secure Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {434--449},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_29},
  doi          = {10.1007/3-540-46035-7\_29},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShikataHZI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HanaokaHSI02,
  author       = {Yumiko Hanaoka and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds
                  and Constructions},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_8},
  doi          = {10.1007/3-540-36159-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HanaokaHSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YonezawaHSI02,
  author       = {Shoko Yonezawa and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {Traceability Schemes for Signed Documents},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {257--271},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_20},
  doi          = {10.1007/3-540-45811-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YonezawaHSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/ImaiHSON02,
  author       = {Hideki Imai and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Akira Otsuka and
                  Anderson C. A. Nascimento},
  title        = {Cryptography with information theoretic security},
  booktitle    = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW}
                  2002, 20-25 October 2002, Bangalore, India},
  pages        = {73},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ITW.2002.1115419},
  doi          = {10.1109/ITW.2002.1115419},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/ImaiHSON02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HanaokaSZI02,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yuliang Zheng and
                  Hideki Imai},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Efficient and Unconditionally Secure Digital Signatures and a Security
                  Analysis of a Multireceiver Authentication Code},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_5},
  doi          = {10.1007/3-540-45664-3\_5},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HanaokaSZI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeSI02,
  author       = {Yodai Watanabe and
                  Junji Shikata and
                  Hideki Imai},
  title        = {Equivalence between semantic security and indistinguishability against
                  chosen ciphertext attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HanaokaSZI00,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yuliang Zheng and
                  Hideki Imai},
  editor       = {Tatsuaki Okamoto},
  title        = {Unconditionally Secure Digital Signature Schemes Admitting Transferability},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {130--142},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_11},
  doi          = {10.1007/3-540-44448-3\_11},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HanaokaSZI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShikataZSI99,
  author       = {Junji Shikata and
                  Yuliang Zheng and
                  Joe Suzuki and
                  Hideki Imai},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Optimizing the Menezes-Okamoto-Vanstone {(MOV)} Algorithm for Non-supersingular
                  Elliptic Curves},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {86--102},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_9},
  doi          = {10.1007/978-3-540-48000-6\_9},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShikataZSI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HarasawaSSI99,
  author       = {Ryuichi Harasawa and
                  Junji Shikata and
                  Joe Suzuki and
                  Hideki Imai},
  editor       = {Jacques Stern},
  title        = {Comparing the {MOV} and {FR} Reductions in Elliptic Curve Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {190--205},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_14},
  doi          = {10.1007/3-540-48910-X\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HarasawaSSI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics